Jump to content

All Activity

This stream auto-updates     

  1. Today
  2. Au premier abord, ils se sont pas trop creusés chez FM, surtout pour une version paire
  3. il est dehors ! https://www.filemaker.com/products/whats-new.html
  4. Bonjour, ta réponse m'intéresse si tu peux me l'expliquer. A l'inverse, j'ai une table externe dans laquelle je coche une case pour indiquer qu'il y a un suivi à faire. Sur un tableau de bord (modèle pour le suivi de plusieurs tables externes différentes), je souhaite que tous les enregistrements qui ont la case cochée apparaissent. (et donc quand je décoche, la ligne disparait du tableau de bord). Je ne parviens pas à trouver la solution pour l'instant. Merci d'avance pour ton explication qui pourrait déjà m'aiguiller, je suis toute ouïe si quelqu'un a une solution toute trouvée ! Bon aprem,
  5. Author’s note: Inevitable comparisons will be drawn between the new While function and the venerable CustomList custom function, which I wrote about at length several years ago. Preliminary testing indicates that CustomList is faster under certain circumstances and While is faster under others. In my opinion, both of them belong in your developer tool kit. […] Afficher la totalité du billet
  6. bonjour, tout d'abord sachez que je suis complètement nouveaux avec le programme Filemaker 17. voici mon problème, j'ai sur mon PC portable ( un Dell ) une licence ( celle avec 5 utilisateur sur 1 an) de Filemaker 17. cependant j'ai fait l'acquisition d'un autre PC portable ( un Asus) et je souhaiterais installer Filemaker 17 grâce à la licence que j'ai utiliser sur mon ancien PC portable ( bien sur je ne compte plus utiliser Filemaker sur l'ancien PC portable). sachant que bien évidement les 4 autres licence sont déjà utiliser. du coup est-il possible de ré-installer Filemaker17 sur mon nouveaux PC portable grâce à la même clé de licence. merci de votre attention.
  7. FileMaker 18 Security Enhancements Among the ensemble of new things to play with, FileMaker 18 brings with it a collection of security enhancements. Some of these changes include a redesigned Manage Security dialog aimed towards improved ease of use, an ability to manage FileMaker users without the need to have Full Access privileges, and a security warning for potentially malicious plug-ins.  Manage Security Redesign The Manage Security dialog has been redesigned, combining the Detail View and Basic View into one new display. Clicking an account name will make the detailed settings of the account slide in from the right, where users can still personalize the settings per the individual. The “Advanced Settings…” button in the bottom left pops up the Extended Privileges, Privilege Sets, and File Access settings in the original Manage Security dialog. Managing Users Without Full Access Arguably the biggest enhancement lies within the ability for non-Full Access users to manage the security of a FileMaker file. Now non-power users will have the ability to add and manage non-Full Access accounts in the Manage Security dialog without having to contact a developer or an administrator. However since the default privilege sets cannot be changed, accounts with this power will have to use a custom privilege set. This setting can be enabled under the “Edit Privilege Set” menu of the Manage Security dialog. Unsigned Plug-in Notifications Additionally FileMaker will now display a notification on startup when an installed plug-in is not signed by its developer. This is a measure taken to notify users that one or more of their plug-ins could have been potentially tampered with. This dialog gives the user the ability to choose whether they would like to load the unsigned plug-in. Please note that if you auto install unsigned plug-ins in your solution you will have to make sure Set Error Capture is set to Off to for users to get the warning. The auto installer will otherwise fail if Set Error Capture is set to On. Conclusion Managing security for your FileMaker solutions has become more intuitive and user friendly, while also keeping users more informed of security risks. Contact us if you would like help securing your FileMaker solution. Download the FileMaker Security Enhancements Database Please complete the form below to download your FREE FileMaker database file. Name* First Last Company Phone* Email* FileMaker Experience*New to FileMaker Platform Existing User of FileMaker Existing Developer of FileMaker Terms of Use I agree OPT-IN: I agree that I am downloading a completely free FileMaker application file with no strings attached. This database is unlocked, and I may use it for my business or organization as I see fit. Because I am downloading a free database, I agree that I should receive occasional marketing. I understand that I can OPT-OUT of these emails at anytime. Did you know we are an authorized reseller for FileMaker Licensing? Contact us to discuss upgrading your FileMaker software. Afficher la totalité du billet
  8. FileMaker While Function Sometimes smallest features offer the biggest impact. The new While function, which gives the ability to loop within a calculation, drastically reduces the need for one-off recursive custom functions, speeding up development in any part of FileMaker that requires looping in a calculation. Let’s take at how it works.  How It Works The format of a while function is broken into four parts: initial variables, the condition, logic, and the results. The function repeats the logic section until the condition is false; that is how the function provides the ability to loop. In the example below the While function returns a list of numbers 1 through 5: While ( [ count = 1; numberList = "" ]; count < 6 ; [ numberList = numberList & (count) & "¶"; count = count + 1 ]; numberList ) The function returns: 1 2 3 4 5 Notes Initial variables are available throughout the loop of the function. You can define multiple initial variables by enclosing them in brackets, similar to how let functions work. Variables that need to retain information from each iteration must be defined in the initial variable section otherwise their values are empty in the next iteration. To prevent infinite loops the while function will return “?” after the number of iterations exceeds a limit. The default limit is 50,000 iterations. Use the new function, Set Recursion, to set a new limit to the number of iterations. Conclusion With the advent of the While function, development of FileMaker applications will become a simpler and quicker process, eliminating the need for one-off recursive functions. Download the demo file to try out the new function. Did you know we are an authorized reseller for FileMaker Licensing? Contact us to discuss upgrading your FileMaker software. Download FileMaker While Function Database Please complete the form below to download your FREE FileMaker database file. Name* First Last Company Phone* Email* FileMaker Experience*New to FileMaker Platform Existing User of FileMaker Existing Developer of FileMaker Terms of Use I agree OPT-IN: I agree that I am downloading a completely free FileMaker application file with no strings attached. This database is unlocked, and I may use it for my business or organization as I see fit. Because I am downloading a free database, I agree that I should receive occasional marketing. I understand that I can OPT-OUT of these emails at anytime. Afficher la totalité du billet
