Solved

Read Only Attach Table in Access2?

Posted on 1997-10-22
8
270 Views
Last Modified: 2008-03-10
Is it possible to make the attach table in Access2 for read-only?  I don't and won't use MDA to set the access constrain.
Many Thanks!!

Tasman :)
0
Comment
Question by:tasman082997
  • 4
  • 4
8 Comments
 
LVL 1

Accepted Solution

by:
birchallr earned 50 total points
Comment Utility
Hello,

It is possible to attach to a table in a separate read-only file.  For example, you can attach to tables in a file on a CD-ROM or on a network share where you have read-only access.

However, if it is on a network share where you have read-only access, there can be no other user, with full read/write access, also using that file.  If that is the case then you, the read-only user, are locked out.

The solution is to have a separate copy of the data.MDB file that is for use only by read-only users.  You can have this backed up from the primary data.MDB file once a day or something like that.

Regards,

Richard

0
 

Author Comment

by:tasman082997
Comment Utility
The data in the attached tables are dynamic, and critical.  They are shared (read/referenced/attached) by more than 15 Access2 databases in my office.  I don't want these databases(users) have a chance  to lock and modified any of the records.  Therefore, I just can't make a copy of the shared database once a day.
0
 
LVL 1

Expert Comment

by:birchallr
Comment Utility
So I understand you to mean that you have both users with read/write access and users with read-only access, and that it is important that both sets of users have up-to-the-minute data (i.e. the read-only users cannot tolerate one day out of date)?  Is this correct.

If this is the case, you will have to use MS Access internal security, rather than relying on network permissions.

No one will be locked out, if everybody has read/write access to the network share.  Is this on a Windows NT server?

Regards,

Richard

0
 

Author Comment

by:tasman082997
Comment Utility
All the databases are on novell netware.  And I won't and can't create a centralize MDA file for all the users/databases  (I memtioned this restrain at the very first beginning).
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 
LVL 1

Expert Comment

by:birchallr
Comment Utility
Hello,

There is some info at:
http://premium.microsoft.com/support/access/content/secfaq.asp

Make sure that the .LDB files are also sharable and that all users have write access to them.

Here is some text that might help,
= = = = = = = = = = = = = start text = = = = = = = = = = = = =
   Normally, the .LDB file must be in a directory where the user has
   read-write privileges. However, it is possible to open a database
   in a directory or device where a user has read-only privileges.
   To do this, select both the Read Only and the Exclusive check boxes
   in the Open Database dialog box. The Open Database dialog box can
   be found by selecting Open Database from the File menu. The
   combination of read-only and exclusive means that users will not be
   updating any database information, so record-locking isn't
   required. Because record-locking isn't required, Microsoft Access
   does not attempt to open or create an .LDB file.
= = = = = = = = = = = = = = end text = = = = = = = = = = = = =

Regards,

Richard

0
 

Author Comment

by:tasman082997
Comment Utility
I can't set the whole database to be read-only.  I just want the attach tables to be read only (without using DMA file).  thanks!

0
 
LVL 1

Expert Comment

by:birchallr
Comment Utility
Hello,

I assume you have already split the database.  There is a good explanation of this in the Access manual and online help, as well as a "wizard".

The user has full access to the front-end database file (containing queries, reports, forms, but not data tables), on their hard drive (or personal network area).

The back-end database file (only containing the data tables) would be in a read-only area.

The front-end database file attaches to tables in the back-end file.


Regards,

Richard

0
 

Author Comment

by:tasman082997
Comment Utility
Thanks a lot, Richard!!


0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Most if not all databases provide tools to filter data; even simple mail-merge programs might offer basic filtering capabilities. This is so important that, although Access has many built-in features to help the user in this task, developers often n…
It took me quite some time to sort out all the different properties of combo and list boxes available from Visual Basic at run-time. Not that the documentation is lacking: the help pages are quite thorough and well written. The problem was rather wh…
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
What’s inside an Access Desktop Database. Will look at the basic interface, Navigation Pane (Database Container), Tables, Queries, Forms, Report, Macro’s, and VBA code.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now