Skip to main content
  • 241 Accesses

Abstract

This chapter will show you how to use the Access workgroup (user-level) security system to secure your user interface and most of the objects in your database. To achieve these worthwhile goals, you need to follow some fundamental steps, such as creating a secure workgroup file, changing object ownership in the your database, and setting permissions on all or some of these objects. Just undertaking these tasks can all get a little complex, especially if you are unsure of what you are doing or what you are testing for. Another issue with workgroup security is that it can add the burden of yet another password for a user and additional responsibilities to the DBA in sorting them out. Therefore, I have structured this chapter to

  • Provide you with driving instructions for the different things you need to do (can do) to implement workgroup security.

  • Provide a system in which users (and the developer) never have to enter passwords.

  • Produce a database in which the user cannot change the design of any object and cannot view the design of forms, reports, macros, and, to a lesser extent, modules.

  • Achieve a lot of security and protection without producing a too-complex security design.

  • Create a database that is not susceptible to password-cracking software (discussed in Chapter 9).

  • Allow you to protect your startup options and, therefore, protect toolbars and menus, the Database window, and other startup options that you don’t want your users to tamper with.

  • Set up a framework for other security measures, such as Access data and query security (discussed in Chapter 10) and operating system security (discussed in Chapter 12).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Science+Business Media New York

About this chapter

Cite this chapter

Robinson, G. (2004). Developer Workgroup Security. In: Real World Microsoft Access Database Protection and Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0793-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4302-0793-1_8

  • Publisher Name: Apress, Berkeley, CA

  • Print ISBN: 978-1-59059-126-0

  • Online ISBN: 978-1-4302-0793-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics