Solved

Access runtime / Windows 7 - how to set a trusted location

Posted on 2014-12-22
6
1,914 Views
Last Modified: 2015-01-06
Using Microsoft Access 2013 I would want to install the access runtime onto a number of PC's so the users can open and use a database.
How can I add the folder the database will reside in to a trusted location without having the necessary dialog in the access runtime IDE.
Not available in runtime mode(I am testing it with the /runtime flag at present on a development PC).
0
Comment
Question by:AndyAinscow
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 50

Expert Comment

by:Gustav Brock
ID: 40512875
The easiest method is to do it the other way around: "install" (=copy) your database file in a location that already is trusted.
That could be %localappdata% (you can paste %localappdata% directly into Windows Explorer).

Here, create a generic folder like your CompanyName.
In this folder, create a folder for your application like MyApp.
In this folder, place a copy of your application and create a shortcut for the user.

/gustav
0
 
LVL 36

Expert Comment

by:PatHartman
ID: 40513077
You may be able to get your desktop support group to distribute the correct registry keys via group policy.  That is what I do for most clients.  Or, you can do it yourself.   Here's an article that gives you a start.
https://social.msdn.microsoft.com/Forums/en-US/a3cb49c3-de8d-41e4-b9ef-77a2f3efeab9/add-ms-access-trusted-location?forum=scripting
0
 
LVL 26

Accepted Solution

by:
Nick67 earned 500 total points
ID: 40513775
It can be hacked into the registry in whatever fashion suits:

This to permit a network location
[HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Access\Security\Trusted Locations]
"AllowNetworkLocations"=dword:00000001


This for each permitted path, starting at location zero
Local path

[HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Access\Security\Trusted Locations\Location0]
"Path"="DriveLetter:\\foldername\\"
"AllowSubfolders"=dword:00000001
"Description"=""
"Date"="28/03/2013 9:41 AM"


Network path
[HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Access\Security\Trusted Locations\Location1]
"Path"="\\\\server\\share\\"
"AllowSubfolders"=dword:00000001
"Description"=""
"Date"="28/03/2013 9:41 AM"


I got tired of putting them in.
Now a double click does it.
Access 2013 is version 15.0, that's the only change
Access 2007, God help you, is version 12.0
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 44

Author Comment

by:AndyAinscow
ID: 40514440
Thanks for the responses.
I'll get back in a number of days when I have had a chance to study/test them.
0
 
LVL 84
ID: 40518347
0
 
LVL 44

Author Closing Comment

by:AndyAinscow
ID: 40535058
Perfect, thanks.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Access custom database properties are useful for storing miscellaneous bits of information in a format that persists through database closing and reopening.  This article shows how to create and use them.
In Part II of this series, I will discuss how to identify all open instances of Excel and enumerate the workbooks, spreadsheets, and named ranges within each of those instances.
The viewer will learn how to simulate a series of sales calls dependent on a single skill level and learn how to simulate a series of sales calls dependent on two skill levels. Simulating Independent Sales Calls: Enter .75 into cell C2 – “skill leve…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question