Secure Testing Service

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Secure Testing Service"

Transcription

1 Secure Testing Service Overview and pre-release use Authors: Andrej Sokoll Matthew Loewengart Revisions: 2011 Version 1.0

2 Page 2 Contents Overview... 3 Background... 3 How does the secure testing service work?... 4 Testing the secure testing services... 5 Prepare your account by:... 5 Prepare two variations of a website which links the published and unpublished assets Run the test:... 6 Supported and un-supported asset types... 7 S7OnDemand features:... 7 Use Cases... 8 Integrating the secure testing services into a web-site preview... 8 Building Business to Business application using Scene7 secure testing services... 8 Conclusion... 9 Appendix A: Sample HTML test page Confidential. Property of Adobe Systems, Inc. Copyright

3 Page 3 Overview Enterprise ecommerce Sites have grown accustomed to a 3-tier architecture with a formal development, staging, and production environments. The developers of these sites want to be able to test the complete endto-end workflow by loading new content and publishing it for testing while developing their next site release or product launch and don't want their content available before it has been internally approved/launched. With the new secure testing services being released by Adobe Scene7 our SaaS based customers will now have the ability to define different secure test environments and target which Image Server this content is made available either publicly or based upon a configurable set of IP address and ranges. This new functionality allows developers to match their Scene7 deployments with the architecture of their content management and commerce platform. Background Adobe Scene7 serves dynamic rich-media assets into the users browser. In order to do that Scene7 utilizes standard web protocols and technologies. So accessing an asset via a URL does not require any authentication. An asset on the S7 Image Server is available via URL under these conditions: Asset uploaded to the Scene7 Publishing System Asset is marked for publish A publish process sends to the asset to the public facing Image Servers. Under these conditions images are available under public URLs like: As soon as the web site s html pages links the URL the asset becomes available. In many cases, other imagery and rich media may have been published and only referenced from a staging environment. It is the act of referencing that content from the Web page that makes it publicly available. In some instances, this is not a sufficient level of security as a user maybe able to guess a URL based on SKU number or a known naming convention which can produce challenges when launching a new product or Web site redesign. Companies are beginning to leverage the Scene7 platforms for internal applications and across corporate processes where the broad set of functionalities Scene7 provides should be used in secured environments. However the Adobe Scene7 infrastructure is not within the customer s infrastructure, corporate intranet, or demilitarized zone. Confidential. Property of Adobe Systems, Inc. Copyright

4 Page 4 So there are there are specific situations where access to Scene7 functionality should not be in public environments: Preview of web sites before public launch (staging web site) Serving assets requiring restricted access, e.g. ecatalogs showing custom prices in a B2B web application Usage of asset behind a firewall as part of a product information management system, customer service applications, training, etc. The secure testing services addresses this need by Providing a full featured access to the image server even for unpublished assets Limiting access to a configurable set of IP addresses and IP ranges The secure testing services functionality does not affect the access to the Scene7 Publishing System (SPS). The SPS security remains consistent and requires the appropriate credentials for access to SPS and the related Web Services. How does the secure testing service work? Most corporations run their Internet behind a firewall. Access to the Internet is possible through certain routes and typically through a limited range of public IP addresses. From your corporate network you can figure out your public IP address using web sites like or request this information from your corporate IT organization. With the secure testing service, Scene7 has established a dedicated Image Server that can be used for staging or internal applications. Any request, made against this Server will check the origin IP address. If the incoming request is not within the approved list of IP addresses a failure response is returned. Note, because we need to confirm the location of the original request, the traffic of the secure testing services is not routed through a content distribution network as your public Scene7 Image Server traffic. Because of this, requests to the Secure Testing Service might have a higher slightly higher latency compared to the public Scene7 Image Servers. An additional benefit of this feature is that unpublished assets immediately available from the secure testing services, without the need to publish. This allows Scene7 users to run a preview before assets are published to their public facing image server. Confidential. Property of Adobe Systems, Inc. Copyright

5 Page 5 Testing the secure testing services Prepare your account by: 1. Configure the public IP addresses or IP ranges that you would like to make secure testing content available by using the Client Address Filter found under Setup > Application Setup > Publish Setup > Image Server. Select the context Test Image Serving Be careful: using the wrong context leads in missing images on your public site. 2. Upload a number of images to your SPS account. 3. Ensure that some of these images are Marked for Publish and keep some Unmarked for Publish. 4. Run an Image Server Publish. 5. Determine the Test Publish Context Server Name of your secure testing services This can be found under Setup > Application Setup > General Settings Confidential. Property of Adobe Systems, Inc. Copyright

6 Page 6 Get in contact with support when the server entry is missing or URLs to this server do not work. Prepare two variations of a website which links the published and unpublished assets. Public version: Link assets using your traditional Scene7 URL syntax into this web site. Staging version: Link assets into this Web site using the same syntax but with the secure testing site name. Run the test: 1. From with-in your corporate network perform the following test: From within your corporate network - identified by the IP address range previously defined the Staging version should show all images no matter if marked for publish or not. This allows for QA and testing without accidentally making images available before approval or product launch. Confirm that the Public version of your site shows published assets as you have previously experienced with Scene7 without any disruption. 2. From outside your corporate network, verify that non-published assets (e.g. Unmarked for Publish) are protected from 3 rd party access: From out-site your corporate network e.g. by using a 3G connection or home computer verify the Public version of your site shows all published assets as before, but none of the unpublished content. Confirm that the Staging version shows no asset even if they are marked for publish or not since you are accessing the secure testing service from an IP address that has not been approved. In Appendix A you will find a simple HTML page that you can use to run this basic test. Change the server name in the header of the file Change the company name Change the domain name to match secure testing site name Change the list of comma separate asset IDs Confidential. Property of Adobe Systems, Inc. Copyright

7 Page 7 Supported and un-supported asset types The Scene7 platform supports many more assets then just images. Adobe Scene7 is working hard to support as many of these files and asset types as possible. The following asset types will be available via the secure testing services for the pre-release that you will be participating: Images Image sets and all other types of sets (ecatalog, render sets, media sets) Standard Scene7 rich media viewers S7 OnDemand JSP pages Static content such as PDF files and progressively served videos The following asset types/functionalities are currently not supported by the secure testing services: Video streaming Render Server requests UGC services Web-to-print Dynamic Flash Banner content S7 Info or ecatalog search S7OnDemand features: The S7OnDemand module provides some features of the Scene7 platform. This module actually does not contain custom assets. However to use these features you can set parameters to use content from the secure testing services. Confidential. Property of Adobe Systems, Inc. Copyright

8 Page 8 Use case with the S7 secure testing services Integrating the secure testing services into a web-site preview ecommerce companies usually check changes in a preview environment before the site goes live. Such changes typically include: Web site feature changes Data changes Rich media changes Until now, such previews of product imagery and rich media content required development teams to use published Scene7 assets. The same URL was used to access Scene7 content within the DMZ as well as in the public facing Web site. The secure testing site now allows previewing the staging version of the Web site with un-published content. Here is a typical workflow of how this can be achieved: Staging system references the common Scene7 Image Server (e.g. customer.scene7.com) Name resolution of the tester s PC is changed to point for customer.scene7.com to the secure testing site. An Alternative process Global changes: In the preview system point your staging version of your Web site to the secure testing server for site validation and/or in anticipation of a product launch. At the time that this version of the site is promoted to the live production environment a global variable will need to be updated in order to change these Scene7 references to the public facing Scene7 domain. Separately, it is important that you log into your SPS account and ensure all content that was previously Unmarked for Publish assets has their publish status updated to Mark for Publish and run a publish process to make sure assets are available in the live site. Building Business to Business application using Scene7 secure testing services Let s consider B2B applications as Web applications requiring authentication of users when accessing content. Usually authentication provides a context (e.g. a session) under which the server delivers the various content required by the user (html, css, images, pdf, etc). Similar to public Web sites each of these components are requested with unique URLs that can be copied and sent to any 3 rd party. The context of the session would get lost and the request to such URLs should not provide a meaningful result. Confidential. Property of Adobe Systems, Inc. Copyright

