473,804 Members | 2,255 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How To Create Login Password Protected Database

Hello again,

I have to go home and read up on Access.

But, I have read else-where in this newsgroup that I can just save the
password in the database under scrutiny.

Wouldn't it be wasteful to create a password column for all database
entries?

E.G.:

Entry 1: password field1 ... fieldn
....
Entry M:password field1 ... fieldn

Note: For security reasons (unless I have to), I do not want to
hardcode passwords in VB 8, or save encryted passwords in a text file..

Thanks,
Christopher Lusardi

May 2 '06 #1
6 3163
Access supports workgroup security files. This allows you to create users,
groups and assign security to the database objects even at the field level.
Once the workgroup file is setup, you can then provide a simple interface in
your application to prompt the user for the login information. The security
will be much like that of SQL or Oracle once implemented.

Have a look at
http://office.microsoft.com/en-us/as...704101033.aspx
<cl********@aol .com> wrote in message
news:11******** *************@g 10g2000cwb.goog legroups.com...
Hello again,

I have to go home and read up on Access.

But, I have read else-where in this newsgroup that I can just save the
password in the database under scrutiny.

Wouldn't it be wasteful to create a password column for all database
entries?

E.G.:

Entry 1: password field1 ... fieldn
...
Entry M:password field1 ... fieldn

Note: For security reasons (unless I have to), I do not want to
hardcode passwords in VB 8, or save encryted passwords in a text file..

Thanks,
Christopher Lusardi

May 2 '06 #2
IMHO, the security on Access is very weak because the security file can be
deleted and the database can be exposed to anyone.

"AMDRIT" wrote:
Access supports workgroup security files. This allows you to create users,
groups and assign security to the database objects even at the field level.
Once the workgroup file is setup, you can then provide a simple interface in
your application to prompt the user for the login information. The security
will be much like that of SQL or Oracle once implemented.

Have a look at
http://office.microsoft.com/en-us/as...704101033.aspx
<cl********@aol .com> wrote in message
news:11******** *************@g 10g2000cwb.goog legroups.com...
Hello again,

I have to go home and read up on Access.

But, I have read else-where in this newsgroup that I can just save the
password in the database under scrutiny.

Wouldn't it be wasteful to create a password column for all database
entries?

E.G.:

Entry 1: password field1 ... fieldn
...
Entry M:password field1 ... fieldn

Note: For security reasons (unless I have to), I do not want to
hardcode passwords in VB 8, or save encryted passwords in a text file..

Thanks,
Christopher Lusardi


May 2 '06 #3

AverageUser wrote:
IMHO, the security on Access is very weak because the security file can be
deleted and the database can be exposed to anyone.


What can I do about this? If I throw away VB and use Access directly
would that be better, or should I use something such as Oracle?

Thank you,
Christopher Lusardi

May 3 '06 #4
Every lock has a lockpick. Access' security file is good enough. LAN
deployments are reasonably safe, just like pending deposits your accountants
manage. It would be more secure than a CSV file. If you are that concerned
about the security, create a webservice or remoting service and put the
server in a NOC, or move to a major RDBMS.

I don't think that security should be the main focus with Access. Rather,
file locks on Novell servers, or data contention and disaster recovery
should be the main focus.

More about that security file. If you attempt to open the MDB without the
security file, you will recieve an error. The only way I suppose you could
bypass the security file, is to modify the header of the database itself.
Absense of the security file is the same as absense of your key on the way
back from vacation; there may be another way in, most people wont try it.

"AverageUse r" <Av*********@di scussions.micro soft.com> wrote in message
news:29******** *************** ***********@mic rosoft.com...
IMHO, the security on Access is very weak because the security file can be
deleted and the database can be exposed to anyone.

"AMDRIT" wrote:
Access supports workgroup security files. This allows you to create
users,
groups and assign security to the database objects even at the field
level.
Once the workgroup file is setup, you can then provide a simple interface
in
your application to prompt the user for the login information. The
security
will be much like that of SQL or Oracle once implemented.

