Securing Your Database with Your Developer Workgroup File


Now that you have a suitable developer workgroup file, you are at the stage where you are ready to start securing parts of your database. The initial security techniques that I will describe will achieve most of the security that developers are interested in. If you want to secure the actual data in the database itself, you will need to work through some other technical issues to achieve the holy grail of a secure database. Initially, though, I will show you how you can achieve a lot of good protection and some object security by changing some permissions on just one (or a few) objects in your database. Thereafter, our target audience, the anonymous Admin user and the Users group (explained earlier in the chapter) will not be able to change or look at the design of the object, import those objects, or upgrade the databases to newer versions of Access. This is my favorite and simple Access security strategy that I stumbled onto in my early days of shareware development.




Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net