Reflecting on this Chapter


If you have read the chapter from start to finish, you might think that securing your data was quite time consuming. Well, actually, it really doesn't take all that much time ”it's just explaining it that takes the time! So what are some of the things that we learned from the chapter?

  • You must use Access workgroup security to secure your data.

  • You can easily make a database very secure for one or two people.

  • Shortcut files join you temporarily to a workgroup file.

  • You can hide the location of a workgroup file and database by using VBA code.

  • Once you start sharing your database, you need to keep your developer workgroup file hidden from your users.

  • The User -Level Security wizard is a useful tool for securing your database.

  • You need to organize your table permissions by using group accounts.

  • Group accounts can be added to any workgroup file.

  • RWOP queries allow you to display some data from a secure table to users who do not have permissions.

  • If you want to distribute secure Access data, restrict what you send to people.

Finally, my favorite topic from the chapter is the anonymous Windows authentication method, which allows you to use a workgroup in the secure private folders of Windows XP or Windows 2000 with group accounts to produce a simple and secure way of allowing users to log on to the database.




Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net