Solved

Access security to an old access program

Posted on 2011-09-29
4
264 Views
Last Modified: 2012-05-12
The city would like to give access to different Access programs to the police department with restrictions on what data and tables they can see (no social security numbers).  The security set up on the access database was done with out the access security.  Basically anyone with any knowledge could access our data if the want to.  At this time we do not want to rewrite the security of the access database, but would like to be able to run a script to copy what tables and data the police department can see.  This also is between two different servers and firewalls.

Thanks
0
Comment
Question by:DowneyCity
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 12

Assisted Solution

by:pdebaets
pdebaets earned 100 total points
ID: 36817501
Sorry to be a downer, but I just don't think Access is appropriate for holding sensitive data. I always say "It's called Access for a reason". Please consider in the future moving this data to something more secure like SQL Server.

Now to your question(s). When you talk about running a script to copy, this sounds like you will be creating two copies of the data. If this is the case, then which is the "master"? will you allow updates to the copy? How will those updates to the copy be reconciled with the "master"?

You will probably want to do the best you can to ensure that users only access the data through forms. Then if the form excludes the SSN, you've implemented your restriction. Distribute an .mde (or .accde), hide tables, encrypt the back-end, and that's about all you can do to prevent a malicious user from seeing unauthorized data. Unfortunately, it's really not enough and again I recommend SQL Server for your data back-end as noted above.
0
 
LVL 74

Assisted Solution

by:Jeffrey Coachman
Jeffrey Coachman earned 100 total points
ID: 36817590
Yes, if you will be "Copying" the data anyway, why not move up to one of the SQL variants?
(SQL express is free)

< The security set up on the access database was done with out the access security. >
Then this may not even be as strong as Access built in Security...

<This also is between two different servers and firewalls.>
This may prove ineffective against a determined hacker.
0
 
LVL 19

Accepted Solution

by:
Eric Sherman earned 300 total points
ID: 36817808
<<<<<This also is between two different servers and firewalls.>>>>

1.) Create Make Table Queries to select only the shared data.
2.) Export the tables created in step 1 to a blank database and distribute.

ET
0
 

Author Closing Comment

by:DowneyCity
ID: 36818316
The two first ones are what we plan on doing in the future.  The last one will help out for now.

Thanks
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I see at least one EE question a week that pertains to using temporary tables in MS Access.  But surprisingly, I was unable to find a single article devoted solely to this topic. I don’t intend to describe all of the uses of temporary tables in t…
You need to know the location of the Office templates folder, so that when you create new templates, they are saved to that location, and thus are available for selection when creating new documents.  The steps to find the Templates folder path are …
With Microsoft Access, learn how to start a database in different ways and produce different start-up actions allowing you to use a single database to perform multiple tasks. Specify a start-up form through options: Specify an Autoexec macro: Us…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question