You might also consider using
an Event with some type of “trigger” file.
We use this technique since we often find that we cannot adequately
control the security requirements to use the API and limit its usage when distributed to a server.
We have a standardize file
name structure and content. The Event looks
for the file and analyzes its contents and, if authorized, activates the
requested object or function. While it is
not as immediate as executing an API it serves our needs.
Retrieving data ...