Integrated Pictometry Analytics Quick Start Guide. July 2012

Size: px
Start display at page:

Download "Integrated Pictometry Analytics Quick Start Guide. July 2012"

Transcription

1 Integrated Pictometry Analytics Quick Start Guide July 2012

2 Copyright 2012 Pictometry International Corp. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic or mechanical, including photocopying, recording, or otherwise, without the prior written permission of Pictometry International Corporation. Pictometry is a trademark of Pictometry International Corp. All other brands or products are the trademarks or registered trademarks of their respective holders. Pictometry International Corporation 100 Town Centre Drive Rochester, NY Printed in the United States of America Documentation Version 1.0 [update] July 2012 IPA Quick Start Guide ii

3 Contents About this guide... 1 Related documentation... 1 Overview... 1 Client requirements... 2 Tier 1 fully supported... 2 Tier 2 partially supported... 2 Web application development environment... 2 Recommended languages... 2 Untested languages... 2 Embedding the IPA... 4 Web page requirements... 4 Keys and URLs needed... 4 Generating the digital signature... 4 Validating the HMAC signature... 5 Loading the JavaScript Library... 6 Adding the iframe element... 6 Initializing IPA Communication... 7 Communicating with the IPA... 9 Initial Setup... 9 Simplified overview of the startup sequence for an IPA:... 9 Making an API call... 9 Retrieving data from the IPA... 9 IPA Events Listening for events Troubleshooting IPA Quick Start Guide iii

4 About this guide About this guide This Quick Start Guide describes what you need to do to start using the Integrated Pictometry Analytics (IPA) API so your users can use Pictometry imagery and tools within your own web applications as quickly as possible. It covers application development requirements, [finish]. This guide is intended for Software Developers who are already familiar with server-side and client-side web development and specifically JavaScript, HTML, and server-side implementation languages. It assumes that you are familiar with at least one of these programming languages: PHP, Java, C#, VB.NET, Python, Perl, or Ruby. If you find errors in this guide, or if you have comments about it, we d like to know. Please us at documentation@pictometry.com. Related documentation Along with this guide, you should have received the Integrated Pictometry Analytics API Guide, which describes the API calls and events, the key pair file, as well as an examples directory. Overview The IPA is a web component that can be integrated with your web application by using JavaScript and iframes. The IPA is loaded as part of your web page and makes calls to Pictometry via the IPA JavaScript Library. The steps for integrating the IPA on your web page are covered in this document. Once you ve set up your web application to load the IPA on client computers, the IPA will communicate with the Pictometry API directly so your users can use Pictometry imagery and tools in your web application. IPA Quick Start Guide 1

5 Overview Client requirements Tier 1 fully supported The following browsers are recommended for use with IPA. Internet Explorer 8 or higher Firefox 3.6 or higher Chrome 16 or higher Safari 5 or higher Tier 2 partially supported The following browsers are supported using a compatibility feature of the IPA JavaScript library to emulate cross-domain messaging. While every effort has been made to ensure it is fully compatible, there may be certain circumstances under which it does not work properly. To ensure full compatibility use one of the browsers listed under Tier 1 above. Internet Explorer 7 Firefox Chrome 15 or earlier Safari 4 Internet Explorer 6 is not supported for use with IPA. Web application development environment To use the IPA, your web applications must meet these requirements: They must support the use of iframes. (See Adding the iframe element on page 6.) They must be developed with a recommended language one that supports the generation of a signed hash using the HMAC (hash-based message authentication code) algorithm. For more information about the HMAC algorithm, see the IETF RFC (Request for Comments) 2104 document. Recommended languages The following languages have been tested and are known to generate an HMAC signed hash correctly: PHP or higher (hash_hmac) Java or higher (HMAC-MD5 Example).NET Framework 2.0 or higher (HMAC) Untested languages These languages are untested, but should work: Python 2.2 or higher (hmac) IPA Quick Start Guide 2

6 Overview Perl (using Digest::HMAC from CPAN) Ruby (using ruby-hmac gem from rubyforge) Languages other than those listed above might also work, but we cannot confirm if they support HMAC. You will have to verify HMAC support before using a different language. IPA Quick Start Guide 3

7 Embedding the IPA Embedding the IPA This section describes what you need to do to embed the IPA in your client environments. It involves 4 basic elements: 1. Code to generate the digital signature for the IPA Load URL 2. Adding the IPA JavaScript Library 3. Adding the IPA iframe 4. JavaScript code to initialize and interact with the IPA Web page requirements Make sure that each web application page where you want to use the IPA meets these requirements: includes a script element that links to the Pictometry JavaScript library generates a new HMAC signature for each page load contains an iframe element which will be used as the location for the IPA Keys and URLs needed To generate the web page code, you need the following items (already provided by Pictometry): API Key Secret Key IPA Load URL IPA JavaScript Library URL Generating the digital signature Every page on which you want to embed the IPA will need to generate a new signed IPA Load URL using the following information. url: The IPA Load URL apikey: The API Key secretkey: The Secret Key timestamp: The current time in GMT as a unix timestamp This URL is then used to create the digital signature using the HMAC algorithm. This signature is appended to the end of the URL to create the signed URL that is used as the src attribute for the iframe. PHP Example: IPA Quick Start Guide 4

