RunWithFullAccess: Power and Risk
IntermediateUnderstand the security implications of RunWithFullAccess scripts and how to use the feature safely.
What you'll learn
- What RunWithFullAccess actually bypasses
- Input validation requirements for full-access scripts
- Controlling which users can trigger full-access scripts
- Auditing full-access script usage
RunWithFullAccess is one of FileMaker's most powerful features -- and one of its most dangerous if misused. A script running with full access privileges bypasses every record, layout, field, and privilege set restriction. An attacker who can trigger a poorly written full-access script can do things their privilege set would otherwise block entirely.
What RunWithFullAccess bypasses
A script marked RunWithFullAccess temporarily elevates to [Full Access] for its duration. It bypasses: record-level access restrictions, field-level access restrictions, layout access restrictions, script access restrictions (a user who cannot normally run a script can still trigger it via another script), and table access restrictions.
Sign in to track your progress and pick up where you left off.
Sign in to FM Dojo