What happened to user-level security?

User-level security features are not available in databases that use one of the new file formats (.accdb, .accde, .accdc, .accdr).

You can continue to manage user-level security in database files that use an earlier Access file format (such as an .mdb or .ade file). We recommend this only if you already have a user-level security solution in place that you want to keep using.

Note:  In Access 2010, if you use the User-Level Security wizard to specify a default workgroup information file, you must also use the /WRKGRP command-line switch to point to your workgroup information file when you start Access. For more information about using a command-line switch with Access, see the article Command-line switches for Access.

Manage user-level security for an earlier-format database file

Important: Do not convert your database to one of the new file formats if you want to continue using user-level security. The user-level security features work only in databases that use an earlier Access file format, such as .mdb files.

  1. Open the database that has user-level security settings that you want to manage.

  2. On the Database Tools tab, in the Administer group, click Users and Permissions.

  3. Click one of the following commands:

    • User and Group Permissions    Use this to grant or revoke user or group permissions, or to change the owner of database objects.

    • User and Group Accounts    Use this to create or delete a user or a group, to change the password or the group membership of a user, or to change the database Logon password.

    • User-level Security Wizard    Use this to start the Security Wizard, which makes an unsecured backup copy of your database and guides you through the process of implementing user-level security features.

      Note: These commands are not available in databases that use one of the new file formats.

Other security features

For better security, consider using one or more of the following features:

  • Encryption    The encryption tool in Access 2010 makes your data unreadable by other programs or tools, and it forces users to enter a password to use the database. The encryption tool is available only in databases that use one of the new file formats. For more information, see the article Encrypt a database by using a database password.

  • Database server    Store your data on a database server that manages user security, such as Microsoft SQL Server. Then, use Access to build queries, forms, and reports by linking to the data on the server. You can use this technique on a database saved in any Access file format.

  • SharePoint site    SharePoint provides user security and other useful features, such as working offline. There are a variety of implementation options, depending on which SharePoint product you use. Some SharePoint integration features are available only in databases that use one of the new file formats.

  • Web databases    Access Services, a new SharePoint component, provides a way to publish your database so that SharePoint users can use the database in a web browser. For more information see the article Build an Access database to share on the Web.

Share Facebook Facebook Twitter Twitter Email Email

Was this information helpful?

Great! Any other feedback?

How can we improve it?

Thank you for your feedback!