9 Page 9 However, in the past if the request included a Scene7 URL from a public server, an ecatalog for instance, this content would have been delivered to the Web browser without requesting any login credentials. Within the context of a B2B application the secure testing services provide a solution that allows rich media content to be served in your application without fear of the content making its way to unintended users. With the secure testing services you can now route Scene7 traffic through your network and therefore you can always check if such requests are authenticated using your established mechanism. In some cases to accomplish this with an extended team or customer base you would want to work with your IT team to setup a proxy functionality for this routing. You gain the full feature set of Scene7 for your B2B application and can use the same rich media experiences found on your consumer sites: Dynamic imaging Zoom 360 spin ecatalogs Conclusion With the new secure testing services being released by Adobe Scene7 our customers will now have the ability to define different secure test environments and build robust B2B solutions. This new functionality allows developers to match their Scene7 deployments with the architecture of their content management and commerce platform. Confidential. Property of Adobe Systems, Inc. Copyright

10 Page 10 Appendix A: Sample HTML test page The following HTML code utilizing JavaScript provides a simple sample test page <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD><TITLE>Scene7 Secure IP Image Test </TITLE> <META http-equiv=content-type content="text/html; charset=windows-1252"> <script type="text/javascript"> <!-- //test data to be changed to your test var SERVER ="s7g3.scene7.com";//your S7 public image server var SECUREIPSERVER ="test-e3.scene7.com";// your S7 secure testing services (not your origin server) var COMPANY ="AndrejSokoll"; //your SPS company //your list of published image assets imagearraypublished= new Array ("patent_01","patent_02","patent_03","patent_04"); //your list of non published image assets imagearraynotpublished=new Array ("patent_01_non","patent_02_non","patent_03_non","patent_04_non"); //===== end of config, leave the rest var COLUMNS=4; function displaylist(mod,entrytext,vserver,vmodus) { //outputs the inner of a table with image var i=0; if (vmodus=="published"){var vimagearray= imagearraypublished}; if (vmodus=="notpublished"){var vimagearray= imagearraynotpublished}; for(var j in vimagearray) { var imagename = vimagearray[j]; if (i==0) { document.write('<tr>')}; i+=1; //column counter url = " vserver + "/is/image/" + COMPANY +"/" + imagename + MOD; document.write('<td align="center">'); document.write('<br><div>' + entrytext + '</div><br>'); document.write('<img src="' + url + '" border="0"></a>'); document.write('</div>'); document.write('</td>'); if (i==columns) { document.write('</tr>');i=0}; }; if (i!=columns) { document.write('</tr>')}; } --> </script> </HEAD> <body> <table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse" width="100%" > <tr> <td colspan="7"><div class="stylehead"><a href=" > <img src=" border="0" alt="scene7 Logo"></a> Test page for Secure testing services </div> </td><td align="right"></td> </tr> </table> <div align="center">requests to public published images<br></div> <table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse" width="100%"> <!-- width="1020" --> <script> displaylist("?wid=200&hei=200&fmt=jpeg&qlt=85&op_usm=1.1,0.8,0,0&resmode=sharp2","200x200",server,"published");</script> </table> <div align="center">requests to public non published images<br></div> <table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse" width="100%"> <!-- width="1020" --> <script> displaylist("?wid=200&hei=200&fmt=jpeg&qlt=85&op_usm=1.1,0.8,0,0&resmode=sharp2","200x200",server,"notpublished");</script> </table> <div align="center">requests to secure IP server with published images<br></div> <table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse" width="100%"> <!-- width="1020" --> <script>displaylist("?wid=200&hei=200&fmt=jpeg&qlt=85&op_usm=1.1,0.8,0,0&resmode=sharp2","200x200",secureipserver,"published");</script> </table> <div align="center">requests to secure IP server with non published images<br></div> <table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse" width="100%"> <!-- width="1020" --> <script> displaylist("?wid=200&hei=200&fmt=jpeg&qlt=85&op_usm=1.1,0.8,0,0&resmode=sharp2","200x200",secureipserver,"notpublished"); </script> </table> </BODY> </HTML> Confidential. Property of Adobe Systems, Inc. Copyright

Adobe Marketing Cloud How Adobe Scene7 Publishing System Supports SEO

Adobe Marketing Cloud How Adobe Scene7 Publishing System Supports SEO Adobe Marketing Cloud How Adobe Scene7 Publishing System Supports SEO Contents Contact and Legal Information...3 Introduction...4 Indexing of images by search engines...4 Maintaining the name of the image...6

