Welcome to SPN

Register and Join the most happening forum of Sikh community & intellectuals from around the world.

Sign Up Now!

Workgroups and Users

Discussion in 'Information Technology' started by Matt W., Oct 27, 2005.

  1. Matt W.

    Matt W.
    Expand Collapse
    Guest

    Im very novice with Access Securty so any help will be appreciated. I have a
    database with 4 different forms on it. I want to apply these forms to a
    shared network so that user A can only access form A. But i would like to be
    able to put an icon on user A's desktop. It will be a user environment of
    about 60-70 people. I am not grasping how to set worgroup admin and user
    groups and so on and so forth. Is there a reference that will give me a step
    by step on how to do this. Im just not exactly sure which order to do it.
    Thanks
     
  2. Loading...


  3. '69 Camaro

    '69 Camaro
    Expand Collapse
    Guest

    Hi, Matt.

    > Im very novice with Access Securty


    Most people are, even when they've been working with it for a while.

    > Is there a reference that will give me a step
    > by step on how to do this. Im just not exactly sure which order to do it.


    Yes. There is. And the steps have to be followed in the right order, too.
    Study the Security FAQ on the following Web page:

    http://support.microsoft.com/default.aspx?scid=/support/access/content/secfaq.asp

    For the easy-to-understand steps, please see Joan Wild's (MVP) Web site:

    http://www.jmwild.com/Accesssecurity.htm

    Practice on a copy of the database, because something is bound to go wrong,
    and you don't need a heart attack when people start complaining to your boss
    that they can't get into the database anymore, especially if it's your boss
    doing the complaining.

    HTH.
    Gunny

    See http://www.QBuilt.com for all your database needs.
    See http://www.Access.QBuilt.com for Microsoft Access tips.

    (Please remove ZERO_SPAM from my reply E-mail address so that a message will
    be forwarded to me.)
    - - -
    If my answer has helped you, please sign in and answer yes to the question
    "Did this post answer your question?" at the bottom of the message, which
    adds your question and the answers to the database of answers. Remember that
    questions answered the quickest are often from those who have a history of
    rewarding the contributors who have taken the time to answer questions
    correctly.


    "Matt W." wrote:

    > Im very novice with Access Securty so any help will be appreciated. I have a
    > database with 4 different forms on it. I want to apply these forms to a
    > shared network so that user A can only access form A. But i would like to be
    > able to put an icon on user A's desktop. It will be a user environment of
    > about 60-70 people. I am not grasping how to set worgroup admin and user
    > groups and so on and so forth. Is there a reference that will give me a step
    > by step on how to do this. Im just not exactly sure which order to do it.
    > Thanks
     
  4. Glint

    Glint
    Expand Collapse
    Guest

    I have been very worried about security in an Access database too. I need to
    know this: how safe is an mde database from an Access guru who intends to
    break in to the tables?
    --
    Glint


    "'69 Camaro" wrote:

    > Hi, Matt.
    >
    > > Im very novice with Access Securty

    >
    > Most people are, even when they've been working with it for a while.
    >
    > > Is there a reference that will give me a step
    > > by step on how to do this. Im just not exactly sure which order to do it.

    >
    > Yes. There is. And the steps have to be followed in the right order, too.
    > Study the Security FAQ on the following Web page:
    >
    > http://support.microsoft.com/default.aspx?scid=/support/access/content/secfaq.asp
    >
    > For the easy-to-understand steps, please see Joan Wild's (MVP) Web site:
    >
    > http://www.jmwild.com/Accesssecurity.htm
    >
    > Practice on a copy of the database, because something is bound to go wrong,
    > and you don't need a heart attack when people start complaining to your boss
    > that they can't get into the database anymore, especially if it's your boss
    > doing the complaining.
    >
    > HTH.
    > Gunny
    >
    > See http://www.QBuilt.com for all your database needs.
    > See http://www.Access.QBuilt.com for Microsoft Access tips.
    >
    > (Please remove ZERO_SPAM from my reply E-mail address so that a message will
    > be forwarded to me.)
    > - - -
    > If my answer has helped you, please sign in and answer yes to the question
    > "Did this post answer your question?" at the bottom of the message, which
    > adds your question and the answers to the database of answers. Remember that
    > questions answered the quickest are often from those who have a history of
    > rewarding the contributors who have taken the time to answer questions
    > correctly.
    >
    >
    > "Matt W." wrote:
    >
    > > Im very novice with Access Securty so any help will be appreciated. I have a
    > > database with 4 different forms on it. I want to apply these forms to a
    > > shared network so that user A can only access form A. But i would like to be
    > > able to put an icon on user A's desktop. It will be a user environment of
    > > about 60-70 people. I am not grasping how to set worgroup admin and user
    > > groups and so on and so forth. Is there a reference that will give me a step
    > > by step on how to do this. Im just not exactly sure which order to do it.
    > > Thanks
     
  5. '69 Camaro

    '69 Camaro
    Expand Collapse
    Guest

    Let me put your mind at ease. Access gurus have no intention of breaking
    into your database. The Access gurus are too busy earning a living building
    superior database applications with their superior database skills to bother
    stealing anyone's data. And most people in business have ethics, or they
    won't stay in business very long.

