READ ONLY message displayed when opening an Accde database

I have designed a database application for use by several users on the network. The Access application is a client/server application with an Accde front end and Access runtime libraries installed on each user's computer. Thus not requiring a full copy of Microsoft Access.
The back end linked table database is located on a network share in a folder that all users have [Modify] permissions but not [Full Control].
The client front end file is run from C:\Program Files (x86)\Microsoft Office\Office16\ACCWIZ folder because it is a Default trusted location within Access and this location stops the security messages popping up when a user first opens the application.

However.

When the front end application is run the opening form has the following message displayed across the top:

"READ ONLY. This database has been opened read only. you can only change data in linked tables. To make design changes, save a copy of the database"
An a [Save As] button.
This would be confusing for the users.
How can I hide the message?

Thanks for your time

Neil
Neil RandallAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

ste5anSenior DeveloperCommented:
This directory is read-only.. bad idea. Also it is not a per-user folder. So this folder is not the perfect fit for a per user front-end file.

Just speak to your IT-department to add a common trusted folder for each user. Or let the user add it them self, cause it's a per user setting. Or do it per batch:

reg add "HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Access\Security\Trusted Locations\LocationX" /v "Path" /t reg_sz /d "%USERPROFILE%\YourApplicationPath"
reg add "HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Access\Security\Trusted Locations\LocationX" /v "AllowSubfolders" /t reg_dword /d "00000001"
reg add "HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Access\Security\Trusted Locations\LocationX" /v "Description" /t reg_sz /d "YourApplicationID"

Open in new window

where X is a number between 1 and 99.
0
Scott McDaniel (Microsoft Access MVP - EE MVE )Infotrakker SoftwareCommented:
There's several ways to handle the Trust Center issue. Here's a good article that discusses them:

https://www.experts-exchange.com/articles/10805/Overcome-the-Trust-Center-nuisance.html
The back end linked table database is located on a network share in a folder that all users have [Modify] permissions but not [Full Control].
User must have Read/Write/Create/Destroy permissions on the Folder. I'm not sure if Modify permissions provide that (probably does, but ask to be sure).
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Jim Dettman (Microsoft MVP/ EE MVE)President / OwnerCommented:
User must have Read/Write/Create/Destroy permissions on the Folder. I'm not sure if Modify permissions provide that (probably does, but ask to be sure).

 Note that this is for the front end as well as the back end.  Right now, you're getting that "read only" message as a result of the permissions on the front end directory.

Jim.
0
10 Tips to Protect Your Business from Ransomware

Did you know that ransomware is the most widespread, destructive malware in the world today? It accounts for 39% of all security breaches, with ransomware gangsters projected to make $11.5B in profits from online extortion by 2019.

Scott McDaniel (Microsoft Access MVP - EE MVE )Infotrakker SoftwareCommented:
Note that this is for the front end as well as the back end.
Right, and the same goes for the Trusted Location issue. You must add both as a Trusted Location, if both machines are setup to require that.
0
Gustav BrockCIOCommented:
Always use a folder of the user to hold your frontend which - to Windows - is a document.

You can run a script to simplify the full process of deployment and updating the frontend. I explained it here:

Deploy and update a Microsoft Access application in a Citrix environment
0
Neil RandallAuthor Commented:
Thanks to you all.

Ste5an for getting me started with the Reg changes
Scott for breaking it down and explaining it very simply
Jim and Gustav for reminding me to focus on the user and permissions
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Databases

From novice to tech pro — start learning today.