Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database
Analyze a database's performance <ul><li>Analysis tools will help you provide a database that runs as efficiently as possi...
The Performance Analyzer dialog box
The Performance Analyzer  analysis window
View and print database documentation <ul><li>If you want to print a graphical view of the relationships in your database,...
Link a database to a table  in another database <ul><li>There will be times when you will want to make an Access table ava...
The Link Tables dialog box
Use the Linked Table Manager <ul><li>When you link to a table, Access keeps track of where that table is stored. </li></ul...
The Linked Table Manager dialog box
Use replication to create a Design Master and replica of a database <ul><li>Sometimes there will be multiple users updatin...
Update Design Masters  from replica sets <ul><li>The Design Master and all of the replicas that have been made of it are c...
The Database Window  for a Design Master
Synchronize the Design Master  and replica Data <ul><li>When you have a replica set, you can synchronize the records in th...
The Synchronize Database dialog box
Split a database <ul><li>A database developer often will separate the interface to a database (its queries, forms, and oth...
The Database Splitter dialog box
Front-end versus back-end database <ul><li>The users of the database will work through the front-end database to add, modi...
An illustration of splitting a database
Set database startup options <ul><li>There are several options that can be set to be initiated at the time the database is...
The Startup dialog box
Implement database security <ul><li>Databases often have sensitive data that must be protected.  </li></ul><ul><li>Securit...
Encrypt and decrypt a database <ul><li>Encryption is a process that will convert the data in a database to a format that i...
Set and unset a database password <ul><li>If data is very important and meant to be viewed only by authorized users, it is...
The Set Database Password dialog box
Implement user-level security <ul><li>The security measures discussed in previous sections apply to all users of the datab...
Assign users permissions to a database <ul><li>You can assign each user a set of permissions, which specify what that part...
Assign group permissions  for multiple users <ul><li>The DBA will be responsible for controlling and assigning permissions...
An illustration of user-level security
Use the Security Wizard  to assign permissions
Protect VBA code from  unauthorized changes <ul><li>Database developers often work long, tedious hours writing VBA code to...
Create an MDE file <ul><li>You can save a database as an MDE file, which compiles all the VBA code into machine code and r...
Upcoming SlideShare
Loading in …5
×

Microsoft Office Access 2003

632 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
632
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Microsoft Office Access 2003