  9. FileMaker 18 Database Engine Improvements FileMaker Server 18 brings some exciting database improvements in the form of faster processing of parallel queries and automatically recovering corrupt databases when the server starts up using a transactional log. This auto-correction feature, called Startup Restoration, will save significant time and headaches during disaster recovery of a FileMaker application. Both updates are intertwined within Startup Restoration, which means that added speed and stability are packaged together.  What’s the Fuss About? Performance optimization is one of the most time-consuming (and expensive) types of development and is often overlooked or ignored until applications are nearly unusable. This often happens as businesses expand, adding both more users and data which load the server with an ever increasing number of queries. Without Startup Restoration (what most users are used to), FileMaker Server handles queries in serial. Each query is put in a single line and assigned a processing “lane” once one opens up, much like a bank line with several tellers. The Startup Restoration feature allows the server to handle queries in parallel. That means, your query goes to the shortest “lane” available and has a better chance of being processed more quickly. To get an idea of the impact, the two screenshots below show just how much faster enabling Startup Restoration is. With Startup Restoration turned on, our example unstored find took a little less than 15 seconds for 10 simultaneous users. With Startup Restoration off, the same unstored find for the same 10 users took more than twice as long at just under 33 seconds. The added efficiency on the CPU is a major part of the benefit. For developers frustrated with a server needing more cores while the CPU usage is hanging around 20%, Startup Restoration will help, allowing you to do more with each core. The unstored find for 10 users with Startup Restoration easily took up about 60% of the CPU. The same find for 10 users without Startup Restoration barely topped 30% of the CPU. Auto-Recovery Startup Restoration also allows the server to auto-recover files on startup if corrupt data is detected. Having Startup Restoration enabled means in addition to more efficient queries, the server also keeps a transactional log of all the data changes occurring in FileMaker. If the server detects an error in the consistency of your FileMaker application, it automatically rolls itself back to the last consistent state by using the transactional log. Manual rollbacks to a progressive backup should be even more rare and no one has to worry about them being accidentally turned off. That means added stability and fewer emergencies. How Do I Get It? In FileMaker 18 Server, Startup Restoration is on by default, but turning it off is a simple command with either the Admin API or the command line. Setting “StartupRestorationEnabled=false” will disable logging. Setting it to “true” will enable the feature. If you are toggling Startup Restoration, you must restart FM Server for it to take effect. What if you want to know if Startup Restoration is enabled already? You can use the FMSAdmin “Get” command to ask the server for the current setting setup. When Not To Use It Why would you want to turn it off? Startup Restoration comes at a cost: creating and editing records take longer. In our example, creating records with Startup Restoration enabled meant an extra 1.5 seconds per user for 1,000 records. With Startup Restoration turned on it took just over 2 seconds per user to make 1,000 records. With Startup Restoration turned off, it only took each user an average of .6 seconds to make 1,000 records. For most applications and users, this isn’t likely to be a problem or even noticeable (the additional time per record in our example was .0015 seconds). However, if your application batch creates records, this could mean a pretty significant slowdown. If you have large-scale, predictable batch creations, you may even consider turning transactional logging off while you run those batch creations. Start Optimizing Almost everything is fast when it is first built, but your FileMaker application isn’t a statue – it changes and grows with your business. The optimization in Server 18 is FileMaker’s way of recognizing that as applications grow in size, FileMaker needs to keep up with the requests. In the same vein, Startup Restoration emphasizes better stability and less downtime caused by corrupt files. While no database engine improvement is a silver bullet for performance or stability, these optimizations are an improvement that will help applications grow with the businesses they serve even more effectively than before. Did you know we are an authorized reseller for FileMaker Licensing? Contact us to discuss upgrading your FileMaker software. Download FileMaker 18 Database Engine Improvements Please complete the form below to download your FREE FileMaker database file. Name* First Last Company Phone* Email* FileMaker Experience*New to FileMaker Platform Existing User of FileMaker Existing Developer of FileMaker Terms of Use I agree OPT-IN: I agree that I am downloading a completely free FileMaker application file with no strings attached. This database is unlocked, and I may use it for my business or organization as I see fit. Because I am downloading a free database, I agree that I should receive occasional marketing. I understand that I can OPT-OUT of these emails at anytime. Afficher la totalité du billet