More information

THE OPEN UNIVERSITY OF TANZANIA

THE OPEN UNIVERSITY OF TANZANIA THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Portals and Hosted Files

Portals and Hosted Files 12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines

More information

WAN Optimization for Microsoft SharePoint BPOS >

WAN Optimization for Microsoft SharePoint BPOS > White Paper WAN Optimization for Microsoft SharePoint BPOS > Best Practices Table of Contents Executive Summary 2 Introduction 3 SharePoint BPOS performance: Managing challenges 4 SharePoint 2007: Internal

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

Web Editing Basics 2: Reference

Web Editing Basics 2: Reference Web Editing Basics 2: Reference We will be using the sample pages as a reference point for this training. They can be found on the Web Policy site: http://www.umkc.edu/web-policy/downloads.asp TOPICS 1.

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015 QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Architectural Overview

Architectural Overview Architectural Overview Version 7 Part Number 817-2167-10 March 2003 A Sun ONE Application Server 7 deployment consists of a number of application server instances, an administrative server and, optionally,

More information

Online sales management software Quick store setup. v 1.1.3

Online sales management software Quick store setup. v 1.1.3 Online sales management software Quick store setup v 1.1.3 Table of Contents 1Shopizer urls...3 2Configure your store...3 Store and profile...4 Store Front Configuration...4 3Integration...6 4Configure

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

HTML Fails: What No One Tells You About Email HTML

HTML Fails: What No One Tells You About Email HTML HTML Fails: What No One Tells You About Email HTML 2 Today s Webinar Presenter Kate McDonough Campaign Manager at PostUp Worked with various ESPs: Constant Contact, Campaign Monitor, ExactTarget, Distribion

More information

RightNow Knowledge Base Syndication Widget

RightNow Knowledge Base Syndication Widget RightNow Knowledge Base Syndication Widget This document describes how the knowledge syndication widget is setup and delivered. It uses a simple reference implementation to illustrate how the widget can

More information

Barracuda Networks Web Application Firewall

Barracuda Networks Web Application Firewall McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Barracuda Networks Web Application Firewall January 30, 2015 Barracuda Networks Web Application Firewall Page 1 of 10 Important

More information

NextRow - AEM Training Program Course Catalog

NextRow - AEM Training Program Course Catalog NextRow - AEM Training Program Course Catalog Adobe Experience Manager Training Program Course Catalog NextRow provides Adobe CQ training solutions designed to meet your unique project demands. To optimize

More information

Creating a generic user-password application profile

Creating a generic user-password application profile Chapter 4 Creating a generic user-password application profile Overview If you d like to add applications that aren t in our Samsung KNOX EMM App Catalog, you can create custom application profiles using

More information

WEB DEVELOPMENT IA & IB (893 & 894)

WEB DEVELOPMENT IA & IB (893 & 894) DESCRIPTION Web Development is a course designed to guide students in a project-based environment in the development of up-to-date concepts and skills that are used in the development of today s websites.

More information

How-To: Submitting PDF forms to SharePoint from custom websites

How-To: Submitting PDF forms to SharePoint from custom websites How-To: Submitting PDF forms to SharePoint from custom websites Introduction This How-To document describes the process of creating PDF forms using PDF Share Forms tools, and posting the form on a non-sharepoint

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Penetration Testing with Selenium. OWASP 14 January 2010. The OWASP Foundation http://www.owasp.org

Penetration Testing with Selenium. OWASP 14 January 2010. The OWASP Foundation http://www.owasp.org Penetration Testing with Selenium 14 January 2010 Dr Yiannis Pavlosoglou Project Leader / Industry Committee Seleucus Ltd yiannis@owasp.org Copyright 2010 The Foundation Permission is granted to copy,

More information

Test Run Analysis Interpretation (AI) Made Easy with OpenLoad

Test Run Analysis Interpretation (AI) Made Easy with OpenLoad Test Run Analysis Interpretation (AI) Made Easy with OpenLoad OpenDemand Systems, Inc. Abstract / Executive Summary As Web applications and services become more complex, it becomes increasingly difficult

More information

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey 1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics

More information

Rational AppScan & Ounce Products

Rational AppScan & Ounce Products IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168

More information

Client Requirement. Why SharePoint

Client Requirement. Why SharePoint Client Requirement Client wanted a sharepoint system that could meet their document and record management needs. It should also improve client s information management systems. To support existing and

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

NetWrix File Server Change Reporter. Quick Start Guide

NetWrix File Server Change Reporter. Quick Start Guide NetWrix File Server Change Reporter Quick Start Guide Introduction... 3 Product Features... 3 Licensing... 3 How It Works... 4 Getting Started... 5 System Requirements... 5 Setup... 5 Additional Considerations...

