Navigation:  22    S:  Set up Latitude Security >

22.1 Overview

Previous pageReturn to chapter overviewNext page

22.1.1 Latitude has a distinctive security model that allows control over user permissions while using Latitude.

 

Note that the Latitude security system in no way controls access to your data file other than through Latitude forms and reports provided in Latitude. Anyone using Microsoft Access directly can access your data without restriction.

 

You grant rights to users by assigning characters (letters of the alphabet (a-z) and digits (0-9)) to your users and also to the particular objects that you want secured. When User and Object characters match, the user will gain access to that object.

 

Letters of the alphabet give full access.

Digits give "View Only" access.

Four special codes (!, #, ^, *) are used to secure the bands of buttons on the Main Menu.

If you include the "|" (vertical bar) character against a user they will be barred from adding or deleting records.

 

If you do not wish an object to be secured, do not assign any codes to that object.

If you want to setup a more flexible security system you can assign multiple codes to objects and users.

 

22.1.2 Note that Timesheets screen security words are slightly different. It is described later in this Guide.