Solved

MS Access - Lock backend database as Read-Only

Posted on 2004-08-16
3
484 Views
Last Modified: 2012-06-27
I have a split MS Access database with the backend on a network share and the frontend on each end-user desktop.

There are no updates permitted to the backend database tables.

How can the backend database be secured as Read-Only to prevent unwanted changes and still leave the frontend completely open for the end-user to create their own forms, queries and macros ?
0
Comment
Question by:colin4
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
3 Comments
 
LVL 11

Expert Comment

by:phileoca
ID: 11814799
the front end user and do anything they want without effecting the backend.
since the front end will be all linked tables, they won't be able to change  the table structure.
0
 
LVL 11

Expert Comment

by:phileoca
ID: 11814809
typo:
 the front end user and do
****
 the front end user can do
0
 
LVL 11

Accepted Solution

by:
phileoca earned 125 total points
ID: 11842943
hey, i got your feedback, let me explain:

>>There are no updates permitted to the backend database tables.
-------On a backend database, users can't make changes unless they find the database under the network and open it thru the network.    But your backend should only be tables, and nothing else.  Thus any form changes won't be possible.
-------if you're afraid of them changing the table structure, then you can put a system administation password on the database so they can't open it without  a password.  (but they can still link to the tables)

They user will still be able to make changes to their Front end database as it won't effect the backend.
Remember, the backend is tables
the frontend is LINKED table, queries, forms, reports, macro's, modules.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In a multiple monitor setup, if you don't want to use AutoCenter to position your popup forms, you have a problem: where will they appear?  Sometimes you may have an additional problem: where the devil did they go?  If you last had a popup form open…
I see at least one EE question a week that pertains to using temporary tables in MS Access.  But surprisingly, I was unable to find a single article devoted solely to this topic. I don’t intend to describe all of the uses of temporary tables in t…
In Microsoft Access, learn the trick to repeating sub-report headings at the top of each page. The problem with sub-reports and headings: Add a dummy group to the sub report using the expression =1: Set the “Repeat Section” property of the dummy…
With Microsoft Access, learn how to specify relationships between tables and set various options on the relationship. Add the tables: Create the relationship: Decide if you’re going to set referential integrity: Decide if you want cascade upda…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question