READ ONLY message displayed when opening an Accde database

Neil Randall
Neil Randall used Ask the Experts™
on
I have designed a database application for use by several users on the network. The Access application is a client/server application with an Accde front end and Access runtime libraries installed on each user's computer. Thus not requiring a full copy of Microsoft Access.
The back end linked table database is located on a network share in a folder that all users have [Modify] permissions but not [Full Control].
The client front end file is run from C:\Program Files (x86)\Microsoft Office\Office16\ACCWIZ folder because it is a Default trusted location within Access and this location stops the security messages popping up when a user first opens the application.

However.

When the front end application is run the opening form has the following message displayed across the top:

"READ ONLY. This database has been opened read only. you can only change data in linked tables. To make design changes, save a copy of the database"
An a [Save As] button.
This would be confusing for the users.
How can I hide the message?

Thanks for your time

Neil
Comment
Watch Question

Do more with

Expert Office
EXPERT OFFICE® is a registered trademark of EXPERTS EXCHANGE®
ste5anSenior Developer
Commented:
This directory is read-only.. bad idea. Also it is not a per-user folder. So this folder is not the perfect fit for a per user front-end file.

Just speak to your IT-department to add a common trusted folder for each user. Or let the user add it them self, cause it's a per user setting. Or do it per batch:

reg add "HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Access\Security\Trusted Locations\LocationX" /v "Path" /t reg_sz /d "%USERPROFILE%\YourApplicationPath"
reg add "HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Access\Security\Trusted Locations\LocationX" /v "AllowSubfolders" /t reg_dword /d "00000001"
reg add "HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Access\Security\Trusted Locations\LocationX" /v "Description" /t reg_sz /d "YourApplicationID"

Open in new window

where X is a number between 1 and 99.
Most Valuable Expert 2012
Top Expert 2014
Commented:
There's several ways to handle the Trust Center issue. Here's a good article that discusses them:

https://www.experts-exchange.com/articles/10805/Overcome-the-Trust-Center-nuisance.html
The back end linked table database is located on a network share in a folder that all users have [Modify] permissions but not [Full Control].
User must have Read/Write/Create/Destroy permissions on the Folder. I'm not sure if Modify permissions provide that (probably does, but ask to be sure).
Jim Dettman (EE MVE)President / Owner
Most Valuable Expert 2017
Most Valuable Expert 2012

Commented:
User must have Read/Write/Create/Destroy permissions on the Folder. I'm not sure if Modify permissions provide that (probably does, but ask to be sure).

 Note that this is for the front end as well as the back end.  Right now, you're getting that "read only" message as a result of the permissions on the front end directory.

Jim.
Ensure you’re charging the right price for your IT

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden using our free interactive tool and use it to determine the right price for your IT services. Start calculating Now!

Most Valuable Expert 2012
Top Expert 2014

Commented:
Note that this is for the front end as well as the back end.
Right, and the same goes for the Trusted Location issue. You must add both as a Trusted Location, if both machines are setup to require that.
Most Valuable Expert 2015
Distinguished Expert 2018

Commented:
Always use a folder of the user to hold your frontend which - to Windows - is a document.

You can run a script to simplify the full process of deployment and updating the frontend. I explained it here:

Deploy and update a Microsoft Access application in a Citrix environment

Author

Commented:
Thanks to you all.

Ste5an for getting me started with the Reg changes
Scott for breaking it down and explaining it very simply
Jim and Gustav for reminding me to focus on the user and permissions

Do more with

Expert Office
Submit tech questions to Ask the Experts™ at any time to receive solutions, advice, and new ideas from leading industry professionals.

Start 7-Day Free Trial