



System requirementsįileMaker solutions require users to authenticate with an account name and password combination. Security settings configured within FileMaker Server and FileMaker Cloud are deployment specific and apply to all solutions hosted by the server. Security settings defined within a solution using FileMaker Pro Advanced apply only to the information and schema (layouts, tables, fields, relationships, and scripts) stored in that solution. The FileMaker platform employs a unified security model, where the security that you establish for a solution is in effect across all clients. Server monitoring and administration: Admin Console allows you to monitor solution access, disconnect idle users, and create backups of your solutions.You can also require Secure Socket Layer (SSL) encryption of data between FileMaker Server or FileMaker Cloud and FileMaker Pro Advanced, FileMaker Go, FileMaker WebDirect, FileMaker Data API, and ODBC and JDBC client applications. Data encryption on the disk and during transmission: You can encrypt the data stored within a FileMaker solution.You can define as many privilege sets as needed.

Access control with privilege sets: You define permissions that determine levels of access to your solution.Users can also authenticate via Active Directory, Open Directory, or OAuth identity providers. Authentication with accounts: FileMaker encrypts credentials stored within solutions so the credentials are protected.The FileMaker platform's features help you control data access, operations, and development within a FileMaker file.
