Table of Contents
Previous Section Next Section

Working with Access Security

Access isn't a real database server, and its security systems are something of a joke when compared with the features provided by its bigger brother and cousins. We'll have just a quick look at them before moving on. ...

Access 2002 supports the GRANT and REVOKE commands, but with Access the visual wizards have always had much more success. You can access all security-related Access features by visiting the Tools Ø Security menu.

The most basic way to secure an Access database (an .mdb file) is to set a database password on it. Once a password has been set on the database, it's requested each time the database is opened. You can set a database password by opening the database and selecting Tools Ø Security Ø Set Database Password. This option becomes more powerful when combined with database file encryption (Tools Ø Security Ø Encrypt/Decrypt Database). An encrypted data file is much harder to break than a nonencrypted, password-protected one.

Access also supports user-level security, which can be combined with the database password. User-level security allows you to fine-tune the access permissions for the users you define. To manage the database users, select Tools Ø Security Ø User and Group Accounts. This will allow you to add, remove, or modify existing user information (see Figure 11-1).

Click To expand
Figure 11-1: Adding users

Once you have added the users to the database, you can control their permissions by accessing Tools Ø Security Ø User and Group Permissions (see Figure 11-2).

Click To expand
Figure 11-2: Controlling permisssions

If you prefer a wizard to do some of the work for you, try calling the User-Level Security Wizard from Tools Ø Security Ø User-Level Security Wizard.


Table of Contents
Previous Section Next Section