Microsoft Office Tutorials and References
In Depth Information
Chapter 3: Securing Your Data
Chapter 3: Securing Your Data
In This Chapter
Surveying the types of Access security
Configuring your startup options to secure the database
Setting a database password
Creating an .accde file
Setting other options in the Access Trust Center
After you create a database, you may want to control who can open the
database and change the data. If you’re creating a database in which
many people link to a shared back-end database, you should design security
from the beginning; otherwise, your data is sure to deteriorate as different
people use the database in different ways. Foolish consistency may be the
hobgoblin of little minds, but consistency is vital for clean data. You owe
the users of your database protection against accidentally doing something
Be sure to use validation in your tables and forms, too. Read all about it in
Book II, Chapter 5.
Access has several mechanisms for adding security to your database:
Startup options that you use to display your own forms or run other
code when the database opens. See “Controlling What Happens When
You Open the Database” in this chapter.
Password-protecting your database. See “Password-Protecting and
Encrypting Your Database” in this chapter.
Converting your database to an .accde file to prevent anyone from
editing forms, reports, and Visual Basic for Applications (VBA) modules.
See “Locking Up Your Database As an .accde File” in this chapter.
Observing Basic Windows Security
No matter what Access security options you choose, your first line of
defense for your Access database is securing the computer where you store
the database.
Search JabSto ::

Custom Search