Solved

Prevent Tables and Queries from being imported from Access File

Posted on 2011-09-25
7
1,214 Views
Last Modified: 2012-05-12
I created a accde file to prevent users from viewing or modifying the code in my access database.  However when I create a new access file and use the import objects feature I can import tables and queries from the accde file.  How can I prevent this from happening.

0
Comment
Question by:RDLFC
  • 4
  • 3
7 Comments
 
LVL 77

Expert Comment

by:peter57r
Comment Utility
There are not many options  to secure data in Access.

With an accdb file you can apply a database password and for this to be effective you need to split the database into front-end and back end and apply the password just to the backend.  
Then in your frontend code you can create the links to the backend tables when you open the (frontend) database and delete them all when you close, so that the user is not required to know the password to the backend.
The linked tables should be hidden so that they are not apparent should the user find their way to the navigation pane.

The password in A2007/A2010 is strong .  

It would be needed by anyone who tried to import the tables into a new file.

However, if data security is a primary requirement for you then you consider not using an Access database as the file store.
Maybe use a server database such as SQL Server (express edition is free) where there is a more powerful security model available, although getting to grips with it would not be simple.
0
 

Author Comment

by:RDLFC
Comment Utility
thanks for the reply.  I currently have an access front end and a SQL backend.  I have ODBC connections established in the front end and a user can import the odbc table connections to another database.

if I password protect the front end will that stop the tables from being exported with the user needing to know the password?
0
 
LVL 77

Expert Comment

by:peter57r
Comment Utility
As far as I know, there is no way to stop authorised users from exporting tables. I assumed you were trying to protect against UNauthorised people trying to access the data.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:RDLFC
Comment Utility
any user at all.  An athorised user can access the database through the front end but I want to stop all users from creating a new database and importing the linked tables from the front end.
0
 

Accepted Solution

by:
RDLFC earned 0 total points
Comment Utility
For any users following this question see the link below.

http://www.vbforums.com/showthread.php?t=350669
0
 

Author Closing Comment

by:RDLFC
Comment Utility
I found a solution
0
 
LVL 77

Expert Comment

by:peter57r
Comment Utility
Nothing in the 'solution' you have found prevents anyone from doing anything.  It just hides things.
0

Featured Post

Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

Join & Write a Comment

It took me quite some time to sort out all the different properties of combo and list boxes available from Visual Basic at run-time. Not that the documentation is lacking: the help pages are quite thorough and well written. The problem was rather wh…
A simple tool to export all objects of two Access files as text and compare it with Meld, a free diff tool.
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
In Microsoft Access, learn how to use Dlookup and other domain aggregate functions and one method of specifying a string value within a string. Specify the first argument, which is the expression to be returned: Specify the second argument, which …

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now