Security settings defined within a solution using FileMaker Pro apply only to the information and schema (layouts, tables, fields, relationships, and scripts) stored in that solution. The FileMaker platform employs a unified security model, where the security that you establish for a solution is in effect across all clients. Server monitoring and administration: Admin Console allows you to monitor solution access, disconnect idle users, and create backups of your solutions.You can also require Secure Socket Layer (SSL) encryption of data between FileMaker Server or FileMaker Cloud and FileMaker Pro, FileMaker Go, FileMaker WebDirect, and ODBC and JDBC client applications. Data encryption on the disk and over the wire: You can encrypt the data stored within a FileMaker solution.You can define as many privilege sets as needed. Access control with privilege sets: You define permissions that determine levels of access to your solution. ![]() ![]() Users can also authenticate via Active Directory, Open Directory, or OAuth identity providers. Authentication with accounts: FileMaker encrypts credentials stored within solutions so the credentials are protected.The FileMaker platform's features help you control data access, operations, and development within a FileMaker file.
0 Comments
Leave a Reply. |