|
||||||
|
Split Database Seminar Lessons Welcome to Access Split Database. Total running time is 1 Hour, 8 Minutes.
Lessons
Resources
Questions?Please feel free to post your questions or comments below. If you have questions about a specific lesson, please specify the lesson number and the time index in the lesson where the issue occurs. Thank you! Subscribe for UpdatesIf you would like to be notified whenever changes are made to this page, new lessons are posted, or comments are made, click on the subscribe button.
IntroIn this seminar, we'll focus on split database security in Microsoft Access. You'll learn how to create a simple customer database, set up one-to-one relationships between secure and unsecured tables, and build separate forms for general and sensitive data. I'll show you how to split the database into a front end and two back end files, secure your data by placing sensitive tables in a protected location, set up shared folders, and use the Linked Table Manager. We'll also cover how to encrypt your front end database to protect your design and VBA code.TranscriptWelcome to another Microsoft Access Seminar brought to you by AccessLearningZone.com. In this seminar, we'll focus on Split Database Security.In this seminar, you'll learn how to create a real simple customer database. We'll put the secure data, like financial information and credit card numbers, in a separate table. I'll show you how to set up a one-to-one relationship between two tables, so the customer information is linked to his secure information. We'll set up a customer form for the unsecured data that everybody who has access to the database can use, such as your secretaries and data entry people. Then we'll set up a separate secure form for the customer data, like credit card numbers and such, that you only want your financial people to see. Then we'll split the database into three pieces. You'll have your front end database that has the forms, reports, queries, and such. You'll have one back end table database that has the unsecured information in it, and then a third file that has your secure data in it, which you'll put on the server in a secure folder. Finally, we'll encrypt the front end database, which is the copy that you put on everyone's computers, so they can't mess with your form design or see your VBA code. Now, before taking this seminar, you should have at least an intermediate level of Access knowledge. I'm not going to take the time to explain how to set up tables and forms and such. There will be a tiny bit of VBA programming, but don't worry, I'll show you exactly what I'm doing. You don't have to be a VBA master in order to take the seminar. A couple of techniques I'm going to show you only require a couple of lines of code, and you can just type them in as I do. If you need to study up on your Access before taking the seminar, you can visit my website at AccessLearningZone.com or go to that short link right there, 599cv.com/access. You'll find lots more information on my beginner and intermediate level Access classes. Now, this seminar only scratches the surface of securing your databases. I do have a much more in-depth security seminar that covers lots more information. You can create user and group security inside your database. You can manage the workflow of who can do what inside your database. You can control who has access to which database objects, send email notices, create a detailed system log, and encrypt and secure your database files. I'm going to show you a little bit of some of this stuff today, but if you want to learn a lot more about securing your databases, check out my Access and Security Seminar. I will be using Access 2010 in this video. Most of the techniques I'm going to show you work just fine for any version of Access. The screens will be a little bit different if you have some older versions like 2003, but all the techniques I'm going to show you are the same. Of course, if you have questions about the material covered in this class, please feel free to post them in my student forums on my website. If you're watching this in my online theater, you'll see the student forums pop up right next to the video. Now let's take a closer look at exactly what we're going to cover in today's class. In lesson one, we'll talk about why you should split your database and what security benefits it provides. In lesson two, we'll set up our customer table and our secure customer table, and then we'll set up a one-to-one relationship between them. In lesson three, we'll build our customer form and a secure customer form. We'll password protect the secure customer form with an input box so users can't even get to the secured form if they don't know what the password is. Then I'll show you how to hide the navigation pane so users can't browse through your objects and just open up the secured form. In lesson four, we'll break apart the database into three different files: a front end database file for our forms (and it can also have the reports, macros, and VBA code, but in this database we only have forms). Then we'll make two back end tables, one for our secure data and one for our unsecured data. In lesson five, I'll show you how to set up shared folders on your server or on your workstation. Copy the back end database files where they need to go, and then using the Linked Table Manager, we'll refresh the links to your main database so it can point to the correct back end database files. In lesson six, I'm going to teach you how to encrypt your front end database, which compiles it into executable code, essentially hiding the design of your forms, reports, VBA code, and all those types of things so your end users physically cannot get into the design of your database. QuizQ1. What is the main focus of this Microsoft Access seminar?A. Managing reports in Access B. Split Database Security C. Importing spreadsheets into Access D. Creating SQL Server connections Q2. How should secure data such as financial information and credit card numbers be stored in the database described in the seminar? A. In the same table as customer information B. In an unprotected Access form C. In a separate secure table D. On paper records Q3. What type of relationship will be set up between the customer table and the secure customer table? A. One-to-many B. Many-to-many C. One-to-one D. Many-to-one Q4. Who should have access to the customer form containing unsecured data? A. Only financial staff B. System administrators only C. All users who need it, such as secretaries and data entry people D. Only IT personnel Q5. What protects access to