  10. Redesigned FileMaker Import Dialog The new FileMaker 18 Import Dialog has been redesigned to be more user-friendly, flexible and fast. Some of the new features include the ability to select the target fields in a list that can be filtered and the ability to perform auto-enter options individually for each field.  What Is New? User-friendly interface Ability to select the target field from a list that can be filtered A custom row can be used as the “Field Names” row in the source file for certain data types Auto-enter options are independent for each field Ability to import data from files using a custom character to separate values User Friendly Interface The way information is presented makes it easier for the users to understand how the import process works. For example the use of colors to define if the field will be imported or not, or if it will be used to find a match conveys what is going to be done in a very efficient and natural way. In addition FileMaker provides diagrams in a pop-up window of the different operations that could be performed when importing. Search Target Field FileMaker now allows us to choose the target fields from a list that can be filtered, decreasing the time needed to map fields, especially when including a considerable amount of fields. Use Custom Record As Field Names You can now select any row in the import file as the header row (the row containing the field names). All rows in the file before the header row will be omitted. Independent Auto-Enters You can choose which auto-enters to fire when importing by clicking on the red gear button located on the right side of each field with auto-enter options. Custom Character Separators You have now the ability to import files that have separators other than commas and tabs, getting rid of the need to preprocess the file before importing. Conclusion FileMaker greatly improved importing with a more intuitive interface, a more efficient methodology, and more flexible functionality. Contact us if you would like help importing data into your FileMaker application. Did you know we are an authorized reseller for FileMaker Licensing? Contact us to discuss upgrading your FileMaker software. Download Redesigned FileMaker Import Dialog Database Please complete the form below to download your FREE FileMaker database file. Name* First Last Company Phone* Email* FileMaker Experience*New to FileMaker Platform Existing User of FileMaker Existing Developer of FileMaker Terms of Use I agree OPT-IN: I agree that I am downloading a completely free FileMaker application file with no strings attached. This database is unlocked, and I may use it for my business or organization as I see fit. Because I am downloading a free database, I agree that I should receive occasional marketing. I understand that I can OPT-OUT of these emails at anytime. Afficher la totalité du billet
  11. FileMaker Script Error Logging For many years FileMaker Server has automatically logged errors in server side scripts, but now with FileMaker 18 developers have to ability to log script errors client side in FileMaker Pro and Go, saving time troubleshooting issues with scripts. And with the new file manipulation script steps, developers can automatically import script error logs into a centralized table to quickly view errors across all clients.  A simple-to-use script step Error logging can now be accomplished with a simple script step: Set Error Logging [ On/Off ]. And because you can control when error logging occurs you can prevent unnecessary log entries from being created. Additionally you can set up a “custom debug info” calculation, the result of which will be added to each log entry of the script allowing developers to log dynamic information the moment an error occurs. The log file When enabling error logging in a script, FileMaker will create a single file named “ScriptErrors.log”, which will be created in the user’s Documents folder if it doesn’t already exist. Each log entry will include the following pieces of information: the name of the file, account, script, script step, error code, timestamp, session number, and custom debug information. Set Error Logging is currently only supported on FileMaker Pro and Go, not WebDirect, nor FileMaker Server. Collecting log files To really make these log files useful you should consider automatically importing them into a centralized table so the information is in one location and easily searchable by a developer. For example you could import the log every time a user closes the FileMaker application via the OnLastWindowClose trigger. Having an easily accessible error log can go a long way when something has gone wrong and troubleshooting becomes necessary. Conclusion Script error logging is no longer relegated to only FileMaker Server: it is now available in both FileMaker Pro Advanced and FileMaker Go, to help troubleshoot errors in client side scripting. In a future version of the FileMaker platform we would love the ability to enable or disable script error logging on FileMaker Server to prevent unnecessary log entires. In the mean time download the sample file to check out the client side script error log in action! Did you know we are an authorized reseller for FileMaker Licensing? Contact us to discuss upgrading your FileMaker software. Download FileMaker Script Error Logging Database Please complete the form below to download your FREE FileMaker database file. Name* First Last Company Phone* Email* FileMaker Experience*New to FileMaker Platform Existing User of FileMaker Existing Developer of FileMaker Terms of Use I agree OPT-IN: I agree that I am downloading a completely free FileMaker application file with no strings attached. This database is unlocked, and I may use it for my business or organization as I see fit. Because I am downloading a free database, I agree that I should receive occasional marketing. I understand that I can OPT-OUT of these emails at anytime. Afficher la totalité du billet
