Results 1 to 4 of 4
  1. #1
    Monty51 is offline Advanced Beginner
    Windows XP Access 2010 32bit
    Join Date
    Mar 2015
    Posts
    48

    User-level Security Beginner


    As a follow-up to a previous post (again, my thanks to those that suggested things), I decided to purchase Access Password from thegrideon.com and was able to recover user names, passwords, and IDs from an Access application written by someone who passed away and left no documentation.

    I'm a beginner to user-level security and I've only ever written databases for limited and special use, and not a lot of them at that, so the ins and outs of ULS is foreign. I'm pursuing information on the subject on-line, but I'd like to ask a simple question: now that I have user information, do those users need to exist on the Windows system I'm using or do they exist somewhere within Access? Also, the IDs I've recovered, are they the 'workgroup' these users need to belong to, and are those Windows workgroups?

    Thanks.

  2. #2
    Xipooo's Avatar
    Xipooo is offline Sr. Database Developer
    Windows 8 Access 2013
    Join Date
    Jan 2014
    Location
    Arizona
    Posts
    332
    That entirely depends on how the database was designed. You can use the Windows Login, or you can have database specific user accounts that don't tie in at all to Windows Logins.

    Do a quick text search through the VBA code for Environ("username")

    If you see it, that means you're using windows logins for something. If you don't then all accounts are being handled internally within the database.

  3. #3
    Monty51 is offline Advanced Beginner
    Windows XP Access 2010 32bit
    Join Date
    Mar 2015
    Posts
    48
    So far I'm not able to open the app code without executing it because there's still something I don't know about USL. I have however, the user names, groups, and IDs from the System.mdw file that is associated with and came with the application. You'd think that was all I needed, but since I'm still a beginner at this subject, I don't know if the user info I've extracted refers to logons to the system or to Access.

    There's plenty of info on implementing USL, but not much on reverse engineering it. That's where I stand: still researching and studying.

  4. #4
    ssanfu is offline Master of Nothing
    Windows XP Access 2000
    Join Date
    Sep 2010
    Location
    Anchorage, Alaska, USA
    Posts
    9,664

Please reply to this thread with any new information or opinions.

Similar Threads

  1. Get User Automatically and Security Level example
    By pkstormy in forum Code Repository
    Replies: 2
    Last Post: 12-10-2015, 12:11 PM
  2. Replies: 13
    Last Post: 11-18-2013, 02:20 PM
  3. User Level Security
    By A kinason in forum Sample Databases
    Replies: 6
    Last Post: 11-02-2013, 02:00 AM
  4. Replies: 1
    Last Post: 08-13-2011, 04:44 AM
  5. Replies: 8
    Last Post: 06-30-2010, 10:57 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Other Forums: Microsoft Office Forums