databasedev.co.uk - database solutions and downloads for microsoft access

Documenting Database Security

Microsoft Access Database Security - Documenting your Database Security:

After you have established security for your application, you can print a security report for a particular workgroup. In this report, you can see the security for both users and groups, just users, or just groups. The report includes group names and user names, and indicates which users and groups belong together in the particular workgroup. If you want to send the security report directly to the printer, you can use the Print Security dialog box to make selections about what level of security you want to document.

Let's start by taking a look at your options to print a report about users and groups in the sample database - MyNewApp.mdb. You will have created these user and group accounts and permissions in the previous tutorials listed at the bottom of this page.

Task A-9: Printing reports about security users and groups.

  1. Choose Tools, Security, User And Group Accounts to open the User And Group Accounts dialog box.
  2. Click Print Users And Groups to open the Print Security dialog box.

    Print Users And Groups command button
  3. Take a look at the print security options.

    The options available for printing Security settings
    You can print reports that show one of the following security levels:
    • All users defined for the current workgroup.
    • All groups defined for the current workgroup.
    • Both user and group account information.
    All users in the current workgroup can print reports showing user and group information.
  4. Click Cancel. Because printed security reports are sent directly to a printer, your computer must be attached to a printer if you click OK.
  5. Close the User And Group Accounts dialog box. Next, you'll create a report on a form with permissions for each user and group.

Once you have tested your security you will want to Document Database Security.

Go to page:

  1. Steps to Securing an Access Database by Using User-level Security
  2. Setting Logon Procedures
  3. Group Accounts
  4. User Accounts
  5. Changing a Password
  6. The Security Wizard
  7. Permissions
  8. Testing Security
  9. Documenting Database Security
  10. Previewing Permissions
  11. Securing a Database with a Database Password
  12. Distributing the Secured Application

Recommended Reading:

If you are serious about your Microsoft Access security, then you should check out Garry Robinson's book Real World Microsoft Access Database Protection and Security

About the book:

Real World Microsoft 
            Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Protection and Security takes a different approach than all the other Access books in the market by focusing from the start on all the issues that will help protect your database. It approaches protection and security from a task-by-task perspective and provides details that when put together will make your database more secure.

This book will help you to keep your staff from looking at your salary tables, stop your customers from looking at the design of your software that you distribute, and help you decide which security options are worth doing and which are generally a waste of your time.

Garry writes from a very experienced developer's point of view and he discusses in detail how to program all types of security issues including hiding tables as system tables, producing databases that password cracker software cannot easily crack, backing-up databases, menus, queries, and even user surveillance.