20
Securing, Deploying, and Maintaining Access Applications
WHAT'S IN THIS CHAPTER?
- Review how to track and identify users and changes to the data in the databases solution
- Walk through development lifecycle environments
- Look at different deployment methods
- Learn how to maintain your database solution
WROX.COM CODE DOWNLOADS FOR THIS CHAPTER
The wrox.com code downloads for this chapter are found at www.wiley.com/go/proaccess2013prog.com on the Download Code tab. The code files are in the Chapter 20 download, and are individually named according to the code filenames noted throughout the chapter.
In this chapter you will read about methods to secure who can access your solution and how to set permissions to the users who access the database. You will also learn about different methods to set an audit trail to capture and log changes users make to the data once they are allowed into the database.
The chapter discusses the development cycle and the different environments you need to support development and your database solutions. You will read how to update and maintain the database and the front-end (FE) file once you deploy the solution to your users.
USER LEVEL SECURITY AND AUDIT TRAIL
Some of the database solutions you design will require you to include security features. The types of features will range from setting different permission levels and access limits for different users, to creating an audit trail to capture who did what with the data.
It can be important to a company ...
Get Professional Access 2013 Programming now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.