1 Chapter 13 Securing an Access Application. 13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level.

Slides:



Advertisements
Similar presentations
1 All Powder Board and Ski Microsoft Access Workbook Chapter 10: Database Administration Jerry Post Copyright © 2007.
Advertisements

Managing User, Computer and Group Accounts
Chapter Five Users, Groups, Profiles, and Policies.
ACCESS SECURITY THE TOOLS PROVIDED BY MICROSOFT TO PROTECT YOUR WORK MUCH OF THE INFORMATION CONTAINED IN THIS PRESENTATION COMES FROM THE MICROSOFT SECURITY.
Lesson 17: Configuring Security Policies
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Compile MS Access Pertemuan 18 Matakuliah: F0712 / Lab MS Access Tahun: 2007.
XP Chapter 3 Succeeding in Business with Microsoft Office Access 2003: A Problem-Solving Approach 1 Analyzing Data For Effective Decision Making.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
By Rashid Khan Lesson 8-Crowd Control: Controlling Access to Resources Using Groups.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
MS Access Advanced Instructor: Vicki Weidler Assistant:
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
DAY 15: ACCESS CHAPTER 2 Larry Reaves October 7,
Hands-On Microsoft Windows Server 2008
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
XP Chapter 2 Succeeding in Business with Microsoft Office Access 2003: A Problem-Solving Approach 1 Building The Database Chapter 2 “It is only the farmer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Security Planning and Administrative Delegation Lesson 6.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
Copyright © 2013 Curt Hill Database Security An Overview with some SQL.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
Chapter 10: Rights, User, and Group Administration.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
By Rashid Khan Lesson 6-Building a Directory Service.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Lesson 13: Configuring Shared Resources
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Securing a Database 1.Understanding database security 2.Protecting the Database File 3.Protecting Code 4.Using User level Security 5.Working with workgroups.
Access Lesson 14 Creating Database Security and Documentation Microsoft Office 2010 Advanced Cable / Morrison 1.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Securing and Sharing Workbooks Lesson 11. The Review Tab Microsoft Excel provides several layers of security and protection that enable you to control.
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
Visual Basic for Application - Microsoft Access 2003 Finishing the application.
Privilege Management Chapter 22.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
1 Chapter Overview Understanding Shared Folders Planning, Sharing, and Connecting to Shared Folders Combining Shared Folder Permissions and NTFS Permissions.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
Lesson 14: Configuring File and Folder Access MOAC : Configuring Windows 8.1.
ITMT Windows 7 Configuration Chapter 6 – Sharing Resource ITMT 1371 – Windows 7 Configuration 1.
Database Security (Chapter 10)
Introduction to NTFS Permissions
Microsoft Office Access 2003
Microsoft Excel 2007 – Level 2
Chapter 9: Managing Groups, Folders, Files, and Object Security
Introducing NTFS Reliability Security Long file names Efficiency
Windows Vista Inside Out
Presentation transcript:

1 Chapter 13 Securing an Access Application

13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level security

13 The Elements of Security Security  Refers to the protection of an application from unauthorized use Authorization  Specifies who can access and update different objects in the application

13 The Elements of Security Application-level security  Makes it difficult for unauthorized users to view the contents of the application User-level security  Gives different users different permissions for various objects that comprise an application Permission  Ability to perform an action on an object

13 Stripping Source Code.mde file  Compiled database file that cannot be modified, even though it is smaller and runs more quickly Advantages of.mde file  Can be distributed, but users cannot view or change the application’s objects  Protects a developer’s investment in the application

13 Data Encryption and Decryption Encryption  Conversion of data from one representation into another  New representation is coded so that it cannot be easily understood Decryption  Reverses the process of encryption

13 Data Encryption and Decryption Security measures supplied by Access apply only to Access  Encryption will make the data more difficult to read To read encrypted files:  You must possess processes and the decoding key necessary to decrypt the files

13 Creating a Database Password Database password  Simplest way to prevent unauthorized access to an Access application  Can be set in the Set Database Password dialog box You can’t set a database password if user- level security has been defined for your database and you do not have Administer permission for the database

13 User-Level Security User account  An object that represents a user (or developer) of an Access application PID  Case-sensitive string that can hold between 4 and 20 characters  Used in combination with the user name to create a 128-bit machine-readable number

13 User-Level Security Workgroup  Set of accounts that tend to access the same set of Access applications Accounts in the workgroup share the same workgroup information file  Have the.mdw extension  Access reads file information when it starts  Contains information about the users in a workgroup

13 User-Level Security Workgroup identifier (WID)  Uniquely identifies a workgroup  Case-sensitive string that can hold between 4 and 20 characters Owner of an object  Special user who always has full permissions on the object  Identified by the user name and PID

13 User-Level Security Group  Named collection of user accounts that share the same set of permissions on an application’s objects Permissions  Privilege

