Alison Balteramp;#039;s Mastering Microsoft Office Access 1002003 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Alison Balteramp;#039;s Mastering Microsoft Office Access 1002003 [Electronic resources] - نسخه متنی

Alison Balter

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید



Looking at Special Issues


Although the discussion of security so far has been quite thorough, a couple of issues surrounding the basics of security have not yet been covered. They include additional issues with passwords, understanding how security works with linked tables, understanding and working with object ownership, and printing security information. These topics are covered in this section.

Passwords


When you create a user, you do not assign a password to the user. You can assign passwords to a user only when that user has logged on to the system. The System Administrator cannot add or modify a user's password (the exception to this is when using the Security Wizard). It is important to encourage users to assign themselves a password the first time they log on to the system. Using VBA code, the users can be forced to assign themselves a password. This is covered in Chapter 28. Alternatively, the administrator of the database can log on as each user, assigning each a password.

Although you cannot assign a password to a user or modify the user's password, you can remove a user's password. This is necessary when a user forgets his or her password. To clear a user's password, follow these steps:


  • With or without a database open, choose Tools, Security, User and Group Accounts.

  • From the Names drop-down list, select the user whose password you want to clear.

  • Click Clear Password.


  • Security and Linked Tables


    When you design your application with two databases (one for tables and the other for the remainder of the application objects), it is necessary for you to secure both databases. Securing only the linked tables is not sufficient!Chapter 28.

    Ownership


    Remember that the user who creates the database is the database's owner. This user retains irrevocable rights to the database. You cannot change the owner of a database; you can change only the ownership of objects in the database. There is a workaround that allows you, in effect, to change the owner of the database. If you have rights to the database's objects, you can create a new database and import all the objects from the other database. You can accomplish this by using the Security Wizard.

    By default, the creator of each object in the database is its owner. To change the ownership of an object in the database, follow these steps:


  • With the appropriate database open, choose Tools, Security, User and Group Permissions.

  • Click the Change Owner tab to select it, as shown in Figure 27.28.

    Figure 27.28. The Change Owner tab allows you to change an object's ownership.

  • From the Object Type list box, select the objects whose ownership you want to change. You can press the Ctrl key to select noncontiguous items, and the Shift key to select contiguous items.

  • Select the Groups or Users option button.

  • Select the name of the group or user who will become the new owner of the objects.

  • Click Change Owner.

  • Repeat steps 3 through 7 for all objects that you want to assign to new owners.


  • Printing Security


    You can print a list of each user and the groups she is a member of by following these steps:


  • With the appropriate database open, choose Tools, Security, User and Group Accounts.

  • Click Print Users and Groups. The Print Security dialog box appears, as shown in Figure 27.29.

    Figure 27.29. The Print Security dialog box allows you to print a list of each user and the groups she is a member of.

  • Select the Both Users and Groups, Only Users, or Only Groups option button.

  • Click OK. The security report prints.


  • Chapter 29, "Documenting Your Application."


    / 544