- database solutions and downloads for microsoft access

Microsoft Access Database Security

Setting Logon Procedures

If you do not activate the logon procedure, you are automatically logged on under the Admin user account, for which there is an empty password. If you want to require users to log on to start Access, you can change the password of the Admin user account. The Admin user is a member of the Admins (Administrator) group. The Admin user account is the same for every installation of Access. Administrators always have full permissions for objects created in the workgroup.

An Access password is case-sensitive and can have up to 14 characters, including any ASCII characters except null (ASCII character 0). When you type your password in the New Password text box, asterisks are displayed to maintain your password’s security. The first time you set a password, do not type anything in the Old Password text box.

Before completing the following activities, please ensure that you have followed the previous exercise: Steps to Securing an Access Database by Using User-level Security

Task A-2: Activating the logon procedure

Objective: To change the logon password for the user named Admin to turn on security for the MyNewApp.mdb database. Please download the MyNewApp.mdb database before starting this tutorial.

  1. Start Access. Do not open a database
  2. Choose Tools, Security, User And Group Accounts. You use the User And Group Accounts dialog box to define user names, group membership, group names, and a logon password.
  3. Verify that the Users tab is selected and that Admin is selected in the User Name text box. You're goint to change the password for this user.

    The User and Group Accounts dialog box
  4. Select the Change Logon Password tab. In the New Password text box, type password. (Don't type in the Old Password text box because there is no old password.) Passwords are case-sensitive. Notice that an asterisk is displayed for each character that you type.
  5. In the Verfiy text box, type password. Accuracy is essential! The password text boxes should look identical.

    Verifying Logon Password
  6. Click OK to accept your new password.
  7. Exit Access.
  8. Start Access. Try to open MyNewApp.mdb. The Logon dialog box opens before you can open the database. You must enter a valid user name and password.

    Login dialog when opening Microsoft Access
  9. In the Name text box, type Admin. In the Password text box, type password.

    Admin Logon activation
  10. Click OK. Now MyNewApp.mdb opens!

Go to page:

  1. Steps to Securing an Access Database by Using User-level Security
  2. Setting Logon Procedures
  3. Group Accounts
  4. User Accounts
  5. Changing a Password
  6. The Security Wizard
  7. Permissions
  8. Testing Security
  9. Documenting Database Security
  10. Previewing Permissions
  11. Securing a Database with a Database Password
  12. Distributing the Secured Application

Recommended Reading:

If you are serious about your Microsoft Access security, then you should check out Garry Robinson's book Real World Microsoft Access Database Protection and Security

About the book:

Real World Microsoft 
            Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Protection and Security takes a different approach than all the other Access books in the market by focusing from the start on all the issues that will help protect your database. It approaches protection and security from a task-by-task perspective and provides details that when put together will make your database more secure.

This book will help you to keep your staff from looking at your salary tables, stop your customers from looking at the design of your software that you distribute, and help you decide which security options are worth doing and which are generally a waste of your time.

Garry writes from a very experienced developer's point of view and he discusses in detail how to program all types of security issues including hiding tables as system tables, producing databases that password cracker software cannot easily crack, backing-up databases, menus, queries, and even user surveillance.