[AccessD] POLL: Access Security

Jim Lawrence (AccessD) accessd at shaw.ca
Thu Nov 13 10:01:10 CST 2003


Hi All:

This security thing can go a little overboard. If your applications have
sensitive data and provides access from the general public no one will ever
use a standard computer terminal and Access's MDB as the BE, it is just too
flaky.

SCO Unix had a 'Yellow Book' setting that when toggled basically made the
system inaccessible and consumed all the system resources monitoring every
access, every task performed and continually validated every user, again and
again. The system now became a monster to handle and even to do the simplest
of tasks, for the systems guy, could take an hour. (Everyone in that office
was delighted when the data was backed up and the server was reformatted and
the system re-installed.)

My point is, that sometimes super tight security is a waste of time. A good
talk by the office manager on how he/she will whack the first person who
screws with things, without authorization, is the best security of all.

Jim

-----Original Message-----
From: accessd-bounces at databaseadvisors.com
[mailto:accessd-bounces at databaseadvisors.com]On Behalf Of Elam, Debbie
Sent: Thursday, November 13, 2003 6:08 AM
To: 'Access Developers discussion and problem solving'
Subject: RE: [AccessD] POLL: Access Security


2

Have had a whole series of HR databases with sensitive data that needs
locked tight.  It takes me a while and I avoid it if I can.  Secured
databases are a PITA.  I inherited a database locked so tight it was darn
near impenetrable.  All of this for info that was common knowledge in the
workplace and not all that sensitive outside it.  The thing is nearly
impossible to modify or troubleshoot and I would love to give the guy that
wrote this a piece of my mind.

Debbie

-----Original Message-----
From: John W. Colby [mailto:jcolby at colbyconsulting.com]
Sent: 13 November 2003 01:00
To: AccessD
Subject: [AccessD] POLL: Access Security


I'd like to take a poll regarding your knowledge of Access' built-in
security. By security I do NOT mean the database properties, rather using
workgroups / users to secure forms, tables, queries etc.

Anyone interested in participating please choose one of the following:

1) I am an Access security guru.  I can quickly and easily lock a database
down so tight I can't even get back in.  No help / books needed.
2) I am fluent with Access security.  I can get the job done but it
definitely takes a few hours.  I probably won't need the help / books.
3) I have done Access Security on at least one real paying project.  I would
need help / books to do it again.
4) I have heard about Access Security, read about it, managed to shoot a toe
off, maybe played around with it, but I am confident I could get the job
done.  Books / help definitly needed.
5) Access has built in security?  What is this and where would I go to learn
it?  Why haven't I ever seen these books / help?

If you would please just select a number and reply I would appreciate it.

As for myself, I must admit I rate a solid 4.  No client has ever been
willing to pay for it and I have always had other things to learn / do so I
just never did it (for real).

John W. Colby
www.colbyconsulting.com


_______________________________________________
AccessD mailing list
AccessD at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/accessd
Website: http://www.databaseadvisors.com
_______________________________________________
AccessD mailing list
AccessD at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/accessd
Website: http://www.databaseadvisors.com
- JENKENS & GILCHRIST E-MAIL NOTICE - This transmission may be: (1) subject
to the Attorney-Client Privilege, (2) an attorney work product, or (3)
strictly confidential. If you are not the intended recipient of this
message, you may not disclose, print, copy or disseminate this information.
If you have received this in error, please reply and notify the sender
(only) and delete the message. Unauthorized interception of this e-mail is a
violation of federal criminal law.
This communication does not reflect an intention by the sender or the
sender's client or principal to conduct a transaction or make any agreement
by electronic means.  Nothing contained in this message or in any attachment
shall satisfy the requirements for a writing, and nothing contained herein
shall constitute a contract or electronic signature under the Electronic
Signatures in Global and National Commerce Act, any version of the Uniform
Electronic Transactions Act or any other statute governing electronic
transactions.
_______________________________________________
AccessD mailing list
AccessD at databaseadvisors.com
http://databaseadvisors.com/mailman/listinfo/accessd
Website: http://www.databaseadvisors.com



More information about the AccessD mailing list