Have a look at
http://office.microsoft.com/en-us/as...704101033.aspx
<cl********@aol .com> wrote in message
news:11******** *************@g 10g2000cwb.goog legroups.com...
> Hello again,
>
> I have to go home and read up on Access.
>
> But, I have read else-where in this newsgroup that I can just save the
> password in the database under scrutiny.
>
> Wouldn't it be wasteful to create a password column for all database
> entries?
>
> E.G.:
>
> Entry 1: password field1 ... fieldn
> ...
> Entry M:password field1 ... fieldn
>
> Note: For security reasons (unless I have to), I do not want to
> hardcode passwords in VB 8, or save encryted passwords in a text file..
>
> Thanks,
> Christopher Lusardi
>


May 3 '06 #5
I think I'll store hashed passwords in a database and keep a backup of
the database.

Chris

May 3 '06 #6
What is it that you want to protect, really, and from whom?

cl********@aol. com wrote:
Hello again,

I have to go home and read up on Access.

But, I have read else-where in this newsgroup that I can just save the
password in the database under scrutiny.

Wouldn't it be wasteful to create a password column for all database
entries?

E.G.:

Entry 1: password field1 ... fieldn
...
Entry M:password field1 ... fieldn

Note: For security reasons (unless I have to), I do not want to
hardcode passwords in VB 8, or save encryted passwords in a text file..

Thanks,
Christopher Lusardi

May 3 '06 #7

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
4764
by: Klaus Kragelund | last post by:
Hi I'm using DreamWeaver 2004 on a Win2k machine to create my homepage. After spending several hours of mingling with ASP I discover that my ISP doesn't support Access databases. So I turned to MySQL... However now I'm stuck. I created the files describes in this tutorial: http://www.gidforums.com/t-887.html But I know next to nothing about SQL. For example - where is the
0
1629
by: Brenny | last post by:
Hi I'm developing a project and in the project, I used crystal report. Firstly my database isn't protected with password. After finishing project I determined a password for my database. Firstly I opened my database as private usage. I determined a database password. Only password, there iso no login ID or user ID. After that, I edited my crystal report.In the crystal report I changed only jet database password. In the report...
2
1661
by: Brian Henry | last post by:
We have our windows forms login set up and working good, well it works at least, just now we need a logout button, so when you click on it, the user will be logged out of the authentication, how would we do this? this is how we are doing the login form ======= <authentication mode="Forms"> <forms loginUrl="/WebClient/SecurePages/logon.aspx" name="RSMNEmail" timeout="20" path="/"></forms>
5
1590
by: Alex Nitulescu | last post by:
Hi. Because I'm a beginner in creating controls, I spent more than two *&^#$ hours to create this "login" as a custom control and to make it work properly: _________________________________________________________________________________________________________ Imports System.ComponentModel Imports System.Web.UI Imports System.Web.UI.WebControls <Description("Provides a login component"), DefaultProperty(""),
7
1975
by: Samuel Shulman | last post by:
Is there a method that will indicate the person who logged successfully is Logged and therefore allowed to browse freely other then using the 'Web.Security.FormsAuthentication.RedirectFromLoginPage' method thanks, Samuel
2
4269
by: ad | last post by:
I use login control of VS2005 in my web application. The web applicaiton is developed in my notebook. It run ok in my notebook, but when I login in from another PC with the user ID and password, it can't login in. I tried again and again. When I login with incorrect password, the login control display the FailureText. But when I enter the correct password, the Failure Text disappear but it still stay in the login page.
9
3601
by: Ben | last post by:
Hello, I'll bet this has been asked a million times but I can't seem to find a thread that gives the clear example I need. This PC has MySQL and IIS configured and running. The MySQL database is "myDB" with a table "myUsers" with fields "Username" and "Password". I also have the MySQL ODBC driver loaded with a DSN "dsnMySQL" setup. First question is can someone direct me to a site or provide a sample code for a login page that...
4
6918
by: Vlad | last post by:
I am having problems using the file.create method within a function that is called when looping through an array of filepaths. If I call my function with a hardcoded file path --C:\Temp.txt the function creates the file as expected. When I loop through my array I get the error - "ArgumentException was unhandled - Illegal characters in path" The value "C:\Temp.txt" is the first value in the array - as it works
8
4439
by: ssmeshack | last post by:
Hai All, Im doing a login page.... And that was without cookie.... I realy dono how to create cookie... pls anyone can help... Here is code from Default.aspx for login control: <asp:Login ID="Login1" runat="server" BackColor="#F7F6F3" BorderColor="#E6E2D8" BorderPadding="4" BorderStyle="Solid" BorderWidth="1px" Font-Names="Verdana"
0
9714
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9594
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10599
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10090
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9173
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
6863
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5531
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4308
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
3001
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.