ACC2000: How to Simulate Column-Level Security in Microsoft Access (304315)
The information in this article applies to:
This article was previously published under Q304315 Advanced: Requires expert coding, interoperability, and multiuser skills.
This article applies only to a Microsoft Access database (.mdb).
SUMMARY
The Microsoft Jet database engine does not provide column-level security, as does Microsoft SQL Server, where you can assign permissions at the column level to a user or group account. For example, you may want some users/groups to have read-write permissions to some columns, whereas other users/groups have read-only permissions to the same columns. This article demonstrates how you can simulate column-level security in Microsoft Access 2000. This article assumes that you have a thorough understanding of how to create queries and relationships, and a thorough understanding of the pieces that make up the Microsoft Access security model: workgroups, accounts, ownership, and permissions.
REFERENCESFor more information about how to secure a database in Microsoft Access, click Microsoft Access Help on the
Help menu, type secure a Microsoft Access database in the Office Assistant or
the Answer Wizard, and then click Search to view the topics
returned. For more information about setting user-level security, click Microsoft Access Help on the
Help menu, type secure a database using the user-level security wizard in the Office Assistant or
the Answer Wizard, and then click Search to view the topics
returned.
For more information about securing a Microsoft Access database file, see the following article in the Microsoft Knowledge Base: 207793 ACC2000: Access Security FAQ Available in Download Center
254372 ACC2000: Overview of How to Secure a Microsoft Access Database
Modification Type: | Major | Last Reviewed: | 6/25/2004 |
---|
Keywords: | kbhowto KB304315 |
---|
|