microsoft.com Home  
Microsoft
http://www.microsoft.com/office/ork  
Microsoft Office 2000 Resource Kit Home
 Managing and Supporting Office 2000
 Ongoing Configuration of Office on Users' Computers
 Helping Users Help Themselves
 Managing Security
Protecting Against Micro Viruses
Protecting Excel and Word Documents
Using Security Features in Access
Using Security Features in FrontPage
Using Security Features in Outlook
 Overview of Tools and Utilities
Glossary
Index
Using Security Features in Access

Strategies for Securing an Access Database

Microsoft Access 2000 supports several levels and methods of file protection:

  • User access restriction

    You can use startup options to restrict access to default menus and toolbars, the Database window, and special keys.

  • File open protection

    You can set a password to control opening the database.

  • Source code protection

    You can save an application as an MDE file to remove Visual Basic® for Applications (VBA) source code and prevent changes to the design of forms, reports, and modules.

  • Database encryption

    You can use database encryption to prevent unauthorized users from viewing the objects in an application with a disk editor or other utility program. You can use encryption with all other methods of protecting an application.

  • User-level security

    You can use user-level security to apply the most powerful and flexible method of protecting an application. However, establishing user-level security is a complex process that might exceed your requirements.

The strategy that you use depends on the extent of security you need and how the application is used.


Topic Contents
Next

Topic Contents   |   Next   |   Top

  Friday, March 5, 1999
© 1999 Microsoft Corporation. All rights reserved. Terms of use.

License