Access security

T

Tony Toews [MVP]

Robert said:
What is the simplest to implement Access security?

No such thing. There's a Security FAQ you must read and follow the
steps exactly. I'd suggest asking your question i the
microsoft.public.access.security with a little more details as to your
objective and what version of Access.

Tony
--
Tony Toews, Microsoft Access MVP
Please respond only in the newsgroups so that others can
read the entire thread of messages.
Microsoft Access Links, Hints, Tips & Accounting Systems at
http://www.granite.ab.ca/accsmstr.htm
Tony's Microsoft Access Blog - http://msmvps.com/blogs/access/
 
R

Robert

Thank you. Where is this FAQ?

Tony Toews said:
No such thing. There's a Security FAQ you must read and follow the
steps exactly. I'd suggest asking your question i the
microsoft.public.access.security with a little more details as to your
objective and what version of Access.

Tony
--
Tony Toews, Microsoft Access MVP
Please respond only in the newsgroups so that others can
read the entire thread of messages.
Microsoft Access Links, Hints, Tips & Accounting Systems at
http://www.granite.ab.ca/accsmstr.htm
Tony's Microsoft Access Blog - http://msmvps.com/blogs/access/
 
T

Tom Wickerath

Hi Robert,

The simplist form of security would be to just rely on Windows Security,
giving RWCD privileges for a shared folder (for the back-end database of a
split application) only to those people who have a need to gain access to
your application. If you wish to implement Access User Level Security (ULS),
be aware that it can be easily cracked by people determined to do so, and it
is not fully supported in the newest version of Access (Access 2007).

Here is a good web site for Access ULS, if you wish to pursue this method:

http://www.ltcomputerdesigns.com/Security.htm


Tom Wickerath
Microsoft Access MVP
https://mvp.support.microsoft.com/profile/Tom
http://www.access.qbuilt.com/html/expert_contributors.html
__________________________________________
 
R

Robert

Thank you.
Tom Wickerath said:
Hi Robert,

The simplist form of security would be to just rely on Windows Security,
giving RWCD privileges for a shared folder (for the back-end database of a
split application) only to those people who have a need to gain access to
your application. If you wish to implement Access User Level Security
(ULS),
be aware that it can be easily cracked by people determined to do so, and
it
is not fully supported in the newest version of Access (Access 2007).

Here is a good web site for Access ULS, if you wish to pursue this method:

http://www.ltcomputerdesigns.com/Security.htm


Tom Wickerath
Microsoft Access MVP
https://mvp.support.microsoft.com/profile/Tom
http://www.access.qbuilt.com/html/expert_contributors.html
__________________________________________
 
Top