Solved

Save database front end

Posted on 2014-03-10
2
457 Views
Last Modified: 2014-03-25
Is there a way to save the save a database front end where the user will not be able to get get to any of the formula's, queries, etc? If so, how and is it easy to do?
0
Comment
Question by:cansevin
2 Comments
 
LVL 25

Assisted Solution

by:SStory
SStory earned 250 total points
ID: 39918404
There is Tools->Security. There is also a switchboard (Tools-Switchboard) which you can use to start with a default form and the average user can't get to that.  Or there is the Access developer edition
http://www.microsoft.com/en-us/download/details.aspx?id=24569
0
 
LVL 84

Accepted Solution

by:
Scott McDaniel (Microsoft Access MVP - EE MVE ) earned 250 total points
ID: 39919226
Access 2007 no longer includes User Level Security, unless you're working in the older .mdb format. 2010 and 2013 are the same way, and I'm not even sure 2013 would open a ULS-secured database.

Developer Editions have not been produced since Access 2003, but your link points to the Developer Extensions. That said, the only thing the Dev Extensions provide is the Package Wizard, Template features, and Source Code features.

=================

If you save your database as a .accde file and deploy that, users cannot get into the Design of your Forms, Reports or VBA code. They can, however, open Tables, Queries and Macros, and in some cases can make and save changes to those.

You can "secure" 2007 to some degree:

Don't show the Nav Pane, and instead include some sort of menu form, as SStory suggests

Don't use built-in ribbons. Create your own and deploy those, and control what the user can get to.

Disable the Shift Key bypass.

Force the users into Runtime mode

This article goes into much more detail:

http://msdn.microsoft.com/en-us/library/office/cc136539(v=office.12).aspx
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Describes a method of obtaining an object variable to an already running instance of Microsoft Access so that it can be controlled via automation.
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question