1 All Powder Board and Ski Microsoft Access Workbook Chapter 9: Database Administration Jerry Post Copyright © 2003.

Slides:



Advertisements
Similar presentations
1 All Powder Board and Ski Microsoft Access Workbook Chapter 8: Applications Jerry Post Copyright © 2007.
Advertisements

1 All Powder Board and Ski Microsoft Access Workbook Chapter 10: Database Administration Jerry Post Copyright © 2007.
1 Chapter 13 Securing an Access Application. 13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level.
GP2013 (R2) New features in GP2013 (R2). New Ribbon for windows Edit List is the Print button on the right without the paper background Action pane can.
Copyright 2007, Paradigm Publishing Inc. EXCEL 2007 Chapter 6 BACKNEXTEND 6-1 LINKS TO OBJECTIVES Workbook properties Workbook properties Workbook Sharing.
1 Linking & Consolidating Worksheets Applications of Spreadsheets.
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
Database Administration in Microsoft Access The Access Workbench: Section Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 3 rd Edition.
By Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson, Linda Lau, Jerri Williams Chapter 9 Fine-Tuning the Database 1 Copyright.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Compile MS Access Pertemuan 18 Matakuliah: F0712 / Lab MS Access Tahun: 2007.
Creating Custom Forms. 2 Design and create a custom form You can create a custom form by modifying an existing form or creating a new form. Either way,
Chapter 5: Configuring Users and Groups. Types of User Accounts Administrator –Unrestricted access to performing administrative tasks –Use sparingly Standard.
DBSYSTEMS 1 of 13 Chapter 10 DB System Administration (Part II) 1 Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Access 2007 ® Use Databases How can Microsoft Access 2007 help you manage a database?
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Multi-Functional Printer Scan-to-PC (SMB) Office of the Chief Information Officer (OCIO) The Hong Kong Institute of Education Last Update: 06 Dec 2013.
Tutorial 8 Managing and Securing a Database. Objectives Filter data in a table and a form Save a filter as a query and apply the saved query as a filter.
MS Access Advanced Instructor: Vicki Weidler Assistant:
Microsoft Office 2007 Access 2007 Chapter 9 Administering a Database System.
Building The Database Chapter 2
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
XP Chapter 2 Succeeding in Business with Microsoft Office Access 2003: A Problem-Solving Approach 1 Building The Database Chapter 2 “It is only the farmer.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
PC Maintenance: Preparing for A+ Certification Chapter 23: Using a Windows Network.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
TxEIS Security A role-based solution October 2010.
1. Chapter 25 Protecting and Preparing Documents.
1 All Powder Board and Ski Oracle 9i Workbook Chapter 9: Database Administration Jerry Post Copyright © 2003.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 11 Committed to Shaping the Next Generation of IT Experts. Chapter 9 Bulletproofing the Database.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Microsoft Access 2010 Chapter 10 Administering a Database System.
COMPREHENSIVE Access Tutorial 12 Managing and Securing a Database.
® Microsoft Access 2010 Tutorial 12 Managing and Securing a Database.
Copyright 2007, Paradigm Publishing Inc. ACCESS 2007 Chapter 3 BACKNEXTEND 3-1 LINKS TO OBJECTIVES Modify a Table – Add, Delete, Move Fields Modify a Table.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
Microsoft Access 2013 ®® Tutorial 12 Managing and Securing a Database.
Securing a Database 1.Understanding database security 2.Protecting the Database File 3.Protecting Code 4.Using User level Security 5.Working with workgroups.
Access Lesson 14 Creating Database Security and Documentation Microsoft Office 2010 Advanced Cable / Morrison 1.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Visual Basic for Application - Microsoft Access 2003 Finishing the application.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
Chapter 27. Copyright 2003, Paradigm Publishing Inc. CHAPTER 27 BACKNEXTEND 27-2 LINKS TO OBJECTIVES Track and Customize Changes Track and Customize Changes.
XP New Perspectives on Microsoft Office Access 2003, Second Edition- Tutorial 6 1 Microsoft Office Access 2003 Tutorial 6 – Creating Custom Forms.
® Microsoft Access 2010 Tutorial 8 Managing and Securing a Database.
Microsoft SQL is known as RDMS (Relational Database Management System) which is developed by Microsoft and is highly used at corporate and enterprise.
McGraw-Hill/Irwin Copyright © 2005 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9: Database Administration All Powder Board and Ski.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Installing RMS 3.0 Contractor Mode
Know About MS Access Database
Database Security (Chapter 10)
Tutorial 8 Managing and Securing a Database
Administering a Database System
Lesson 13 PROTECTING AND SHARING DOCUMENTS
How to open password- protected Excel file
Microsoft Office Access 2003
Lesson 6: Protecting, Maintaining and Managing Databases
Microsoft Office Access 2003
Microsoft Office Access 2003
8 6 MySQL Special Topics A Guide to MySQL.
Tutorial 12 Managing and Securing a Database
Presentation transcript:

1 All Powder Board and Ski Microsoft Access Workbook Chapter 9: Database Administration Jerry Post Copyright © 2003

2 Access System Tables: Metadata Tools/Options/View tab Check to see system tables MSysObjects lists all tables

3 Performance Analyzer Select all items Select all objects

4 Performance Analyzer Suggestions Recommendations are the highest priority Some suggestions cannot be taken because of business rules The optimize button applies the recommendation

5 Creating Indexes Menu: View/Indexes Single column indexes SQL: CREATE INDEX …

6 Backup and Recovery Use Windows tools to copy the mdb file Creating a compressed (zip) folder substantially reduces the size Use Tools/Database Utilities/Compact and Repair to remove deleted items and fix minor errors If a database is corrupted, you can sometimes recover data and other items by starting a new database and using File/Get External Data/Import to retrieve whatever you can from the damaged file

7 Simple Security: Assign a password Close the database and reopen it in Exclusive mode Tools/Security/Set Database Password Enter the password and verify it. Close the database and reopen it.

8 Encryption Unencrypted data Encrypted database Tools/Security/Encrypt/ Decrypt Database

9 Protect Forms with an MDE File Tools/Database Utilities/Make MDE File Design view is disabled for everyone Keep the original file safe. It is the only way to edit the forms, reports, and modules.

10 User-Level Security in Access Database Application Form1Form 2Form 3Form 4 User 1User 2 Workgroup database Usernames and passwords Database Administrator login Assign permissions credentials

11 User Groups Sales clerksSales Managers Sales table Customer table Item table Sales clerksS,U,I S Sales ManagersS,U,I,DS,U,IS Rental ManagersS,U,IS Individual users Assign permissions to groups based on tasks, and assign users to groups. Permissions only have to be set once. Employee changes are handled by moving individuals into or out of groups.

12 User-Level Security Wizard Every WID is unique and is used to recover the workgroup data if the file is lost. Avoid the first option. It will force you to log in every time you open Access for any database.

13 Predefined User Groups

14 Adding Users

15 Assign Users to Groups Make sure that you assign at least one person to the Admins group!

16 Customized Groups (after login) Select the Groups tab to enter new group names Select users and add them to groups to grant additional permissions

17 Assigning Permissions to Groups Assign by groups New groups need to be able to open the database Click the Apply button to activate changes

18 Implementing a Secured Database Copy files: 1)Secured database 2)Workgroup database 3)Startup link Edit the properties for the startup link "C:\Program Files\Microsoft Office\Office10\MSACCESS.EXE" “C:\FullPathname\AllPowder2002.mdb" /WRKGRP "C:\FullPathname\Secured.mdw"