John W. Colby
jcolby at colbyconsulting.com
Wed Nov 12 20:01:18 CST 2003
Ahh.. understood.
And why is it your choice to not use Access Security? (yes, that is a
leading question ;-)
John W. Colby
www.colbyconsulting.com
-----Original Message-----
From: accessd-bounces at databaseadvisors.com
[mailto:accessd-bounces at databaseadvisors.com]On Behalf Of Kath Pelletti
Sent: Wednesday, November 12, 2003 8:51 PM
To: Access Developers discussion and problem solving
Subject: Re: [AccessD] POLL: Access Security
No - I have (years ago) trained advanced users in Access security over and
over again, so the basics had to become second knowledge to me.
I was asked by a client when writing a large-ish system to specifically use
security so I did that. I have helped clients who have secured databases
with setting up shortcuts to specifically call their mdw files, as they
often have several mdb's secured and several mdw's. I have helped clients
who have corrupted their system mdw's restore them back etc etc.
So it may take me some basic revision now that I do not use it (my choice
and totally my preference) but not much.
Kath
----- Original Message -----
From: John W. Colby
To: Access Developers discussion and problem solving
Sent: Thursday, November 13, 2003 12:33 PM
Subject: RE: [AccessD] POLL: Access Security
Kath,
Pardon me if I seem incredulous but you are saying that you have used
Access
Security once, three years ago, but could secure a database in a few hours
without referencing any books or help? Is this the same security I am
looking at? Am I making it harder than it is?
John W. Colby
www.colbyconsulting.com
-----Original Message-----
From: accessd-bounces at databaseadvisors.com
[mailto:accessd-bounces at databaseadvisors.com]On Behalf Of Kath Pelletti
Sent: Wednesday, November 12, 2003 8:26 PM
To: Access Developers discussion and problem solving
Subject: Re: [AccessD] POLL: Access Security
Yeah - I would be a 2, but unless the client specifically insists on that
form of security (it did happen once but 3 years ago) I use my own login /
security procedure.
Kath
----- Original Message -----
From: Haslett, Andrew
To: 'Access Developers discussion and problem solving'
Sent: Thursday, November 13, 2003 12:15 PM
Subject: RE: [AccessD] POLL: Access Security
6) I don't use the built in security functions of Access. I Use MDE's
and
roll my own security depending on the requirements of the client.
-----Original Message-----
From: John W. Colby [mailto:jcolby at colbyconsulting.com]
Sent: Thursday, 13 November 2003 11:30 AM
To: AccessD
Subject: [AccessD] POLL: Access Security
I'd like to take a poll regarding your knowledge of Access' built-in
security. By security I do NOT mean the database properties, rather
using
workgroups / users to secure forms, tables, queries etc.
Anyone interested in participating please choose one of the following:
1) I am an Access security guru. I can quickly and easily lock a
database
down so tight I can't even get back in. No help / books needed.
2) I am fluent with Access security. I can get the job done but it
definitely takes a few hours. I probably won't need the help / books.
3) I have done Access Security on at least one real paying project. I
would
need help / books to do it again.
4) I have heard about Access Security, read about it, managed to shoot a
toe
off, maybe played around with it, but I am confident I could get the job
done. Books / help definitly needed.
5) Access has built in security? What is this and where would I go to
learn
it? Why haven't I ever seen these books / help?
If you would please just select a number and reply I would appreciate
it.
As for myself, I must admit I rate a solid 4. No client has ever been
willing to pay for it and I have always had other things to learn / do
so
I
just never did it (for real).
John W. Colby
www.colbyconsulting.com