MS Access Security – Understand the Role the Jet Database Engine Plays

In this article we will examine the role the Jet Database Engine plays in the overall security framework of Ms Access

Access Security WarningThe Security features in MS Access are not considered to be one of the best features of the application. Access is in-fact often looked down as one of the database applications with complicated and difficult to understand security features. To be able to use the security features provided in MS Access for database security, it is important to first understand the concept of database security and what all features can help you achieve that security. There are multiple aspects of database security, which you need to know before implementing database security. These aspects are:

  • Disallowing all users from extracting data from the database, on a disk.
  • Preventing unauthorized/ malicious access to the databases.
  • Allowing only the Database Administrators the authority to make changes in a database.
  • Restricting users from executing changes in the code or structure of the database.
  • Ensuring user level security permissions to prevent unwanted access of database users to different tables in a database.

After understanding various aspects of database security in MS Access, it is important to understand how are all these aspects are taken care of by the security measures undertaken in the application. A Jet Engine in MS Access is used for storing and retrieving data, the jet engine is also responsible for performing and handling queries, along with multiple other functions. To be able to understand the database security features provided by MS Access, it is important to first understand how the jet engine will respond to the users of MS Access.

The Jet Database EngineIn a Jet database, MS Access can be considered as the front – end to jet engine, with security being central to the jet, instead of being something that is limited to only the front – end. Jet database engine considers security to be based on workgroup and not individual users. Which is why every time it is launched, jet engine begins searching for a workgroup file titled SYSTEM.MDW  (default name). This is the file containing information about the users of database and groups. This file will only contain information of valid databases and not for all other user databases. The details of user accounts and groups are contained in this file. This information is collected by jet engine and used for verifying users every time Access is launched or an attempt is made to login to jet database.

Jet engine is thus one of the key factors in maintaining security of jet databases. After one has successfully logged in to a jet database, the user can then connect to the database they want to access. This database might be containing some additional security information for a few of the elements of a database. Because of all these security measures and multiple logs in stages involved, the process of logging in Access databases is often considered as a two – stage process. This process happens so seamlessly that users often consider the whole process as a single stage procedure.

Dealing with Issues of Database corruption due to Virus Attack

In some cases, owing to a virus attack, Access damage can occur. Once you have removed the virus, you should then use a powerful recovery software like DataNumen Access Repair to extract the contents from the corrupted file. The tool also proves handy if you need to recover several MDB databases in one go, owing to its batch recovery feature.

Author Introduction:

Vivian Stevens is a data recovery expert in DataNumen, Inc., which is the world leader in data recovery technologies, including repair mdf file problem and excel recovery software products. For more information visit www.datanumen.com

Comments are closed.