  1. 1. Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database
  2. 2. Analyze a database's performance <ul><li>Analysis tools will help you provide a database that runs as efficiently as possible. </li></ul><ul><li>The Performance Analyzer will produce a list of ideas, suggestions, and recommendations. </li></ul><ul><li>However, many of the suggestions and recommendations can be carried out for you. </li></ul><ul><li>If you decide to allow Access to fix the problem, you will be able to check the results by viewing the objects pertaining to the suggestion. </li></ul>
  3. 3. The Performance Analyzer dialog box
  4. 4. The Performance Analyzer analysis window
  5. 5. View and print database documentation <ul><li>If you want to print a graphical view of the relationships in your database, you can have Access print the relationships window. </li></ul><ul><li>This will print exactly what you see when you open this window. </li></ul><ul><li>If you need to have more detailed information about the objects in the database, you can run the Documenter . </li></ul><ul><li>In the Documenter, you can choose what objects to include in the Documenter's report and you can make several choices as to what should be included in the report. </li></ul><ul><li>When you are finished making your selections, you will received a very detailed report containing Field names, Field types, Field sizes, relationships with other objects, etc. </li></ul>
  6. 6. Link a database to a table in another database <ul><li>There will be times when you will want to make an Access table available to a user for data entry, but you would not want them to be able to change the structure of your table. </li></ul><ul><li>You can do this by providing a linked table in the database. </li></ul><ul><li>A linked table is a table that is stored in a file outside the open database. </li></ul><ul><li>Access will be able to update and retrieve records in the open database but will disallow changes to the structure of the table. </li></ul><ul><li>When you establish a link to a table in the database, the linked table shows up on your list of table objects but the icon looks different. </li></ul>
  7. 7. The Link Tables dialog box
  8. 8. Use the Linked Table Manager <ul><li>When you link to a table, Access keeps track of where that table is stored. </li></ul><ul><li>If you move the location of the database to a different folder, Access won't know where it is. </li></ul><ul><li>You can use the Linked Table Manager to refresh the link to the table so that Access will be able to find the linked table. </li></ul><ul><li>In the Linked Table Manger, point to the new location, and Access will then update the link information. </li></ul>
  9. 9. The Linked Table Manager dialog box
  10. 10. Use replication to create a Design Master and replica of a database <ul><li>Sometimes there will be multiple users updating database data. </li></ul><ul><li>If you gave each one a copy of the database and allowed them each to make changes in their copy, it would be quite difficult to pull all the changes together later into a single database. </li></ul><ul><li>However, replication makes it easy to handle this kind of activity. </li></ul><ul><li>When you create a replica of a database, you create a special copy of the database and the original copy becomes the Design Master of the database. </li></ul>
  11. 11. Update Design Masters from replica sets <ul><li>The Design Master and all of the replicas that have been made of it are called the replica set. </li></ul><ul><li>Once you have created a replica set, Access keeps track of the changes that eventually will be incorporated into the Design Master. </li></ul><ul><li>Any changes in the data in any replicas can be updated automatically in the Design Master through a process called synchronization. </li></ul>
  12. 12. The Database Window for a Design Master
  13. 13. Synchronize the Design Master and replica Data <ul><li>When you have a replica set, you can synchronize the records in the replica database(s) by running the Synchronize Database process. </li></ul><ul><ul><li>When the synchronization process is run, Access will check for changes in the data in the replica database(s) and, if any, will incorporate those changes into the Design Master. </li></ul></ul><ul><li>After the synchronization process is complete, you will be able to see the changes that have been made in the replica database(s) in the Design Master database. </li></ul><ul><li>When you no longer need the replica(s), you should delete them. </li></ul><ul><li>If there are no replicas being used, you should rename the Design Master to its original name. </li></ul>
  14. 14. The Synchronize Database dialog box
  15. 15. Split a database <ul><li>A database developer often will separate the interface to a database (its queries, forms, and other database objects) from the actual database data. This is known as splitting the database. </li></ul><ul><li>The Database Splitter splits the database into two databases. </li></ul><ul><li>The database that contains the actual data is called the back-end database. </li></ul><ul><li>The database that contains the other objects is called the front-end database. </li></ul>
  16. 16. The Database Splitter dialog box
  17. 17. Front-end versus back-end database <ul><li>The users of the database will work through the front-end database to add, modify, and delete data in the back-end database. </li></ul><ul><li>The developer does not make changes to the back-end database but periodically makes changes to the front-end database by updating its queries, forms, and reports. </li></ul><ul><li>In a network environment, the back-end database is usually stored on the network where users can access it. </li></ul><ul><li>The Front-End database is stored on all the user computers, as it is their interface to the back-end database. </li></ul>
  18. 18. An illustration of splitting a database
  19. 19. Set database startup options <ul><li>There are several options that can be set to be initiated at the time the database is opened. </li></ul><ul><li>These options are called Startup Options and can be set by clicking Tools on the menu bar and then click Startup. </li></ul><ul><li>On this Startup dialog box, you can specify a particular form you want to display when the database is opened. </li></ul><ul><li>You can also choose from several options related to how much access users will have to the menu and toolbars. </li></ul>
  20. 20. The Startup dialog box
  21. 21. Implement database security <ul><li>Databases often have sensitive data that must be protected. </li></ul><ul><li>Security refers to the protection of a database against unauthorized access. </li></ul><ul><li>Startup options offer a degree of security but there is more that you could do to protect the data. </li></ul><ul><li>You can use Encryption, Decryption, and Passwords to protect your database. </li></ul>
  22. 22. Encrypt and decrypt a database <ul><li>Encryption is a process that will convert the data in a database to a format that is unreadable. </li></ul><ul><ul><li>If a user is able to gain access to a database that is encrypted, the data could only be read if it was decrypted </li></ul></ul><ul><li>Decrypting a database is the process of returning the encrypted data to its original state. </li></ul><ul><li>Another form of security includes the use of passwords. </li></ul><ul><ul><li>Passwords applied to a database makes it impossible to open the database unless you know the password </li></ul></ul>
  23. 23. Set and unset a database password <ul><li>If data is very important and meant to be viewed only by authorized users, it is a good idea to assign a password to the database. </li></ul><ul><li>When you set a password, you usually establish exclusive access, meaning that only one user can access the database at a time. </li></ul><ul><li>You can also set the password so that the database is opened as Read-Only, meaning that no changes can be made to the database. </li></ul><ul><li>In order to remove the password, you must use the password to get into the database and unset (or cancel) the password. </li></ul>
  24. 24. The Set Database Password dialog box
  25. 25. Implement user-level security <ul><li>The security measures discussed in previous sections apply to all users of the database. </li></ul><ul><li>Sometimes you will want to allow some users access rights and disallow those rights for other users. </li></ul><ul><li>You can accomplish this by setting user-level security. </li></ul><ul><li>User-level security lets you grant users or groups of users specific permission to tables, queries, forms, reports, and macros. </li></ul>
  26. 26. Assign users permissions to a database <ul><li>You can assign each user a set of permissions, which specify what that particular user has rights to. </li></ul><ul><li>You can specify that a user can modify data or can only read data. </li></ul><ul><li>You can specify whether the user is allowed to delete data. </li></ul><ul><li>This kind of activity is usually managed by a person designated as the database administrator, or a group of people called the database administration (DBA) group. </li></ul>
  27. 27. Assign group permissions for multiple users <ul><li>The DBA will be responsible for controlling and assigning permissions to certain users. </li></ul><ul><li>Because there are often groups of people who should have the same permissions, the DBA can assign permissions to groups rather than individuals. </li></ul><ul><li>Usually there is a workgroup information file that maintains group names, user names, passwords, and group membership information. </li></ul><ul><li>This information is stored in hidden files and is available only to the DBA. </li></ul>
  28. 28. An illustration of user-level security
  29. 29. Use the Security Wizard to assign permissions
  30. 30. Protect VBA code from unauthorized changes <ul><li>Database developers often work long, tedious hours writing VBA code to augment the functionality of the database. </li></ul><ul><li>Usually, the developer will want to protect the code from unwarranted changes. </li></ul><ul><li>The code is readily available in the modules of the database unless the code is converted. </li></ul>
  31. 31. Create an MDE file <ul><li>You can save a database as an MDE file, which compiles all the VBA code into machine code and removes the VBA source code. </li></ul><ul><li>The database will still work exactly as it did prior to this conversion, but no one will be able to alter the code because they will not be able to get to it. </li></ul><ul><li>In Access 2003, you must make sure the database is in 2002 format before you try to convert it to an MDE file. </li></ul><ul><li>This process is not always necessary and should only be done if there are many VBA modules in the database and the code must be protected from changes. </li></ul>

×