My question I think is a bit odd - and yes I have read up on this - I am working on a DB at home that I hope to propose at work as a solution to Runaway Speadsheet Syndrome. SO, the problem becomes two fold, first what is the best way to implement the security? Should this be the last step, and that done at work on the network?
Second, when this is done I want the maintenance to fall to someone in an HR-type position. They are comfortable with computers, but not a "technical user." How should this be handled? I am tempted to create a table and have the security bounce off of that, but it is not as good as MS security. So, do I (or someone) train her how to add new users to the groups, pass the baton to someone in IS (I am a supervisor in a non-IS postion), or bite the bullet and claim this baby as mine?
This is not exactly covered in books, and it seems experience (of which I am a bit shallow) may be able to smooth this process over and help me to not torpedo a carreer doing what I REALLY like - working with people almost full time.
Any insights?
Thanks, Brambojr
Second, when this is done I want the maintenance to fall to someone in an HR-type position. They are comfortable with computers, but not a "technical user." How should this be handled? I am tempted to create a table and have the security bounce off of that, but it is not as good as MS security. So, do I (or someone) train her how to add new users to the groups, pass the baton to someone in IS (I am a supervisor in a non-IS postion), or bite the bullet and claim this baby as mine?
This is not exactly covered in books, and it seems experience (of which I am a bit shallow) may be able to smooth this process over and help me to not torpedo a carreer doing what I REALLY like - working with people almost full time.
Any insights?
Thanks, Brambojr