General Workgroup Security Question
Dec 26, 2006
Hello,
I cant seem to get a certain setting right. I am trying to setup a user for the database that I have been working on. It keeps saying the following:
"It says I do not have necessary permissions to open. Have the system admin. Or person who created the object establish appropriate permissions for you."
I have that person assigned to the following:
Full Permissions
Full Data Users
Updated Data Users
And they still are unable to open the database.
Now from what I have read on this forum, I shouldn't give any personal permissions. So I have assigned users to groups and given the groups permissions.
In regards to the security question, what are bare minimums for a user to open the database, use the switchboard, choose a form, enter/change data via the form, and view reports.
I dont know the difference between:
Open/Run
Read Design
Modify Design
Administer
And I am afraid to give more than what I need, and I feel like I am just guessing and hoping to set it right. Thanks for any direction in this area.
View Replies
ADVERTISEMENT
Jun 2, 2005
Might be a stupid question but here goes.
I have successfully created my own private workgroup and have set up security levels for 4 users on one access programme that l have written.
I have a second access programme that l use with the same users, however l want to set different user parameters, can l set a second workgroup up as l did the first.
Is two workgroups possible on the same machine ?
Regards
Andy B
View 8 Replies
View Related
Jul 26, 2007
I'm trying to set-up and secure a networked multi-user database. I used the Workgroup Administrator to create a new workgroup and save it to the network drive. However, when I open my database, it seems it may still be pointing to the the default SYSTEM.MDW workgroup on my hard drive. Do I need to do something to my database to tell it to point to the new workgroup I have set-up? When I start having other people log in from different locations, will they need to join the workgroup or also point the database to the networked workgroup when they open the database? The manuals aren't very clear on this, please help.
View 1 Replies
View Related
Jun 6, 2005
Can someone post a copy of a sample mdw file so that I may observe the design of the database? I am very new to the concept of db security and would like to take a look at how the design is constructed. Thanks!
View 11 Replies
View Related
Oct 27, 2004
This is more of a point of interest then a question, at work, Access defaults to a central workgroup file, so all Access files opened on a work machine will prompt for a user name and password, and only let you in if you get it right... but if you move the work group file, even after it has been open using that workgroup file, it will just let you straight in and GIVE YOU ADMIN RIGHTS!
No one really seems to know about this... does it happen if you manually set the workgroup file? Or is this just a security hole if you rely on the default? I'm not sure yet, haven't tested, but i fell people should be made aware (happens for sure on Access2002, haven't tested it on any others)
-mwalts
View 4 Replies
View Related
Apr 21, 2005
I was looking for free access add-ins through a search engine when I came across this site. I'm not sure whether or not some of the more seasoned programmers have seen this, but so far it looks like a less confusing alternative to the security features that access comes with. I'm not in any way advertising this, and I haven't tried it myself yet, so I can't speak about how good or bad it is, but it may be something worth looking into. Here are the links:
http://www.accesswizards.com/Downloads.html This lists the add-ins that are available from this particular site.
http://www.accesswizards.com/SecDetails.html This is the "read me" information about the security add-in.
View 1 Replies
View Related
Jul 19, 2006
I've designed an access ade file (based on sql server) and distributed it at the network.
Somebody else has made another database (mdb) and placed the users in a access workgroup file by placing their windows logons into the workgroup file. These users happen to be the same users accessing my application. The following thing is happening : "when the users open my database they are prompted their user names and password of the workgroup file'.
I placed an empty database and the same thing is happening, the workgroup security is active alongside every database deployed to this specific user group.
How can I easily 'tell my database' it shouldn't make use of the workgroup security?
(It's odd that an ade which isn't able to use workgroup security prompts users by using workgroup security)
View 2 Replies
View Related
Jun 22, 2007
Hi,
I've created a duplicate of our database in order to be able to work on the design of it from several locations. At present the database which is being used has been split into FE (on local machines) & BE (on server), with a .mdw file for the workgroup settings.
For the duplicate I have created a new database with all the Tables, Queries, Reports, Forms, Macros and code copied from the FE & BE files into a single file. My question is, to be able to work on this from remote machines / pass it on to others to work on the design, do I need to have a copy of the MDW present with the duplicate, or is it possible to remove the workgroup and security permission settings?
