Access Database Security Settings

Source: Internet
Author: User
Tags access database security administrator password password protection

Some Forum beginners are not aware of the danger of their Forum databases. Therefore, they decided to take dvbbs7.0 as an example to introduce how to protect your access database. Let's take a look at the following:

1. Add password protection to your Access Database (in fact, the password protection of the Access database is very fragile. Here, I just add a lock to it ).

A. Open the Microsoft Access software to open your DV theory database in an exclusive manner (the database is data/dvbbs7.mdb under the root directory of the Forum by default ).

B. Set the database password. The access software menu item is: tool --> Security-> set the Database Password.

2. Modify the name of your database.

The default database name of Forum 7.0 is dvbbs7.mdb. To avoid unauthorized download and cross-database connection, we should change the name to the following format:
# 123data. asp
# & $ % 1 * DV. asa

{Ad} 3. Modify the conn. asp file of your forum.

1) use notepad or other text editing software to open the conn. asp file. After opening the file, you will see the following lines of code:

'For free users, modify the database address of the local database and change the database name in the data directory for the first time. For example, change dvbbs6.mdb to dvbbs6.asp.
DB = "Data/dvbbs7.mdb"
Connstr = "provider = Microsoft. Jet. oledb.4.0; Data Source =" & server. mappath (db)

2) Change dvbbs7.mdb in db = "Data/dvbbs7.mdb" to the file name modified in step 2, 2nd.

3) Change connstr = "provider = Microsoft. Jet. oledb.4.0; Data Source =" & server. mappath (db):
Connstr = "provider = Microsoft. Jet. oledb.4.0; Data Source =" & server. mappath (db) & "; Jet oledb: Database Password = mydbpassword"

Replace mydbpassword with the database password set in figure 3 and save the password.

After the above steps, the protection work for your access database has basically been completed, but it does not mean that you can take database security lightly. In general, you must always do a good job of protection, do not disclose your database address at will. Go to the official forum to check for updates and patches. I also need to read more articles on ASP knowledge. Mastering the technology is the foundation to protect my security.

In the office family members, people often only have an understanding of Access 2000 on its operation interface, the database management function remains on simple applications such as creating tables, inputting data, using the Form Wizard, Report Wizard, and data access page wizard. In fact, Access 2000 is very powerful and beyond your imagination. It is a database software that has the most comprehensive functionality since Microsoft announced access and is most closely integrated with windows and the Internet. It is a very powerful and easy-to-use database management system (DBMS ), A system that stores, processes, and manages databases.
Manage workgroup information files
As a database stores a large amount of data, it is very important to improve its security. Access 2000 has a working group information file named system. MDW by default, which stores all the security information of the Access database, including user accounts and group accounts.
Note that the information file of the original system. MDW workgroup is insecure. When access is installed, the installer automatically defines the default workgroup In the workgroup information file it creates. Before you start access again, use the default workgroup information file. In the workgroup information file, you can store the configured security account.
Therefore, before setting up a security account, you should select the access workgroup information file that stores these accounts, and make sure that the selected workgroup information file uses the unique wid) created. The original system is in the default status. the reason why the MDW Working Group information file is insecure is that its Working Group Identifier (WID) is blank. Anyone can obtain the Administrator account defined in the Working Group information file and have various permissions to access the database, this is not safe for databases. The user can use the worker Worker Program (workgadm.exe) in the accesscomponent directory to manage the information files of the Working Group.
Group and user management
The Database Administrator has the right to add or delete groups and users. It is best to design members of the same project into a group. Access classifies users into various groups, so database security management can be greatly simplified, that is, assigning permissions for groups rather than individual users, then, you can change the permissions of a single user by adding the user to or deleting the user from the group. Users in the same group can be granted new permissions by performing an operation. For database security, users and groups that no longer use databases should be deleted in a timely manner.
Set administrator password
After using the new workgroup information file, you can set an administrator password to prevent others from entering your database system. To set the administrator password, follow these steps.
1. Click "tools/security/users and group accounts" to bring up the "window" for users and group accounts (see figure ).
2. Click the "Change logon password" tab to bring up the Change Password dialog box. In the dialog box, enter the old password. When you enter the password for the first time, you do not need to enter the password because the Administrator does not have a password. Enter the new password twice in the new password and verification box, and click the [OK] button.
When you restart access, a "Logon" box appears, asking you to enter the name and password. After you enter them separately, click the [OK] button. Note that passwords are case-sensitive and should be kept in mind. Otherwise, you will not be able to access the database.
If you want to change the user password, enter the user name in the Login Dialog Box. If the user name does not have a password, you do not need to provide a password when you first enter the database. If you have a password, the original password is required. Open the database and follow the above steps to set a new password for the user. When you start the database the next time and use the changed user name to log on, you must provide the new password to open the database.
Database Permissions
In Access 2000, you have two types of Database Access Permissions: explicit and implicit. Explicit permission is used to directly grant permissions to a user account, which is dedicated to this user account and has nothing to do with other users. Implicit permission is the permission granted to the group account, that is, the permissions granted to the group when the user joins the group. If a user has both of the preceding permissions, when the user accesses a database with security settings, the permissions of the user are the intersection of the two permissions.
In an Access database, you can only set the permissions for groups and users to access the database through the Administrator. The configured permissions include: "Open/run", "read design", "Modify design", "manage", "read data", "update data", "insert data", and "delete data.
Set and modify user permissions
Log on as an administrator and start the database. Click "tools/security/user and group permissions", and the "user and group permissions" window is displayed. There are two radio buttons "user" and "group" in the window, used to change the permissions of users or groups. The Group permission includes the user permission. If the Group permission allows data update, the user has the right to update the data, regardless of whether the permission is selected. Select an object for permission setting in the object type, including tables, queries, forms, reports, macros, and modules. The Object Name box lists all the content of the object. For example, if the object type is table, the names of all tables are listed. You can select one or more tables. To set permissions, click the check button (check box) in the lower part of the window. After the selection is complete, click the [OK] button. By modifying group permissions, all users in a group have the same permissions. For example, if you want to revoke the Design Modification permission of a user group, users belonging to the user group do not have the permission to modify the design after they enter the database.
Encrypted Database
The more security measures, the more secure the database. Access encrypts the database based on user settings. If the user's new database is stored in the original location and has the same name as the original database, access will automatically replace the original database with the encrypted database. If the encrypted database cannot be stored due to insufficient disk space or other reasons, access will retain the original database.
To encrypt a database, follow these steps:
1. Use the relevant workgroup information file to start access, close all opened databases, and ensure that all online users no longer use the database.
2. Click Tools/security/encryption/Decryption database. The "encryption and decryption" dialog box appears.
3. In the dialog box, you can specify the database to be encrypted. The database must also be a database with a security mechanism. Click [OK. The "Save database as encrypted" dialog box is displayed.
4. In this dialog box, you need to specify the name of the encrypted database and the location of the valid database, and then click [OK.
It should be noted that ACCESS 2000 is an application that operates on the database. Therefore, a better configuration is required. For users who install Access 2000, the required hardware configuration is as follows:
1. Pentium 200 or above.
2. 2 GB or above hard disk.
3. No less than 32 MB memory.
4. One Optical Drive.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.