Access vs Comercially available databases

There's no need to spend lots of money and time migrating from a customized Access app to an off the shelf app that doesn't do everything that the Access app does just because it's "safer" than Access. That's certainly not a justifiable reason.
For whom? me? you? or OP?

In case of the other parts of your reply, I think we have some communication problems. Because we're going in circles.
I think I'll stop here one more time, because, it's kind of wasting our time, and other readers

Thanks for your replies.
 
For whom? me? you? or OP?

In case of the other parts of your reply, I think we have some communication problems. Because we're going in circles.
I think I'll stop here one more time, because, it's kind of wasting our time, and other readers

Thanks for your replies.
You can do whatever you want, but I absolutely do not recommend the OP follow your advice. I previously suggested the OP aggressively defend the current Access app for all it's merits and you detoured this thread with over 30 posts about Access not being secure which is not a high priority for the OP, so I really have nothing further to say about security.
 
but I absolutely do not recommend the OP follow your advice.
Now I'm sure you have problems reading. Because I didn't suggest anything. Show me where I suggested anything.
Maybe if I make the fonts bold you can understand what I mean:

KitaYama said:
......., I simply said Access is not secure enough (comparing to out-of-box apps) and maybe that's why the OP's company is thinking about another solution like ALIS.
 
Now I'm sure you have problems reading. Because I didn't suggest anything. Show me where I suggested anything.
Maybe if I make the fonts bold you can understand what I mean:

KitaYama said:
......., I simply said Access is not secure enough (comparing to out-of-box apps) and maybe that's why the OP's company is thinking about another solution like ALIS.
I'm done arguing with you, have a good night, or day, wherever you are.
 
With Access and Windows, it's all about environment. I'll try to say it without too many stumbling points. It is ALWAYS about risk/reward. You ALWAYS should buy the protections you need to control the risk, and the reward is a working tool to help your organization go forward.

The U.S. Navy had a BuPers (Bureau of Personnel) application that was used to manage medical school scholarships for potential Navy medical doctors. (Navy pays for your degree, full-ride scholarship, if you serve as a medical officer for 10 years.) It was implemented with Access as FE manager and SQL Server as BE manager. It sat behind an isolation firewall that led to a network called NMCI - the Navy/Marine Corps Internet - essentially a private enterprise network - that was not fully exposed to the big-I Internet i.e. "the world." That subject matter meant that they were subject to the USA Privacy Act and, because it was a personnel system, was also subject to Navy regulations regarding security clearances.

It was basically SBU - Sensitive But Unclassified - and FOUO - For Official Use Only. It wasn't quite sensitive enough to be classified as Secret. The lesser level is called "Public Trust" and for much of my career with them, that is the clearance I held. Access to NMCI required Public Trust and was accomplished via two-factor authentication - a physical smart-card reader and a separate PIN. AND it worked over a VPN, which meant secure remote access was possible. As to range, NMCI at one time held the distinction of having the second-largest OUTLOOK address book in the world. I'm not allowed to tell you how many people were served by it (because the Secret-clearance NDA is lifetime), but it was a bunch. NMCI was available in Rota, Spain and Seoul, South Korea plus a few Aussie sites, something from Qatar, and I forget how many other international sites were served by NMCI - but it was massive. In fact, I met Nautical Gent while we were both on NMCI.

This situation passed security requirements because of (a) sub-net isolation (b) higher-level login requirements (c) I don't know how the SQL Server was set up but it was not a passive part of the security. I got called in for front-end diagnosis and trouble-shooting; another team member handled the BE machine. The point being that as paranoid an organization as the U.S. Navy still entrusted Access to drive the FE of a money-and-personal-data app. They did so because it was shielded. It didn't matter that Access intrinsic security was limited. Its external security was top-notch.

On the other hand, even OTC apps could sometimes get fooled when going out through a stateful firewall. One of my colleagues visited the New York Times (on the Web) site using whatever Microsoft was using as a browser in about 2014 - probably Edge - for a news article only to find it had been hacked and contained a malicious link that then downloaded porn to his machine. Took the IT team two days to wipe his laptop and reload it.

