How to Encrypt a Microsoft Access Database
Security-conscious information source users have long necessary the capability to use strong protection in Microsoft company Accessibility. With the release of Accessibility 2007, Microsoft company answered these pleas and introduced a robust protection function that allows for the simple addition of significant amounts of protection to Accessibility information source.
What is encryption?
Encryption provides you with the capability to guard your details source information file from prying eyes. It transforms the way details are stored on your disk so that individuals who do not know the information source protection password can not start the information source or use other techniques to view the information file contents. Security professionals recommend the use of protection to guard sensitive information.
How do I decrypt an Accessibility 2007 database?
If you want to start up an secured information source for use and then reencrypt it when you are finished, Microsoft company Accessibility will handle the mechanics for you. Simply start the information source as you normally would and enter the information source protection password when prompted. Accessibility will decrypt the information source for your use and then save a new secured copy when you make changes.
If you want to get rid of protection from an secured Accessibility information source, start the information source in exclusive mode and then click “Decrypt Database” in the Database Resources group.
What type of protection does Accessibility 2007 use?
Access 2007 uses the Microsoft company Cryptographic API. This means that it will support any cryptographic criteria available within Windows as a Cryptographic Service Provider (CSP). This is a great improvement over previously editions of Accessibility, which only supported a built-in, weak protection criteria.
When you want to help prevent unauthorized use of an Accessibility information source, consider encrypting the information source by setting a protection password. If you know the protection password for an secured information source, you can also decrypt the information source consider its protection password. This article explains how to secure a knowledge source by using a knowledge source protection password, and how to decrypt a knowledge source consider its protection password.
In previously editions of Accessibility, you could create customer accounts and passwords using an element known as user-level protection. This topic does not discuss user-level protection, which is not available when you use the .accdb information structure.
If you secure a knowledge source and then lose the protection password, you will be unable to use the information source. You cannot eliminate a knowledge source protection password if you do not know the protection password.
The protection device makes your details unreadable by other tools, and sets a protection password that is required to use the information source. Remember these rules as you proceed:
The new protection function applies only to information source in the .accdb information structure.
The device uses a stronger protection criteria than was used in previously editions of Accessibility.
If you want to encode or apply a protection password to an earlier-version Accessibility information source (an .mdb file), Accessibility uses the Encoding and Password features from Accessibility 2003.