• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 19. Linking Access Front-Ends to... > Applying User-Level Security to Acce...

Applying User-Level Security to Access Front-Ends

Descriptions of Access’s user- and group-based security design range from labyrinthine to inscrutable. In reality, the Jet-based security model closely resembles that of Windows .NET/2000/NT and early versions of SQL Server. You create groups having particular sets of permissions for Access objects, and then add individual users to the groups. Unlike SQL Server and Windows versions of other client/server RDBMSs, Jet-based security doesn’t integrate with Windows authentication.

Establishing Your Own Admins Name, Password, and PID

Access has two levels of security: user level and file level. The user-level security system requires each user of Access to enter a username and a password to start Access. You establish file-level security for back-end .mdbs through the network operating system, and grant users permissions to access shared folders. If the server’s file system is NTFS, you can grant permissions for individual files, as described in the earlier “Establishing Network Share and File Security for the Back End” topic. Network administrators usually manage server folder- and file-level security.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint