Alpha Software Mobile Development Tools:   Alpha Anywhere    |   Alpha TransForm subscribe to our YouTube Channel  Follow Us on LinkedIn  Follow Us on Twitter  Follow Us on Facebook

Announcement

Collapse

The Alpha Software Forum Participation Guidelines

The Alpha Software Forum is a free forum created for Alpha Software Developer Community to ask for help, exchange ideas, and share solutions. Alpha Software strives to create an environment where all members of the community can feel safe to participate. In order to ensure the Alpha Software Forum is a place where all feel welcome, forum participants are expected to behave as follows:
  • Be professional in your conduct
  • Be kind to others
  • Be constructive when giving feedback
  • Be open to new ideas and suggestions
  • Stay on topic


Be sure all comments and threads you post are respectful. Posts that contain any of the following content will be considered a violation of your agreement as a member of the Alpha Software Forum Community and will be moderated:
  • Spam.
  • Vulgar language.
  • Quotes from private conversations without permission, including pricing and other sales related discussions.
  • Personal attacks, insults, or subtle put-downs.
  • Harassment, bullying, threatening, mocking, shaming, or deriding anyone.
  • Sexist, racist, homophobic, transphobic, ableist, or otherwise discriminatory jokes and language.
  • Sexually explicit or violent material, links, or language.
  • Pirated, hacked, or copyright-infringing material.
  • Encouraging of others to engage in the above behaviors.


If a thread or post is found to contain any of the content outlined above, a moderator may choose to take one of the following actions:
  • Remove the Post or Thread - the content is removed from the forum.
  • Place the User in Moderation - all posts and new threads must be approved by a moderator before they are posted.
  • Temporarily Ban the User - user is banned from forum for a period of time.
  • Permanently Ban the User - user is permanently banned from the forum.


Moderators may also rename posts and threads if they are too generic or do not property reflect the content.

Moderators may move threads if they have been posted in the incorrect forum.

Threads/Posts questioning specific moderator decisions or actions (such as "why was a user banned?") are not allowed and will be removed.

The owners of Alpha Software Corporation (Forum Owner) reserve the right to remove, edit, move, or close any thread for any reason; or ban any forum member without notice, reason, or explanation.

Community members are encouraged to click the "Report Post" icon in the lower left of a given post if they feel the post is in violation of the rules. This will alert the Moderators to take a look.

Alpha Software Corporation may amend the guidelines from time to time and may also vary the procedures it sets out where appropriate in a particular case. Your agreement to comply with the guidelines will be deemed agreement to any changes to it.



Bonus TIPS for Successful Posting

Try a Search First
It is highly recommended that a Search be done on your topic before posting, as many questions have been answered in prior posts. As with any search engine, the shorter the search term, the more "hits" will be returned, but the more specific the search term is, the greater the relevance of those "hits". Searching for "table" might well return every message on the board while "tablesum" would greatly restrict the number of messages returned.

When you do post
First, make sure you are posting your question in the correct forum. For example, if you post an issue regarding Desktop applications on the Mobile & Browser Applications board , not only will your question not be seen by the appropriate audience, it may also be removed or relocated.

The more detail you provide about your problem or question, the more likely someone is to understand your request and be able to help. A sample database with a minimum of records (and its support files, zipped together) will make it much easier to diagnose issues with your application. Screen shots of error messages are especially helpful.

When explaining how to reproduce your problem, please be as detailed as possible. Describe every step, click-by-click and keypress-by-keypress. Otherwise when others try to duplicate your problem, they may do something slightly different and end up with different results.

A note about attachments
You may only attach one file to each message. Attachment file size is limited to 2MB. If you need to include several files, you may do so by zipping them into a single archive.

If you forgot to attach your files to your post, please do NOT create a new thread. Instead, reply to your original message and attach the file there.

When attaching screen shots, it is best to attach an image file (.BMP, .JPG, .GIF, .PNG, etc.) or a zip file of several images, as opposed to a Word document containing the screen shots. Because Word documents are prone to viruses, many message board users will not open your Word file, therefore limiting their ability to help you.

Similarly, if you are uploading a zipped archive, you should simply create a .ZIP file and not a self-extracting .EXE as many users will not run your EXE file.
See more
See less

Working with Access Rights

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    #16
    Re: Working with Access Rights

    Originally posted by Steve Wood View Post
    Thank You Steve.That Helped :)
    Thanks & Regards,
    RR


    Wonder rather than doubt is the root of all knowledge

    Comment


      #17
      Re: Working with Access Rights

      Can i import jus the websecurity tables from server other than importing all the pages and components ?
      i have gone through utilities in websecurity where it mentioned that , select profile to import files..

      Is there a way that i can jus import only websecurity tables.
      Alternate way i can do is to create one dummy project import websecurity tables from server into that project and from there i can import to my project.

      But before procedding that way , jus want to find out about other possibilites.
      Last edited by DOntquIT; 09-23-2008, 09:44 PM.
      Thanks & Regards,
      RR


      Wonder rather than doubt is the root of all knowledge

      Comment


        #18
        Re: Working with Access Rights

        I know what Alpha/Jerry would say - "at your own risk". Personally, even though I know I could import or otherwise use those security tables, I don't touch them. I don't believe there is anything you want to do below that you cannot do with the normal functions, not that I figured it out. I would not even import information from the security files into my own tables. The major reasons are a) I don't want to compromise my security, b) I don't want to second guess what is in those tables and c) Alpha could encrypt or change how those tables work with any update and d) I don't want to expose to any significant degree how security works.
        Steve Wood
        See my profile on IADN

        Comment


          #19
          Re: Working with Access Rights

          Originally posted by DOntquIT View Post
          Can i import jus the websecurity tables from server other than importing all the pages and components ?
          i have gone through utilities in websecurity where it mentioned that , select profile to import files..

