Microsoft Office 2000/Visual Basic Programmer's Guide |
There are additional factors to take into account when establishing User-Level security for a solution that has been split into a back-end database that contains only tables, and a front-end database that contains the remaining objects plus links to the tables in the back-end database. You may not know the name of the specific network location for the back-end database in advance, or you may want to allow a database administrator to move the back-end database. In either situation, users must be able to relink the tables in the back-end database.
To establish User-Level security for a front-end/back-end solution
For more information about the RunPermissions property, see "Using the Access RunPermissions Property with User-Level Security" later in this chapter.
Tip You can also write code that prompts users during startup to refresh table links. For sample code that refreshes table links, see "Refreshing Links for Linked Tables" in Chapter 14, "Working with the Data Access Components of an Office Solution."
Because users have Modify Design permission for the linked tables in the front-end database, they can reset the links to the back-end tables if the location of the back-end database changes. They can't make any modifications to the design of the actual tables in the back-end database.