the secure customer form that contains sensitive information? A. An input box requiring a password B. File compression C. Hiding the database file D. Making the file read-only Q6. How many files will the split database be divided into, according to the seminar? A. Two B. Three C. Four D. One Q7. Where should the secure data file be stored? A. On a shared network drive with open access B. Inside the front end database C. In a secure folder on the server D. On users' desktop computers Q8. Why is the front end database encrypted? A. To save disk space B. To increase database speed C. To prevent users from accessing the design and VBA code D. So users can edit the forms easily Q9. What is recommended if you need more information before taking this seminar? A. Search random online forums B. Take beginner and intermediate Access classes at AccessLearningZone.com C. Learn VBA first D. Use Microsoft Word tutorials Q10. What extra topic does the in-depth Access Security Seminar cover that this seminar only touches on? A. Form design best practices B. Advanced database speed optimization C. Detailed user and group security management D. Cloud database development Q11. What version of Access is used in the video? A. Access 97 B. Access 2003 C. Access 2010 D. Access 2019 Q12. Which tool allows you to update links to your back end database files after moving them? A. Table Design View B. Linked Table Manager C. Import Wizard D. Macro Builder Q13. What does encrypting the front end database do? A. Adds users to the database B. Makes the database larger C. Hides designs, reports, and VBA code from end users D. Removes password protection Answers: 1-B; 2-C; 3-C; 4-C; 5-A; 6-B; 7-C; 8-C; 9-B; 10-C; 11-C; 12-B; 13-C DISCLAIMER: Quiz questions are AI generated. If you find any that are wrong, don't make sense, or aren't related to the video topic at hand, then please post a comment and let me know. Thanks. SummaryToday's video from Access Learning Zone is all about Split Database Security in Microsoft Access.In this seminar, I walk you through the process of designing a basic customer database with an added layer of security for sensitive information. We begin by placing confidential data such as financial records and credit card numbers in a separate table, away from the general customer information. I demonstrate how to create a one-to-one relationship between the main customer table and the secure data table, keeping all the necessary data connected while safeguarding sensitive details. Next, we build two types of forms: a standard customer form for general data entry, accessible by users like secretaries or data entry personnel, and a secure form for highly confidential information. The secure form is designed to be available only to authorized staff, such as those who handle financial matters. Once the forms and tables are in place, I show you how to split the database into three distinct files. The front end contains forms, reports, queries, and other objects. There is a back end file that holds general customer information, and a separate back end file for the secure data. This secure data file should be stored in a protected folder on your server to restrict access. To further protect your work, I guide you through encrypting the front end database. This prevents users from making changes to your form designs or viewing your VBA code, ensuring that the application's structure and logic remain intact. Please note that to follow along with this seminar, you should already have at least an intermediate understanding of Access. I will not be covering the basics of creating tables or forms, but if you need a refresher or want to strengthen your Access skills, be sure to check out the beginner and intermediate courses on my website. This seminar focuses primarily on foundational steps for securing your data in a split database environment. If you are interested in learning more advanced security concepts, such as implementing user and group-level security, managing access to specific database objects, sending notifications, maintaining system logs, and additional encryption strategies, I offer a full Access Security Seminar that you may want to consider. Throughout this seminar, I use Access 2010, but the fundamental techniques apply to most versions of Access. The interface may look slightly different if you are using an older version, but the steps remain the same. If you have any questions, I encourage you to participate in the student forums on my website, where you can interact with me and other students about any part of this seminar. Here is an overview of what you will learn in each lesson: - Lesson one: The advantages of splitting your database and the security benefits it brings. - Lesson two: How to build both the main customer table and the secure customer table, and link them with a one-to-one relationship. - Lesson three: Creating both the customer form and the secure customer form. I will also show you how to password-protect the secure form using an input box and how to hide the navigation pane, so unauthorized users cannot access restricted forms or objects. - Lesson four: Separating your database into three files – the front end for user interface elements, and two back ends, one for secure data and one for regular data. - Lesson five: Setting up shared folders on your network, copying the back end files into their proper locations, and using the Linked Table Manager to ensure your front end points to the correct data sources. - Lesson six: Encrypting your front end database to protect the design of your forms, reports, VBA code, and more, making sure your users cannot alter the internal structure of your database. You can find a complete video tutorial with step-by-step instructions on everything discussed here on my website at the link below. Live long and prosper, my friends. Topic ListSplitting a database for security benefitsCreating customer and secure customer tables Establishing a one-to-one relationship between tables Building a customer form for general data Building a secure customer form for sensitive data Password protecting forms using an input box Hiding the navigation pane to restrict access Breaking the database into front end and two back ends Setting up shared folders for database files Copying back end files to secure locations Refreshing linked tables with Linked Table Manager Encrypting the front end database to protect design and code |
||||||||||||||
|
| |||
| Keywords: Access Split Database Seminar PermaLink How To Set Up a Split and Secure Customer Database With Encrypted Front End in Microsoft Access |