There are additional factors to take into account when establishing user-level security for an application that has been split into a back-end database containing only tables, and a front-end database containing the remaining objects and links to the tables in the back-end database. You may not know the name of the specific network location for the back-end database in advance, or you may want to allow a database administrator to move the back-end database. In either situation, users must be able to relink to the tables in the back-end database.
Û To establish user-level security for a front-end/back-end application
See Also For more information about the RunPermissions property, see “Using the Microsoft Access RunPermissions Property with User-Level Security” later in this chapter.
By default, after you run the User-Level Security Wizard, your database users have permission to create new tables and queries in the front-end database. If Database Access Objects (DAO) code has been used to remove this permission, you must use DAO code and the dbSecCreate constant to reassign this permission.
See Also For more information about using DAO code to assign permissions, see “Securing Objects” later in this chapter.
Tip You can also write code that prompts users during startup to refresh table links. For sample code that does this, see the RelinkTables and RefreshLinks functions in the RefreshTableLinks module of the Orders sample application, which is included with Microsoft Access.
Because users have Modify Design permission for the linked tables in the front-end database, they can reset the links to the back-end tables if the location of the back-end database changes. They can’t make any modifications to the design of the actual tables in the back-end database.