E
Ed
I have created several Access db apps, but I'm in the
process of utilizing security for the first time. I used
User-Level security and the process seemed relatively
straightforward. However, now them I'm ready to deploy, I
ran the database splitter and learned that my backend db
is wide open with no security. For a newbie to security,
what's the most efficient way to solve this issue. Thanks.
process of utilizing security for the first time. I used
User-Level security and the process seemed relatively
straightforward. However, now them I'm ready to deploy, I
ran the database splitter and learned that my backend db
is wide open with no security. For a newbie to security,
what's the most efficient way to solve this issue. Thanks.