Security/permissions in Access 2000

Posted on 2005-04-29
Last Modified: 2012-05-05
I'm creating a database for a friend and want to ensure that he can't change the design, view code, etc.

I've separated the database UI and data and joined them with the linked table wizard. This will mean that I can make changes to the UI without having to distrupt the user and email data to/from them - I can just send the UI file if changes need to be made. I don't want to create a MDE file.

I've tried to use the User Level security wizard. The ideal was to create a user called "Joe Bloggs" who logged in with a password to add/edit data on the forms, print reports etc, but not be able to see design, or code. There should be a second user (e.g. Admin) that I'd log-in with, which has a password to be able to have full functionality.

After running the wizard I find I can't even open the database myself  - it comes up with the message "You do not have the necessary permissions to access file...." Have your system administrator or the person who created this object establish the appropriate permissions for you" I AM the SYSTEM ADMINISTRATOR and DATABASE CREATOR so can't understand the message.

Question by:rwallacej
    LVL 77

    Accepted Solution

    Hi rwallacej,

    If you have created new users then make sure you have logged in with a correct username/password and that you are joined to the correct workgroup file.

    I hope you took a backup of your unsecured database .

    I'm not sure that the security wizard in A2000 was that brilliant.  You would certainly be better off implementing security in a step by step way as described in the Access Security Faq  on the MS support site;en-us;207793
     or the shortened version here:
    You are then in a much better position to handle any problems.


    Author Comment

    I've ended up using a mde file... I didn't know that I could do this when the UI file was linked to tables.

    Thanks for help nonetheless

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Suggested Solutions

    Introduction When developing Access applications, often we need to know whether an object exists.  This article presents a quick and reliable routine to determine if an object exists without that object being opened. If you wanted to inspect/ite…
    Overview: This article:       (a) explains one principle method to cross-reference invoice items in Quickbooks®       (b) explores the reasons one might need to cross-reference invoice items       (c) provides a sample process for creating a M…
    As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
    Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now