8 Embedding the IPA $apikey = '12345'; $secretkey = ' '; $loadurl = ' $url = $loadurl. '?apikey='. $apikey. '&ts='. time(); $signature = hash_hmac('md5', $url, $secretkey); // final signed url $signedurl = $url. '&ds='. $signature; C# Example: using System; using System.Security.Cryptography; string apikey = "12345"; string secretkey = " "; string loadurl = " // create timestamp TimeSpan span = (DateTime.UtcNow - new DateTime(1970,1,1,0,0,0,DateTimeKind.Utc)); long ts = (long) Math.Floor(span.TotalSeconds); // create the url string url = loadurl + "?apikey=" + apikey + "&ts=" + ts; // generate the hash System.Text.ASCIIEncoding encoding = new System.Text.ASCIIEncoding(); HMACMD5 hmac = new HMACMD5(encoding.GetBytes(secretKey)); byte[] hash = hmac.computehash(encoding.getbytes(url)); // convert hash to digital signature string string signature = BitConverter.ToString(hash).Replace("-", "").ToLower(); // create the signed url string signedurl = url + "&ds=" + signature; Validating the HMAC signature After you ve generated your HMAC hash signature, you ll need to test it to be sure it works. Use these values to test the signature: key: 'mysecretkey' message: 'mymessage' These values will create this hash signature: 58af6f92bf1e5f42deff3e986b10f093 If you don t get this result, then the algorithm isn t working. Re-check your code, fix any errors, and test the hash signature again, until you are sure it is working. Once the hash is working, no further validation is needed. For PHP and C#, use the following code to test your HMAC hash. PHP Example: IPA Quick Start Guide 5

9 Embedding the IPA // generate the hash $signature = hash_hmac('md5', 'mymessage', 'mysecretkey'); C# Example: // generate the hash System.Text.ASCIIEncoding encoding = new System.Text.ASCIIEncoding(); HMACMD5 hmac = new HMACMD5(encoding.GetBytes("mysecretkey")); byte[] hash = hmac.computehash(encoding.getbytes("mymessage")); // convert hash to digital signature string string signature = BitConverter.ToString(hash).Replace("-", "").ToLower(); Loading the JavaScript Library To load the Pictometry JavaScript library, you ll need to add a script element for the JavaScript Library URL to each web page for which you want the IPA to be available. The following example shows the script element you need to add. Example: <head> <title>my Application</title> <!-- include the client side script from pictometry --> <script type="text/javascript" src=" </head> Adding the iframe element You ll use an iframe element to load the IPA in your web page. You ll need to add an iframe element, styled as needed, to each page where you would like the IPA to be embedded. The iframe element needs to have the following attributes: src: The signed IPA Load URL as described above. The app_id parameter also needs to be appended so the IPA knows the iframe that it is communicating with. id: The unique id of the iframe. This is required as it is used by the IPA for communication. The signed IPA Load URL also needs to have the iframe id appended to it. This ensures that the IPA is communicating with the correct iframe. &app_id=[iframe id] PHP Example: <iframe id="pictometry_ipa" src="<?php echo $signedurl;?>&app_id=pictometry_ipa"></iframe> IPA Quick Start Guide 6

10 Embedding the IPA ASP.NET Example: <iframe id="pictometry_ipa" src="<% Response.Write(signedUrl) %>&app_id=pictometry_ipa"></iframe> Initializing IPA Communication Before the IPA is loaded in the iframe, a new instance of PictometryHost() needs to be created to setup the communication channel to the IPA. This class requires two parameters to initialize: iframeid: The HTML element id of the iframe the IPA will be loaded into. loadurl: The IPA Load URL (Pictometry supplied). The second part of the process is setting up the ready() function. This function is called when the IPA has finished initializing and is ready for use. This function can do whatever you need it to, but typically this is the place to set a starting location, add event listeners, or other actions that depend on the IPA being available. Important: The initialization code below needs to be executed BEFORE the iframe loads. The easiest solution is to just include the script in the head tag so it executes immediately on page load (Example 1). Alternatively, the iframe src can be set dynamically after the PictometryHost instance has been created (PHP Example 2 and ASP.NET Example 2). Example 1: (placed in head tag) <script type="text/javascript"> var ipa = new PictometryHost('pictometry_ipa', ' ipa.ready = function() { ipa.addlistener( 'someevent', function( param1, param2 ) { // do something here } ); ipa.setcenter( , ); }; </script> PHP Example 2: (dynamically loaded iframe src must be called AFTER the iframe element is created) <script type="text/javascript"> var ipa = new PictometryHost('pictometry_ipa', ' ipa.ready = function() { ipa.addlistener( 'someevent', function( param1, param2 ) { // do something here } ); ipa.setcenter( , ); }; // set the iframe src to load the IPA var iframe = document.getelementbyid('pictometry_ipa'); iframe.setattribute('src', '<?php echo $signedurl;?>'); </script> IPA Quick Start Guide 7

