J
Jeff Conrad
First note: Please ask your question in the Body of the message
instead of the Subject line.
For the best security on a Jet (Access) database you should
implement User Level Security (ULS). This will produce a login form
that users must enter a valid User Name/Password before
using the database. It is a complex process so I recommend
ALL of the following reading material and practicing on
dummy databases.
Access User-Level Security:
Security FAQ (the Security Bible):
http://support.microsoft.com/?kbid=207793
Jack Macdonald's Security Document:
http://www.geocities.com/jacksonmacd/AJMAccessSecurity.pdf
Lynn Trapp's Ten Security Steps:
http://www.ltcomputerdesigns.com/Security.htm
Joan Wild's Tips:
http://www.jmwild.com/security02.htm
The Security Whitepaper is also worth reading:
http://support.microsoft.com/?id=148555
Keith Wilby's Instructions (See step-by-step link)
http://www.keithwilby.com/
Other Good Information:
http://www.access-experts.com/default.aspx?selection=TutorialSecurity&sm=18
Other Microsoft KB articles of interest:
Description of how to help protect a Access 2000 database:
http://support.microsoft.com/?id=254372
Description of the role of workgroup information files in Access 2000 security:
http://support.microsoft.com/?id=305541
You could also set up your own type of "home-grown" security
system, but it will not be anywhere near as secure as ULS and
could easily be bypassed.
Good luck,
instead of the Subject line.
For the best security on a Jet (Access) database you should
implement User Level Security (ULS). This will produce a login form
that users must enter a valid User Name/Password before
using the database. It is a complex process so I recommend
ALL of the following reading material and practicing on
dummy databases.
Access User-Level Security:
Security FAQ (the Security Bible):
http://support.microsoft.com/?kbid=207793
Jack Macdonald's Security Document:
http://www.geocities.com/jacksonmacd/AJMAccessSecurity.pdf
Lynn Trapp's Ten Security Steps:
http://www.ltcomputerdesigns.com/Security.htm
Joan Wild's Tips:
http://www.jmwild.com/security02.htm
The Security Whitepaper is also worth reading:
http://support.microsoft.com/?id=148555
Keith Wilby's Instructions (See step-by-step link)
http://www.keithwilby.com/
Other Good Information:
http://www.access-experts.com/default.aspx?selection=TutorialSecurity&sm=18
Other Microsoft KB articles of interest:
Description of how to help protect a Access 2000 database:
http://support.microsoft.com/?id=254372
Description of the role of workgroup information files in Access 2000 security:
http://support.microsoft.com/?id=305541
You could also set up your own type of "home-grown" security
system, but it will not be anywhere near as secure as ULS and
could easily be bypassed.
Good luck,