View 3 Replies
View Related
Mar 14, 2007
Hello people of access world forums. I've decided to design a simple access db with 2003 version but with 2000 compatibility and everything appear to work ok.
After designing and testing the db, I have set the Jet user-level security options as described in some documentation and set the startup options too for a "clean type" start. Everything is ok: I have created the workgroup in a new .mdw file, joined the workgroup, set the users, set the groups, protect the forms I wanted to. If I try to open the db, it asks for user and password and the db works as espected about security.
But if I delete, move or change the .mdw filename, the db turns accesible without the implemented security. Only the startup option works but no user is prompted and the protected items turns unprotected.
I would like to know how can I associate the .mdw to the .mdb so I can't access the .mdb if the .mdw file is not present (i.e. copying the .mdb to another computer or something).
Thanks in advanced.
Kish
View 8 Replies
View Related
Oct 5, 2007
Ok.. I have done this before at another job, but this network (or stupid me) is giving me trouble. I'm trying to setup a database security (login/password) for a database on a network. I setup the security levels..setup a seperate workgroup... From my computer it logins fine with the correct workgroup.
I setup a link:
"G:Maximizer DatabaseMaximizer.mdb" /wrkgrp "G:Maximizer Databasemaxsecurity.mdw"
Under my network login it pops up with the correct login/password prompt.
On others, it goes into the database under "READ ONLY" but gives them access to the database in read only. It should using that workgroup.
Any suggestions?
View 6 Replies
View Related
Oct 1, 2013
The purpose of this project is to aim the security mechanism an allow and restrict of individuals or group of individuals of the database. Define the security accounts and groups of users allowed to access.
Users: Can view / add / edit of data into the database.
Superintendent: Has view access to database but is limited only to their section.
Manager: Has full access to database but is limited to their section.
Administrator: Acts as the overall administrator for the database. Has full control over all data and objects contained in the database.
Most likely the closest example of this database is annual leave application. If individuals is/are adding data and only his immediate Superintendent can view with limited to his group and the same with the Manager as we have four (4) sections (Finance; Procurement; Services; & Management) in one unified department.
View 2 Replies
View Related
Jun 13, 2013
I have a user that has to enable the security everytime he opens a database I have. What would cause this? No one else has any issues and this user has all the permissions he needs.
View 1 Replies
View Related
Sep 21, 2012
I will be sending out copies of a program to several locations. Once I send the program I have absolutely no control over it. The FE file will always be in the same folder. The setup process creates C:MyFolder with the FE file in there. Is there a way to to programmatically disable the warnings throughout setup or to make C:MyFolder a trusted location?
View 3 Replies
View Related
Oct 10, 2014
I created *.mdb database and I used (user-level security wizard) to give each user a username and a password. The dB file is saved in D: drive. The security wizard created a shortcut on the desktop to open the dB through it. After using that wizard I cannot open the database directly from drive D:.If I try to open it , it says"You don't have necessary permissions to use the database".Now, there are many users should use this db through the network.
View 1 Replies
View Related
Sep 24, 2012
I have an Access 2003 db being used through Access 2007 in order to use user-based security.It is a spit db with the be being on a shared server.For some reason, the security login has been deactivated after working fine for over a year. The user goes right to the autoexec macro file without having to log in.
They are also getting a "Read-Only" message at the top about only being able change table in linked tables.The DB is configured to utilize the logon as a parameter in some queries.
View 6 Replies
View Related
Apr 7, 2013
I have inherited a 2003 db with unknown PIDs for the Group & User security.When trying to alter User details, I'm asked for a PID, so I'm trying to find the PID for the existing users.
I've gone to unhide the systems tables to get a dump of the data & hopefully find the PIDs but no luck so far.There is a Parent ID & if I run a query from the Users DB file, it appears as if it something like japanese writing ???
View 1 Replies
View Related
May 18, 2015
I created the .accde to distribute only the compiled file. But I have a problem. When you open the file .accde there is this problem of security: You can not determine whether the content is from a trusted source. Leave off the contents, unless they provide essential capabilities and the source is considered reliable. Open the file or cancel the operation? How Can I avoid the visualization of this security alert?
