Hardening WebDirect for Public Deployments
BeginnerSecurity measures specific to WebDirect deployments accessible over the public internet.
What you'll learn
- Restricting WebDirect access to authorized users
- Rate limiting and brute-force prevention for WebDirect logins
- Security headers for the WebDirect response
- Monitoring WebDirect for unusual access patterns
When WebDirect is accessible from the public internet, your FileMaker login page is visible to the entire internet. Hardening a public WebDirect deployment means restricting who can reach the login page, preventing brute-force attacks, and ensuring the solution itself does not expose more than intended to an authenticated web user.
Restricting access to known users or IPs
Use a reverse proxy (nginx, Cloudflare, AWS ALB) in front of WebDirect to: restrict access to specific IP ranges (if users are on a known network), require additional authentication (Cloudflare Access, Basic Auth on the proxy) before reaching the FileMaker login page, or geo-restrict to your country of operation.
# nginx: restrict WebDirect to known IP range:
location /fmwebdirect {
allow 10.0.0.0/8; # internal network
allow 203.0.113.0/24; # known office IPs
deny all;
proxy_pass https://localhost;
}Sign in to track your progress and pick up where you left off.
Sign in to FM Dojo