People Goal 7 - Review

Document created by Kedar on Feb 3, 2015Last modified by communitymanager on May 12, 2015
Version 9Show Document
  • View in full screen mode

 


Now that you’ve taken your first steps to securing your solution, you should be able to sleep a little easier at night.

 

Below are the steps you worked though. As your solution continues to evolve, you can always go back and repeat any of them:

 

  1. Set up your full access account

  2. Add a manager-level privilege set

  3. Add a team-level privilege set

  4. Change the full access account

  5. Add user accounts

 

IMPORTANT: we’ve taught you some of the basics of securing a FileMaker solution, but there are many other things to consider when working with sensitive information. Be sure to read this information if you are working with credit card information, social security numbers, health care information, student loan information, human research data, student education records, or personnel records.

 

You’re almost done — next you’re going to host your database file and share it with your company!



      

      

Attachments

    Outcomes