Solved

MS Access - Lock backend database as Read-Only

Posted on 2004-08-16
3
483 Views
Last Modified: 2012-06-27
I have a split MS Access database with the backend on a network share and the frontend on each end-user desktop.

There are no updates permitted to the backend database tables.

How can the backend database be secured as Read-Only to prevent unwanted changes and still leave the frontend completely open for the end-user to create their own forms, queries and macros ?
0
Comment
Question by:colin4
  • 3
3 Comments
 
LVL 11

Expert Comment

by:phileoca
ID: 11814799
the front end user and do anything they want without effecting the backend.
since the front end will be all linked tables, they won't be able to change  the table structure.
0
 
LVL 11

Expert Comment

by:phileoca
ID: 11814809
typo:
 the front end user and do
****
 the front end user can do
0
 
LVL 11

Accepted Solution

by:
phileoca earned 125 total points
ID: 11842943
hey, i got your feedback, let me explain:

>>There are no updates permitted to the backend database tables.
-------On a backend database, users can't make changes unless they find the database under the network and open it thru the network.    But your backend should only be tables, and nothing else.  Thus any form changes won't be possible.
-------if you're afraid of them changing the table structure, then you can put a system administation password on the database so they can't open it without  a password.  (but they can still link to the tables)

They user will still be able to make changes to their Front end database as it won't effect the backend.
Remember, the backend is tables
the frontend is LINKED table, queries, forms, reports, macro's, modules.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
You need to know the location of the Office templates folder, so that when you create new templates, they are saved to that location, and thus are available for selection when creating new documents.  The steps to find the Templates folder path are …
What’s inside an Access Desktop Database. Will look at the basic interface, Navigation Pane (Database Container), Tables, Queries, Forms, Report, Macro’s, and VBA code.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question