Solved

Macro security level and digital signature setting on terminal services

Posted on 2007-11-23
4
1,450 Views
Last Modified: 2012-05-05
Hi

I am aware there are a number of posts already with a similar issue, however this appears to be on a machine by machine basis.

I have a terminal server that users run an application on which essentially is a access database. A copy is made from the source when run which the individual user then works from.

When run, the database loads and then the user receives the error in a window 'Security Warning - This file may not be safe if it contains code that was intended to harm your computer'. I am aware that  this is caused by both/either:
1. the macro security level being set to Medium or High, or
2. the application requiring a digital signature being associated with it.

My first choice is to just change the macro security level so that any access database will just open when run. Therefore, my first question is, is there a way of setting this macro security level for all users on terminal services as opposed having to change this setting for all users individually? Secondly, if it is possible, can this same setting be applied if only a runtime version of access is installed on the terminal services.

If the above is not possible and/or digital signing is the best option I then have a third question. It appears to be easy enough to create a digital signature for in house use, however I appear to then have a similar issue (as above) where I will need to install this cerificate for every user on terminal services individually. Therefore is there a way of installing and trusting this digital signature for all users on the terminal server?

Thanks in advance
0
Comment
Question by:kinton
  • 2
  • 2
4 Comments
 
LVL 84

Accepted Solution

by:
Scott McDaniel (Microsoft Access MVP - EE MVE ) earned 500 total points
Comment Utility
The cert will need to be installed on the TS, and then each user will "use" that certificate. You'd want to be sure that you're in "install" mode when the app installs the certificate (your app will prompt the first user to install the certificate, so make sure that first user has Admin permissions and is in Install mode).

AFAIK, you must set the macro security level for each user individually. I've never circumvented security measures (and, if you're not the boss, make sure that your powers that be are aware of what you're doing if you disable macro security) so can't really advise as to that. Also, the same settings apply for runtime and retail.
0
 
LVL 2

Author Comment

by:kinton
Comment Utility
Thanks for your response.

I put the server into install mode and ran the app, the certificate was prompted for installation and all ran fine. However when I then ran the app under my log in, I recieved the same prompt to install the certificate?
0
 
LVL 84
Comment Utility
Where'd you get the certificate? If you built the cert yourself, you'll get this prompt for every user. If you purchase a security cert for a root authority, then you won't get the prompt. You can setup a certification server for this; see this link - http://office.microsoft.com/en-us/access/HP010397921033.aspx

Does your TS box run the app? In almost every case, the app is installed AND run on the TS box, but I've run into instances where the app is run on the box, but the backend is hosted on a different box ... if that's the case, then you'll need to sign BOTH files on each box.
0
 
LVL 2

Author Comment

by:kinton
Comment Utility
The data is all stored in SQL so there isn't an Access back end and every user runs their own copy of the app from TS.

Thanks for your tips, we got a proper cert so it works fine thank you.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

In the previous article, Using a Critera Form to Filter Records (http://www.experts-exchange.com/A_6069.html), the form was basically a data container storing user input, which queries and other database objects could read. The form had to remain op…
Overview: This article:       (a) explains one principle method to cross-reference invoice items in Quickbooks®       (b) explores the reasons one might need to cross-reference invoice items       (c) provides a sample process for creating a M…
Familiarize people with the process of utilizing SQL Server views from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Access…
Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now