Database Administration in Microsoft Access The Access Workbench: Section Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 3 rd Edition.

Slides:



Advertisements
Similar presentations
1 All Powder Board and Ski Microsoft Access Workbook Chapter 10: Database Administration Jerry Post Copyright © 2007.
Advertisements

Introduction to Computers Section 6A. home The Operating System (OS) The operating system (OS) is software that controls the interaction between hardware.
1 Chapter 13 Securing an Access Application. 13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level.
Stored procedures and views You can see definitions for stored procedures and views in the demo databases but you can’t change them. For views, expand.
XP Tutorial 9 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Exploring Your Network Tutorial 9.
Lesson 17: Configuring Security Policies
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 6: Configure and Troubleshoot Local User and Group Accounts.
MIS Chapter 51 Chapter 5 – Managing File Access MIS 431 Created Spring 2006.
Security Dalam Aplikasi Pertemuan 17 Matakuliah: F0654/Lab Sistem Informasi Akuntansi Tahun: 2007.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Getting Started with Microsoft SQL Server 2012 Express Edition Appendix A DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 6 th Edition.
Getting Started with Web Servers, PHP, and the Eclipse PDT Appendix I DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 6 th Edition.
Chapter Extension 6 Using Microsoft Access © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Web Database Processing Using Microsoft Access The Access Workbench: Section Seven DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 3 rd Edition.
Getting Started with Microsoft Access The Access Workbench: Section One DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 4 th Edition.
Ch 9 Managing Active Directory User Accounts. Objectives Create Organizational Unit Creating User Accounts in Active Directory Disabling, Enabling, and.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
File Management and Organisation © Copyright William Rowan 2007.
Word Lesson 16 Working with Macros Microsoft Office 2010 Advanced Cable / Morrison 1.
Getting Started with Oracle Database 11g Release 2 Express Edition Appendix B DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 6 th Edition.
Ch 8-3 Working with domains and Active Directory.
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
Step 1: Create Login Page –  Copy an existing page and create a page that will house the login form.  Save and go back to Page Management.  Do not export.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Several Ways to Print in Windows 98 by Ralph Godinez.
Working with Queries in Microsoft Access The Access Workbench: Section Three DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 3 rd Edition.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. WORD 2007 M I C R O S O F T ® THE PROFESSIONAL APPROACH S E R I E S Lesson 22 Macros.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 11 Committed to Shaping the Next Generation of IT Experts. Windows XP Robert Grauer, Lynn.
PC Maintenance: Preparing for A+ Certification Chapter 23: Using a Windows Network.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Working with Multiple Tables in Microsoft Access The Access Workbench: Section Two DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 3 rd Edition.
Exploring Microsoft Office 2007
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 11 Committed to Shaping the Next Generation of IT Experts. Chapter 9 Bulletproofing the Database.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Slide 1 ASP Authentication There are basically three authentication modes Windows Passport Forms There are others through WCF You choose an authentication.
Relationships in Microsoft Access The Access Workbench: Section Five DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 3 rd Edition.
Project 2 Working on the Windows XP Desktop Windows XP Service Pack 2 Edition Comprehensive Concepts and Techniques.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 1 Committed to Shaping the Next Generation of IT Experts. Chapter 4: Create, Edit,
Securing a Database 1.Understanding database security 2.Protecting the Database File 3.Protecting Code 4.Using User level Security 5.Working with workgroups.
1 All Powder Board and Ski Microsoft Access Workbook Chapter 9: Database Administration Jerry Post Copyright © 2003.
Google HOW DO I SUBMIT MY ASSIGNMENT?. To join a classroom, your teacher will give you a code.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
The Diagnostic Pathfinder System Introduction Getting Started.
1 After completing this lesson, you will be able to: Get around the Internet with your browser. Connect to the Internet. Print Web pages. Save Web pages.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Configuring and Deploying Web Applications Lesson 7.
1 After completing this lesson, you will be able to: Create a form using AutoForm. Create a form using the Form Wizard. Add controls to a form. Modify.
…the basics…. Wildland Fire Information and Technology Server Requirements ● Windows 7 Professional or Windows 2003/2008 Server ● Windows 8/10 (discussion)
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Appendix I: Getting Started with Web Servers, PHP and the.
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Appendix E: Getting Started with MySQL Workbench Data Modeling.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Excel 2002 Using Macros Lesson.
Labcheck Next Generation Quick Start Guide Admin Basics.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Using the Personal Image Photo Library
HOW TO PUT PASSWORD IN WORD, SPREAD SHEET AND DATABASE
Administering a Database System
Microsoft Office Access 2003
WORKING WITH SHARED DOCUMENTS
Working on the Windows XP Desktop
SOP of System Security Settings
Shelly Cashman: Microsoft Windows 10
Presentation transcript:

