Solved

Prevent users from opening network version of Access application

Posted on 2013-06-20
5
331 Views
Last Modified: 2013-06-20
Hi Experts. I'm looking for some advice on how to prevent users from opening a network version of a front-end. I have users opening the application by way of a batch file shortcut which copies the front-end to the user's local machine while retaining a link to the back-end. This prevents users from making changes to the front-end and also gives them the most current of the application each time they open it.

A client of mine has a user going into the network version and making changes to query and report designs, etc.

Can you give me some ideas on how to prevent this? I have a development copy in another location on the network and can keep doing things that way - but sometimes the user will leave the front-end in a locked state which causes problems too.

Any ideas?
0
Comment
Question by:Ei0914
5 Comments
 
LVL 26

Assisted Solution

by:pony10us
pony10us earned 250 total points
ID: 39263075
If the "front end" and "back end" are in different locations (folders) then i would set the permissions to the folder where the front end resides read only.  This will prevent users from saving any changes.
0
 
LVL 47

Accepted Solution

by:
Dale Fye (Access MVP) earned 250 total points
ID: 39263311
It is difficult to "secure" an access backend from someone that is familiar.

One method I have used is to disable the "shift key" bypass, then add an auto exec macro that runs a sub routine.  In mine, I check whether the path of the current database is the network path, and if it is I display a message advising the user to use the appropriate front end application.
0
 
LVL 57
ID: 39263381
As pony said, make the directory read-only for users.  This is what I do.

No points please.

Jim.
0
 
LVL 47

Expert Comment

by:Dale Fye (Access MVP)
ID: 39263462
Btw, I use the same technique with the network copy of the front end as I do with the backend.
0
 

Author Closing Comment

by:Ei0914
ID: 39263648
Great suggestions. Thanks a lot as always!!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most if not all databases provide tools to filter data; even simple mail-merge programs might offer basic filtering capabilities. This is so important that, although Access has many built-in features to help the user in this task, developers often n…
In the previous article, Using a Critera Form to Filter Records (http://www.experts-exchange.com/A_6069.html), the form was basically a data container storing user input, which queries and other database objects could read. The form had to remain op…
Learn how to number pages in an Access report over each group. Activate two pass printing by referencing the pages property: Add code to the Page Footers OnFormat event to capture the pages as there occur for each group. Use the pages property to …
In Microsoft Access, learn how to “cascade” or have the displayed data of one combo control depend upon what’s entered in another. Base the dependent combo on a query for its row source: Add a reference to the first combo on the form as criteria i…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now