Access Security - genarally speaking

  • Thread starter Thread starter Robert
  • Start date Start date
R

Robert

Hello. I would like some general advice.

1. Is the security which is described in the 10-step document that is
posted here form time to time the so-called "Access User-Level Security"?
Are they one and the same?

2. Do you recommend it? Is it worth the trouble? Are there better ways?
I realize individual requirements may vary but what has been your
experience?

3. Where can I get a small sample database employing this security?

Robert
 
Robert said:
Hello. I would like some general advice.

1. Is the security which is described in the 10-step document that is
posted here form time to time the so-called "Access User-Level Security"?
Are they one and the same?

I have no idea. The document that is most frequently referenced here is the
FAQ (link on my web site).
2. Do you recommend it?
Yes.

Is it worth the trouble?
Yes.

Are there better ways?

To do what? To apply security to an Access file I would say no, but to
secure your data? Yes. Access security is breakable if you have the right
tools, other systems such as Oracle are more robust.
I realize individual requirements may vary but what has been your
experience?

It's all down to your requirements. You need to assess what risk there is
of anyone hacking your system. In my organisation that risk is minute so
Access security is fine for the job.
3. Where can I get a small sample database employing this security?

I don't think anyone has ever offered one on here but you never know. Try
the example on my web site, it will give you a flavour of what's involved.

Keith.
www.keithwilby.com
 
Back
Top