
Sign up to save your podcasts
Or


We had the pleasure of hearing Charles Delfs break down HAM (Headless Authorization Module) as he showed us how this system transforms the way you manage roles, permissions, and feature access in FileMaker. Inheritance, overrides, and data-driven rules can replace brittle security setups and open use cases like feature flags, SaaS plans, and time-based access.
By Portage Bay Solutions5
33 ratings
We had the pleasure of hearing Charles Delfs break down HAM (Headless Authorization Module) as he showed us how this system transforms the way you manage roles, permissions, and feature access in FileMaker. Inheritance, overrides, and data-driven rules can replace brittle security setups and open use cases like feature flags, SaaS plans, and time-based access.