  12. FileMaker 18 Overview A new and exciting version of the FileMaker platform is here! 2019 marks over 34 years for the FileMaker platform. In this article we review what’s new in the FileMaker platform, specifically for FileMaker Pro Advanced 18, FileMaker Server 18, FileMaker Go 18, and FileMaker Cloud for AWS. We highlight some of our favorite new features with in-depth content with videos and sample files. With this release FileMaker continues to prove to be the Workplace Innovation Platform leader. What’s New? FileMaker Pro Advanced now includes an Import Dialog redesign, introduction of scripted Versioning, native File Manipulation script steps, and the new norm: more security enhancements. FileMaker Go now includes Append to Existing PDF, more barcodes supported, and OAuth 2 login support for iOS SDK with Amazon, Google, or Microsoft Azure. FileMaker Server now includes parity between the FileMaker Data API and the FileMaker PHP API—which is on the deprecation watch list—and the official release of the FileMaker Server Admin API (both RESTful APIs). FileMaker Community launched a new site in April. FileMaker Cloud for AWS 1.18 availability within the week. An all new FileMaker Cloud is coming later this year and will be the first time FileMaker offers a SaaS directly to customers. This will not require a separate AWS account to setup. FileMaker Marketplace is coming sometime later this year, replacing Made for FileMaker and requires developers to resubmit their product. No new price increases, price protection for existing customer ended May 14th. FileMaker Pro Advanced 18 FileMaker Pro Advanced is the flagship desktop application with more enhancements to create custom apps such as an improved file importing workflow, native file manipulation, enhanced security, and many more developer tools that allow you to build and deploy more innovative applications faster than ever before. Redesigned Import Records A welcomed redesign to the process of bringing data into FileMaker via the File Menu->Import Records, the dialog presents users a much easier way to import data and more possibilities with custom file import delimiters. You can choose any row for the field names, trigger auto-enters on a per field basis, and use type ahead field mapping when dealing with large number of columns to wade through. See the wonderful user experience as Carlos Machado shows you the Redesigned FileMaker Import Records Dialog in action. Version Comparison The new Save a Copy as XML script step opens up the potential for automating versioning of solutions and is great for teams or managing multiple build outs of the same application. The XML representation provides more detail than the Database Design Report XML most developers use today. See FileMaker Version Comparison in action as Brandon Terrell shows you in a video and sample file. Sending HTML Emails Sending email is now supported in the Insert from URL script step with SMTP cURL options, which have opened up the ability to send HTML emails directly from FileMaker. Learn about Sending FileMaker HTML Emails as Kevin Boehle walks you through in a video and provides a sample file for download. File Manipulation What used to require third party plugins can now be done natively in FileMaker: you can work with files on disk, including creating, renaming, deleting, reading and writing. See FileMaker File Manipulation in depth as Victor Perez-Mendoza shows you how and provides a free download as well. Security Enhancements Many new security improvements are available in FileMaker 18 including the ability to grant administrators account management without giving the them Full Access in Advanced Settings. A new user experience for the Manage Security Dialog box allows you to work more seamlessly when managing accounts including a new Details pane, type ahead, and multi-select. Also Full Access is required by default to reference a file when creating a new application. Read more in depth about the new FileMaker 18 Security Enhancements as Andrew Bosworth demos the security updates. Script Error Logging Now you can log errors while a script is running in FileMaker Pro, similar to how errors are logged when a script runs on FileMaker Server. With the file manipulation script steps, developers can build automatically importing the script error logs into a central table to view errors from all Pro clients. Check out FileMaker Script Error Logging as Austen Gren shows you in a video and sample file. While and SetRecursion Functions The new While function allows developers to loop in calculations, repeating logic while a condition is true, and then return the result. This gives developers the ability to replace many recursive custom functions. And with the new SetRecursion function, developers can bypass the previous limit of 50,000 iterations. See the new FileMaker While Function in detail as Devin Drake shows you how the function works. Open Application at Launch Using the Assisted Install file, you can now specify the FileMaker application to automatically launch by default when FileMaker Pro is opened. For those who distribute the application for single purposes such as SBA (Solution Bundle Agreement) or want the end user always to go to the same application this provides more control over your FileMaker user experience. FileMaker Pro Advanced Technical Specs FileMaker Pro Advanced 18 is supported on Windows 10 Pro and Enterprise, Windows 8.1 Standard and Pro, Windows 7 SP1 Professional and Ultimate, macOS Mojave 10.14, and macOS High Sierra 10.13. If you want early access to FileMaker versions, purchase a FileMaker Developer Subscription for $99/per year. The subscription gives you access to the pre-release version, the FileMaker Data Migration Tool, the FileMaker iOS SDK, and more. FileMaker Go 18 FileMaker Go for iPad and iPhone has all the features provided in FileMaker Pro Advanced plus specific iOS features. You will need FileMaker Pro Advanced on the desktop to build your custom application. The new version of FileMaker Go 18 is available in the App Store as a free download. Append to Existing PDF Users love to create and send PDFs from FileMaker Go and it just got better with the ability to append a new PDF to an existing one via the Save Records as PDF script step’s append option on Go. Enhanced Barcode Support There are many barcode fonts out there and 4 more are now supported in Go 18. Using the script step Insert from Device you can now read PDF417 (IDs), ITF-14 (packages), Aztec (mobile), and Data Matrix (labels, letters, food) barcode types. OAuth Support for iOS SDK Using the FileMaker iOS SDK you can use MDM (Multi Device Management) to authenticate your application with the same OAuth providers supported in regular FileMaker applications: Amazon, Google, and Microsoft Azure. FileMaker Go 18 Technical Specs FileMaker Go 18 is supported on iPads and iPhones running iOS 12.1. FileMaker Server 18 FileMaker Server is known for its ease-of-use and ability to run without any problems. The newest version focuses on performance improvements, FileMaker Server Admin Console interface enhancements, security updates, FileMaker Data API enhancements, and the Official FileMaker Admin API. Database Engine Enhancements FileMaker has enhanced the performance of FileMaker Server’s database engine, speeding up finds when many users are connected to the server. Understand more and see some tests of the FileMaker 18 Database Engine Enhancements by Nathan Kiefer with a sample file you can use to do some benchmarking yourself. Expect more improvements to the database engine over time. Startup Restoration Unfortunately servers do go down unexpectedly due to hardware failure or power outages, but with the new Startup Restoration feature, FileMaker Server will automatically fix corrupt files after the server is restarted. The process validates database entries when a file is first opened and before client access and if the file appears to not have been closed properly then FileMaker Server uses the restoration log (restore*.log) to restore the file to its last consistent state. Nathan’s article on the FileMaker 18 Database Engine also discusses Startup Restoration. Server Monitoring FileMaker Server has been updated to work better with Zabbix, an open-source server monitoring software. You can monitor users, memory, cpu, disk space, network traffic, and processes, and you can trigger events on stats. FileMaker plans to release a white paper and Zabbix templates for FileMaker Server. Understand how to set up Zabbix FileMaker Server Monitoring in a video by Aaron Kaiser. FileMaker Data API Enhancements The future of FileMaker Custom Web Publishing is the FileMaker Data API and it is now in parity with the functionality provided by the FileMaker PHP API. The Data API now includes XML metadata such as Script Names, Layout Names, and Layout Schema. FileMaker continues to support the FileMaker PHP API for Custom Web Publishing (via Command Line Interface only) and has been clear to developers that web apps should be built using the Data API going forward. Learn more about the Official FileMaker Data API as Mason Stenquist goes in depth about how to use the Official FileMaker Data API in a video. Official FileMaker Server Admin API The FileMaker Server Admin API allows administrators to create their own interfaces to manage servers. The FileMaker Server Admin API, based on the OpenAPI specification (REST API), was previously in beta until September 27th 2019 in FileMaker Server 17, but with 18 is now officially released. Learn about the FileMaker Server Admin API by Mason showing you how the FileMaker Server Admin API works with FileMaker Cloud for AWS in a video. FileMaker Server Admin Console Enhancements The FileMaker Server 18 Admin Console now includes more details on schedules such as which ones are currently running, their last success, or their last failed information. You can also see the last time the FileMaker Server was restarted, more clear status of files hosted on server via iconography, and in the command line interface (CLI) you can change the default backup time. All welcomed additions; another one we would like to see in future FileMaker Servers is the ability to view and filter logs without downloading them first. FileMaker Server 18 Technical Specs FileMaker Server 18 is compatible with Windows Server 2019 Standard Edition, Windows Server 2016 Standard Edition, Windows Server 2012 R2 Standard with Update Microsoft KB2919355, macOS High Sierra 10.13, and macOS Sierra 10.12. If you’re on Windows Server 2008 it’s a good time to think about moving to FileMaker Cloud. Also worth noting the release of a Spanish FileMaker Server support. WebDirect desktop browser support includes Safari 12.x, IE 11.x, Microsoft Edge 44+, Chrome 72+, and mobile browser support includes Safari on iOS 12.x minimum and Chrome 72 on Android 7.x. Note that Firefox is not on the list of supported browsers. FileMaker Cloud for AWS FileMaker Cloud for AWS was initially released in September 2016 and is a great product for most customers especially if you need to replace your current server hardware or are expanding to a more mobile workforce! This new product is available ONLY through Amazon Web Services (AWS) and gives you FileMaker Server in minutes. FileMaker Cloud is fast, lowers long-term maintenance, and is secure. FileMaker Cloud 1.18 will support all of the features of FileMaker Server 18. Contact us if you would like help to setup and Manage FileMaker Cloud. Summary The FileMaker platform continues to be the leader in creating innovative, powerful custom applications for organizations all around the world and works seamlessly across Windows, Mac, iPad, iPhone, and the web. The release of the FileMaker 18 platform further solidifies FileMaker as the Workplace Innovation Platform leader. FileMaker Go gives the platform a competitive edge and this version continues to build off its strong foundation. Organizations can create innovative and rapid custom applications for iOS with great ROI. Creating prototype applications on the iPad and iPhone is a matter of hours not months. FileMaker 18 is a great release and has features everyone can benefit from. We look forward to building innovative custom applications using the new tools for mobile, web and desktop. Did you know we are an authorized reseller for FileMaker Licensing? Contact us to discuss upgrading your FileMaker software. Afficher la totalité du billet
  13. Bonjour, Pour définir les paramètres mentionnés, vous devez utiliser la fonction native de FileMaker JSONSetElement pour "encapsuler" vos données en json. Ensuite, car ce n'est pas tout ! Il faut regarder précisément ce que l'API demande, s'il y a un en-tête est nécessaire, s'il y a une authentification particulière etc... Voici ce que cela donnerait : JSONSetElement ( "" ; [ "date_debut" ; "2019-03-01" ; JSONString ] ; [ "date_fin" ; "2019-05-01" ; JSONString ] ) En général (et je dis bien en général ;-) ) les API sont fournies avec une documentation... Ici, vous trouverez la documentation de FileMaker concernant les fonctions Json : https://fmhelp.filemaker.com/help/17/fmp/fr/#page/FMP_Help%2Fjsonsetelement.html%23 Bien à vous,
  14. Intermedia69

    JSON

    Bon je ne suis pas très à l'aise voir pas du tout ... J'ai une adresse de connexion du type: Http://exemple/api/maliste On me dit les paramètres ( en post) : { "date_debut":"2019-03-01","date_fin":"2019-05-01" } Et de là je dois donc récupérer des résultats en JSON Comment dois-je faire dans FMPRO ? je doit je suppose utiliser la fonction "inserrer depuis une URL" je souhaite passer en POST ces paramètres { "date_debut":"2019-03-01","date_fin":"2019-05-01" } mais comment le formuler ou le rédiger dans mon script ?
  15. Merci beaucoup pour cette délicieuse idée et trouvaille. il n'est pas impossible que cela me soit utile un de ces jours.
  16. Bonjour, C'est possible 😉 Par script en effet : Le principe est celui d'une boucle au départ des contributeurs. Cette boucle bouclera sur chacun des contributeurs. Au sein de la boucle : - une déclaration de variable pour le chemin et le nom du fichier excel à exporter - une recherche au sein des contacts / ou l'activation de ces contacts via la relation contributeur - contact ; pour isoler les contacts du contributeurs - l'export des contacts trouvés en utilisant la variable du chemin & nom - on passe au contributeur suivant Cordialement, Tanguy
  17. FileMaker 18 introduces two new cryptographic functions which can be used to generate and verify digital signatures: Generate digital signature CryptGenerateSignature ( data ; algorithm ; privateRSAKey ; keyPassword ) Verify digital signature CryptVerifySignature ( data ; algorithm ; publicRSAKey ; signature ) Why Use Digital Signatures: An Example Digital signatures are a digital analog to good old-fashioned physical signatures which we’re all familiar with. Digital signatures serve a similar function as physical signatures, but they also provide additional benefits which physical signatures do not. Let’s look at an example. Back in 2011, I lived in a Chicago condominium building which had six units. In Chicago, the city handles waste removal (trash pickup) for buildings with four units or less, and larger properties are required to contract with a private waste management company. These contracts are frequently structured in a way that causes homeowners to overpay. Here’s one way how this is done: The contract is set up with a negotiated rate for three years. The customer agrees to the rate and signs the contract. Buried in the fine print is an explanation that the contract will automatically renew at a rate specified by the waste management company (which ends up being much higher than the original rate), and that canceling the automatic renewal must be done within a short time window that ends a month before the original three-year contract expires (probably to increase the chance that this is overlooked by the homeowner). Our condo association was stuck in one of these automatic renewals for a year, and as that extra contract year came to an end, we shopped around for a better deal. We eventually decided to go with one of the other waste management companies, and I signed a one-year contract with them. Our current waste removal company found out we were not going to renew, so they called and offered better terms and explained that if we extend our contract with them, it would supersede the new contract which I signed. As part of the back and forth with canceling the new contract, the new company sent me a copy of the contract that I signed, and I noticed a small difference between what they sent me and the copy that I had kept after signing it. They had removed the contract expiration date on their “official” copy of the contract. If we had stayed with them, and if I hadn’t kept a copy of the contract that I signed with them, they could have claimed that I signed a contract for much longer than one year. My copy of the contract with the end date specified in the “Terms of Agreement” section: Figure 1 – Original contract with end date. Their “Official” copy of the contract with the end date removed: Figure 2 – Contract with the end date removed The integrity of the contract had been compromised, and this is something that would not have been possible to do if I had signed the contract using a digital signature. If a digitally signed contract is tampered with, the signature is automatically invalidated. Before we look into how that works, let’s review all of the benefits provided with digital signatures. The Benefits of Using Digital Signatures Digital signatures can provide these three benefits: Benefit Definition Physical Signatures Digital Signatures Authentication If I sign something, others will know it was signed by me and not someone else, because my signature is uniquely mine and cannot be forged. Physical signatures afford this protection to a degree, but of course, forgeries are possible. Digital signatures are created using certificates issued by Certificate Authorities. With a digital signature, I cannot impersonate someone else, because the Certificate Authority will not issue a certificate to me unless I am able to demonstrate that I really am who I say I am. Non-repudiation If I sign something, I cannot later claim that the signature didn’t come from me. With a physical signature, I could try to claim that the signature was forged by someone else. With a digital signature, I cannot claim that I did not sign something while at the same time claiming that my private key is indeed private. Data integrity If I sign something, I want to feel assured that the contents of what I signed will not change later. As we saw with my contract example above, physical signatures do not provide this benefit. If a document is tampered with, the digital signature will not be verified. Cryptographic Hash Functions Before we explain how digital signatures work, let’s do a quick cryptography primer, starting with cryptographic hash functions. A hash function takes some data (for example, a document) as an input and outputs some other data of fixed size. The input is referred to as the message, and the output is referred to as the digest or hash. Cryptographic hash algorithms have these properties: A digest can be computed quickly. The original message cannot be derived from the digest. Even a small change in the message will result in a completely different digest. Digests always have the same length. Collisions (where two different messages create the same digest) are hard to create. For example, the digest of “hello world” (using the SHA-512 hash algorithm) is: b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9 And the digest of the 343-word lyrics of “Stairway To Heaven” is: 7b0f1b5dc9ce51751a4db89f3bd8f51456b65e3df260693e5e31883849193db2 Because collisions are unlikely, hash functions that obey the properties listed above can be used to generate a sort of unique identifier. If I use a cryptographically strong hash algorithm, it is essentially impossible for me to come up with a different message that generates the same digest as “hello world.” (We’ll revisit collisions a bit later.) Encryption An encryption algorithm takes some readable text (referred to as cleartext or plaintext) or binary data and converts it into unintelligible data. Decryption is the inverse: convert unreadable, encrypted data into intelligible content. There are two types of encryption: symmetric and asymmetric. Symmetric encryption uses the same secret key to both encrypt and decrypt. Asymmetric encryption uses a public-private key pair. One key is used to encrypt and the other to decrypt. Digital signatures take advantage of this property. The private key is used to generate the signature. This can only be done by someone in possession of the private key, so it’s critical that you keep your private key well secured. The public key is used to verify the signature. The public key can be published far and wide. A copy can be given to whomever asks for it without compromising the security of the signature. How Digital Signatures Work Generating the signature: A cryptographic hash algorithm is used to generate a digest of the message that you would like to have signed. That digest is then encrypted using an asymmetric encryption algorithm and a private key. The encrypted hash serves as the digital signature. An identifier for the hash algorithm that was used to create the digital signature is embedded in the digital signature itself so that when somebody verifies the signature, they know which hash algorithm to use. Verifying the signature: The original message, the digital signature, and a copy of the public key are obtained. The public key is used to decrypt the digital signature, revealing the plaintext digest and the identifier of the hash algorithm that was used to generate the signature. That hash algorithm is then used to generate a new message digest. The two plaintext digests are compared. If they are the same, the digital signature is considered to be verified. Security Principles Revisited Data integrity – If the message is altered in any way (even by just a single bit), the message digest will change too, and the signature will no longer be verifiable. This is what provides data integrity and what was missing in my experience with the waste management company. Non-repudiation – If I signed the message, I cannot later claim both (1) that I did not sign it and (2) that my private key is indeed private. Authentication – The identity of the owner of the private key is embedded in the certificate that contains the public key. To prevent others from impersonating him, the key owner can have the key signed by a Certificate Authority (CA). As part of this process, the CA will validate the authenticity of the key owner’s identity. Without the involvement of the Certificate Authority, you would have to take it on faith that the sender of the message is who he says he is. With the Certificate Authority signing the public key, you have to take it on faith that the Certificate Authority did its job properly in terms of validating the authenticity of the key owner. The job of deciding which Certificate Authorities to trust is generally delegated to the manufacturers of the major web browsers; i.e. Mozilla, Google, Microsoft, Apple, etc. Back in 2005, they established the CA/Browser Forum to ensure that certificate authorities follow best practices (a set of baseline requirements) when they issue certificates. Generating a Digital Signature Using FileMaker A digital signature can be generated using this function: CryptGenerateSignature ( data ; algorithm ; privateRSAKey ; keyPassword ) data – This parameter is the message that is to be signed. The value can come from a field or a variable and can be text or binary (e.g. container field). algorithm – This parameter specifies the cryptographic hash algorithm used to create the digest. Note that we get to choose the hash algorithm (used in step 1 of the signing process), but we don’t get to choose the encryption algorithm (used in step 2). The choice of the encryption algorithm is made for us. FileMaker has settled on using an RSA-based signature scheme, but there are others. privateRSAKey – This parameter is the private RSA key that will be used to encrypt the message digest. As a further security precaution, this private key can itself be encrypted with a password. This encryption is done using symmetric encryption (the same password is used to encrypt and decrypt the key) and creates an additional hurdle for a would-be hacker who may have obtained a copy of the private key but still doesn’t know what the encryption password is. keyPassword – If the private RSA key is encrypted, then the encryption password is provided in this parameter. Our choices for the cryptographic hash algorithm are the same as with the CryptAuthCode function: MD5 — do not use MDC2 — do not use SHA SHA1 — do not use SHA224 SHA256 SHA384 SHA512 Do not use MD5 or SHA-1, as they have been shown to have security vulnerabilities. MDC-2 may also be unsafe to use based on the information provided in this article. The CryptGenerateSignature function returns the digital signature as a binary file which can be stored in a container field. As a subsequent step, the digital signature file can also be stored as text using one of the text encoding functions; e.g. Base64Encode. If any of the parameters are invalid, the function will return “?”. Note that CryptGenerateSignature does not embed a timestamp inside the signature. This would have been nice to have so that the date and time of when the message was signed could be looked up as part of verifying the signature. One way of adding this to the signature yourself is to include the date and time inside the document that is being signed. Verifying a Digital Signature Using FileMaker A digital signature can be verified using this function: CryptVerifySignature ( data ; algorithm ; publicRSAKey ; signature ) data – This parameter is the message that was signed and whose signature needs to be verified. algorithm – This parameter specifies which cryptographic hash algorithm was used to create the signature. I am not sure why this parameter is needed since the algorithm is also specified inside the signature. publicRSAKey – This parameter is the public RSA key that corresponds to the private key that was used in step 2 of the signature generation. signature – This parameter is the binary digital signature file. This is the signature that we want to verify. The function returns 1 if the signature was verified or 0 if it was not. If any of the parameters are invalid, the function will return “?”. Authenticity? The CryptVerifySignature function will provide data integrity and non-repudiation, but not authenticity. The is because a public key on its own does not include any identifying information about the key owner. To do that, the public key would have to be included in a certificate signed by a Certificate Authority. These certificates are similar to the SSL certificates you may be familiar with. These signing certificates are known as “email and document signing certificates,” and the “common name” in those certificates specifies an email address instead of a domain name. If you are interested in getting one for yourself, you can purchase them at a discount at sites like this one: https://www.gogetssl.com/email-document-signing-certificates/. If you do end up getting a signing certificate, you can extract the public key from it using this OpenSSL command: openssl x509 -pubkey -noout -in <certificate_file> Note: OpenSSL is an open-source cryptography software library. It comes preinstalled on macOS and can be easily installed on Windows. Here’s a description of the command and the options used with