More information

Tableau Server Trusted Authentication

Tableau Server Trusted Authentication Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted

More information

IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.

IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd. IMF Tune Quarantine & Reporting Running SQL behind a Firewall WinDeveloper Software Ltd. 1 Basic Setup Quarantine & Reporting Web Interface must be installed on the same Windows Domain as the SQL Server

More information

Security and the Mitel Teleworker Solution

Security and the Mitel Teleworker Solution Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks

More information

Macromedia Dreamweaver 8 Developer Certification Examination Specification

Macromedia Dreamweaver 8 Developer Certification Examination Specification Macromedia Dreamweaver 8 Developer Certification Examination Specification Introduction This is an exam specification for Macromedia Dreamweaver 8 Developer. The skills and knowledge certified by this

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

Kontiki Enterprise Video Platform Integration

Kontiki Enterprise Video Platform Integration Kontiki Enterprise Video Platform Integration Flexibility For The Enterprise Enterprises need scalable solutions they can trust, but that can also play well with their existing corporate applications.

More information

Application Note. Onsight TeamLink And Firewall Detect v6.3

Application Note. Onsight TeamLink And Firewall Detect v6.3 Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It

More information

Web Development I & II*

Web Development I & II* Web Development I & II* Career Cluster Information Technology Course Code 10161 Prerequisite(s) Computer Applications Introduction to Information Technology (recommended) Computer Information Technology

More information

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages

More information

Application Note. Onsight Connect Network Requirements v6.3

Application Note. Onsight Connect Network Requirements v6.3 Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...

More information

Load testing with WAPT: Quick Start Guide

Load testing with WAPT: Quick Start Guide Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

Web Viewer Reports: Using the Data URI. FMUG June 6, 2008

Web Viewer Reports: Using the Data URI. FMUG June 6, 2008 Web Viewer Reports: Using the Data URI FMUG June 6, 2008 Skills you should have Familiarity with the Web Viewer object HTML Scripting and calculations What is the Web Viewer? A object introduced in v8.5

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

EdgeCast Networks Inc. Token-Based Authentication Administration Guide

EdgeCast Networks Inc. Token-Based Authentication Administration Guide EdgeCast Networks Inc. Token-Based Authentication Administration Guide Disclaimer Care was taken in the creation of this guide. However, EdgeCast Networks Inc. cannot accept any responsibility for errors

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Advanced Configuration Administration Guide

Advanced Configuration Administration Guide Advanced Configuration Administration Guide Active Learning Platform October 2015 Table of Contents Configuring Authentication... 1 PingOne... 1 LMS... 2 Configuring PingOne Authentication... 3 Before

More information

Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice

Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair

More information

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection

More information

Connected Data. Connected Data requirements for SSO

Connected Data. Connected Data requirements for SSO Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated

More information

Citrix Receiver for Mobile Devices Troubleshooting Guide

Citrix Receiver for Mobile Devices Troubleshooting Guide Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING

More information

WildFire Cloud File Analysis

WildFire Cloud File Analysis WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

SharePoint 2010 Intranet Case Study. Presented by Peter Carson President, Envision IT

SharePoint 2010 Intranet Case Study. Presented by Peter Carson President, Envision IT SharePoint 2010 Intranet Case Study Presented by Peter Carson President, Envision IT Peter Carson President, Envision IT Virtual Technical Specialist, Microsoft Canada Computer Engineering, UW peter@envisionit.com

More information

Integrating Web Messaging into the Enterprise Middleware Layer

Integrating Web Messaging into the Enterprise Middleware Layer The increasing demand for real-time data has companies seeking to stream information to users at their desks via the web and on the go with mobile apps. Two trends are paving the way: o Internet push/streaming

