Share this Page URL

Chapter 19. Implementing Security > Setting a User Password - Pg. 665

Implementing Security 665 5. 6. Click Apply. John is now a part of the ITReadWrite permission group, and he inherits any permissions associated with that group. To remove John from that group, you would select the ITReadWrite group from the Member Of list and click the Remove button. Click OK. John is now a part of a group that has read and write permissions to all the tables. With this foun- dation, you can restrict or allow John's access to database objects as needed. You've now com- pleted your first and perhaps most powerful line of defense for your data. Using the User-Level Security Wizard Most of the tasks we covered in this section have been wrapped up in a handy wizard that can walk you through setting up user-level security for your database. In addition to helping you create a new WIF, create users and groups, and assign permissions, the User-Level Security Wizard also will password-protect your database and automatically encode it for you. The wizard is a good way to get a jump-start on setting up security for your database. To launch the wizard, choose Security, User-Level Security Wizard from the Tools menu. For a complete description of the wizard, see Chapter 30 in John Viescas's book Microsoft Office Access 2003 Inside Out (Microsoft Press, 2003). Quick Check Q. When you create a new user, is the user automatically assigned a strong password? A. No. Users are created with a blank password. The first thing new users should do when logging on is to give themselves a strong password. Q. If an individual user has been given read permissions to a table but is a part of a group that has read and insert permissions to a table, what level of permissions will the user have? A. The user will have both read and insert permissions to the table. A user always inherits the highest (most permissive) level of permissions that have been applied to his or her user account or any group of which that user is a part.