User manual

Table Of Contents
198 | Security measures
Enhancing operating system security
Use the security features of your operating system to restrict access to
important data. The network administrator should provide access only to
individuals authorized to administer and maintain the system or the FileMaker
databases. In addition, they should:
1 Track system user IDs and passwords.
1 Restrict access to the FileMaker Pro application and file directories,
servers, and web pages.
1 Review remote access settings for file sharing and FTP.
1 Restrict file upload or download access.
1 Make sure all users have the latest, most secure versions of operating
system software.
1 To streamline processes, you can enable external authentication, which
uses accounts that have been configured in the Windows Domain
Authentication or in Apple Open Directory. For more information, see
FileMaker
Pro Help.
1 Do not put FileMaker Pro files on file servers to share them. Use the built-
in networking feature in FileMaker
Pro and FileMaker Server. This
prevents the files from being inappropriately copied or from introducing
record locking and potential corruption issues when files are shared with
inappropriate methods.
Establishing network security
Databases shared on an intranet or the internet use the TCP/IP protocol. You
may also use the TCP/IP protocol when you share databases peer-to-peer, or
with FileMaker Server. Though TCP/IP is good for moving data and allowing
clients to connect to your data, it was not designed with security as a primary
objective. Unless you take precautions, it can provide uninvited access to your
host computer, server software, databases, and perhaps to other client machines
on your internal network. TCP/IP doesn't provide very much protection for
data, so it is important to place barricades such as firewalls and SSL data
encryption in the path of uninvited visitors.
φμπ10_υσερσ_γυιδε.βοοκ Παγε 198 Μονδαψ, Αυγυστ 25, 2008 3:59 ΠΜ