View 11 Replies
View Related
Nov 6, 2014
I have some Databases that were created back in Access 97 and have managed to upgrade these databases to work in Access 2013, fixing any modules and forms which broke when upgrading the databases.User access and permissions within the database were controlled by User Level Security (the Workgroup.mdw file) which is not secure anyway I guess, as someone could easily copy the entire database.
The database as it stands now works perfectly in Access 2013, however anyone can do anything with the database which is my main issue. Im wanting to limit access for certain forms / tables / reports to certain users, then out right deny other users from accessing the database.
Ive seen the SQL Server 2014 Migration Assistant for Access, which looks to store the tables on SQL server then map these to the Access database, so i guess i could deny certain users from accessing tables that way, or only allow them to read the tables. However I'm not sure how that would lock them out of certain forms / reports and queries in the databases?
View 2 Replies
View Related
Oct 3, 2013
I need securing an Access database. I am about to put the database on a shared drive. I want myself to be able to do anything (of course), my co-worker Paul to be able to ONLY enter information (along with being able to view everything like forms and reports), and my boss to ONLY be able to view everything (form/report wise).
I found this post [URL] .... about how to secure a database. I spent all day doing it, but it didn't work at all! I just got a bunch of errors whenever I tried to do anything, so I deleted the database and re-used an earlier version.
View 6 Replies
View Related
Jun 27, 2012
I have a question about user level security / access control.For my database I have a back-end containing the tables and a front-end with forms, queries and everything. I have set up the access user level security.Dependent from the access level of my users, some front-end options will be hidden and some queries retrieve only part of the data. For example: I have a form to calculate clients' end prices. A vendor can only see prices for his own clients, not for other vendor's clients.
BUT: to make the query work, all users need access to the tables and the back-end must be stored in a public place, right? Now all vendors can just open the back-end and see all information.Maybe protect the BE with a password and store this in the queries?
View 7 Replies
View Related
Jul 2, 2015
I have a database whereby users already have to sign in with a username and password, using a form which them allows them to view a front page. The front page allows them to access data and add/amend it.
I now have to adjust this setup as we have directors who want to view the system, but we don't want them to amend it.
Is there anyway to change the current setup that I already have or do I have to scrap it and start again?
View 14 Replies
View Related
Nov 28, 2012
I was wondering if it is possible to create custom security permissions in access. For example I have created an employee database, with security. I would like to have it when a manager logs on, it will only display his employee's information and no other departments. Is this possible?? In one of the tables is a field for the department the employee works on, can it based off of a table field?
View 1 Replies
View Related
Nov 27, 2012
I was wondering if it is possible to create custom security permissions in access. For example I have created an employee database, with security. I would like to have it when a manager logs on, it will only display his employee's information and no other departments. Is this possible?? In one of the tables is a field for the department the employee works on, can it based off of a table field?
View 1 Replies
View Related
Sep 28, 2013
I have created a database and made the steps to the user-level security and VBA protected the project but i lost the passwords and the MDW file.
is there any way to reset the VBA pass then reset the security level?
this is very important for my business it's a school database with lots of info and it's critical for me to update or at least export some reports and forms to a new project
View 3 Replies
View Related
Jul 19, 2013
I'm a SQL Server DBA and have a few Access 2010 Db's to look after and occasionally have to make amendments to (as is the case today). I've been asked to apply permissions to certain users of the Access database whereby users in a group we're calling 'Viewer' only have read permission and users in another group called 'Writer' (original I know!) have both read and write permission.
The database is form driven (i.e. no-one directly accesses and amends the tables in the database), the file is saved with a .mdb extension.
I've played around with the 'Manage Users & Permissions' in the File Menu however these don't seem to do what I need them to and only result in having to input a user and password to access the database on start-up.
View 1 Replies
View Related
Mar 26, 2007
I've read and gone though quite a few of the scrips and examples for creating logins and security and i'm getting to the stage when i need to have good understanding of the different methods.
Some of the examples whilst create a user login do not really allow for security within the database whilst the build in security wizard would appear to offer that functionality.
I am thinking that I will use the Workgroup file and that method. My question is am i able to utilise the fact that if a person 'AdamA' logs onto the database which is built into the workgroup security file. am I then able to take 'AdamA' to populate a table which records actions by a user? (I can't seem to find any thread or book reference to doing this)
View 4 Replies
View Related