Access vs Comercially available databases (2 Viewers)

The two main reasons people choose Access are its ease of use and the fact that it’s already installed at their organization. Security isn’t even considered until the IT department says “NO.”
 
The two main reasons people choose Access are its ease of use and the fact that it’s already installed at their organization. Security isn’t even considered until the IT department says “NO.”
Exactly, even though Excel is being used for the same thing and holds the same "sensative" data.

I dont mind people being stupid, but be consistent with your stupidity
 
Each user has an individual account but I pick the password so he doesn't know it. His windows login won't work. He logs into the Access app using whatever password he choose and the app logs into the server and links the tables using a password that only the DBA and I know. There are two ways to do this. Either a hardcoded password which the DBA and I must change frequently or a generated password. I give the DBA a database he can use to generate a password for the user and I use the same code. There are lots of ways to generate a password that is based on a string that is the user's login. Corporate logins are assigned by IT and so I start with that value. Then I make the password 30 characters and append a string to the end of the login string with enough characters to bring it up to 30. Then I pick some method of choosing characters from that string in some order to create the password. So even from the left and odd from the right or whatever. The appended string should contain numbers and any special characters that the server password rules allow.

When the app closes, the tables are deleted to remove the links although the password isn't saved in the link.
Yes, that's called SQL authentication as far as the auth method, and also known as service accounts, esp. if they don't know the PW.
 
Access was never designed to be or to create enterprise level applications. This is why many users feel frustration about scalability. It's awesome if people recognize It's limitations.
 
Access was never designed to be or to create enterprise level applications. This is why many users feel frustration about scalability. It's awesome if people recognize It's limitations.
I have found the multi-user aspect to be more or less unlimited as long as the back end is SQL server
 
Access was never designed to be or to create enterprise level applications. This is why many users feel frustration about scalability.

Maybe, but by splitting into an Access front-end and an SQL engine on the back end, you CAN very EASILY reach enterprise-level apps. Such as the Navy App I mentioned earlier... one of MANY possible actions. It is only the native Access back-end that would interfere with enterprise solutions.
 
Maybe, but by splitting into an Access front-end and an SQL engine on the back end, you CAN very EASILY reach enterprise-level apps. Such as the Navy App I mentioned earlier... one of MANY possible actions. It is only the native Access back-end that would interfere with enterprise solutions.
Once you hook Access up to SQL Server, it’s no longer “just an Access database,” it’s a hybrid Access/SQL Server application.
 
I have found the multi-user aspect to be more or less unlimited as long as the back end is SQL server
"Unlimited" if SQL Server edition is not Express, and running on Windows Server.
 
Last edited:
Once you hook Access up to SQL Server, it’s no longer “just an Access database,” it’s a hybrid Access/SQL Server application.

Even when you DON'T hook up to SQL Server, it's not "just" an Access DB, it is an Access GUI front end on an ACE DB, which turns out to be something used by Windows itself.
 
Even when you DON'T hook up to SQL Server, it's not "just" an Access DB, it is an Access GUI front end on an ACE DB, which turns out to be something used by Windows itself.
Agreed - at root the Excel spreadsheet sheet that you see is still dao technology.
 
The point I make with security keys is the client doesn't know the authentication key value. The issue your discusing is the use of service accounts, which can easily fall into the wrong hands and then how do you know who perpetrated a hack?
As I said, I am not talking about service accounts. If the user doesn't actually ever know his password, then the hardware lock works but at a cost. I don't think I've ever had a client that used hardware locks for every computer.
 

Users who are viewing this thread

Back
Top Bottom