Presentation is loading. Please wait.

Presentation is loading. Please wait.

Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing. 2007. All Rights Reserved.

Similar presentations


Presentation on theme: "Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing. 2007. All Rights Reserved."— Presentation transcript:

1 Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing. 2007. All Rights Reserved.

2 Securing Access Databases 15 * Understanding security in Access 2007 * Trusting locations and publishers * Packaging databases for distribution * Preventing database tampering Stations Along the Way

3 Access 2007 Security Changes Features removed:  User-level security  The Workgroup Administrator application Features added:  Trusted computing  Operating system control of user access  Internal application security  Stronger encryption scheme

4 Handling User-Level Security The process…  Define a user group  Place databases to share in common folder  Define sharing options  Grant permissions to the user group

5 Connecting to the Shared Folder The process…  Map a network drive to the folder location  Supply the server and share names Syntax: \\servername\sharename Example: \\10.0.1.240\Databases  Reconnect at logon with a user name and password

6 Password Protecting the Database  Adds database encryption  Requires the password to open the database  Works best with good passwords… At least 10 characters Capital and lowercase characters Numbers and alternative characters Hard to guess, but easy to remember Not in the dictionary  Is a reversible process (decryption)

7 Enabling Trusted Computing Trusted Setting What It DoesDefault Trusted Location Trusts all content in a specified location Untrusted Trusted Content Trusts executable content for a specified database and session Untrusted

8 Creating Signed Databases Signed databases…  Contain a security certificate  Can use the SelfCert tool  Indicate a certified publisher  Can distribute safe-to-use content  Must be extracted and accepted

9 Using File Extensions for Security Access 2007 Extension ReplacesMode ACCDBMDBFull-access mode ACCDEMDEExecute-only mode; users can’t change code or design ACCDRn/aRuntime mode; blocks direct access to database objects

10 Discussion Topics What types of security does Access 2007 support? How can I protect my databases on a network? What’s a trusted publisher? How can I prevent users from changing the design or code in a database?


Download ppt "Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing. 2007. All Rights Reserved."

Similar presentations


Ads by Google