After you design and develop a sophisticated application, you should ensure that the users of the application cannot violate its integrity and the data it maintains. Microsoft Access gives you several options for securing databases. These options range from a very simple method of applying a password to the entire database to applying varying levels of security to each and every object in the database. The more intricate the security solution, the more difficult it is to implement. Fortunately, you can tailor the complexity of the security you implement to the level of security required by each particular application. This hour covers the following concepts:
Implementing share-level security
Implementing user-level security
This hour delves into these topics so that you can grasp all the basics of Access security.