Brendan said:
According to Eric Rucker's blog on Access 12
(
http://blogs.msdn.com/access/default.aspx) JET's user-level security
features were never actually intended to be user-level security features.
They were actually designed as navigation features.
Wow! The Office/VB Programmer's Guide talks about protecting
intellectual property by securing the mdb file. It states that Access
security protects the database and its data. Unbelievable...
Thanks for clarifying that. I was not quite sure where the security
problem lies. Now it is crystal clear!
Now, I should probably not say what I personally think of the suggestion
that the developers of JET's user and group level security system actually
thought they were developing a navigation feature. It will probably be more
productive if we concentrate not on what this says about the past of JET
security, but what it says about the future of JET security, and on that it
is unambiguous. In the future, if you care about security, use SQL Server.
What a paradox! Access.Security newsgroup should always remind readers
about Access not being secure. By the way, there are professional
Access developers who market their Access solution as secured or
suggested so. Saying like the following are plain misleading:
"multi-user client-server applications protected by user-level
security."
"if you intend to distribute your msaccess database you have no control
of the security unless you provide protection for the mdb file...
MDBSecure has been developed to provide this security..."
If all the security design flaw were true, then the ultimate
misrepresentation comes from Microsoft itself: (MS Office 2000/VB
Programmer's Guide)
"Establishing security for your Microsoft Access database file (.mdb)
or project file (.adp) protects intellectual property such as your
solution's structure and programming code. It also prevents your
solution's users from inadvertently changing object designs or code in
a way that would cause your solution to stop working. If your .mdb file
also contains data, establishing security protects sensitive data
regardless of what program is used to access your database file. This
chapter discusses techniques you can use to secure your Access
solution."
I was simply frustrated in my search for a secured embedded database
solution and lured into believing that Access was a reasonable one.
To everyone who read this thread and responded to my posting, I thank
you for clarifying the insecurity of the Access security.