• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 28. Advanced Security Techniques > Why This Chapter Is Important

Why This Chapter Is Important

You might not always be available to set up security for the users of your application. Of course, one alternative is to make sure that they purchase their own copies of Access and then to instruct them on how to maintain security implementing the user interface. Access security is very complex, though, so this solution is not particularly practical. In fact, if you are distributing your application to a large group of users, this option is an impossibility. Fortunately, you can build in to your application code the capability to maintain all aspects of security directly. It is important that you provide your administrative users with the capability to establish and maintain security for their workgroups. This involves building a front-end interface to all the security functionality provided by Access. Behind the scenes, you can use ActiveX Data Object (ADO) code to implement the security functionality.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint