How ULS work?

marianne

Registered User.
Local time
, 23:14
Joined
Mar 26, 2009
Messages
327
how does ULS work to protect the objects in the database? how does ULS code the objects so that they will be protected? What would be the code behind it?
 
To learn more, see:
The Microsoft Access Security Apparatus

and

Security paper by Jack MacDonald (EDIT: updated link)

and

http://blogs.msdn.com/access/archive...ity-model.aspx

"Since JET is a file based database system where users need physical access to the file to operate on their data, the concept of user level security in Jet to assign different levels of user access to the data within the same file was not recommended. To have multiple people use the database but with different data access privileges, the recommended practice was to move this data to a centralized service like SQL server or SharePoint lists. However, Jet has had this feature for some time and it has worked OK for usability and custom navigation scenarios but isn’t recommended for actual security. "

If security is a must for your tables, then I would not use an Access back end, but an SQL server like Microsoft's SQL Server.
 
Last edited:

Users who are viewing this thread

Back
Top Bottom