Download presentation
Presentation is loading. Please wait.
Published byLinette Jackson Modified over 9 years ago
1
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing. 2007. All Rights Reserved.
2
Securing Access Databases 15 * Understanding security in Access 2007 * Trusting locations and publishers * Packaging databases for distribution * Preventing database tampering Stations Along the Way
3
Access 2007 Security Changes Features removed: User-level security The Workgroup Administrator application Features added: Trusted computing Operating system control of user access Internal application security Stronger encryption scheme
4
Handling User-Level Security The process… Define a user group Place databases to share in common folder Define sharing options Grant permissions to the user group
5
Connecting to the Shared Folder The process… Map a network drive to the folder location Supply the server and share names Syntax: \\servername\sharename Example: \\10.0.1.240\Databases Reconnect at logon with a user name and password
6
Password Protecting the Database Adds database encryption Requires the password to open the database Works best with good passwords… At least 10 characters Capital and lowercase characters Numbers and alternative characters Hard to guess, but easy to remember Not in the dictionary Is a reversible process (decryption)
7
Enabling Trusted Computing Trusted Setting What It DoesDefault Trusted Location Trusts all content in a specified location Untrusted Trusted Content Trusts executable content for a specified database and session Untrusted
8
Creating Signed Databases Signed databases… Contain a security certificate Can use the SelfCert tool Indicate a certified publisher Can distribute safe-to-use content Must be extracted and accepted
9
Using File Extensions for Security Access 2007 Extension ReplacesMode ACCDBMDBFull-access mode ACCDEMDEExecute-only mode; users can’t change code or design ACCDRn/aRuntime mode; blocks direct access to database objects
10
Discussion Topics What types of security does Access 2007 support? How can I protect my databases on a network? What’s a trusted publisher? How can I prevent users from changing the design or code in a database?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.