11 Embedding the IPA ASP.NET Example 2: (dynamically loaded iframe src must be called AFTER the iframe element is created) <script type="text/javascript"> var ipa = new PictometryHost('pictometry_ipa', ' ipa.ready = function() { ipa.addlistener( 'someevent', function( param1, param2 ) { // do something here } ); ipa.setcenter( , ); }; // set the iframe src to load the IPA var iframe = document.getelementbyid('pictometry_ipa'); iframe.setattribute('src', '<% Response.Write(signedUrl) %>'); </script> Note: Working code examples for both PHP and C#/ASP.NET are available in the examples directory of the archive this document was provided with. IPA Quick Start Guide 8

12 Communicating with the IPA Communicating with the IPA Refer to the Integrated Pictometry Analytics API Guide for specific calls and events available to you. Initial Setup Before any API calls can be made, a communication channel needs to be setup between the IPA and the host application. The first part of this setup happens during the PictometryHost object instantiation before the IPA app is loaded into the iframe. Once the IPA has completed initializing, a call is made to the function that you assigned to the PictometryHost.ready property. This function is where any initial API calls should be made (for location, etc). Simplified overview of the startup sequence for an IPA: Making an API call All API calls are made using methods of the PictometryHost class instance. This class is available as soon as the IPA JavaScript has been loaded, but will not be completely ready for use until AFTER the ready() event occurs. Example: Here s an example of an API call that sets the starting location of the map by using a method called setcenter(). ipa.setcenter( , ); Retrieving data from the IPA On some occasions it will be necessary to retrieve information from the IPA (current location, measurement result, etc.). To accomplish this task, certain API methods require that a callback function be provided.. Example: Get the center of the currently displayed image. ipa.getcenter( function(latitude, longitude) { alert(latitude + " : " + longitude); } ); IPA Quick Start Guide 9

13 Communicating with the IPA Note that each callback will be sent different parameters. The specific parameters for each callback are described in the Integrated Pictometry Analytics API Guide. IPA Events Listening for events Once the IPA has finished loading, the ready() function is automatically called and the IPA is ready to use. To listen for events from the IPA, your web application must pass the event name and a callback function to the addlistener()method. This should be done in the ready()function. Example: ipa.ready = function() { ipa.addlistener( 'someevent', function( param1, param2 ) { // do something here } ); }; The Integrated Pictometry Analytics API Guide describes all events available to you. IPA Quick Start Guide 10

14 Troubleshooting Troubleshooting You see a 'Login Failed' message when loading the IPA Please check the following in order: 1. Ensure you are using the correct API Key and Secret Key. The keys should exactly match what was given to you by Pictometry. Also make sure that you have not swapped the keys (using API Key for Secret Key and vice versa). 2. Verify that the signature is being generated properly. See the section titled Validating your HMAC hash above. 3. The IPA Load URL does not match what is saved for the IPA User (i.e. vs. PictometryHost calls do not seem to do anything or PictometryHost events are never triggered Please check the following in order: 1. Verify that the host application is served from the URL you provided to Pictometry prior to receiving your API Key/Secret Key set. The URL that Pictometry has on file should be listed in the document that contains your API Key and Secret Key. The keys are tied to a specific domain and will not work for any other domain. If you are using a port other than 80 for http or 443 for https, please make sure that the URL given to Pictometry reflects this. 2. The iframe id has not been set. 3. The iframe id has not been passed to PictometryHost on instantiation or does not match. 4. The iframe id has not been passed to in the signed IPA Load URL in the app_id parameter in the iframe or it does not match. 5. Verify that you are using a supported browser. IPA Quick Start Guide 11

Login with Amazon. Getting Started Guide for Websites. Version 1.0

Login with Amazon. Getting Started Guide for Websites. Version 1.0 Login with Amazon Getting Started Guide for Websites Version 1.0 Login with Amazon: Getting Started Guide for Websites Copyright 2016 Amazon Services, LLC or its affiliates. All rights reserved. Amazon

More information

Tableau Server Trusted Authentication

Tableau Server Trusted Authentication Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted

More information

Integrating Luceo with your Website Using iframes. Version 4.1 Jan 15, 2013

Integrating Luceo with your Website Using iframes. Version 4.1 Jan 15, 2013 Integrating Luceo with your Website Using iframes Version 4.1 Jan 15, 2013 Table of Contents Table of Contents... 2 Preface... 3 Confidential Information... 3 Intellectual Property... 3 Quick Start Guide...

More information

Project 2: Web Security Pitfalls

Project 2: Web Security Pitfalls EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course

More information

Spectrum Technology Platform

Spectrum Technology Platform Spectrum Technology Platform Version 8.0.0 SP2 RIA Getting Started Guide Information in this document is subject to change without notice and does not represent a commitment on the part of the vendor or

More information

MASTERTAG DEVELOPER GUIDE

MASTERTAG DEVELOPER GUIDE MASTERTAG DEVELOPER GUIDE TABLE OF CONTENTS 1 Introduction... 4 1.1 What is the zanox MasterTag?... 4 1.2 What is the zanox page type?... 4 2 Create a MasterTag application in the zanox Application Store...

More information

IMRG Peermap API Documentation V 5.0

IMRG Peermap API Documentation V 5.0 IMRG Peermap API Documentation V 5.0 An Introduction to the IMRG Peermap Service... 2 Using a Tag Manager... 2 Inserting your Unique API Key within the Script... 2 The JavaScript Snippet... 3 Adding the

More information

ACCESSING THE PROGRESS OPENEDGE APPSERVER FROM PROGRESS ROLLBASE USING JSDO CODE

ACCESSING THE PROGRESS OPENEDGE APPSERVER FROM PROGRESS ROLLBASE USING JSDO CODE ACCESSING THE PROGRESS OPENEDGE APPSERVER FROM PROGRESS ROLLBASE USING JSDO CODE BY EDSEL GARCIA, PRINCIPAL SOFTWARE ENGINEER, PROGRESS OPENEDGE DEVELOPMENT 2 TABLE OF CONTENTS Introduction 3 Components

More information

PLAYER DEVELOPER GUIDE

PLAYER DEVELOPER GUIDE PLAYER DEVELOPER GUIDE CONTENTS CREATING AND BRANDING A PLAYER IN BACKLOT 5 Player Platform and Browser Support 5 How Player Works 6 Setting up Players Using the Backlot API 6 Creating a Player Using the

More information

A Tale of the Weaknesses of Current Client-Side XSS Filtering

A Tale of the Weaknesses of Current Client-Side XSS Filtering Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni

More information

Tableau Server Trusted Authentication

Tableau Server Trusted Authentication Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted

More information

Qualtrics Single Sign-On Specification

Qualtrics Single Sign-On Specification Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by

More information

Pay with Amazon Integration Guide

Pay with Amazon Integration Guide 2 2 Contents... 4 Introduction to Pay with Amazon... 5 Before you start - Important Information... 5 Important Advanced Payment APIs prerequisites... 5 How does Pay with Amazon work?...6 Key concepts in

More information

Usage Tracking for IBM InfoSphere Business Glossary

Usage Tracking for IBM InfoSphere Business Glossary Usage Tracking for IBM InfoSphere Business Glossary InfoSphere Business Glossary Version 8.7 and later includes a feature that allows you to track usage of InfoSphere Business Glossary through web analytics

More information

Implementing 2-Legged OAuth in Javascript (and CloudTest)

Implementing 2-Legged OAuth in Javascript (and CloudTest) Implementing 2-Legged OAuth in Javascript (and CloudTest) Introduction If you re reading this you are probably looking for information on how to implement 2-Legged OAuth in Javascript. I recently had to

More information

Portals and Hosted Files

Portals and Hosted Files 12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines

More information

JavaScript By: A. Mousavi & P. Broomhead SERG, School of Engineering Design, Brunel University, UK

JavaScript By: A. Mousavi & P. Broomhead SERG, School of Engineering Design, Brunel University, UK Programming for Digital Media EE1707 JavaScript By: A. Mousavi & P. Broomhead SERG, School of Engineering Design, Brunel University, UK 1 References and Sources 1. DOM Scripting, Web Design with JavaScript

More information

Webair CDN Secure URLs

Webair CDN Secure URLs Webair CDN Secure URLs Webair provides a URL signature mechanism for securing access to your files. Access can be restricted on the basis of an expiration date (to implement short-lived URLs) and/or on

More information

Direct Post Method (DPM) Developer Guide

Direct Post Method (DPM) Developer Guide (DPM) Developer Guide Card Not Present Transactions Authorize.Net Developer Support http://developer.authorize.net Authorize.Net LLC 2/22/11 Ver. Ver 1.1 (DPM) Developer Guide Authorize.Net LLC ( Authorize.Net

More information

Tracking E-mail Campaigns with G-Lock Analytics

Tracking E-mail Campaigns with G-Lock Analytics User Guide Tracking E-mail Campaigns with G-Lock Analytics Copyright 2009 G-Lock Software. All Rights Reserved. Table of Contents Introduction... 3 Creating User Account on G-Lock Analytics. 4 Downloading

More information

Copyright: WhosOnLocation Limited

Copyright: WhosOnLocation Limited How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and

More information

INTRODUCTION WHY WEB APPLICATIONS?

INTRODUCTION WHY WEB APPLICATIONS? What to Expect When You Break into Web Development Bringing your career into the 21 st Century Chuck Kincaid, Venturi Technology Partners, Kalamazoo, MI ABSTRACT Are you a SAS programmer who has wanted

More information

Performance Testing for Ajax Applications

Performance Testing for Ajax Applications Radview Software How to Performance Testing for Ajax Applications Rich internet applications are growing rapidly and AJAX technologies serve as the building blocks for such applications. These new technologies

More information

Phishing by data URI

Phishing by data URI Phishing by data URI Henning Klevjer henning@klevjers.com October 22, 2012 1 Abstract Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker.

