Summary
The security system in Access 2003 is quite robust, but also somewhat complex. Using Access security, you can fully secure a database and all its objects. As a developer, you might want to prevent people from modifying the objects in your database. Furthermore, you might want to restrict certain users from viewing certain data, using specific forms, or running certain reports.This chapter walked you through all the steps required to properly secure a database. It began by showing you how to set up a database password and how to encrypt a database. It then covered all the details of implementing user-level security.Invoking user-level security first involves using the Workgroup Administrator to set up a workgroup. You then must create an administrative user and make that user a member of the Admins group. Next, you change the password for the Admin user and remove the Admin user from the Admins group. You then exit Access, log on as the System Administrator, and assign yourself a password. All these steps were covered in detail in this chapter. In addition, this chapter walked you through using the Security Wizard to perform many necessary tasks, such as changing the owner of the database from Admin to the new Administrator and revoking all permissions from the Users group. This ensures that the database is truly secure. The final step is to assign permissions for groups and/or users to the objects that reside in your newly secured database. The chapter also covered this very powerful process.