Article ID: 132143
Article Last Modified on 1/19/2007
APPLIES TO
- Microsoft Access 2.0 Standard Edition
- Microsoft Access 95 Standard Edition
- Microsoft Access 97 Standard Edition
This article was previously published under Q132143
SUMMARY
This article provides an overview of how you can secure a
database so that it is not changed or copied by other Microsoft Access users.
This article assumes that you have a thorough understanding of the
pieces that make up the Microsoft Access security model: workgroups, accounts,
ownership, and permissions. For more information about the Microsoft Access
security model, you can obtain the "Security Wizard and White Paper for Version
2.0" document.
For information about how to download the "Security
Wizard and White Paper for Version 2.0," please see the following article in
the Microsoft Knowledge Base:
122036
ACC2: Security Wizard and White Paper for Access 2.0 Available
For
an overview of how to secure a database in Microsoft Access version 7.0, search
the Help index for "security, user-level security" and display the topic,
"Secure a database using the Security Wizard."
For an overview of
how to secure a database in Microsoft Access 97, search the Help index for
"security, overview" and display the topic, "Secure a database." Scroll to the
bottom of the topic and click the link to "Secure a database with the
User-Level Security Wizard."
REFERENCES
Microsoft Access "Building Applications," version 2.0,
Chapter 14, "Securing Your Application," pages 313-344
Additional query words: 12 steps twelve
Keywords: kbhowto kbusage KB132143