One thought on “Keychain Mitigation

  1. Mardi Kennedy

    Hi Kevin,

    By chance, I have implemented a very similar arrangement in one of my core solutions, albeit for different reasons. Basically, I am intending to add particular FM Go functionality but I haven’t gotten it done yet. Nevertheless, I wanted to begin the process of ‘training’ my users to be more comfortable with relogging in, and consciously selecting access privileges, depending upon the task in hand, ie ‘just sharing’ or actually doing data changes.

    The one hiccup that I’ve found: importing.

    If I need to import data from one file to another, I now need to remember to open the source file and relogin with sufficient privileges, prior to attempting the import.

    Reply

Leave a Reply to Mardi Kennedy Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.