There are multiple kinds of hackers. Fortunately for most of us, the most common hacker is the opportunistic "grazer" - looking for any system with weak security. This is the kind of hacker you can dissuade by having decent security. The worst kind of hacker is the "targeted attention" operative, who knows or believes that behind your protections is a treasure trove of some kind. This is the hacker you can never stop; you can only slow him/her down. State-sponsored hackers (Russia, China, and Iran come to mind) are paid professional black-hat hackers whose attention you don't want.
 
Security is all relative. Access is weak but probably good enough in most situations, whereas keeping all your financial details on your mobile phone is never safe.

As we were told at GCHQ - security doesn't need to be good - it needs to be good enough. At its simplest if your threat horizon is for 30 minutes then anything you can complete in 20 is OK.
 
The point being that as paranoid an organization as the U.S. Navy still entrusted Access to drive the FE of a money-and-personal-data app. They did so because it was shielded. It didn't matter that Access intrinsic security was limited. Its external security was top-notch.
This is the point I was making to @KitaYama via my analogy of how we do our best to protect our: family, life, health, wallet, keys, money . . .
 
The two main reasons people choose Access are its ease of use and the fact that it’s already installed at their organization. Security isn’t even considered until the IT department says “NO.”
 
The two main reasons people choose Access are its ease of use and the fact that it’s already installed at their organization. Security isn’t even considered until the IT department says “NO.”
Exactly, even though Excel is being used for the same thing and holds the same "sensative" data.

I dont mind people being stupid, but be consistent with your stupidity
 
Each user has an individual account but I pick the password so he doesn't know it. His windows login won't work. He logs into the Access app using whatever password he choose and the app logs into the server and links the tables using a password that only the DBA and I know. There are two ways to do this. Either a hardcoded password which the DBA and I must change frequently or a generated password. I give the DBA a database he can use to generate a password for the user and I use the same code. There are lots of ways to generate a password that is based on a string that is the user's login. Corporate logins are assigned by IT and so I start with that value. Then I make the password 30 characters and append a string to the end of the login string with enough characters to bring it up to 30. Then I pick some method of choosing characters from that string in some order to create the password. So even from the left and odd from the right or whatever. The appended string should contain numbers and any special characters that the server password rules allow.

When the app closes, the tables are deleted to remove the links although the password isn't saved in the link.
Yes, that's called SQL authentication as far as the auth method, and also known as service accounts, esp. if they don't know the PW.
 
Access was never designed to be or to create enterprise level applications. This is why many users feel frustration about scalability. It's awesome if people recognize It's limitations.
 
Access was never designed to be or to create enterprise level applications. This is why many users feel frustration about scalability. It's awesome if people recognize It's limitations.
I have found the multi-user aspect to be more or less unlimited as long as the back end is SQL server
 
Access was never designed to be or to create enterprise level applications. This is why many users feel frustration about scalability.

Maybe, but by splitting into an Access front-end and an SQL engine on the back end, you CAN very EASILY reach enterprise-level apps. Such as the Navy App I mentioned earlier... one of MANY possible actions. It is only the native Access back-end that would interfere with enterprise solutions.
 
Maybe, but by splitting into an Access front-end and an SQL engine on the back end, you CAN very EASILY reach enterprise-level apps. Such as the Navy App I mentioned earlier... one of MANY possible actions. It is only the native Access back-end that would interfere with enterprise solutions.
Once you hook Access up to SQL Server, it’s no longer “just an Access database,” it’s a hybrid Access/SQL Server application.
 
I have found the multi-user aspect to be more or less unlimited as long as the back end is SQL server
"Unlimited" if SQL Server edition is not Express, and running on Windows Server.
 
Last edited:
Once you hook Access up to SQL Server, it’s no longer “just an Access database,” it’s a hybrid Access/SQL Server application.

Even when you DON'T hook up to SQL Server, it's not "just" an Access DB, it is an Access GUI front end on an ACE DB, which turns out to be something used by Windows itself.
 
Even when you DON'T hook up to SQL Server, it's not "just" an Access DB, it is an Access GUI front end on an ACE DB, which turns out to be something used by Windows itself.
Agreed - at root the Excel spreadsheet sheet that you see is still dao technology.
 

Users who are viewing this thread

Back
Top Bottom