microsoft.com Home | |||
http://www.microsoft.com/office/ork |
After you understand how the Microsoft Access user-level security model works, you can proceed with the steps to secure a database. Although you can perform individual steps yourself, the User-Level Security Wizard is the easiest and most reliable way to secure a database.
In Access 2000, the User-Level Security Wizard performs all the necessary steps for you and can even be run again on a secured database to modify previous settings. The User-Level Security Wizard performs the following actions to secure your Access database:
You can also modify a workgroup information file previously created by running the User-Level Security Wizard or the Workgroup Administrator program. You can make the workgroup information file the default for the current installation of Access, or the wizard can create a Windows shortcut that uses the /wrkgrp command-line option to open your secured database by using the workgroup information file.
If the VBA project has been password-protected, you must unlock the project before running the wizard.
These groups include Backup Operators, Full Data Users, Full Permissions, New Data Users, Project Designers, Read-Only Users, and Update Data Users.
You can also grant permissions to the Users group for some objects. This option is useful for developers who don’t want to require users to log on to the database and only want to secure certain objects.
If you choose to create a new workgroup information file, a new user account is created for you.
At least one new user account must be assigned to the Admins group account to serve as the database administrator account. By default, the new user account created in the wizard is assigned to the default Admins group as the new database administrator account.
The objects that you selected are secured by revoking all permissions on those objects for the default Users group. Ownership of the database and its objects is transferred to the new database administrator account. Finally, the secured database is encrypted.
Keep this report in a secure location in the event that you need to use these values to re-create the workgroup information file. This report also documents which objects have been secured.
To secure a database with the Access User-Level Security Wizard
If you log on as a member of the Admins group, you can run the User-Level Security Wizard again on the new, secured database to create new users, modify permissions, and to assign users to groups.
You can establish user-level security for a database that has been split into a back-end database that contains only tables and for a front-end database that contains the remaining objects as well as links to the tables in the back-end database.
To establish user-level security for a front-end/back-end database
– or –
Remove all permissions for the tables and create queries in the front-end database that have the RunPermissions property set to Owner’s and that use the tables in the back-end database. All users must be assigned to groups that have Open/Run permission for the Database object in the back-end database.
Because users have Modify Design permission for the linked tables in the front-end database, they can reset the links to the back-end tables if the location of the back-end database changes. However, they can’t make any modifications to the design of the tables in the back-end database.
If you want to secure some objects in a database, such as the code modules and the design of objects, but you do not care about establishing different levels of access for different groups of users, you might want to consider securing an application without requiring users to log on. You can do this by running the User-Level Security Wizard and granting the permissions you want available for all users to the Users group.
To secure your database without requiring users to log on
Typical permissions include Read Data and Update Data permissions for tables and queries, and Open/Run permission for forms and reports. Don’t give the Users group the permission to modify the design of tables and queries, and don’t give users Administer permission for the database.
Important Do not distribute copies of the workgroup information file that was in use when you secured the database in this procedure. If you need to allow a user to administer your database, give a copy of the workgroup information file to that user only.
To perform administrative functions, you must use the workgroup information file that was in use when you secured the database, and you must log on as one of the members of that workgroup information file’s Admins group in one of two ways:
– or –
Topic Contents | Previous | Next | Top Friday, March 5, 1999 © 1999 Microsoft Corporation. All rights reserved. Terms of use. | ||
License
|