O'Reilly logo

F. Scott Barker's Microsoft® Access 2000 Power Programming by F. Scott Barker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

SECURING REPLICATED APPLICATIONS

Security in replicated databases, with the exception of file passwords, works just the same as non-replicated databases.

The security file, System.mdw, can't be replicated. Therefore, you must either re-create the exact same user/PID in each System.mdw; or re-create the exact same user group/PID in each System.mdw, assign permissions to the group, and make local users join this group.

You can specify a security file for the Replication Manager by using command-line parameters, in a manner similar to Access:

REPLMAN.EXE /WRKGRP path
					

path is the path to System.mdw to be used to open the secured database.

Note

You can't use simple file password security with replication. If you have a non-replicated database that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required