Now that you've created new Microsoft Access Group Accounts, it's time to create new user accounts in Microsoft Access.
When you create user accounts for an application, those accounts are stored in the workgroup that the users join when they use the application. Therefore, before you create the user accounts, you should make sure that you are in the correct workgroup information file.
You can add a user to a group account or remove a user from a group
account by making selections in the Users tab of the Users And Group
Accounts dialog box. Similarly, you can delete a user account or a
group account from a workgroup by making selections in the Users tab
or the Groups tab of the Users And Group Accounts dialog box. You
cannot delete the group accounts Admins or Users.
Objective: To create the administrator's user account as well as four other user accounts, and to assign each user to a group. This information relates to the sample Microsoft Access database download
Before you begin: The User and Group Accounts dialog box is open, and the Order Entry and Sales Managers group accounts are created - please complete the previous tutorial Setting up Microsoft Access Group Accounts before starting.
|User Name||Personal ID||Group Membership|
|Olivia E||oliviapid||Order Entry; Users|
|Oscar D||oscarpid||Order Entry; Users|
|Scott S||scottpid||Sales Managers; Users|
|Susan M||susanpid||Sales Managers; Users|
Next we'll look at Changing a Security Account Password.
Go to page:
If you are serious about your Microsoft Access security, then you should check out Garry Robinson's book Real World Microsoft Access Database Protection and Security
About the book:
Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Protection and Security takes a different approach than all the other Access books in the market by focusing from the start on all the issues that will help protect your database. It approaches protection and security from a task-by-task perspective and provides details that when put together will make your database more secure.
This book will help you to keep your staff from looking at your salary tables, stop your customers from looking at the design of your software that you distribute, and help you decide which security options are worth doing and which are generally a waste of your time.
Garry writes from a very experienced developer's point of view and he discusses in detail how to program all types of security issues including hiding tables as system tables, producing databases that password cracker software cannot easily crack, backing-up databases, menus, queries, and even user surveillance.