AgentM, We did hide the connection string using a "Handler" - suggestion from Microsoft.
My programmer provides the following explanation:
This is the idea:
If a user does a show source the information they see is just what is on the param tags. They never see the info in the dfmap file used by
the handler.
It took us a quite a few tries with microsofts help in getting this working. It appears that any corruption on the dfmap file can cause this not to work. So, the file should be created in notepad on the server. This is ok for intranet but not sure about security for internet. The handler, is I believe in an unreg state. We tried it first in a registered state or on state... but under the later mdac releases it is not necessary to have it on and I believe this makes it more secure.
here is the RDS OBJECT:
<object CLASS="RDS" classid="CLSID:BD96C556-65A3-11D0-983A-00C04FC29E33" height="1" id="RDS" width="1">
<PARAM NAME="Server" VALUE="
<PARAM NAME="Connect" VALUE="Data source=CONNECTTOMATCH">
<PARAM NAME="Handler" VALUE="MSDFMAP.Handler,dfmap.ini">
<PARAM NAME="SQL" VALUE="Authors">
This is the object tag for an RDS object. The server is your webserver parameter, the handler parameter takes the driver?, and the dfmap.ini file
(and i do believe it needs to be named that). the dfmap.ini file is in the winnt directory. It contains a reference to a system ODBC DSN,
the userid and password and looks like the following
Here is the dfmap.ini file:
[connect CONNECTTOMATCH]
Access=ReadWrite
Connect="DSN=YOURSYSEMDSN;UID=xxxxxxx;PASSWORD=xxxxxxx;"
[sql authors]
;If we want to disable unknown SQL values, we set Sql to an invalid query.
Sql="select * from authors
Notice the datasource in the param, must match the [connect ..........]. It doesn't matter what you call it but they must match.
The only security risk is you still have the password in a text based file but that file is on the webserver winnt directory- which
should be secured from the rest of the world. The password is never passed
Good luck.....