One thought on “Keychain Mitigation

  1. Mardi Kennedy

    Hi Kevin,

    By chance, I have implemented a very similar arrangement in one of my core solutions, albeit for different reasons. Basically, I am intending to add particular FM Go functionality but I haven’t gotten it done yet. Nevertheless, I wanted to begin the process of ‘training’ my users to be more comfortable with relogging in, and consciously selecting access privileges, depending upon the task in hand, ie ‘just sharing’ or actually doing data changes.

    The one hiccup that I’ve found: importing.

    If I need to import data from one file to another, I now need to remember to open the source file and relogin with sufficient privileges, prior to attempting the import.

    Reply

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s