About securing an Access project

Microsoft Jet User-Level security can't be used with a Microsoft Access project (.adp) file or .ade file. Users should protect their copy of the Access project file using their computer's file system and periodically make a backup copy if they add their own forms or reports. If their copy of the Access project file is accidentally or unintentionally altered, users can recopy the file from their backup copy or its central location.

Strategies for protecting your project file and its objects are briefly described below and roughly arranged from least secure to most secure.

Show or hide objects in the Database window

This method of protection is the least secure because it is relatively simple to show any hidden objects.

Note that because tables, views, database diagrams, and stored procedures reside in the SQL Server database, you cannot hide these objects in the database window.

Using startup options

You use the startup options to specify or determine settings such as which form opens automatically when your Access project file opens and your Access project application's title and icon. In a new Access project file, the startup properties do not exist until a user makes a change to the default settings in the Startup dialog box.

Securing data access pages

To protect a data access page and the data it accesses, do the following:

Securing Visual Basic for Applications (VBA) code

You can protect Visual Basic for Applications (VBA) code in modules and modules behind forms and reports with a password which you enter once per session. The password prevents unauthorized users from editing, cutting, pasting, copying, exporting, and deleting VBA code.

To protect your code, you can remove editable VBA code from your Access project file and prevent modifications to the code behind your forms and reports by saving it as an ADE file.

Securing a Microsoft SQL Server database

Secure SQL Server database objects

You can secure data and other database objects that are stored in an SQL Server database (tables, views, stored procedures, and database diagrams) by doing the following:

Control logging on to SQL Server

From a Microsoft Access project, you can administer basic security tasks by using the Database Security command to add, edit, or delete server logins, database users, and database roles. You must have SQL Server installed on the same computer as the Access project for these commands to work.

SQL Server provides two security methods for validating logins to the SQL Server database: