Fully Secure Access 2000 databases

Source: Internet
Author: User
Tags access database administrator password

Among the members of the Office family, the knowledge of Access 2000 is often confined to its interface, and the functionality of database management remains just a few simple apps for building tables, data entry, using the Form Wizard, Report Wizard, Data Access page wizard, and so on. In fact, Access 2000 is very powerful and beyond your imagination. It is Microsoft's most comprehensive, windows and Internet-enabled database software since it was published and is a very powerful and Easy-to-use database management system (DBMS), a system that stores, processes, and manages databases.

Managing workgroup information Files

For a database, how to improve its security is a very important issue because it holds a large amount of data. Access 2000 has a workgroup information file with the default name System.mdw, which holds all the security information for the Access database, including user accounts and group accounts.

It should be noted that the original System.mdw workgroup information file is unsafe. Because when you install Access, Setup automatically defines the default workgroup definition in the workgroup information file that it creates. The default workgroup information file is used when you start Access again before users use the tool Group Manager to specify additional workgroup information files. In the workgroup information file, the user can store the security account that is set up.

Therefore, before setting up a security account, the user should select the Access workgroup information file for which these accounts are stored, and must determine that the selected workgroup information file was created with a unique workgroup identifier (WID). The original System.mdw workgroup information file is not secure by default because its workgroup identifier (WID) is blank, and anyone can obtain the administrator account defined by the workgroup information file, with various permissions to access the database, which is not safe for the database. So users can manage the workgroup information file using the Workgroup Administrator program (Workgadm.exe), which is located in the directory where access resides.
Group and user Management

The database administrator has the right to add, delete groups, and users. It is a good idea to design a group of members who develop the same project. Access classifies users into groups, so database security management can be greatly simplified by assigning permissions to groups rather than individual users, and then changing the permissions of individual users by adding them to a group or removing them from a group. Granting new permissions to users who are in the same group, you can grant new permissions to the group account as long as you perform an action. For database security, users and groups that no longer use the database should be deleted in a timely manner.

Set Administrator password

After you use the new workgroup information file, you can set the administrator password to prevent others from entering your database system. Set the administrator password by following these steps.

1, click "Tool/Security/user and group account", bring up the user and group account "window".

2, click the "Change Login Password" tab, the Change Password dialog box. The dialog box requires that you enter an old password. The first time you enter, because the administrator does not yet have a password, so leave blank in the box, do not have to enter. Enter the new password two times in a fresh password and verification box, and click the OK button.

Restarting access appears in the login box, asking for a name and password, and clicking the OK button after you have entered it separately. It should be noted that passwords are case-sensitive and should be kept in mind, otherwise you will not be able to access the database.

To change the user's password, enter the user name in the logon dialog box, and if the username does not already have a password, do not need to provide a password when entering the database for the first time, and if you have a password, you need to provide the original password. Open the database, follow the steps above to set the user's new password, and the next time you start the database, when you log on with the changed user name, you need to provide a new password after the change to open the database.

Permissions for the database

In Access 2000, there are two types of database access permissions that users have: explicit permissions and implicit permissions. Explicit permissions are the permissions that are granted directly to a user's account, which is private to the user's account, regardless of other users. Implicit permissions are the permissions that are granted to a group account, that is, the group that the user is assigned to in the group. If a user has both of these permissions, when the user accesses a database with security set, then the permissions that he has are the intersection of the two permissions.
In an Access database, setting up access to database permissions for groups and users can only be done through an administrator. The permissions that are set include: "Open/Run", read design, modify design, manage, read data, update data, insert data, and delete data.

Setting and modifying User rights

Log on as an administrator to start the database. Click Permissions for Tools/security/Users and groups to draw out the permissions for users and Groups window, which has two radio buttons in the middle of users and groups to change permissions for users or groups, respectively. The permissions of the group include the permissions of the user, and if the permissions of the group allow the data to be updated, the user has the right to update the data, regardless of whether the permission is selected in the user's permissions. Select an object in the object type that sets permissions, including tables, queries, forms, reports, macros, and modules. The entire contents of the object are listed in the Object Name box. For example, if the object's type is a table, lists the names of all the tables, and you can select one, more, or all of the tables. Set permissions just click the Check button (check box) at the bottom of the window, and then click the OK button when you are finished selecting it. By modifying the permissions of a group, all users of a group have the same permissions. For example, to revoke the user group's modify Design permission, users who belong to the user group are not authorized to modify the design after they enter the database.

Encrypt database

The more security measures you have, the more secure your database will be. Access encrypts the database based on the user's settings. If the user's new database is stored in its original location and has the same name as the original database, Access automatically replaces the original database with the encrypted database. If the encrypted database cannot be stored because of insufficient disk space, Access retains the original database.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.