the command: x509 — This command instructs OpenSSL to operate on a certificate file. -pubkey — This option specifies that the public key should be displayed. -noout — This option specifies that the encoded contents of the certificate itself should not be displayed. -in — This option specifies the name of the certificate file. (Replace <certificate_file> with your certificate’s file name.) You can see more details about this OpenSSL command here. Demo File If you would like to experiment with using the new FileMaker functions, take a look at the demo file. I have provided a sample public/private key pair so that you can get started right away. Get the demo file Collisions with MD5 I mentioned earlier that MD5, MDC-5, and SHA-1 should be avoided. These hash algorithms have known security vulnerabilities and should not be used to generate digital signatures. With MD5 in particular, it is possible to generate versions of the original and tampered documents that share the same MD5 digest in near instant time. In fact, to demonstrate this, my colleague Brian Engert did just that with the two images of the contract shown above. If you download those two image files and generate an MD5 hash for each one, you’ll notice that they are identical. Figure 3 – MD5 for Figures 1 and 2 You can read more about these vulnerabilities here: MD5: https://github.com/corkami/collisions SHA-1: https://shattered.io/ MDC-2: https://www.semanticscholar.org/paper/Cryptanalysis-of-MDC-2-Knudsen-Mendel/adab90fc06c2c14e91b9f7288929cdd2d5b16a52 How to Generate a Public/Private Key Pair If you want to generate a public/private RSA key pair to use for testing the CryptGenerateSignature and CryptVerifySignature functions, you can do so quickly and easily using the OpenSSL commands shown below. Just don’t forget that a public key by itself does not include any identifying information about the key owner, which means that, while you can achieve data integrity and non-repudiation by using the public key to verify a digital signature, you will not be able to confirm the authenticity of the signature. Here are the commands to use: Step 1. Generate an RSA private key: openssl genrsa -aes256 -out private.pem 4096 genrsa — This command instructs OpenSSL to generate an RSA key. -aes256 — This option specifies that the AES-256 cipher should be used to encrypt the private key. -out — This option specifies the name of the private key file that is to be generated. 4096 — This is the size of the private key. In this case, we are asking for a 4096-bit key. You will be prompted to specify an encryption password for the private key when you run this command. Step 2. Export RSA public key from private key: openssl rsa -in private.pem -outform PEM -pubout -out public.pem rsa — This command instructs OpenSSL to process an RSA key. -in — This option specifies the name of the private key file that is to be processed. -outform — This option specifies the format of the public key file that is to be exported. -pubout — This option instructs the RSA command to output the public key. -out — This option specifies the name of the public key file that is to be exported. You can see more details about these OpenSSL commands here: Generate RSA private key: https://www.openssl.org/docs/manmaster/man1/genrsa.html Export public key: https://www.openssl.org/docs/manmaster/man1/rsa.html Summary The CryptGenerateSignature and CryptVerifySignature functions make it possible to create and verify RSA digital signatures for files or text content. Consider using digital signatures if you have a use case where the transmission of data has to incorporate the data integrity and non-repudiation security principles. Verifying authenticity may be possible to do as well, although it would require some additional work to set up. Special thanks to Brian Engert for lending me his expertise in preparing this blog post. The post FileMaker 18: Digital Signatures Using CryptGenerateSignature and CryptVerifySignature appeared first on Soliant. Voir le billet d'origine
  18. Yesterday
  19. Effectivement, FileMaker permet d'indexé une rubrique avec un calcul qui contient "Obtenir(DateActuelle)" mais le problème est qu'une fois évalué et indexé, le calcule n'évolue plus et donc les jours passent mais le résultat reste le même. C'est pour cette raison que dans ce genre de calcul il faut que le développeur coche de ne pas indexer la rubrique. Ainsi le résultat sera réévalué à chaque besoin (affichage, recherche, tri....). Le soucis dans ton cas est que pour qu'un lien fonctionne la/les rubrique(s) de destination doivent être indexée - ce qui ne serait plus le cas. Donc il faut trouver une autre manière de travailler cfr mes pistes : calcul non mémorisé dans la table d'origine, ou filtre. bien à toi, Tanguy
  20. Bonjour Tanguy. Pourtant, FileMaker l'a bien indexé et les liens de mes occurences de table fonctionnent. Si j'ai bien compris FileMaker ne permet pas l'indexation lorsqu'un élément du calcul provient d'une autre table, ce qui n'est pas le cas de la rubrique "Jours_Écoulés|Calc" qui est égale à : Obtenir (date actuelle) - Date_Ouverture.
  21. On peut associer un déclencheur à l'ouverture du popover mais ce serait déjà un peu trop tard... Le mieux est de créer un bouton avec un script qui invite à se reconnecter et si OK ouvre un popover. Comme ceci : Pop.fmp12 (login admin / pwd vide )
  22. Bonjour, Je désire demander à un utilisateur son id et mot de passe afin qu'il puisse accéder au contenu d'un popover. comment procéder ? Merci
  23. Bonjour, Ce type de calcul ne peut être mémorisé (indexé) car la date du jour change chaque jour 😉 (dure réalité...) Si ces rubriques sont dans la table C et que le souhait est d'opérer un lien, ce lien sera inopérant dans le cas où il aboutit à des rubriques non mémorisées. Je conseille dès lors de placer dans la table au départ du lien des rubriques non mémorisées avec le calcul de la date du jour + x et de faire le lien vers la date du bon de commande. Sans doute possible aussi de fonctionner avec des filtres sur des tables externes mais attention aux calculs éventuels de sommes, moyennes,...qui ne sont pas impactés par les filtres. Cordialement, Tanguy
  24. Bonjour, Idem pour les individus constituants les équipes, il ne semble pas y avoir de table ¨MEMBRES ÉQUIPE¨. Cordialement.
  25. Bons_Commandes|60Jrs = Si ( Ouvert|Fl ; Si ( Jours_Écoulés|Calc > 60 ; 1 ; "" ) ; "" ) Ouvert|Fl indique si le bon de commande est ouvert ou fermé, car seuls les ouverts sont requis
  26. Last week
  27. Oui oui j'avais bien compris . Ton but est bien de trier les bon de commande en 3 partie selon date ? Alors mon systeme est ok, tu remplace 6 rubrique par une seul . Et tu peu, par ex, afficher dans 3 TE filtrée, chaque plage . Maintenent tu veux utiliser un booléen ...OK mais un Booléen c'est que 2 valeur 0 ou 1 , oui ou non , ... Alors comment tu fait pour avoir 3 valeur . Je suis curieux de voir ton calcule .
  1. Load more activity
×
×
  • Create New...