Chapter 29. Securing Access Applications
IN THIS CHAPTER
Understanding Jet security
Deciding on a security level to implement
Creating a database password
Using the /runtime option
Using the Current Database options
Manipulating users and groups
Securing objects by using permissions
Using the Access Security Wizard
Protecting Visual Basic code
Encrypting or encoding a database
Using the Trust Center
Although Access provides the interface to maintain security options, it is Jet that actually performs security functions. The Jet security model has changed little from Access 95 to Access 2003. Jet's security in those versions is a workgroup-based security model; all users in a workgroup are bound to the same security rules. The rules enforced for individual users may vary from user to user based on the permissions assigned to each user.
Microsoft removed the user-level security features from the new Access 2007 (.accdb
) format but retained the functionality to manage user-level security for previous versions of Access databases (.mdb
files). Microsoft retained the functionality in Access 2007 to manage user-level security for the older file formats; however, you can't set user-level security for an Access 2007 database. Other options, such as setting a database password, are available for all database versions.
Note
In this chapter, you will use the database file Chapter29.mdb
. This is in an Access 2000 format database file that demonstrates all the functionality, including user-level security, not ...
Get Access™ 2007 Bible now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.