My Assistant
![]()
Custom Search
|
![]() ![]() |
![]() |
![]() Post#1 | |
![]() Posts: 434 Joined: 12-February 14 ![]() | Hi All, I have a database (split) for which I use a custom Log In (VBA). Is there a way to to use the native access "Encrypt with Password" option together with a custom log in (where all users have username and password) w/o being asked for the encryption password and then "my" credentials (username & password)? ty |
![]() Post#2 | |
![]() UA Admin Posts: 36,172 Joined: 20-June 02 From: Newcastle, WA ![]() | No. If your Access database application has two different passwords, you'll need to ask your users to supply two different passwords. That said, perhaps there is a workaround, although I can't think of one off the top of my head at the moment. -------------------- My Real Name Is George. Grover Park Consulting is where I did business for 20 years. How to Ask a Good Question Beginning SQL Server |
![]() Post#3 | |
![]() UA Moderator Posts: 76,822 Joined: 19-June 07 From: SunnySandyEggo ![]() | Hi. If the intent is to encrypt the BE but not bother the users to enter the encryption password because you'll be authenticating them using your own login system, then the workaround is probably vPPC. It's a system developed by some of our experts here at UA (Brent was one of them) where you can use an encrypted backend without exposing the password to the user. Unfortunately, I don't have a good link to provide at the moment. -------------------- Just my 2 cents... "And if I claim to be a wise man, it surely means that I don't know" - Kansas Access Website | Access Blog | Email |
![]() Post#4 | |
![]() Posts: 1,036 Joined: 26-January 14 From: London, UK ![]() | It's a poor idea to invent your own login mechanism. If role-based security is important to you then don't use ACE as your database engine. Use SQL Server or another SQL DBMS, all of which have single-signon, role-based security as standard. |
![]() Post#5 | |
![]() UtterAccess Editor Posts: 10,515 Joined: 8-November 07 From: South coast, England ![]() | Hi Depending on what you need your security for, - Access is not the most secure db available and in some circumstances Access cannot be used where security is important. However, you can encrypt the BE with a password which is stored in the Front End (FE), without having to encrypt the FE. When a user logs on, the FE can interrogate the BE to check the users password and, if valid would allow the use to log on. This is not foolproof as, with this method, the BE password can be found in one of the system tables in the FE. Also you should take steps to prevent (as far as possible) users accessing the BE tables through the Front End. (e.g by forcing the user to go though a start up routine and inhibiting the 'ByPass key' The vPPC method, which theDBguy refers to, removes the BE password from the system tables in the Front End. It involves creating two BE files, both having an identical table structure, but one with no data and no password. The FE initially links to the unprotected files and, once linked, the FE is closed and the unprotected file is replaced with the password protected file. When the FE subsequently opens it opens a persistent recordset using the BE password, which is stored within a VBA module in the FE. The FE should then only ever be distributed as an accde to help prevent users accessing the password by opening up the VBA modules. hth -------------------- Warm regards Bernie |
![]() Post#6 | |
![]() UtterAccess VIP Posts: 6,998 Joined: 30-June 11 ![]() | QUOTE vPPC ... Unfortunately, I don't have a good link to provide at the moment. Come on theDBguy! ![]() ![]() All kidding aside, a while back (looking at the date, its actually been a few years now - feeling old all of a sudden ![]() http://www.devhut.net/2016/09/01/securing-...base-front-end/ there's a download available at the end of the post. -------------------- Daniel Pineault (2010-2019 Microsoft MVP, UA VIP, EE Distinguished Expert 2018) Professional Help: https://www.cardaconsultants.com Free MS Access Code, Tips, Tricks and Samples: https://www.devhut.net * Design should never say "Look at me". It should always say "Look at this". -- David Craib * A user interface is like a joke, if you have to explain it, it's not that good! -- Martin LeBlanc All code samples, demonstration databases, links,... are provided 'AS IS' and are to be used at your own risk! Take the necessary steps to check, validate ...(you are responsible for your choices and actions) |
![]() Post#7 | |
![]() Posts: 434 Joined: 12-February 14 ![]() | Thank you all for your answers/help. I kind of knew this was going to be complicated but wanted to give it a shot. ![]() QUOTE Depending on what you need your security for, - Access is not the most secure db available and in some circumstances Access cannot be used where security is important. It's not that much of a security concern but just those kind of nosey users that think they"know Access!!" and try to poke around. Thank you all! ![]() |
![]() Post#8 | |
![]() Posts: 434 Joined: 12-February 14 ![]() | DanielPineault, Thank you! I'll give it a look |
![]()
Custom Search
|
![]() | Search Top Lo-Fi | 8th December 2019 - 04:05 AM |