Can any one please explain me Access Security

  • Thread starter Thread starter Guest
  • Start date Start date
G

Guest

Hi Can any one help me understand the Access security. I am aware of
programming and using the Access database the problem is i want to retain the
security back to the Access database.

So I want to know the complete architecture of the Access Security.

Email ID: (e-mail address removed)
MSN: (e-mail address removed)
 
Raghuram Raichooti said:
Hi Can any one help me understand the Access security. I am aware of
programming and using the Access database the problem is i want to retain
the
security back to the Access database.

So I want to know the complete architecture of the Access Security.

Follow the link on my web site to the FAQ.

Keith.
www.keithwilby.com
 
Hello Raghuram,

Please notice that we have replied you in another thread and maybe we may
focus on that thread because it seems the same issue. For your information,
I have included the major content here:

I understand that you have exported Access 97 database to 2003 but you
cannot add security back to this new database. I'd like to know if you
encounter any problem when creating a new 2003 mdw file? How did you try to
create new mdw file? As Joan mentioned, you shall be able to create new
workgroup file for a unsecured mdb file.

You could try to click Tools->Security->Workgroup administrator->Create.

A workgroup is a group of users who share data in a multiuser environment.
When security is implemented on a database, the user and group accounts are
recorded in the workgroup information file. User passwords are also stored
in the workgroup information file.

When you install Microsoft Access and open a database for the first time, a
file named System.mdw is created. This is the default workgroup information
file.
By default, on computers that are running Microsoft Windows 2000, the
System.mdw file is created in the user profile in the following path.

Permissions and the ownership of the database objects are stored in the
database. Because permissions and ownership are always associated with the
user and group accounts that are stored in the workgroup information file,
the secured application must always be able to point to the specific
workgroup information file that it was secured with. You may want to check
the following articles for more details:

305542 Understanding the role of workgroup information files in Access
security
http://support.microsoft.com/default.aspx?scid=kb;EN-US;305542

Q289885 ACC2002: Overview of How to Secure a Microsoft Access Database
http://support.microsoft.com/default.aspx?scid=kb;EN-US;Q289885

289885 Description of how to help protect a Microsoft Access database
http://support.microsoft.com/?id=289885

304315 ACC2000: How to Simulate Column-Level Security in Microsoft Access
http://support.microsoft.com/?id=304315

If anything is unclear, please feel free to let's know. We look forward to
your reply.

Best Regards,

Peter Yang

Microsoft Online Community Support
==================================================
Get notification to my posts through email? Please refer to
http://msdn.microsoft.com/subscriptions/managednewsgroups/default.aspx#notif
ications
<http://msdn.microsoft.com/subscriptions/managednewsgroups/default.aspx>.
Note: The MSDN Managed Newsgroup support offering is for non-urgent issues
where an initial response from the community or a Microsoft Support
Engineer within 1 business day is acceptable. Please note that each follow
up response may take approximately 2 business days as the support
professional working with you may need further investigation to reach the
most efficient resolution. The offering is not appropriate for situations
that require urgent, real-time or phone-based interactions or complex
project analysis and dump analysis issues. Issues of this nature are best
handled working with a dedicated Microsoft Support Engineer by contacting
Microsoft Customer Support Services (CSS) at
<http://msdn.microsoft.com/subscriptions/support/default.aspx>.
==================================================
This posting is provided "AS IS" with no warranties, and confers no rights.
 
Raghuram Raichooti said:
Hi Can any one help me understand the Access security. I am aware of
programming and using the Access database the problem is i want to retain the
security back to the Access database.

So I want to know the complete architecture of the Access Security.

Email ID: (e-mail address removed)
MSN: (e-mail address removed)
 
Back
Top