John W. Colby
jcolby at colbyconsulting.com
Wed Nov 12 20:01:18 CST 2003
Ahh.. understood. And why is it your choice to not use Access Security? (yes, that is a leading question ;-) John W. Colby www.colbyconsulting.com -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com]On Behalf Of Kath Pelletti Sent: Wednesday, November 12, 2003 8:51 PM To: Access Developers discussion and problem solving Subject: Re: [AccessD] POLL: Access Security No - I have (years ago) trained advanced users in Access security over and over again, so the basics had to become second knowledge to me. I was asked by a client when writing a large-ish system to specifically use security so I did that. I have helped clients who have secured databases with setting up shortcuts to specifically call their mdw files, as they often have several mdb's secured and several mdw's. I have helped clients who have corrupted their system mdw's restore them back etc etc. So it may take me some basic revision now that I do not use it (my choice and totally my preference) but not much. Kath ----- Original Message ----- From: John W. Colby To: Access Developers discussion and problem solving Sent: Thursday, November 13, 2003 12:33 PM Subject: RE: [AccessD] POLL: Access Security Kath, Pardon me if I seem incredulous but you are saying that you have used Access Security once, three years ago, but could secure a database in a few hours without referencing any books or help? Is this the same security I am looking at? Am I making it harder than it is? John W. Colby www.colbyconsulting.com -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com]On Behalf Of Kath Pelletti Sent: Wednesday, November 12, 2003 8:26 PM To: Access Developers discussion and problem solving Subject: Re: [AccessD] POLL: Access Security Yeah - I would be a 2, but unless the client specifically insists on that form of security (it did happen once but 3 years ago) I use my own login / security procedure. Kath ----- Original Message ----- From: Haslett, Andrew To: 'Access Developers discussion and problem solving' Sent: Thursday, November 13, 2003 12:15 PM Subject: RE: [AccessD] POLL: Access Security 6) I don't use the built in security functions of Access. I Use MDE's and roll my own security depending on the requirements of the client. -----Original Message----- From: John W. Colby [mailto:jcolby at colbyconsulting.com] Sent: Thursday, 13 November 2003 11:30 AM To: AccessD Subject: [AccessD] POLL: Access Security I'd like to take a poll regarding your knowledge of Access' built-in security. By security I do NOT mean the database properties, rather using workgroups / users to secure forms, tables, queries etc. Anyone interested in participating please choose one of the following: 1) I am an Access security guru. I can quickly and easily lock a database down so tight I can't even get back in. No help / books needed. 2) I am fluent with Access security. I can get the job done but it definitely takes a few hours. I probably won't need the help / books. 3) I have done Access Security on at least one real paying project. I would need help / books to do it again. 4) I have heard about Access Security, read about it, managed to shoot a toe off, maybe played around with it, but I am confident I could get the job done. Books / help definitly needed. 5) Access has built in security? What is this and where would I go to learn it? Why haven't I ever seen these books / help? If you would please just select a number and reply I would appreciate it. As for myself, I must admit I rate a solid 4. No client has ever been willing to pay for it and I have always had other things to learn / do so I just never did it (for real). John W. Colby www.colbyconsulting.com