Web
2.0-like User-Level Menus in Access
UI Builder for Microsoft Access offers user-level menus out of the
box. Limit users to specific forms and reports in your database without
implementing Access workgroup security. UI Builder is packed with
features to enhance any multi-user database. Download a free
trial today.
The Admin user owns all the objects in the database and has irrevocable permissions to them. However, it is important to change the ownership to the project leader’s account (you). When you create or copy an object, the user who is logged in becomes the owner. The easiest way to change ownership of all objects in the database is to first make sure your project leader is logged in, and then run the Security Wizard.
You can use the Security Wizard to create a new database and fill it with copies of the objects of the database that is currently open. The Security Wizard exports copies of all the objects from the original database. It also secures selected object types by revoking all permissions in the Users group for those objects in the database. The new database is encrypted, which means that it is indecipherable during electronic transmission or when it is stored on a disk, tape, or other magnetic medium. All table relationships and linked tables are recreated in the new database. However, the original database is not changed.
An object's owner is the user who creates that object, also known as the object's creator. The owner of an object has Administer permissions. Other users cannot change the object owner's permissions. If another user creates a new object in the database, then that user is the owner of the object. Having different owners for all the objects within a database can be cumbersome. The database will be easier to maintain if one user is designated as the owner and takes responsibility for maintaining the objects. You can change the owner of an object by using the Change Owner tab of the User and Group Permissions dialog box.
Now let's use the Security Wizard to create an unsecured backup copy of the sample Microsoft Access database download file: MyNewApp.mdb and to secure MyNewApp.mdb. You should have already completed the previous tutorials within this security section; details of each can be found at the bottom of this page.
Objective: To create a new database that only certain users can access. This information relates to the sample Microsoft Access database download
Next we'll take a look at Security Permissions and Permission Types.
Go to page:
If you are serious about your Microsoft Access security, then you should check out Garry Robinson's book Real World Microsoft Access Database Protection and Security
About the book:
Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Protection and Security takes a different approach than all the other Access books in the market by focusing from the start on all the issues that will help protect your database. It approaches protection and security from a task-by-task perspective and provides details that when put together will make your database more secure.
This book will help you to keep your staff from looking at your salary tables, stop your customers from looking at the design of your software that you distribute, and help you decide which security options are worth doing and which are generally a waste of your time.
Garry writes from a very experienced developer's point of view and he discusses in detail how to program all types of security issues including hiding tables as system tables, producing databases that password cracker software cannot easily crack, backing-up databases, menus, queries, and even user surveillance.