Securing Your Database

In most shared databases, different people perform different tasks. The easiest way to keep everyone on the right track is to create several distinct front ends, one for each group of people. This lets you gently guide people along in the tasks they perform.

However, customizing the front end doesn’t restrict the abilities of a determined troublemaker. In a large company that relies on a multiuser database, you don’t just think about guiding people—you also worry about restricting them.

Sadly, Access provides a limited security model. You have the ability to lock strangers out of a database with a password, but you don’t have the more fine-grained features you need to restrict a single user from using certain tables or performing certain actions. As you’ll see in the following sections, you can use some workarounds, but none works as well as the security provided by a server-side database product like SQL Server.

Get Access 2010: The Missing Manual now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.