Paul Hartland (ISHARP)
paul.hartland at isharp.co.uk
Tue Jun 7 04:12:35 CDT 2005
Thanks will look into it -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com] On Behalf Of Kath Pelletti Sent: 07 June 2005 10:02 To: Access Developers discussion and problem solving Subject: Re: [AccessD] Access security question Hi Paul - here's the link for the Access security FAQ. http://support.microsoft.com/support/access/content/secfaq.asp HTH Kath ----- Original Message ----- From: Paul Hartland (ISHARP) To: 'Access Developers discussion and problem solving' Sent: Tuesday, June 07, 2005 5:21 PM Subject: RE: [AccessD] Access security question Talking of Access security, can someone tell me a good point of reference for a novice in Access security to get started. I have tinkered about with it before for a very short while without much success. Basically I think I am looking for some sort of total idiots guide to Access Security.... Help/sample web pages etc greatly appreciated.... Paul Hartland -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com] On Behalf Of Charlotte Foust Sent: 06 June 2005 22:34 To: Access Developers discussion and problem solving Subject: RE: [AccessD] Access security question They can if the BE is not adequately secured, which means at the least that the admin user is stripped of permissions and put in the users group rather than the admins group. Charlotte Foust -----Original Message----- From: Steve Erbach [mailto:erbachs at gmail.com] Sent: Monday, June 06, 2005 2:22 PM To: Access Developers discussion and problem solving Subject: [AccessD] Access security question Dear Group, I've converted an application to Access 2000 for a client. This application is running on single user workstations at about a half dozen places around the U.S. The question my client has is this: Lets say that the tables in the BE have Access security invoked. If the FE/BE is distributed in MDE format with Access Runtime, can a user with a full-bore package of Access start the application, break out of it, and wind up with all the tables available to him for editing, etc? This is provided that the security is administered by the software so that the actual security password is not known by the user. Only user names and application passwords would be known. Or is it even possible for the application to handle Access security like this. That is, can Access security work without a user explicitly typing in a password? Thank you. Regards, Steve Erbach Scientific Marketing Neenah, WI www.swerbach.com Security Page: www.swerbach.com/security -- AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com -- AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com -- AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com -- AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com