    As for the ones you need to worry about, the hackers, the thieves, and the
    overly curious should be on your list. None of these folks need any
    advanced skills, because the tables can be imported from an MDE database to
    another database, as well as linked to from another database. An MDE
    doesn't protect the data in the tables. These folks can see whatever you
    don't want them to if they have access to the computer where the Access
    database is stored, either while it's on the physical premises or through a
    network.

    In case you've applied User-level security or a database password, you still
    need to worry about these folks because tools to break through these
    defenses are readily available, and some of them are free.

    The bottom line is, if you need data to be secured, don't store it in an
    Access database. Use a client/server database instead.

    HTH.
    Gunny

    See http://www.QBuilt.com for all your database needs.
    See http://www.Access.QBuilt.com for Microsoft Access tips.


    "Glint" <Glint@discussions.microsoft.com> wrote in message
    news:A5F781C2-AEF6-4A4D-B30E-0454F54E6DC5@microsoft.com...
    >I have been very worried about security in an Access database too. I need
    >to
    > know this: how safe is an mde database from an Access guru who intends to
    > break in to the tables?
    > --
    > Glint
    >
    >
    > "'69 Camaro" wrote:
    >
    >> Hi, Matt.
    >>
    >> > Im very novice with Access Securty

    >>
    >> Most people are, even when they've been working with it for a while.
    >>
    >> > Is there a reference that will give me a step
    >> > by step on how to do this. Im just not exactly sure which order to do
    >> > it.

    >>
    >> Yes. There is. And the steps have to be followed in the right order,
    >> too.
    >> Study the Security FAQ on the following Web page:
    >>
    >> http://support.microsoft.com/default.aspx?scid=/support/access/content/secfaq.asp
    >>
    >> For the easy-to-understand steps, please see Joan Wild's (MVP) Web site:
    >>
    >> http://www.jmwild.com/Accesssecurity.htm
    >>
    >> Practice on a copy of the database, because something is bound to go
    >> wrong,
    >> and you don't need a heart attack when people start complaining to your
    >> boss
    >> that they can't get into the database anymore, especially if it's your
    >> boss
    >> doing the complaining.
    >>
    >> HTH.
    >> Gunny
    >>
    >> See http://www.QBuilt.com for all your database needs.
    >> See http://www.Access.QBuilt.com for Microsoft Access tips.
    >>
    >> (Please remove ZERO_SPAM from my reply E-mail address so that a message
    >> will
    >> be forwarded to me.)
    >> - - -
    >> If my answer has helped you, please sign in and answer yes to the
    >> question
    >> "Did this post answer your question?" at the bottom of the message, which
    >> adds your question and the answers to the database of answers. Remember
    >> that
    >> questions answered the quickest are often from those who have a history
    >> of
    >> rewarding the contributors who have taken the time to answer questions
    >> correctly.
    >>
    >>
    >> "Matt W." wrote:
    >>
    >> > Im very novice with Access Securty so any help will be appreciated. I
    >> > have a
    >> > database with 4 different forms on it. I want to apply these forms to a
    >> > shared network so that user A can only access form A. But i would like
    >> > to be
    >> > able to put an icon on user A's desktop. It will be a user environment
    >> > of
    >> > about 60-70 people. I am not grasping how to set worgroup admin and
    >> > user
    >> > groups and so on and so forth. Is there a reference that will give me a
    >> > step
    >> > by step on how to do this. Im just not exactly sure which order to do
    >> > it.
    >> > Thanks
     
  6. Glint

    Glint
    Expand Collapse
    Guest

    Thanx, Gunny. At least I know the limitation of my Access now.
    --
    Glint


    "'69 Camaro" wrote:

    > Let me put your mind at ease. Access gurus have no intention of breaking
    > into your database. The Access gurus are too busy earning a living building
    > superior database applications with their superior database skills to bother
    > stealing anyone's data. And most people in business have ethics, or they
    > won't stay in business very long.
    >
    > As for the ones you need to worry about, the hackers, the thieves, and the
    > overly curious should be on your list. None of these folks need any
    > advanced skills, because the tables can be imported from an MDE database to
    > another database, as well as linked to from another database. An MDE
    > doesn't protect the data in the tables. These folks can see whatever you
    > don't want them to if they have access to the computer where the Access
    > database is stored, either while it's on the physical premises or through a
    > network.
    >
    > In case you've applied User-level security or a database password, you still
    > need to worry about these folks because tools to break through these
    > defenses are readily available, and some of them are free.
    >
    > The bottom line is, if you need data to be secured, don't store it in an
    > Access database. Use a client/server database instead.
    >
    > HTH.
    > Gunny
    >
    > See http://www.QBuilt.com for all your database needs.
    > See http://www.Access.QBuilt.com for Microsoft Access tips.
    >
    >
    > "Glint" <Glint@discussions.microsoft.com> wrote in message
    > news:A5F781C2-AEF6-4A4D-B30E-0454F54E6DC5@microsoft.com...
    > >I have been very worried about security in an Access database too. I need
    > >to
    > > know this: how safe is an mde database from an Access guru who intends to
    > > break in to the tables?
    > > --
    > > Glint
    > >
    > >
    > > "'69 Camaro" wrote:
    > >
    > >> Hi, Matt.
    > >>
    > >> > Im very novice with Access Securty
    > >>
    > >> Most people are, even when they've been working with it for a while.
    > >>
    > >> > Is there a reference that will give me a step
    > >> > by step on how to do this. Im just not exactly sure which order to do
    > >> > it.
    > >>
    > >> Yes. There is. And the steps have to be followed in the right order,
    > >> too.
    > >> Study the Security FAQ on the following Web page:
    > >>
    > >> http://support.microsoft.com/default.aspx?scid=/support/access/content/secfaq.asp
    > >>
    > >> For the easy-to-understand steps, please see Joan Wild's (MVP) Web site:
    > >>
    > >> http://www.jmwild.com/Accesssecurity.htm
    > >>
    > >> Practice on a copy of the database, because something is bound to go
    > >> wrong,
    > >> and you don't need a heart attack when people start complaining to your
    > >> boss
    > >> that they can't get into the database anymore, especially if it's your
    > >> boss
    > >> doing the complaining.
    > >>
    > >> HTH.
    > >> Gunny
    > >>
    > >> See http://www.QBuilt.com for all your database needs.
    > >> See http://www.Access.QBuilt.com for Microsoft Access tips.
    > >>
    > >> (Please remove ZERO_SPAM from my reply E-mail address so that a message
    > >> will
    > >> be forwarded to me.)
    > >> - - -
    > >> If my answer has helped you, please sign in and answer yes to the
    > >> question
    > >> "Did this post answer your question?" at the bottom of the message, which
    > >> adds your question and the answers to the database of answers. Remember
    > >> that
    > >> questions answered the quickest are often from those who have a history
    > >> of
    > >> rewarding the contributors who have taken the time to answer questions
    > >> correctly.
    > >>
    > >>
    > >> "Matt W." wrote:
    > >>
    > >> > Im very novice with Access Securty so any help will be appreciated. I
    > >> > have a
    > >> > database with 4 different forms on it. I want to apply these forms to a
    > >> > shared network so that user A can only access form A. But i would like
    > >> > to be
    > >> > able to put an icon on user A's desktop. It will be a user environment
    > >> > of
    > >> > about 60-70 people. I am not grasping how to set worgroup admin and
    > >> > user
    > >> > groups and so on and so forth. Is there a reference that will give me a
    > >> > step
    > >> > by step on how to do this. Im just not exactly sure which order to do
    > >> > it.
    > >> > Thanks

    >
    >
    >
    >
     
  7. '69 Camaro

    '69 Camaro
    Expand Collapse
    Guest

    You're welcome. Sorry for the bad news.

    Gunny

    See http://www.QBuilt.com for all your database needs.
    See http://www.Access.QBuilt.com for Microsoft Access tips.