More information

Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice

Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair

More information

Slide.Show Quick Start Guide

Slide.Show Quick Start Guide Slide.Show Quick Start Guide Vertigo Software December 2007 Contents Introduction... 1 Your first slideshow with Slide.Show... 1 Step 1: Embed the control... 2 Step 2: Configure the control... 3 Step 3:

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

Yandex.Widgets Quick start

Yandex.Widgets Quick start 17.09.2013 .. Version 2 Document build date: 17.09.2013. This volume is a part of Yandex technical documentation. Yandex helpdesk site: http://help.yandex.ru 2008 2013 Yandex LLC. All rights reserved.

More information

Mobile Web Applications. Gary Dubuque IT Research Architect Department of Revenue

Mobile Web Applications. Gary Dubuque IT Research Architect Department of Revenue Mobile Web Applications Gary Dubuque IT Research Architect Department of Revenue Summary Times are approximate 10:15am 10:25am 10:35am 10:45am Evolution of Web Applications How they got replaced by native

More information

Enroll a Windows Phone 8 Device

Enroll a Windows Phone 8 Device Enroll a Windows Phone 8 Device Download Process Enrolling your Windows 8 device is a quick and easy process that takes around 2 minutes to complete. Your IT administrator will send you a MaaS360 enrollment

More information

A Tale of the Weaknesses of Current Client-side XSS Filtering

A Tale of the Weaknesses of Current Client-side XSS Filtering A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers! These slides are preliminary!

More information

Virtual Contact Center

Virtual Contact Center Virtual Contact Center Zendesk CTI Integration Configuration Guide Version 8.0 Revision 1.0 Copyright 2013, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the

More information

SENTRY Payment Gateway

SENTRY Payment Gateway Merchant Developer Guide Date: 3 September 2013 Version: 3.3 Status: Release Document Information Copyright TSYS 2013. All rights reserved. Copyright in the whole and every part of this document belongs

More information

User manual Remote access VNC V 0.2

User manual Remote access VNC V 0.2 & User manual Remote access VNC V 0.2 Latest Update: August 2012 All software-related descriptions refer to the V1279 software. An update is recommended for older versions of the system. Small deviations

More information

Configuring user provisioning for Amazon Web Services (Amazon Specific)

Configuring user provisioning for Amazon Web Services (Amazon Specific) Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re

More information

Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration

Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with

More information

Synology SSO Server. Development Guide

Synology SSO Server. Development Guide Synology SSO Server Development Guide THIS DOCUMENT CONTAINS PROPRIETARY TECHNICAL INFORMATION WHICH IS THE PROPERTY OF SYNOLOGY INCORPORATED AND SHALL NOT BE REPRODUCED, COPIED, OR USED AS THE BASIS FOR

More information

Integration Guide. Integrating Extole with Adobe Target. Overview. Before You Begin. Advantages of A/B Testing

Integration Guide. Integrating Extole with Adobe Target. Overview. Before You Begin. Advantages of A/B Testing Integrating Extole with Adobe Target Overview Extole partners with Adobe Target so that marketers can easily deploy Extole tags and test your referral program to improve its performance. A/B testing will

More information

Visualizing a Neo4j Graph Database with KeyLines

Visualizing a Neo4j Graph Database with KeyLines Visualizing a Neo4j Graph Database with KeyLines Introduction 2! What is a graph database? 2! What is Neo4j? 2! Why visualize Neo4j? 3! Visualization Architecture 4! Benefits of the KeyLines/Neo4j architecture

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

Next Generation Clickjacking

Next Generation Clickjacking Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone paul.stone@contextis.co.uk Coming Up Quick Introduction to Clickjacking Four New Cross-Browser

More information

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache. JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming

More information

Instructions for Embedding a Kudos Display within Your Website

Instructions for Embedding a Kudos Display within Your Website Instructions for Embedding a Kudos Display within Your Website You may use either of two technologies for this embedment. A. You may directly insert the underlying PHP code; or B. You may insert some JavaScript

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Webmail Using the Hush Encryption Engine

Webmail Using the Hush Encryption Engine Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5

More information

StreamServe Persuasion SP4 Service Broker

StreamServe Persuasion SP4 Service Broker StreamServe Persuasion SP4 Service Broker User Guide Rev A StreamServe Persuasion SP4 Service Broker User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520 No

More information

SizmekFeatures. HTML5JSSyncFeature

SizmekFeatures. HTML5JSSyncFeature Features HTML5JSSyncFeature Table of Contents Overview... 2 Supported Platforms... 2 Demos/Downloads... 3 Note... 3 For Tags Served in iframes... 3 Features... 3 Use Case... 3 Included Files... 4 Implementing

More information

IBM Unica emessage Version 8 Release 6 February 13, 2015. User's Guide

IBM Unica emessage Version 8 Release 6 February 13, 2015. User's Guide IBM Unica emessage Version 8 Release 6 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 403. This edition applies to

More information

Version 1.0. ASAM CS Single Sign-On

Version 1.0. ASAM CS Single Sign-On Version 1.0 ASAM CS Single Sign-On 1 Table of Contents 1. Purpose... 3 2. Single Sign-On Overview... 3 3. Creating Token... 4 2 1. Purpose This document aims at providing a guide for integrating a system

More information

OPENTABLE GROUP SEARCH MODULE GETTING STARTED ADD RESERVATIONS TO YOUR WEBSITE

OPENTABLE GROUP SEARCH MODULE GETTING STARTED ADD RESERVATIONS TO YOUR WEBSITE ADD RESERVATIONS TO YOUR WEBSITE OPENTABLE GROUP SEARCH MODULE The group search module allows users to select a specific restaurant location from a list and search tables at that location. The code below

More information

ANZ transactive 05.2012

ANZ transactive 05.2012 ANZ transactive TECHNICAL SPECIFICATIONS GUIDE 05.2012 contents 1. Summary 3 2. Systems overview 4 3. Client technical specification 5 3.1 Usage Considerations 5 3.2 Summary Specification 5 > > 3.2.1 Summary

More information

Virtual Contact Center

Virtual Contact Center Virtual Contact Center NetSuite Integration Configuration Guide Version 8.0 Revision 1.0 Copyright 2014, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the contents

More information

4 Understanding. Web Applications IN THIS CHAPTER. 4.1 Understand Web page development. 4.2 Understand Microsoft ASP.NET Web application development

4 Understanding. Web Applications IN THIS CHAPTER. 4.1 Understand Web page development. 4.2 Understand Microsoft ASP.NET Web application development 4 Understanding Web Applications IN THIS CHAPTER 4.1 Understand Web page development 4.2 Understand Microsoft ASP.NET Web application development 4.3 Understand Web hosting 4.4 Understand Web services

More information

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce. Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

Implementing Sub-domain & Cross-domain Tracking A Complete Guide

Implementing Sub-domain & Cross-domain Tracking A Complete Guide Implementing Sub-domain & Cross-domain Tracking A Complete Guide Prepared By techbythebay.com 1 Contents 1. Sub Domain & Cross Domain Tracking for GA (asynchronous) I. Standard HTML/JavaScript Implementation

More information

Relax Everybody: HTML5 Is Securer Than You Think

Relax Everybody: HTML5 Is Securer Than You Think Relax Everybody: HTML5 Is Securer Than You Think Martin Johns (@datenkeller) SAP AG Session ID: ADS-W08 Session Classification: Advanced Motivation For some reason, there is a preconception that HTML5

More information

PHP Integration Kit. Version 2.5.1. User Guide

PHP Integration Kit. Version 2.5.1. User Guide PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001

More information

Web Application Guidelines

Web Application Guidelines Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security

More information

Network Security OAuth

Network Security OAuth Network Security OAuth Parma, May 28th, 2013 Online Services and Private Data The evolution of online services, such as social networks, has had a huge impact on the amount of data and personal information

More information

Configuring Salesforce

Configuring Salesforce Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

Overview. How It Works

Overview. How It Works Overview Email is a great way to communicate with your alumni and donors. It s agile, it can be interactive, and it has lower overhead than print mail. Our constituents are also becoming more and more

More information

Setting up single signon with Zendesk Remote Authentication

Setting up single signon with Zendesk Remote Authentication Setting up single signon with Zendesk Remote Authentication Zendesk Inc. 2 Zendesk Developer Library Introduction Notice Copyright and trademark notice Copyright 2009 2013 Zendesk, Inc. All rights reserved.

More information

Chapter 2: Interactive Web Applications

Chapter 2: Interactive Web Applications Chapter 2: Interactive Web Applications 2.1 Interactivity and Multimedia in the WWW architecture 2.2 Interactive Client-Side Scripting for Multimedia (Example HTML5/JavaScript) 2.3 Interactive Server-Side

More information

Instant Chime for IBM Sametime Installation Guide for Apache Tomcat and Microsoft SQL

Instant Chime for IBM Sametime Installation Guide for Apache Tomcat and Microsoft SQL Instant Chime for IBM Sametime Installation Guide for Apache Tomcat and Microsoft SQL Spring 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license

More information

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0 Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0 SAP WebAS 6.40 Version 1.0 1.0 1 Copyright Copyright 2004 SAP AG. All rights reserved. No part of this documentation may

More information

CRM Form to Web. Internet Lead Capture. Product Registration Instructions VERSION 1.0 DATE PREPARED: 1/1/2013

CRM Form to Web. Internet Lead Capture. Product Registration Instructions VERSION 1.0 DATE PREPARED: 1/1/2013 CRM Form to Web Internet Lead Capture Product Registration Instructions VERSION 1.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2013 Brite Global, Incorporated. All rights reserved. The information

