workgroup security, 20, 233 “85, 307 “62. See also security wizards
building workgroup file in code, 256 “61
database administrator overview, 308
database developer overview, 308
developer workgroup file strategy, 240 “45
determining which workgroup file and user, 243 “44
what workgroup file is, 243
workgroup file database, 245
employee security considerations, 332
further reading, 282 “84, 360 “61
investigate operating system security as alternative, 333
IT manager overview, 309
maintaining object ownership and change of ownership, 269 “73
and MDE format, 394
and object protection, 365 “71
developer workgroup file, 366 “67
overview, 365
workgroup permissions, 368 “71
opening databases with shortcut files, 323 “31
creating secure shortcut file, 326 “29
creating shortcut file, 323 “26
overview, 323
organizing users in groups, 331
overview, 233 “36, 307 “8
PID authentication, 345 “55
Anonymous Windows Authentication (AWinA), 346 “49, 350 “55
Anonymous Windows Authentication Pro, 353 “54
dual workgroups, 354
overview, 345 “46
preparing developer workgroup file, 245 “53
creating and joining workgroup administration files, 246 “48
no logon dialog, 248 “49
setting up developer user account, 249 “53
workgroup administrator for Access 2002 or later, 245 “46
workgroup administrator for Access 97 and 2000, 245
preventing database upgrade to later version of Access, 265
preventing opening Access 97 databases in Access 2000 or later, 266
preventing reading of object design and permissions changes, 264
protecting database passwords with, 300 “301
protecting data outside company network, 355 “59
rather than protection, 236 “37
removing all permissions from admin user, 276 “77
renaming user and security commands, 254 “55
securing an object, 262 “64
securing database with developer workgroup file, 261
server-based databases, 359 “60
setting database permissions, 273 “76
terminology, 309 “10
testing database permissions, 276
transferring ownership of database and its objects, 267 “69
trusting users by adopting same workgroup, 318 “22
trusting workgroups to other users, 310 “17
allowing ubiquitous users read-only rights to data, 315 “17
changing ownership from anonymous account, 310 “11
form-based read-only mode, 317
overview, 310
protecting individual tables, 313 “15
stopping anyone else from opening database, 312 “13
using data access pages with, 385 “90
using permissions to tame users group, 278 “82