MOS Access Associate (Office 365 and Office 2019)
1 Introduction to Microsoft Access
1-1 Overview of Microsoft Access
1-2 Understanding the Access interface
1-3 Navigating the Ribbon and Backstage view
1-4 Customizing the Quick Access Toolbar
1-5 Using the Tell Me feature
2 Creating and Managing Databases
2-1 Creating a new database
2-2 Opening and closing databases
2-3 Saving and backing up databases
2-4 Converting databases between file formats
2-5 Managing database properties
3 Designing Tables
3-1 Understanding table structure
3-2 Creating tables using table design view
3-3 Defining field properties
3-4 Setting primary keys
3-5 Creating relationships between tables
3-6 Enforcing referential integrity
3-7 Using lookup fields
4 Entering and Managing Data
4-1 Entering data into tables
4-2 Editing and deleting records
4-3 Using data entry forms
4-4 Sorting and filtering data
4-5 Using validation rules and messages
4-6 Importing and exporting data
5 Creating and Customizing Forms
5-1 Understanding forms
5-2 Creating forms using the Form Wizard
5-3 Customizing form layout
5-4 Adding controls to forms
5-5 Setting control properties
5-6 Using form views (Form View, Layout View, Design View)
5-7 Creating subforms
6 Creating and Customizing Reports
6-1 Understanding reports
6-2 Creating reports using the Report Wizard
6-3 Customizing report layout
6-4 Adding controls to reports
6-5 Setting control properties
6-6 Using report views (Report View, Layout View, Design View)
6-7 Grouping and summarizing data in reports
6-8 Printing and exporting reports
7 Querying Data
7-1 Understanding queries
7-2 Creating queries using the Query Wizard
7-3 Using query design view
7-4 Adding fields to queries
7-5 Using criteria and operators
7-6 Sorting and grouping query results
7-7 Creating calculated fields
7-8 Using aggregate functions
7-9 Creating and using parameter queries
7-10 Creating and using crosstab queries
8 Macros and Automation
8-1 Understanding macros
8-2 Creating and editing macros
8-3 Using macro actions
8-4 Assigning macros to events
8-5 Debugging macros
8-6 Understanding VBA (Visual Basic for Applications)
8-7 Writing simple VBA procedures
9 Securing and Sharing Databases
9-1 Setting database passwords
9-2 Encrypting databases
9-3 Managing user-level security
9-4 Sharing databases with others
9-5 Using SharePoint and OneDrive for data storage
9-6 Collaborating with others in real-time
10 Maintaining and Optimizing Databases
10-1 Compact and repair databases
10-2 Analyzing and optimizing database performance
10-3 Using the Database Documenter
10-4 Managing database objects
10-5 Backing up and restoring databases
10-6 Migrating databases to newer versions of Access
Managing User-Level Security in Microsoft Access

Managing User-Level Security in Microsoft Access

Key Concepts

User-Level Security

User-Level Security in Microsoft Access refers to the ability to control access to database objects and data based on user identities. This ensures that only authorized users can perform specific actions, such as viewing, editing, or deleting data.

Workgroup Information File

The Workgroup Information File is a configuration file that stores user and group account information. It is essential for implementing user-level security. The file defines which users and groups have access to the database and what permissions they have.

Permissions

Permissions are the specific rights granted to users or groups to perform actions on database objects. Common permissions include Open/Run, Open Exclusive, Modify Design, and Delete. Assigning appropriate permissions ensures that users can only perform tasks they are authorized to do.

User Accounts

User Accounts represent individual users who have access to the database. Each user account is associated with a unique username and password. User accounts can be members of one or more groups, inheriting the permissions assigned to those groups.

Group Accounts

Group Accounts are collections of user accounts that share common permissions. Creating group accounts simplifies the management of permissions by allowing you to assign permissions to a group rather than individual users. Common groups include Administrators, Users, and Guests.

Encrypting a Database

Encrypting a database involves converting the data into an unreadable format to protect it from unauthorized access. Encryption ensures that even if the database file is accessed, the data remains secure. Encrypting a database is a crucial step in protecting sensitive information.

Trust Center Settings

Trust Center Settings in Microsoft Access provide options to manage security and privacy settings. These settings control how macros, add-ins, and other code are handled. Proper configuration of Trust Center Settings helps prevent security threats and ensures the safe execution of code.

Security Warnings

Security Warnings are notifications that alert users to potential security risks, such as opening a database with macros or running code from untrusted sources. These warnings help users make informed decisions about whether to proceed with potentially unsafe actions.

Digital Signatures

Digital Signatures are electronic credentials used to verify the authenticity and integrity of code or macros. Signing code with a digital signature ensures that it has not been altered and comes from a trusted source. Digital signatures are essential for securing macros and ensuring their safe execution.

Examples and Analogies

Imagine user-level security as a gated community. Just as a gated community controls access to residents and visitors, user-level security controls access to database objects and data. The Workgroup Information File is like the community's membership list, defining who can enter. Permissions are like the keys to different areas of the community, allowing residents to access specific facilities.

Another analogy is a secure vault. Just as a vault protects valuable items with encryption and access controls, encrypting a database and managing permissions protect sensitive data. Trust Center Settings are like the vault's security protocols, ensuring that only authorized personnel can access the vault's contents.

By mastering the concepts of user-level security, workgroup information files, permissions, user and group accounts, database encryption, Trust Center settings, security warnings, and digital signatures, you can effectively manage and secure your Microsoft Access databases.