Per .Len B:
This particular db will contain sensitive info which some eyes
with legitimate access to other areas ought not see. It will
also have processes which only some users will be permitted to
invoke.
To further complicate matters, other back end databases will be
called upon. (a couple of linked tables)
I'm no SQL Server expert - although I've written one fairly large
application using it as a back end, complete with multitudinous
stored procedures.
Having said that, those requirements are saying
"S-Q-L--S-e-r-v-e-r" to me. If you can document the inadequacy
of MS Access' security to their satisfaction, maybe the users
will spring for the 35% or so (my experience) additional man
hours to put the back end on SQL Server.
I can't cite, but I'd bet next month's mortgage money that a
determined, skilled user can defeat any MS Access security
scheme. One of our more illustrious contributors said to the
effect of: "Access security is a brown paper bag. OTOH, the
Mafia enforce SQL Server security."
The idea has occurred to have multiple front ends and I haven't
thought it through but the maintenance prospect doesn't thrill.
Your reply also prompts another question. I usually have BE & FE
in the same folder. Anything to consider there?
I deploy a "source" front end in the same directory as the back
end, but nobody ever executes it. Instead, my deployment
consists of copying a shortcut to each users desktop. The
shortcut calls a .BAT file that copies a fresh copy of the front
end down to the user's "temp" directory when needed and executes
it there.
I've never had concurrent users executing the same front end, so
I don't have any real experience - but the reason I haven't is
that it sounds like such a bad idea that I've never even tried
it. Report printer setup conflicts, for one, but there's
plenty more...