    "Glint" <Glint@discussions.microsoft.com> wrote in message
    news:11604A91-BFBF-4B70-BC8C-88BCD4C3C053@microsoft.com...
    > Thanx, Gunny. At least I know the limitation of my Access now.
    > --
    > Glint
    >
    >
    > "'69 Camaro" wrote:
    >
    >> Let me put your mind at ease. Access gurus have no intention of breaking
    >> into your database. The Access gurus are too busy earning a living
    >> building
    >> superior database applications with their superior database skills to
    >> bother
    >> stealing anyone's data. And most people in business have ethics, or they
    >> won't stay in business very long.
    >>
    >> As for the ones you need to worry about, the hackers, the thieves, and
    >> the
    >> overly curious should be on your list. None of these folks need any
    >> advanced skills, because the tables can be imported from an MDE database
    >> to
    >> another database, as well as linked to from another database. An MDE
    >> doesn't protect the data in the tables. These folks can see whatever you
    >> don't want them to if they have access to the computer where the Access
    >> database is stored, either while it's on the physical premises or through
    >> a
    >> network.
    >>
    >> In case you've applied User-level security or a database password, you
    >> still
    >> need to worry about these folks because tools to break through these
    >> defenses are readily available, and some of them are free.
    >>
    >> The bottom line is, if you need data to be secured, don't store it in an
    >> Access database. Use a client/server database instead.
    >>
    >> HTH.
    >> Gunny
    >>
    >> See http://www.QBuilt.com for all your database needs.
    >> See http://www.Access.QBuilt.com for Microsoft Access tips.
    >>
    >>
    >> "Glint" <Glint@discussions.microsoft.com> wrote in message
    >> news:A5F781C2-AEF6-4A4D-B30E-0454F54E6DC5@microsoft.com...
    >> >I have been very worried about security in an Access database too. I
    >> >need
    >> >to
    >> > know this: how safe is an mde database from an Access guru who intends
    >> > to
    >> > break in to the tables?
    >> > --
    >> > Glint
    >> >
    >> >
    >> > "'69 Camaro" wrote:
    >> >
    >> >> Hi, Matt.
    >> >>
    >> >> > Im very novice with Access Securty
    >> >>
    >> >> Most people are, even when they've been working with it for a while.
    >> >>
    >> >> > Is there a reference that will give me a step
    >> >> > by step on how to do this. Im just not exactly sure which order to
    >> >> > do
    >> >> > it.
    >> >>
    >> >> Yes. There is. And the steps have to be followed in the right order,
    >> >> too.
    >> >> Study the Security FAQ on the following Web page:
    >> >>
    >> >> http://support.microsoft.com/default.aspx?scid=/support/access/content/secfaq.asp
    >> >>
    >> >> For the easy-to-understand steps, please see Joan Wild's (MVP) Web
    >> >> site:
    >> >>
    >> >> http://www.jmwild.com/Accesssecurity.htm
    >> >>
    >> >> Practice on a copy of the database, because something is bound to go
    >> >> wrong,
    >> >> and you don't need a heart attack when people start complaining to
    >> >> your
    >> >> boss
    >> >> that they can't get into the database anymore, especially if it's your
    >> >> boss
    >> >> doing the complaining.
    >> >>
    >> >> HTH.
    >> >> Gunny
    >> >>
    >> >> See http://www.QBuilt.com for all your database needs.
    >> >> See http://www.Access.QBuilt.com for Microsoft Access tips.
    >> >>
    >> >> (Please remove ZERO_SPAM from my reply E-mail address so that a
    >> >> message
    >> >> will
    >> >> be forwarded to me.)
    >> >> - - -
    >> >> If my answer has helped you, please sign in and answer yes to the
    >> >> question
    >> >> "Did this post answer your question?" at the bottom of the message,
    >> >> which
    >> >> adds your question and the answers to the database of answers.
    >> >> Remember
    >> >> that
    >> >> questions answered the quickest are often from those who have a
    >> >> history
    >> >> of
    >> >> rewarding the contributors who have taken the time to answer questions
    >> >> correctly.
    >> >>
    >> >>
    >> >> "Matt W." wrote:
    >> >>
    >> >> > Im very novice with Access Securty so any help will be appreciated.
    >> >> > I
    >> >> > have a
    >> >> > database with 4 different forms on it. I want to apply these forms
    >> >> > to a
    >> >> > shared network so that user A can only access form A. But i would
    >> >> > like
    >> >> > to be
    >> >> > able to put an icon on user A's desktop. It will be a user
    >> >> > environment
    >> >> > of
    >> >> > about 60-70 people. I am not grasping how to set worgroup admin and
    >> >> > user
    >> >> > groups and so on and so forth. Is there a reference that will give
    >> >> > me a
    >> >> > step
    >> >> > by step on how to do this. Im just not exactly sure which order to
    >> >> > do
    >> >> > it.
    >> >> > Thanks

    >>
    >>
    >>
    >>
     

Share This Page