?
Solved

Prevent users from opening network version of Access application

Posted on 2013-06-20
5
Medium Priority
?
338 Views
Last Modified: 2013-06-20
Hi Experts. I'm looking for some advice on how to prevent users from opening a network version of a front-end. I have users opening the application by way of a batch file shortcut which copies the front-end to the user's local machine while retaining a link to the back-end. This prevents users from making changes to the front-end and also gives them the most current of the application each time they open it.

A client of mine has a user going into the network version and making changes to query and report designs, etc.

Can you give me some ideas on how to prevent this? I have a development copy in another location on the network and can keep doing things that way - but sometimes the user will leave the front-end in a locked state which causes problems too.

Any ideas?
0
Comment
Question by:Ei0914
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 26

Assisted Solution

by:pony10us
pony10us earned 1000 total points
ID: 39263075
If the "front end" and "back end" are in different locations (folders) then i would set the permissions to the folder where the front end resides read only.  This will prevent users from saving any changes.
0
 
LVL 48

Accepted Solution

by:
Dale Fye earned 1000 total points
ID: 39263311
It is difficult to "secure" an access backend from someone that is familiar.

One method I have used is to disable the "shift key" bypass, then add an auto exec macro that runs a sub routine.  In mine, I check whether the path of the current database is the network path, and if it is I display a message advising the user to use the appropriate front end application.
0
 
LVL 58
ID: 39263381
As pony said, make the directory read-only for users.  This is what I do.

No points please.

Jim.
0
 
LVL 48

Expert Comment

by:Dale Fye
ID: 39263462
Btw, I use the same technique with the network copy of the front end as I do with the backend.
0
 

Author Closing Comment

by:Ei0914
ID: 39263648
Great suggestions. Thanks a lot as always!!
0

Featured Post

New benefit for Premium Members - Upgrade now!

Ready to get started with anonymous questions today? It's easy! Learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Traditionally, the method to display pictures in Access forms and reports is to first download them from URLs to a folder, record the path in a table and then let the form or report pull the pictures from that folder. But why not let Windows retr…
In Microsoft Access, learn different ways of passing a string value within a string argument. Also learn what a “Type Mis-match” error is about.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question