ACC: Overview of How to Secure a Microsoft Access DatabaseID: Q132143
|
This article provides an overview of how you can secure a database so that
it is not changed or copied by other Microsoft Access users.
This article assumes that you have a thorough understanding of the pieces
that make up the Microsoft Access security model: workgroups, accounts,
ownership, and permissions. For more information about the Microsoft Access
security model, you can obtain the "Security Wizard and White Paper for
Version 2.0" document.
For information about how to download the "Security Wizard and White Paper
for Version 2.0," please see the following article in the Microsoft
Knowledge Base:
Q122036 ACC2: Security Wizard and White Paper for Access 2.0
Available
For an overview of how to secure a database in Microsoft Access
version 7.0, search the Help index for "security, user-level security"
and display the topic, "Secure a database using the Security Wizard."
For an overview of how to secure a database in Microsoft Access 97,
search the Help index for "security, overview" and display the topic,
"Secure a database." Scroll to the bottom of the topic and click the link
to "Secure a database with the User-Level Security Wizard."
Three common mistakes you can make when you create a database that enable
other Microsoft Access users to circumvent security are as follows:
- <Current Database>
- <New Tables/Queries>
- <New Forms>
- <New Reports>
- <New Macros>
- <New Modules>
Microsoft Access "Building Applications," version 2.0, Chapter 14, "Securing Your Application," pages 313-344
Additional query words: 12 steps twelve steps
Keywords : kbusage ScrtImpl
Version : 2.0
Platform : WINDOWS
Issue type : kbhowto
Last Reviewed: April 14, 1999