G
Guest
I am finishing work on a database that will be split and I plan on compiling
the front-end into a MDE. If, prior to compiling, I disable all of the
special keys and the shift key, would it be possible for someone to still get
to the linked tables? I also have all of the menus and toolbars shutoff,
save one custom toolbar.
As it stands now, there is user-level security that limits who can access
the database. This is done through the fOSUserName function that I found
here. When a user logs on, their network ID is checked against the
authorized users. If they are not on the list, a record of the user is made
and the database shuts down. For more secure data, like the list of users, a
second password is required to open that form. Of course, all that is moot
if they can get to the table and make whatever changes.
Keeping in mind that no Access database is really secure, could I be
reasonably sure that your average office worker is not going to figure out
how to get behind the scenes. They won’t be able to use some combination of
keys to get to the tables, etc.
To answer the potential question: The back-end will most likely be on a SQL
server by the time this is rolled out, so I am not as concerned about the
actual tables; however, there is a chance that I will need to park the BE on
a shared server, which raises all new issues. I’ll cross that bridge when I
get to it.
Comments/questions
PJ
the front-end into a MDE. If, prior to compiling, I disable all of the
special keys and the shift key, would it be possible for someone to still get
to the linked tables? I also have all of the menus and toolbars shutoff,
save one custom toolbar.
As it stands now, there is user-level security that limits who can access
the database. This is done through the fOSUserName function that I found
here. When a user logs on, their network ID is checked against the
authorized users. If they are not on the list, a record of the user is made
and the database shuts down. For more secure data, like the list of users, a
second password is required to open that form. Of course, all that is moot
if they can get to the table and make whatever changes.
Keeping in mind that no Access database is really secure, could I be
reasonably sure that your average office worker is not going to figure out
how to get behind the scenes. They won’t be able to use some combination of
keys to get to the tables, etc.
To answer the potential question: The back-end will most likely be on a SQL
server by the time this is rolled out, so I am not as concerned about the
actual tables; however, there is a chance that I will need to park the BE on
a shared server, which raises all new issues. I’ll cross that bridge when I
get to it.
Comments/questions
PJ