More information

TIBCO Spotfire Automation Services Installation and Configuration

TIBCO Spotfire Automation Services Installation and Configuration TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0 February 2015 Updated March 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

OAuth. Network Security. Online Services and Private Data. A real-life example. Material and Credits. OAuth. OAuth

OAuth. Network Security. Online Services and Private Data. A real-life example. Material and Credits. OAuth. OAuth Network Security Dr. Ing. Simone Cirani Parma, May 28th, 2013 Online Services and Private Data The evolution of online services, such as social networks, has had a huge impact on the amount of data and

More information

Customising Your Mobile Payment Pages

Customising Your Mobile Payment Pages Corporate Gateway Customising Your Mobile Payment Pages V2.0 May 2014 Use this guide to: Understand how to customise your payment pages for mobile and tablet devices XML Direct Integration Guide > Contents

More information

JAVASCRIPT AND COOKIES

JAVASCRIPT AND COOKIES JAVASCRIPT AND COOKIES http://www.tutorialspoint.com/javascript/javascript_cookies.htm Copyright tutorialspoint.com What are Cookies? Web Browsers and Servers use HTTP protocol to communicate and HTTP

More information

Sitecore Dashboard User Guide

Sitecore Dashboard User Guide Sitecore Dashboard User Guide Contents Overview... 2 Installation... 2 Getting Started... 3 Sample Widgets... 3 Logged In... 3 Job Viewer... 3 Workflow State... 3 Publish Queue Viewer... 4 Quick Links...

More information

Virtual Contact Center

Virtual Contact Center Virtual Contact Center MS Dynamics CRM Integration Configuration Guide Version 7.0 Revision 1.0 Copyright 2012, 8x8, Inc. All rights reserved. This document is provided for information purposes only and

More information

MASTERPASS MERCHANT ONBOARDING & INTEGRATION GUIDE

MASTERPASS MERCHANT ONBOARDING & INTEGRATION GUIDE MASTERPASS MERCHANT ONBOARDING & INTEGRATION GUIDE VERSION 6.1, AS OF DECEMBER 5, 2014 Notices Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard

More information

AS DNB banka. DNB Link specification (B2B functional description)

AS DNB banka. DNB Link specification (B2B functional description) AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...

More information

Web Pages. Static Web Pages SHTML

Web Pages. Static Web Pages SHTML 1 Web Pages Htm and Html pages are static Static Web Pages 2 Pages tagged with "shtml" reveal that "Server Side Includes" are being used on the server With SSI a page can contain tags that indicate that

More information

Login with Amazon. Developer Guide for Websites

Login with Amazon. Developer Guide for Websites Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.

More information

Setting up an Apache Server in Conjunction with the SAP Sybase OData Server

Setting up an Apache Server in Conjunction with the SAP Sybase OData Server Setting up an Apache Server in Conjunction with the SAP Sybase OData Server PRINCIPAL AUTHOR Adam Hurst Philippe Bertrand adam.hurst@sap.com philippe.bertrand@sap.com REVISION HISTORY Version 1.0 - June

More information

Virtual Contact Center

Virtual Contact Center Virtual Contact Center MS Dynamics CRM Online Integration Configuration Guide Version 7.1 Revision 1.0 Copyright 2013, 8x8, Inc. All rights reserved. This document is provided for information purposes

More information

E*TRADE Developer Platform. Developer Guide and API Reference. October 24, 2012 API Version: v0

E*TRADE Developer Platform. Developer Guide and API Reference. October 24, 2012 API Version: v0 E*TRADE Developer Platform Developer Guide and API Reference October 24, 2012 API Version: v0 Contents Getting Started... 5 Introduction... 6 Architecture... 6 Authorization... 6 Agreements... 7 Support

More information

UFTP AUTHENTICATION SERVICE

UFTP AUTHENTICATION SERVICE UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: 1.1.0 Component Version: 1.1.1 Date: 17 11 2014 UFTP Authentication Service Contents 1 Installation 1 1.1 Prerequisites....................................

More information

Technical University of Sofia Faculty of Computer Systems and Control. Web Programming. Lecture 4 JavaScript

Technical University of Sofia Faculty of Computer Systems and Control. Web Programming. Lecture 4 JavaScript Technical University of Sofia Faculty of Computer Systems and Control Web Programming Lecture 4 JavaScript JavaScript basics JavaScript is scripting language for Web. JavaScript is used in billions of

More information

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements... Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4

More information

BizFlow 9.0 BizCoves BluePrint

BizFlow 9.0 BizCoves BluePrint BizFlow 9.0 BizCoves BluePrint HandySoft Global Corporation 1952 Gallows Road Suite 100 Vienna, VA USA 703.442.5600 www.handysoft.com 1999-2004 HANDYSOFT GLOBAL CORPORATION. ALL RIGHTS RESERVED. THIS DOCUMENTATION

More information

The Feed URL is linked on your Module List under the Actions heading.

