This
seminar will cover:
1.
Set up multiple customer tables, one for normal data, one for
sensitive data
2.
Build two customer forms; the sensitive form requiring a
password to open
3.
Split your database into 3 files: front end and two back-end
files for tables
4.
Create shared folders on your server or Windows PC
5.
Use Windows-level file & folder security to prevent access to the
sensitive data
6.
Move the back-end files to the server and relink with the
Linked Table Manager
7.
Encrypt your front-end database and create an ACCDE file
In Lesson 1, we'll talk about WHY you should split your database
and what security benefits it provides. In our example, we'll build a
customer database. Most of the customer information has to be accessible
by all of the users of our database (name, address, phone number, etc.)
however some of the information needs to be kept secure and ONLY
visible to a select few (credit card numbers, balances, credit limits,
etc.)

In Lesson 2, we'll set up a customer
table, a secure customer table, and then we'll set up a
one-to-one relationship between them.

In Lesson 3, we'll build a customer form
and a secure customer form. We'll set up a command button to open
the secure form but require a password via an inputbox.
Users will need the password to open the secure form. Then we'll hide
the navigation pane on database startup so that users can't just
browse to your secure form and open it themselves.

In Lesson 4, we'll split the database
into three files: one for our front-end objects (queries, forms,
reports, modules, etc.) and then two back-end files: one for the normal
customer data, and another for the sensitive, secure data.

In Lesson 5, you'll see how to set up
shared folders on your network file server. I'll show Windows 2000
Server, but most versions of Windows Server work the same. I'll
also show an example using just peer-to-peer file sharing on
Windows 7 machines. We'll then move the back-end database files to these
shared folders and use the Linked Table Manager to tell the
front-end database where they went.

By using the techniques in JUST
this seminar, you can reasonably secure your data against
unauthorized access from users on your network. Coupled with the
techniques shown in my
Security Seminar
and Data
Encryption Seminar, you can really create a locked-down database
without the need for a Database Server program. Of
course, if you have any questions about whether or not this seminar is
for you, please
contact me.

Access Split Database Security Seminar - Outline
00. Intro (5:01)
01. Why Split Your Database (5:07)
02. Customer Tables (10:53)
CustomerT
CustomerSecureT
One-To-One Relationship
Referential Integrity
Cascade Deletes
Cascade Updates
03. Customer Forms (11:36)
CustomerF
CustomerSecureF
Button to Open Secure Form
Without Security
VBA DoCmd.OpenForm
Add a Password
InputBox
Hide Navigation Pane
04. Splitting the Database (5:57)
Database Tools
Move Data > Access Database
Database Splitter
Copy and Rename Backend Files
05. Set up Shared Folders (14:21)
Windows Server
Sharing
Share This Folder
Share Permissions
Full Control
Users & Groups
File Sharing in Windows 7
Linked Table Manager
Refresh Links
06. Encrypted Front End (8:43)
ACCDE File
Distribution Copy
Save your ACCDB file!
07. Review (6:01)

|