Securing Access 2000 Databases

Source: Internet
Author: User
Tags include log modify requires access database administrator password
access| Security | data | Database in the Office family, People's understanding of Access 2000 is often confined to its interface, and the function of database management is still only in building tables, data entry, using the Form Wizard, Report wizards, Data access page wizard, and so on some simple applications. In fact, Access 2000 is very powerful and beyond your imagination. It is Microsoft's most comprehensive, windows and Internet-enabled database software since it was published and is a very powerful and Easy-to-use database management system (DBMS), a system that stores, processes, and manages databases.

Managing workgroup information Files

For a database, how to improve its security is a very important issue because it holds a large amount of data. Access 2000 has a workgroup information file with the default name System.mdw, which holds all the security information for the Access database, including user accounts and group accounts.

It should be noted that the original System.mdw workgroup information file is unsafe. Because when you install Access, Setup automatically defines the default workgroup definition in the workgroup information file that it creates. The default workgroup information file is used when you start Access again before users use the tool Group Manager to specify additional workgroup information files. In the workgroup information file, the user can store the security account that is set up.

Therefore, before setting up a security account, the user should select the Access workgroup information file for which these accounts are stored, and must determine that the selected workgroup information file was created with a unique workgroup identifier (WID). The original System.mdw workgroup information file is not secure by default because its workgroup identifier (WID) is blank, and anyone can obtain the administrator account defined by the workgroup information file, with various permissions to access the database, which is not safe for the database. So users can manage the workgroup information file using the Workgroup Administrator program (Workgadm.exe), which is located in the directory where access resides.

Group and user Management

The database administrator has the right to add, delete groups, and users. It is a good idea to design a group of members who develop the same project. Access classifies users into groups, so database security management can be greatly simplified by assigning permissions to groups rather than individual users, and then changing the permissions of individual users by adding them to a group or removing them from a group. Granting new permissions to users who are in the same group, you can grant new permissions to the group account as long as you perform an action. For database security, users and groups that no longer use the database should be deleted in a timely manner.

Set Administrator password

After you use the new workgroup information file, you can set the administrator password to prevent others from entering your database system. Set the administrator password by following these steps.

1, click "Tool/Security/user and group account", bring up the user and group account "window" (see photo).

2, click the "Change Login Password" tab, the Change Password dialog box. The dialog box requires that you enter an old password. The first time you enter, because the administrator does not yet have a password, so leave blank in the box, do not have to enter. Enter the new password two times in a fresh password and verification box, and click the OK button.

Restarting access appears in the login box, asking for a name and password, and clicking the OK button after you have entered it separately. It should be noted that passwords are case-sensitive and should be kept in mind, otherwise you will not be able to access the database.

To change the user's password, enter the user name in the logon dialog box, and if the username does not already have a password, do not need to provide a password when entering the database for the first time, and if you have a password, you need to provide the original password. Open the database, follow the steps above to set the user's new password, and the next time you start the database, when you log on with the changed user name, you need to provide a new password after the change to open the database.

Permissions for the database

In Access 2000, there are two types of database access permissions that users have: explicit permissions and implicit permissions. Explicit permissions are the permissions that are granted directly to a user's account, which is private to the user's account, regardless of other users. Implicit permissions are the permissions that are granted to a group account, that is, the group that the user is assigned to in the group. If a user has both of these permissions, when the user accesses a database with security set, then the permissions that he has are the intersection of the two permissions.

In an Access database, setting up access to database permissions for groups and users can only be done through an administrator. The permissions that are set include: "Open/Run", read design, modify design, manage, read data, update data, insert data, and delete data.

Setting and modifying User rights

Log on as an administrator to start the database. Click Permissions for Tools/security/Users and groups to draw out the permissions for users and Groups window, which has two radio buttons in the middle of users and groups to change permissions for users or groups, respectively. The permissions of the group include the permissions of the user, and if the permissions of the group allow the data to be updated, the user has the right to update the data, regardless of whether the permission is selected in the user's permissions. Select an object in the object type that sets permissions, including tables, queries, forms, reports, macros, and modules. The entire contents of the object are listed in the Object Name box. For example, if the object's type is a table, lists the names of all the tables, and you can select one, more, or all of the tables. Set permissions just click the Check button (check box) at the bottom of the window, and then click the OK button when you are finished selecting it. By modifying the permissions of a group, all users of a group have the same permissions. For example, to revoke the user group's modify Design permission, users who belong to the user group are not authorized to modify the design after they enter the database.

Encrypt database

The more security measures you have, the more secure your database will be. Access encrypts the database based on the user's settings. If the user's new database is stored in its original location and has the same name as the original database, Access automatically replaces the original database with the encrypted database. If the encrypted database cannot be stored because of insufficient disk space, Access retains the original database.

The encrypted database follows these steps:

1. Start Access with the appropriate workgroup information file, close all open databases, and make sure that the database is no longer available to all users on the web.
2, click "Tools/Security/encryption/decryption database", the "Encryption and Decryption" dialog box appears.
3, in the dialog box, users can specify the database to be encrypted, this database must also be a security-setting database. Then click the OK button. The Save As After Database Encryption dialog box appears.
4, in this dialog box, users need to specify the encrypted database name, and the location of the valid database, and then click the OK button.

The last thing to note is that Access 2000 is an application that operates on a database, so you need to have a better configuration. The user who installs Access 2000 requires the following hardware configuration:

1, Pentium more than 200.
2, more than 2GB hard disk.
3, not less than 32MB memory.
4, optical drive one.

Installing Access 2000 requires 100MB of disk space. When a user selects a drive, he or she must have sufficient disk space or it will not be able to install successfully or normally

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.