In this article we look at ways to secure Forms and Code we use in an Ms Access Application
There are multiple options available to an Access user for securing the design of their forms, reports, codes, etc. One might attempt to make use of the permissions for securing the two, but it is important to note that Visual Basic is not supported by permissions. You can prevent users by looking at your forms and code designs by not removing the Read Design and The Modify Design permissions. By explicitly removing them, you will make your design visible. When using these applications it is always important to ensure sufficient security and protection. There are multiple other ways which can be used for securing Forms and Codes in MS Access.
- To provide better security for the developer applications, MS Access compiles the source code to remove it from file, leaving behind nothing but the executable code. This helps converting the database from an MDB file to an MDE file. This new formed database file will contain compiled code for forms and reports, and do away with the ability of adding new codes, reports or forms, they will however be able to make changes to the existing tables, reports and codes. After converting an MDB file into MDE file, you cannot convert it back, so make sure that the original file has been safely backed up.
- To secure forms and codes in Access, you can also opt for dividing your databases into Frontend and Backend. The frontend will contain all your forms, reports, etc. whereas the backend will contain the data tables. This split between the frontend and the backend can be easily performed using the splitting tool provided in Access. The frontend of your database will be connected with the data through linked tables, to make sure that the performance continues as before.
- If the protection of application is more important than protecting the data, then you can make use of an alternative approach. You can port the code to any standalone Visual Basic application and not on Access databases. This has been made a lot easier with the coming of VBA implementation in recent Access editions. By completely taking out codes and forms from databases, they have been made more secure and this has also promoted the use of other tools and techniques available. You can get access to multiple tools, providing you the functionality in manner that is more advanced than what you get access to in MS Access.
Besides Protecting Forms Consider Enforcing Measures for Data Protection and Recovery
While using MS Access it is not only important for the user to protect databases, but also to secure forms and codes. If you are unable to provide them with the necessary amount of protection, they might not just become vulnerable, but can also get leaked. To ensure that your forms and codes are well protected, you can try out the methods explained above. Converting an MDB file to an MDE file, splitting frontend and backend and using Visual Basic application instead of Access. All these methods are trusted methods to help you protect Access codes and forms.
However protecting Access forms and code is just one part of securing the Access deployment in your office. You need to enforce standard authorization and encryption security standards for protecting the data stored in Access databases. Further it is critical to invest in an mdb repair or accdb repair utility to deal with contingencies like database corruption.
Vivian Stevens is a data recovery expert in DataNumen, Inc., which is the world leader in data recovery technologies, including sql repair and excel recovery software products. For more information visit www.datanumen.com