The security system in Access 2003 is quite robust but also somewhat complex. By using Access security, you can fully secure a database and all its objects. As a developer, you might want to prevent people from modifying the objects in a database. Furthermore, you might want to restrict certain users from viewing certain data, using specific forms, or running certain reports.

This hour walks through all the steps required to properly secure a database. It begins by showing you how to set up a database password and how to encrypt a database. It also covers all the details of implementing user-level security.

Invoking user-level security first involves using the Workgroup Administrator to set up a workgroup. You then must create an administrative user and make that user a member of the Admins group. Next, you change the password for the Admin user and remove the Admin user from the Admins group. You then exit Access, log on as the system administrator, and assign yourself a password. All these steps are covered in detail in this hour. In addition, this hour walks you through using the Security Wizard to perform many necessary tasks, such as changing the owner of the database from Admin to the new Administrator user and revoking all permissions from the Users group. This ensures that the database is truly secure. As described in this hour, the final step is to assign permissions to groups and/or users for the objects that reside in the newly secured database.

    Part III: Creating Your Own Database and Objects
    Part V: Advanced Topics