Database Administration in Microsoft Access The Access Workbench: Section Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 3 rd Edition

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-2 Section Objectives  Understand database security in Microsoft Access  Understand the role of the workgroup information file in Microsoft Access security  Learn how to: –Use the Microsoft Access Security Wizard to implement basic database security –Use Microsoft Access security tools to manage database security

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-3 Database Security in Access Access has a built-in database security system We run within the security system all the time we use Access Access stores the default security settings in a workgroup information file named system.mwb, located in the Windows system files as C:\WINDOWS\system32\system.mwb Other workgroup information files (.mwb files) can be created to secure individual or groups of databases –Before this is done—before any of the steps in this section of “The Access Workbench” are done—make a backup copy of the original system.mwb file! –If this file gets corrupted or otherwise messed up, you will have real problems using Access –Copy the system.mwb file to your My Documents folder.

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-4 Access Default Security Settings: The User and Group Accounts Dialog Box The Admin user account— this is the only user account in the default security system There are only two groups in the default security system, and Admin is a member of both

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-5 Default Database Security in Access We have been running Access as Admin with no password and, thus, have had full administrator privileges in Access. Access has the ability to handle user authentication by the use of user login and password Access also has user authorization capability at the DBMS level Access authentication and authorization security settings can also be applied to individual databases

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-6 Applying Database Security in Access It is easiest to set up database security and to learn the abilities of the security system by using the Access Security Wizard This Wizard is inconsistently named within Access and the Wizard itself as the Security Wizard, the User- Level Security Wizard, and the One- step Security Wizard

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-7 Access Security Wizard: The User and Group Accounts Dialog Box Read this carefully! This means creating a new.mwb file to store security settings for this database. The current file is system.mwb

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-8 Access Security Wizard: Creating the Workgroup Information File Use the default File Name and WID Type in the Company name Keep the security settings specific to this database only—a desktop shortcut icon will be generated to use for opening the database

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-9 Access Security Wizard: Specifying the Included Database Objects The Wizard has already selected all objects in the database to be secured

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-10 Access Security Wizard: Specifying the Included Security Groups Select all the groups—we will include all of them

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-11 Access Security Wizard: Access Security Group Permissions Summary

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-12 Access Security Wizard: Setting Permissions for the Workstation Users Group Do not give the workstation Users group any default rights to the database

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-13 Access Security Wizard: Creating Users Type the user name here— this will be the user’s login name Type a password here—this will be the user’s password for login Click the Add This User to the List button to add a user

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-14 Access Security Wizard: Assigning Group Membership to a User Click this radio button to assign group membership to a user Select the user name from the drop-down list Select the groups in which the designated user will have membership

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-15 Access Security Wizard: Assigning User Members to a Group Click this radio button to assign users to groups Select the group name from the drop-down list Select the users that will be members of the designated group

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-16 Access Security Wizard: The Security Wizard Warning Dialog Box Click the Yes button to save the One-step Security Wizard Report as a Snapshot (.snp) file

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-17 Access Security Wizard: The One-step Security Wizard Report This is the Snapshot Viewer Print button on the Scroll Bar

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-18 The “You Don’t Have The Necessary Permissions to Use This File” Dialog Box

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-19 The Access Login Dialog Box Enter the user’s login name here Enter the user’s password here

KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall AW-6-20 Security Adminstration: The User and Group Permissions Dialog Box Permissions should be assigned to groups, not users Select the Object Type from this drop-down list Select the User/Group Name in this list Assign specific permissions here

Database Administration in Microsoft Access End of Presentation on The Access Workbench: Section Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 3 rd Edition