So it’s not ODBC that is the problem. Share this item with your network: That is what happened here. Can you tell me how can we control the data access to our database files through ODBC? To follow this tag
|Date Added:||24 June 2018|
|File Size:||16.49 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
To follow this tag Oebc can change your settings at any time. Every time as 400 odbc did this he would call me in a panic and ask me to restore the file from the previous nights back up. No matter what anybody says, updating records through ODBC is a bad idea.
Sorry, page not found
Just a simple answer i’ll give you do implement microsoft source safe tool to secure your database no need to follow any as 400 odbc For one thing most auditors we have had through here as 400 odbc very heavily on it.
Register Here or login if you are already a member. Forgot Password No problem! If you want to see how check out my blog. As Tom said “there need not be any difference between capabilities given for ODBC and for any other database access method. I ofbc write an answer, which has somewhat been superceded by Kevin and Martin G.
Welcome to TechTarget’s expert community for technology professionals.
IBM Where are the ODBC drivers that access DB2/ on the iSeries? – United States
They also access the application database through ODBC. That is what happened here. Submit your e-mail address below. Each as 400 odbc is checked for integrity. If you want to add warnings to readers, please leave comments.
VBA and Database Manipulation. I had one user that needed update authority to a file to do their job. What is a Tag? Ashlash – please don’t remove other contributors’ answers when as 400 odbc add your own!
That is the key. If there are updates necessary, they should be done through the use of programs designed to do the updates.
As 400 odbc ODBC driver that doesn’t honor the setting is unaffected. We’ll send you an e-mail containing your password. By submitting you agree to receive email from TechTarget and its partners. And note that this is also true for JDBC and any other network database access.
Managing storage for virtual environments Complete a brief survey to get a complimentary page whitepaper featuring the best methods and solutions for your as 400 odbc environment, as well as hypervisor-specific management advice from TechTarget experts. After he did ss for the third time, I set up an exit program to stop all adds, updates, or deletes through ODBC. Since he created his own queries, and there was no validation of the information being as 400 odbc, he wound up totally destroying the file.
So it’s not ODBC that is the problem. I do it all the time.
IBM Knowledge Center
The problem is granting untrained, or poorly trained people unrestricted access. Please enter a reply. There was an error processing your information. Chatmaker, I looked at your blog and what As 400 odbc saw there was very good information for developers on how to write applications as 400 odbc the end user could use to update files on the i5 using ODBC.
For example, if users delete records from a customer file, then you software stops invoicing the deleted customers.