          Is there a way that i can jus import only websecurity tables.
          Alternate way i can do is to create one dummy project import websecurity tables from server into that project and from there i can import to my project.

          But before procedding that way , jus want to find out about other possibilites.
          The reason i asked this is,

          we have implemented our project in client place and they started test run on it.
          During implementation, we assigned "testing" as default password for all the user, which they changed once they started using system.

          Now after implementation, when ever there is changes requested and when we republish the files (including web security tables) , all password that changed by user changing back to default password "testing".

          So we thought of importing web security table data alone to our projects and publish whole thing back to server.
          Thanks & Regards,
          RR


          Wonder rather than doubt is the root of all knowledge

          Comment


            #20
            Re: Working with Access Rights

            Take a look at the pages.SecuritySettings file that is published to the web root of your app, that is the file this refers to. (Plus the project.SecuritySettings file too)

            Comment


              #21
              Re: Working with Access Rights

              Once you go live and the software is self-maintained by the client, you should never republish the security tables. You have to manually check a box in order to publish security, so you should not check that box. Is there a special reason you want to republish the security?

              FYI - I unsuccessfully lobbied for a "lockdown" checkbox somewhere far away from the publishing process. You could check a box on a completed project and it would NEVER publish security tables (unless you unchecked the lockdown box). I think is is frightning to have a publishing process where a simple mistake can cost you your entire user list. My request got turned down.
              Steve Wood
              See my profile on IADN

              Comment


                #22
                Re: Working with Access Rights

                Originally posted by Steve Wood View Post
                FYI - I unsuccessfully lobbied for a "lockdown" checkbox somewhere far away from the publishing process. You could check a box on a completed project and it would NEVER publish security tables (unless you unchecked the lockdown box). I think is is frightning to have a publishing process where a simple mistake can cost you your entire user list. My request got turned down.
                What would be nice is a simple check where it compares the user and group list from the server with the local one - if users/groups exist on the server that do not exist locally, or if passwords or email addresses have changed on the server, synchronise instead of just overwrite.... Or at the very least point out the differences and allow the user to cancel.

                Comment


                  #23
                  Re: Working with Access Rights

                  simple check where it compares the user and group list from the server with the local one.
                  Working on it! It's a vital element because the security is, by nature, a hidden beast. But to do it, I have to slightly break one of the 'rules' I listed earlier.
                  Steve Wood
                  See my profile on IADN

                  Comment


                    #24
                    Re: Working with Access Rights

                    Originally posted by Steve Wood View Post
                    Once you go live and the software is self-maintained by the client, you should never republish the security tables. You have to manually check a box in order to publish security, so you should not check that box. Is there a special reason you want to republish the security?
                    We added few employees manually (since its only 3 more emp need to be add other than existing) to all the three web security tables after implementation because the project where they can add user by system in not yet implemented.that module we are plannin to do next month only since its client reqirements.

                    Thats the reason i asked for it.but i feel its better to avoid doing manually to overcome all this situations.

                    Thanks for Info provided.Really usfull informations
                    Thanks & Regards,
                    RR


                    Wonder rather than doubt is the root of all knowledge

                    Comment


                      #25
                      Re: Working with Access Rights

                      I should temper my use of the word "never". I was thinking about a totally live system where users were registering and maintaining their profile online. In that case you would not want to pub security because you would wipe out their changes.

                      Another method is to use Utilities under Web Security to import the existing security from the live site, update manually, and republish security. I am so mistrusting of that mistake-prone process I would always make a copy of the live tabels first. In fact, I backup my live websecurity*.* and other critical tables every day and keep archives for ten days.
                      Steve Wood
                      See my profile on IADN

                      Comment


                        #26
                        Re: Working with Access Rights

                        Originally posted by DOntquIT View Post
                        Can i import jus the websecurity tables from server other than importing all the pages and components ?
                        i have gone through utilities in websecurity where it mentioned that , select profile to import files..

                        Is there a way that i can jus import only websecurity tables.
                        Alternate way i can do is to create one dummy project import websecurity tables from server into that project and from there i can import to my project.

                        But before procedding that way , jus want to find out about other possibilites.
                        Yes, thats my question too.
                        when i use that import option , does it import only websecurity or does it import the whole project to the current system?

                        and if i jus copy the pagesecurity.securitysettings from live site, to my project actually what will happen ? does it gonna modify my security tables ?
                        Thanks & Regards,
                        RR


                        Wonder rather than doubt is the root of all knowledge

                        Comment


                          #27
                          Re: Working with Access Rights

                          The Web Security > Options only imports security Users and Groups, that's all. It does not import the Pages security. But I should not give any advise in this area -- I know what will happen if you move around security files since I have done it. It may work at one point, but then completely screw up your security in the target application at another point.

                          A simple example may help:

                          Say you have two copies of the same application that are exact clones of each other. Say you add a security Group named ADMIN to each of them, or say you add a User named Steve to each of them -- at this moment the two sets of security files will be completely incompatible. If you copy either set to the other, your security will be hosed in the target application and you will have a bunch of work to do to fix it.

                          Going back to your original post, why not create an A5W page using the built-in security functions and call that page from your SQL login screen with parameters that establish security in Alpha?
                          Steve Wood
                          See my profile on IADN

                          Comment

                          Working...
                          X