After splitting the backend has no security?

E

Ed

I have created several Access db apps, but I'm in the
process of utilizing security for the first time. I used
User-Level security and the process seemed relatively
straightforward. However, now them I'm ready to deploy, I
ran the database splitter and learned that my backend db
is wide open with no security. For a newbie to security,
what's the most efficient way to solve this issue. Thanks.
 
R

Rick Brandt

Ed said:
I have created several Access db apps, but I'm in the
process of utilizing security for the first time. I used
User-Level security and the process seemed relatively
straightforward. However, now them I'm ready to deploy, I
ran the database splitter and learned that my backend db
is wide open with no security. For a newbie to security,
what's the most efficient way to solve this issue. Thanks.

Forget the splitter tool. If you make a copy of your combined file and
delete everything but tables from one and delete just the tables from the
other, then link the tables in the former to the latter, then you
accomplish the same thing as the splitter, but don't lose your security.
Better yet would be to start out split from the get-go.
 
A

al

Better yet would be to start out split from the get-go.
Though the idea is quite good one,while developing it can
be a pain,especially if you need to make some changes in
the table.you will have to keep flitting between 2 db's,
the Fe and the BE
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top