ACC: Overview of How to Help Protect a Microsoft Access Database (132143)
The information in this article applies to:
- Microsoft Access 2.0
- Microsoft Access for Windows 95 7.0
- Microsoft Access 97
This article was previously published under Q132143 SUMMARY This article provides an overview of how you can secure a
database so that it is not changed or copied by other Microsoft Access users.
This article assumes that you have a thorough understanding of the
pieces that make up the Microsoft Access security model: workgroups, accounts,
ownership, and permissions. For more information about the Microsoft Access
security model, you can obtain the "Security Wizard and White Paper for Version
2.0" document. For information about how to download the "Security
Wizard and White Paper for Version 2.0," please see the following article in
the Microsoft Knowledge Base: 122036
ACC2: Security Wizard and White Paper for Access 2.0 Available For
an overview of how to secure a database in Microsoft Access version 7.0, search
the Help index for "security, user-level security" and display the topic,
"Secure a database using the Security Wizard." For an overview of
how to secure a database in Microsoft Access 97, search the Help index for
"security, overview" and display the topic, "Secure a database." Scroll to the
bottom of the topic and click the link to "Secure a database with the
User-Level Security Wizard." REFERENCES Microsoft Access "Building Applications," version 2.0,
Chapter 14, "Securing Your Application," pages 313-344
Modification Type: | Minor | Last Reviewed: | 1/26/2005 |
---|
Keywords: | kbhowto kbusage KB132143 |
---|
|