Solved

setting up workgroup in ACCESS to control access to  Tables/Queries/Forms/Reports

Posted on 2013-07-01
3
298 Views
Last Modified: 2013-07-15
Hi,

  I like to know how to set up the access database if I want to set different permission level for network users.
  Say there is two users: John and Susan and each user would have only have access to certain Forms and Reports.
  I know it is a long process, but I would appreciate it if someone take me thru step by step.
 
Thanks.
0
Comment
Question by:sglee
  • 2
3 Comments
 
LVL 77

Accepted Solution

by:
peter57r earned 500 total points
ID: 39291685
What version of Access? Access security only applies to mdb files, not accdb.


It is a long process and so I doubt if anyone will do a step by step.
Attached is the best paper on the subject.

Until you are quite sure what you are doing, only practice on stuff you are happy to throw away.
AJMAccessSecurity.pdf
0
 

Author Comment

by:sglee
ID: 39291895
I have been developing database programs using Access 2000 thru 2003. Recently users started buying office 2010. How is 2010 different from 2003 and older?
0
 
LVL 77

Assisted Solution

by:peter57r
peter57r earned 500 total points
ID: 39292371
The issue on Access security is which file format you are using.

mdb files can use Access workgroup security in all versions including A2007/2010

The accdb format was introduced in A2007 and is the default file format from that point on.
accdb files cannot use Access workgroup security ; if you convert from an mdb to an accdb the security features are lost.  There is no replacement feature, it is just gone.

Office 2010 looks totally different from Office 2003 and earlier because menus and toolbars are replaced with the ribbon.  
If you have a mixed-version user population then you must continue to develop using the older version.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The first two articles in this short series — Using a Criteria Form to Filter Records (http://www.experts-exchange.com/A_6069.html) and Building a Custom Filter (http://www.experts-exchange.com/A_6070.html) — discuss in some detail how a form can be…
Overview: This article:       (a) explains one principle method to cross-reference invoice items in Quickbooks®       (b) explores the reasons one might need to cross-reference invoice items       (c) provides a sample process for creating a M…
Learn how to number pages in an Access report over each group. Activate two pass printing by referencing the pages property: Add code to the Page Footers OnFormat event to capture the pages as there occur for each group. Use the pages property to …
Basics of query design. Shows you how to construct a simple query by adding tables, perform joins, defining output columns, perform sorting, and apply criteria.

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question