More information

Guide to Deploying NetScaler as an Active Directory Federation Services Proxy

Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment

More information

White Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

White Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com

More information

Introduction to Web Analytics Terms

Introduction to Web Analytics Terms Introduction to Web Analytics Terms N10014 Introduction N40002 This glossary provides definitions for common web analytics terms and discusses their use in Unica Web Analytics. The definitions are arranged

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Adobe CQ5 Authoring Basics Print Manual

Adobe CQ5 Authoring Basics Print Manual Adobe CQ5 Authoring Basics Print Manual SFU s Content Management System SFU IT Services CMS Team ABSTRACT A summary of CQ5 Authoring Basics including: Setup and Login, CQ Interface Tour, Versioning, Uploading

More information

SSO Plugin. HP Service Request Catalog. J System Solutions. http://www.javasystemsolutions.com Version 3.6

SSO Plugin. HP Service Request Catalog. J System Solutions. http://www.javasystemsolutions.com Version 3.6 SSO Plugin HP Service Request Catalog J System Solutions Version 3.6 Page 2 of 7 Introduction... 3 Adobe Flash and NTLM... 3 Enabling the identity federation service... 4 Federation key... 4 Token lifetime...

More information

Enable Connectivity for 3PAR Storage:

Enable Connectivity for 3PAR Storage: Enable Connectivity for 3PAR Storage: Call Home Benefit: Periodically, the Service Processor transfers the diagnostic information such as system health information, configuration data, performance data,

More information

CareGiver Remote Support Information Technology FAQ

CareGiver Remote Support Information Technology FAQ CareGiver Remote Support Information Technology FAQ CareGiver remote support Information Technology FAQ Purpose The purpose of this document is to answer Frequently Asked Questions (FAQs) regarding CareGiver

More information

ShoreTel Enterprise Contact Center 8 Installing and Implementing Chat

ShoreTel Enterprise Contact Center 8 Installing and Implementing Chat ShoreTel Enterprise Contact Center 8 Installing and Implementing Chat November 2012 Legal Notices Document and Software Copyrights Copyright 1998-2012 by ShoreTel Inc., Sunnyvale, California, USA. All

More information

Getting Started with AWS. Hosting a Static Website

Getting Started with AWS. Hosting a Static Website Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks

More information

White Paper How to Remotely Access Ethernet I/O Over the Internet

White Paper How to Remotely Access Ethernet I/O Over the Internet White Paper How to Remotely Access Ethernet I/O Over the Internet ACROMAG INCORPORATED Tel: (248) 295-0880 30765 South Wixom Road Fax: (248) 624-9234 P.O. BOX 437 Wixom, MI 48393-7037 U.S.A. Copyright

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

Get started with cloud hybrid search for SharePoint

Get started with cloud hybrid search for SharePoint Get started with cloud hybrid search for SharePoint This document supports a preliminary release of the cloud hybrid search feature for SharePoint 2013 with August 2015 PU and for SharePoint 2016 Preview,

More information

WEB DESIGN COURSE CONTENT

WEB DESIGN COURSE CONTENT WEB DESIGN COURSE CONTENT INTRODUCTION OF WEB TECHNOLOGIES Careers in Web Technologies How Websites are working Domain Types and Server About Static and Dynamic Websites Web 2.0 Standards PLANNING A BASIC

More information

Tagging Guide: Website and Email Implementation. Contents

Tagging Guide: Website and Email Implementation. Contents Tagging Guide: Website and Email Implementation Contents About This Guide... 2 Your CiteID... 2 Website Implementation... 2 Tag Placement... 2 Example... 3 Email Implementation... 5 DNS Setup... 5 Tag

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

NetGroups.com. (scheduled release date 7/01 never released)

NetGroups.com. (scheduled release date 7/01 never released) NetGroups.com (scheduled release date 7/01 never released) 2001 was a rough year for Internet companies as the investment community became fearful of the overheated Internet and many good companies were

More information

Quick Start Guide. Installation and Setup

Quick Start Guide. Installation and Setup Quick Start Guide Installation and Setup Introduction Velaro s live help and survey management system provides an exciting new way to engage your customers and website visitors. While adding any new technology

