Solved

How to hide all tables.

Posted on 1998-03-03
12
299 Views
Last Modified: 2010-08-05
How do i hide the tables?
I want to have update, delete, and insert permission from the form level. But i dont want any users to view or modify any tables. How do i do that in Access97.
How do i make distributed database so users can only view Forms.
0
Comment
Question by:bcp5190
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 2
  • 2
  • +3
12 Comments
 
LVL 3

Expert Comment

by:slpatches
ID: 1969830
A simple solution is to right click each table, choose properties, and then choose "hidden".  This works fine for standard users, but expert ones will figure out how to set their options to show hidden tables.
0
 

Author Comment

by:bcp5190
ID: 1969831
Yaaa, Even i can figure out how to unhide.
0
 
LVL 3

Expert Comment

by:slpatches
ID: 1969832
A 5 point question deserves a 5 point answer.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:bcp5190
ID: 1969833
I'm sorry, i don't mean to dicipoint you
0
 
LVL 3

Expert Comment

by:guillems
ID: 1969834
One idea,
  splitt the database into two:
      1. one with the forms, reports, querys, macros and modules
      2. one with only the tables.

 by code you can create querys, and modify the records,...
 the forms don't have recordsource, you put the recordsource on-line.

 So you don't have to link the tables, only work a low level (by VBA).
 
PS. If you have problems with the points, please contact with the service customers, and they to tell you how to buy points.

I hope this help you.

0
 
LVL 1

Expert Comment

by:arimsoft
ID: 1969835
Use name of tables:
   USYStable_name,  where USYS (User System) - in all tables.
   This works fine for standard
      users, but expert ones will figure out how to set their options to show hidden tables.  



0
 

Author Comment

by:bcp5190
ID: 1969836
Thank you arimsoft's
Would you please more specific with your answer
0
 
LVL 3

Expert Comment

by:chapie
ID: 1969837
you can do what you want with user level security
0
 

Expert Comment

by:Skor
ID: 1969838
The best way to prevent users from getting at your tables is to take away all permissions.  

1) Remove permissions for Users Group and Admin User.  
2) Create queries and set the queries "Run Permission" property to OWNERS.
3) Point the Form's Recordsource property to the Query.

Now users will not be able to get at the tables, but when they open the form, it will run the query.  Since the query is designed to "borrow" you permissions, the query will be able to open the table.  
0
 

Author Comment

by:bcp5190
ID: 1969839
If i remove the permission  from group then no one can up date the tabel from form . There for i have give permission to group so member's of group can up date , insert or delete the table through from.
0
 

Accepted Solution

by:
Skor earned 0 total points
ID: 1969840
You missed the point of my answer.  Look up the online help on Run Permissions.

Try this so you can see how it all works.

1) Create a table and a form.
2) Take away all permissions for your Users on the table.
3) Go to the Form's RecordSource Property and click the Build Button "..."  This will create a Query for your form.
4) In the query, include the fields you want to display and......
5) Set the Query's Run Permissions to OWNER.

Now when the users try to open the table directly, they will get No Permissions error, BUT, they can open the Form and have FULL access to the data.  In effect, they are borrowing your permissions via the query to get at the table.

Try it, you'll like it.

--Skor
0
 

Author Comment

by:bcp5190
ID: 1969841
Thank You skor, I got your point
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In a multiple monitor setup, if you don't want to use AutoCenter to position your popup forms, you have a problem: where will they appear?  Sometimes you may have an additional problem: where the devil did they go?  If you last had a popup form open…
Access developers frequently have requirements to interact with Excel (import from or output to) in their applications.  You might be able to accomplish this with the TransferSpreadsheet and OutputTo methods, but in this series of articles I will di…
Basics of query design. Shows you how to construct a simple query by adding tables, perform joins, defining output columns, perform sorting, and apply criteria.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question