The Feed URL is linked on your Module List under the Actions heading. P a g e 1 Data Feed API For the iobridge IO-204 Monitor and Control Module Introduction Each module that you have linked and registered to your account has a unique Feed URL. When requested, the URL returns

More information

IBM Digital Analytics Implementation Guide

IBM Digital Analytics Implementation Guide IBM Digital Analytics Implementation Guide Note Before using this information and the product it supports, read the information in Notices on page 117. IBM Digital Marketing and Analytics is the new generation

More information

FileMaker Server 10 Help

FileMaker Server 10 Help FileMaker Server 10 Help 2007-2009 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and the Bento logo

More information

XML Processing and Web Services. Chapter 17

XML Processing and Web Services. Chapter 17 XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing

More information

Novell Identity Manager

Novell Identity Manager AUTHORIZED DOCUMENTATION Manual Task Service Driver Implementation Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with

More information

Visualizing an OrientDB Graph Database with KeyLines

Visualizing an OrientDB Graph Database with KeyLines Visualizing an OrientDB Graph Database with KeyLines Visualizing an OrientDB Graph Database with KeyLines 1! Introduction 2! What is a graph database? 2! What is OrientDB? 2! Why visualize OrientDB? 3!

More information

JW Player for Flash and HTML5

JW Player for Flash and HTML5 JW Player for Flash and HTML5 Release 5.3 Embedding Guide December 20, 2010 CONTENTS 1 Embedding the player 1 1.1 Upload.................................................. 1 1.2 SWFObject................................................

More information

Oracle Taleo Business Edition Cloud Service. What s New in Release 15B1

Oracle Taleo Business Edition Cloud Service. What s New in Release 15B1 Oracle Taleo Business Edition Cloud Service What s New in Release 15B1 July 2015 TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 RELEASE FEATURE SUMMARY... 4 CAREERS WEBSITES... 5 Mobile Enabled

More information

Bazaarvoice for Magento

Bazaarvoice for Magento Bazaarvoice Bazaarvoice for Magento Extension Implementation Guide v6.1.2.3 Version 6.1.2.3 Bazaarvoice Inc. 8/5/2015 Introduction Bazaarvoice maintains a pre-built integration into the Magento platform.

More information

Client-side Web Engineering From HTML to AJAX

Client-side Web Engineering From HTML to AJAX Client-side Web Engineering From HTML to AJAX SWE 642, Spring 2008 Nick Duan 1 What is Client-side Engineering? The concepts, tools and techniques for creating standard web browser and browser extensions

More information

ASP.NET: THE NEW PARADIGM FOR WEB APPLICATION DEVELOPMENT

ASP.NET: THE NEW PARADIGM FOR WEB APPLICATION DEVELOPMENT ASP.NET: THE NEW PARADIGM FOR WEB APPLICATION DEVELOPMENT Dr. Mike Morrison, University of Wisconsin-Eau Claire, morriscm@uwec.edu Dr. Joline Morrison, University of Wisconsin-Eau Claire, morrisjp@uwec.edu

More information

CSCI110: Examination information.

CSCI110: Examination information. CSCI110: Examination information. The exam for CSCI110 will consist of short answer questions. Most of them will require a couple of sentences of explanation of a concept covered in lectures or practical

More information

All SABMiller websites, as defined in this document should have Google Analyitcs implemented as a mandatory requirement.

All SABMiller websites, as defined in this document should have Google Analyitcs implemented as a mandatory requirement. Analytics version 1 Introduction Web analytics is used to track, measure, collect, report and analyse web data in order to understand and optimise usage of web properties. These properties could include

More information

IMPLEMENTATION GUIDE. API Service. More Power to You. May 2008. For more information, please contact support@zedo.com

IMPLEMENTATION GUIDE. API Service. More Power to You. May 2008. For more information, please contact support@zedo.com IMPLEMENTATION GUIDE API Service More Power to You May 2008 For more information, please contact support@zedo.com Implementation Guide ZEDO API Service Disclaimer This Implementation Guide is for informational

More information

HTML5. Eoin Keary CTO BCC Risk Advisory. www.bccriskadvisory.com www.edgescan.com

HTML5. Eoin Keary CTO BCC Risk Advisory. www.bccriskadvisory.com www.edgescan.com HTML5 Eoin Keary CTO BCC Risk Advisory www.bccriskadvisory.com www.edgescan.com Where are we going? WebSockets HTML5 AngularJS HTML5 Sinks WebSockets: Full duplex communications between client or server

More information

Capturx for SharePoint 2.0: Notification Workflows

Capturx for SharePoint 2.0: Notification Workflows Capturx for SharePoint 2.0: Notification Workflows 1. Introduction The Capturx for SharePoint Notification Workflow enables customers to be notified whenever items are created or modified on a Capturx

More information

Working with Indicee Elements

Working with Indicee Elements Working with Indicee Elements How to Embed Indicee in Your Product 2012 Indicee, Inc. All rights reserved. 1 Embed Indicee Elements into your Web Content 3 Single Sign-On (SSO) using SAML 3 Configure an

More information