More information

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1 Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example

More information

E-Commerce Installation and Configuration Guide

E-Commerce Installation and Configuration Guide E-Commerce Installation and Configuration Guide Rev: 2011-05-19 Sitecore E-Commerce Fundamental Edition 1.1 E-Commerce Installation and Configuration Guide A developer's guide to installing and configuring

More information

Aruba Instant IAP Setup Notes June 2012 Version 3

Aruba Instant IAP Setup Notes June 2012 Version 3 Aruba Instant IAP Setup Notes June 2012 Version 3 Aruba Instant (or IAP) is a simple to deploy turn-key WLAN solution consisting of one or more access points. As long as you have an Ethernet port with

More information

Website Administration and Development (WSAD)

Website Administration and Development (WSAD) FUNCTIONAL AREA 13 Website Administration and Development (WSAD) Incumbents in this functional area create departmental websites and portals, implement website design, and manage the web content. Incumbents

More information

Quick Guide of DDNS Settings

Quick Guide of DDNS Settings Quick Guide of DDNS Settings Solution: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic IP addresses

More information

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013 Deployment Guide rev. 1.4.2 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances

More information

Getting Started with AWS. Hosting a Static Website

Getting Started with AWS. Hosting a Static Website Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are

More information

PI Cloud Services --- PI Cloud Connect. Customer Onboarding Checklist

PI Cloud Services --- PI Cloud Connect. Customer Onboarding Checklist PI Cloud Services/Connect Onboarding Checklist PI Cloud Services --- PI Cloud Connect Customer Onboarding Checklist Version 1.0.9 Content Introduction... 3 Business requirements... 3 Framing the context

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

COMPUTER SECURITY. J. Magalhães Cruz Computer Security Protection of Local Systems (short) 1 25

COMPUTER SECURITY. J. Magalhães Cruz Computer Security Protection of Local Systems (short) 1 25 COMPUTER SECURITY 9. Protection of local systems (2) Goal (2) Actions to take (3) Protection by Prevention in Local Networks (LAN Protection) (4) Definitions (5) Firewall devices (corta fogos): traffic

More information

Web Page Redirect. Application Note

Web Page Redirect. Application Note Web Page Redirect Application Note Table of Contents Background... 3 Description... 3 Benefits... 3 Theory of Operation... 4 Internal Login/Splash... 4 External... 5 Configuration... 5 Web Page Redirect

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Taleo Enterprise. Taleo Reporting Getting Started with Business Objects XI3.1 - User Guide

Taleo Enterprise. Taleo Reporting Getting Started with Business Objects XI3.1 - User Guide Taleo Enterprise Taleo Reporting XI3.1 - User Guide Feature Pack 12A January 27, 2012 Confidential Information and Notices Confidential Information The recipient of this document (hereafter referred to

More information

GEMFIND. We Handle The Journey. So You Can Focus On The Destination. WEB TECHNOLOGIES FOR THE JEWELRY INDUSTRY - Est. 1999

GEMFIND. We Handle The Journey. So You Can Focus On The Destination. WEB TECHNOLOGIES FOR THE JEWELRY INDUSTRY - Est. 1999 GEMFIND WEB TECHNOLOGIES FOR THE JEWELRY INDUSTRY - Est. 1999 We Handle The Journey So You Can Focus On The Destination COMPANY Your Jewelry Technology Team We Handle Your Entire Digital Experience WEB

More information

WALKME WHITEPAPER. WalkMe Architecture

WALKME WHITEPAPER. WalkMe Architecture WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises

More information

Load Balancing Smoothwall Secure Web Gateway

Load Balancing Smoothwall Secure Web Gateway Load Balancing Smoothwall Secure Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

SERENA SOFTWARE Authors: Bill Weingarz, Pete Dohner, Kartik Raghavan, Amitav Chakravartty

SERENA SOFTWARE Authors: Bill Weingarz, Pete Dohner, Kartik Raghavan, Amitav Chakravartty SERENA SOFTWARE Scaling for the Enterprise Authors: Bill Weingarz, Pete Dohner, Kartik Raghavan, Amitav Chakravartty 2012-05-07 Table of Contents Who Should Read This Paper?... 3 Introduction... 3 Architecture...

More information