13 Creating and Joining Workgroups Workgroups are created and managed through the Microsoft Access Workgroup Administrator  Workgroup Administrator  Application separate from Access  File name Wrkgadm.exe When a new workgroup is joined, the old workgroup is no longer considered active

13 User Accounts and Passwords Admins group  Group account that retains full permissions on all databases created when the workgroup was active Users group  Group account that contains all user accounts Secure workgroup  A workgroup that prompts for a user name and password

13 Creating a New User Account Figure 13-2 Entering a user

13 Creating a New User Account Access applications use the user name and PID to determine the identity of the current user Users can assign themselves a password when a database is open by using the Change Logon Password tab of the User and Group Accounts dialog box

13 Creating a New User Account Figure 13-3 Change Logon Password tab

13 Workgroup Dynamics Workgroups do not share information including user name and password  A user account and password must be created for each workgroup that a particular user must use You can modify passwords and create new users within VBA

13 Users and Their Groups Groups with the same group name and PID, regardless of workgroup, receive the same permissions on a particular application When an application supports a large number of users, permissions should be managed through groups  Easier to assign permissions to a few groups than to each individual user

13 Users and Their Groups You can create or delete groups in the Group tab of the User and Group Accounts dialog box Figure 13-4 Entering a new group

13 Adding and Removing Users To and From Groups Creating users and groups is less cumbersome under the ADO model than the DAO model  Append the new user to the Users collection or new group to the Groups collection A reciprocal relationship exists between the objects in a user’s Groups collection and the objects in the group’s Users collection

13 Adding and Removing Users To and From Groups Figure 13-6 Relationship between security- related objects in collections

13 Using and Assigning Permissions Permissions can be assigned to:  All database objects  Database  Individual users  Groups of users  All members of the group have the same permissions

13 Using and Assigning Permissions Permissions can be assigned through the User and Group Permissions dialog box Figure 13-7 User and Group Permissions dialog box

13 Assigning Permissions Through User and Group Permissions Dialog Box With OwnerAccess Option declaration  Used when the developer would like the user to update data in a table, but does not want the user to view the details of the table’s design  When possessed by a query, a user can run the query as long as the owner of the query has the appropriate permissions

13 Setting and Using Permissions in VBA Access stores information related to Permissions in properties of the Container and Document objects  Containers collection  Located inside a database object  A container exists for every type of object used in an Access application  Contains a document collection,which also exists for every object

13 Setting and Using Permissions in VBA SetPermissions method  Sets a value that establishes the permissions for the user or group identified by the Group or User object GetPermissions method  Retrieves permissions once they have been set Bitwise arithmetic  Involves a bit-by-bit comparison of identically positioned bits in two numeric expressions

13 Owner and Admins Group Security Problems User-level security is not complete until you have considered the special capabilities of Admins group members and owners Owners of an object always have the ability to assign themselves full permissions on the object If an application was created in an unsecured environment, the Admin account is the owner of all objects

13 Owner and Admins Group Security Problems Table 13-1 Permissions granted to users

13 Owner and Admins Group Security Problems Important implications of these relationships:  Admin account should not own any object in a secure application  Workgroup used to create an application should not be distributed as part of the application Developers can restrict the permissions of the Admin account and Admin group

13 Changing Object Ownership and Creating a Secure Application Object owner  User who creates an Access object  Always has full permissions applicable to an object Administer permission  Exists regardless of whether the user is a member of the Admins group or whether an account in the Admins group attempts to change owner’s permission

13 Changing Object Ownership and Creating a Secure Application If an object is not a database, it’s ownership may be changed through the Change Owner tab on the User and Group Permissions dialog box Figure 13-8 Change Owner tab

13 Changing Object Ownership Owners of a database always have the right to open the database To change the ownership of an entire database:  Import the database into Access while you are logged on using the account of the new owner

13 Changing Object Ownership Figure 13-9 Import Objects dialog box

13 Changing Database Ownership and Securing an Application The import database technique is one way to secure an unsecured application  Allows ownership of all objects, including the database, to be transferred from an unsecured database

13 The User-Level Security Wizard User-Level Security Wizard WILL:  Create a new database  Import all the objects from the old database  Remove all permissions from the Users group  Encrypt the new database Application’s performance will be degraded slightly because it now uses an encrypted database

13 Preparing a Workgroup for Distribution Each computer that runs an Access application must have access to:  The application files  The workgroup information file  The Access default workgroup information file is used to run an application or  The developer will distribute a workgroup information file

13 Chapter Summary Security can be provided at both the application and the user levels Application-level security has the same effect on all users of a particular Access database file Database files can be encrypted and assigned a password

13 Chapter Summary User-level security  Provides different types of security for different users Key to understanding how user-level security is implemented is to understand the relationships between workgroups, groups, users, owners, and permissions

13 Chapter Summary Admins members can always modify their own permissions when the workgroup that created an Access application is active Owners can modify their own permissions no matter which workgroup is active Security features can be implemented through Access menus and VBA