How To Write A Data Snap Server In A Microsoft Datasnap (Server) And 2.2 (Client) (Server And Client) (For A Microsnet 2.4.1)
|
|
- Alan Gordon
- 3 years ago
- Views:
Transcription
1 DataSnap in Action! By Bob Swart, Bob Swart Training & Consultancy DataSnap is the multi-tier application development framework of RAD Studio (which includes Delphi, C++Builder, Delphi Prism and RadPHP). In this article, the power and functionality of DataSnap is demonstrated using Delphi XE by describing a small but real-world DataSnap application. The sample application is an issue monitoring and tracking system, called D.I.R.T. (Development Issue Report Tool). The system is used by remote developers in different locations to enter issue reports for projects. The new DataSnap features that we use to produce high quality multi-tier applications include: - DataSnap Server Wizards producing application skeletons (server and client) - HTTPS support for secure ISAPI DLLs deployment - RSA and PC1 encryption filters (for example when HTTPS is not an option) - Enhanced TAuthenticationManager for login support - Role-based Authentication capabilities for server methods and datasets Data Model The data model describing the Users, the Reports and the Comments on these reported issues is as follows: - 1 -
2 The User table contains the list of developers, testers and others that access the application. Required information are a username, (hashed) password, and address. A user also has a single role, like developer, tester or manager. We don t store the real password of the user, but only the HASH value of the password. During logon, only the hashed version of the password is sent over the (secure) connection from the client to the server. The Report table stores issue report and brief summary, plus the Project, Version (optional), Module (optional), Type of issue and Priority. A special field is used to contain the Status of the issue (reported, assigned, opened, solved, tested, deployed, closed). Also important are the date of the report, the user who reported it, and (optionally) the user who is assigned to the issue. The Comment table contains the workflow of what s being reported and done about the issue. These three tables, linked together by the different ReportID, ReporterID, AssignedTo and UserID fields, are used as basis for the DataSnap Server application. DataSnap Server Delphi XE Enterprise (and Architect) supports three Wizards to create DataSnap Servers: a DataSnap REST Application, a DataSnap Server, and a DataSnap WebBroker Application. For the D.I.R.T. application, we need a DataSnap Server type accessed in a secure and safe way. To allow access from mobile devices and wireless connections, the HTTPS protocol was chosen, using an SSL/TLS certificate for the encrypted communication and secure identification of the server. HTTPS means an ISAPI DLL produced by either the DataSnap WebBroker or the DataSnap REST Application wizard. The REST wizard generates additional files for the REST application, which are not needed at this time, so the choice was made to use the DataSnap WebBroker Application wizard. The ISAPI DLL is deployed on Microsoft Internet Information Services (IIS), using an SSL certificate for HTTPS support. The New DataSnap WebBroker Application wizard includes options to use Authentication and Authorization, and the choice of a Server Methods Class with Sample Methods. Authentication means checking if a user is who he or she claims he is, while authorization controls which functionality is explicitly allowed or forbidden based on a user role. Our example uses both Authentication and Authorization, as well as a Server Methods Class, but no Sample Methods: - 2 -
3 TDSServerModule is used as ancestor for the Server Methods class, allowing the export of server methods and datasets (using TDataSetProviders). Login and Authentication The TDSAuthenticationManager component on the Web Module controls the authentication and authorization
4 In the OnUserAuthenticate event handler we verify the User, Password as well as the used protocol (to make sure it s HTTS and not HTTP). To get access to the DIRT database with usernames and passwords, an TSQLConnection component and SQL query is used, performing a SELECT of the UserID and Role from the User table. The Role retrieved by the SELECT command is added to the UserRoles collection. procedure TWebModule1.DSAuthenticationManager1UserAuthenticate( Sender: TObject; const Protocol, Context, User, Password: string; var valid: Boolean; UserRoles: TStrings); <snipped> <snipped> SQLQuery.CommandText := 'SELECT UserID, Role FROM [User] WHERE ' + ' (Name = :UserName) AND (PasswordHASH = :Password)'; Authorization DataSnap connects user roles with server classes and server methods. In the DSAuthenticationManager OnUserAuthorize event the authorization can be implemented in an optimistic or pessimistic way, depending on your situation. Optimistic means that any operation is allowed, unless explicitly forbidden, while pessimistic means no operation is allowed, unless explicitly allowed. For our example, security is important, so we used the pessimistic approach. Assignment of authorizations by role can be done at the server methods level. Admin has the right add new users, a manager can view all issues but only in a read-only way, a tester can report new issues, and both the tester and developer can add comments to issues. Server Methods for the Client Extend the TServerMethods1 class with custom server methods, like GetCurrentUserRoles to return the role that the current user belongs to. Server Method to Get All Issues A more useful server method, only available for the Manager role, returns the list of all reported issues, within a range of MinStatus and MaxStatus. [TRoleAuth('Manager')] // Return all issues (read-only) between MinStatus..MaxStatus function GetIssues(MinStatus,MaxStatus: Integer): TDataSet; This server method needs a TSQLConnection and TSQLDataSet component on the server module. The TSQLDataSet selects all fields from the Report, using the Status field in the WHERE clause. The query returns a read-only list, and is joined with the User table replacing ReporterID and AssignedTo with actual names
5 SELECT "ReportID", "Project", "Version", "Module", "IssueType", "Priority", "Status", "ReportDate", UReporterID.Name AS "Reporter", UAssignedTO.Name AS Assigned, "Summary", "Report" FROM "Report" LEFT OUTER JOIN [User] UReporterID ON UReporterID.UserID = ReporterID LEFT OUTER JOIN [User] UAssignedTO ON UAssignedTO.UserID = AssignedTO WHERE Status >= :MinStatus AND Status <= :MaxStatus ORDER BY Status Implement GetIssues using the SQL statement above to return a DataSet. Exporting Data: Open Issues We can also export a TDataSetProvider to the client, where changes can be made to the data (insert, update and/or delete), and applied back to the server. A developer working on an issue report should also see all comments, so the TDataSetProvider exports records from the Reports and Comments tables in a master-detail relationship. This is implemented using two TSQLDataSet components sqlreportuser and sqlcomments, and a TDataSource component dsreportuser pointing to sqlreportuser and used as DataSource for sqlcomments. The TDataSetProvider called dspreportuserwithcomments exposes the master sqlreportuser. The sqlreportuser retrieves Report records with either the ReporterID or the AssignedTo fields equal to the current user: SELECT "ReportID", "Project", "Version", "Module", "IssueType", "Priority", "Status", "ReportDate", "ReporterID", "AssignedTo", "Summary", "Report" FROM "Report" WHERE (Status >= :MinStatus) AND (Status <= :MaxStatus) AND ((AssignedTo = :AssignedTo) OR (ReporterID = :ReporterID)) This SQL command returns 12 fields, configurable using the Fields Editor
6 ReportID is an autoincrement key field, and needs pfinupdate of the ProviderFlags set to False, but the pfinkey set to True. The SQL command has four parameters. The MinStatus and MaxStatus input parameters are provided by the client and should be kept. AssignedTo and ReportedID must be removed from the Params collection, so they will not show up at the client side, and will be filled in by the server itself, based on the UserID value in the session of the current user. The detail sqlcomments uses a parameter ReportID that connects the comments to the master report record: SELECT CommentID, ReportID, UserID, CommentDate, Comment FROM Comment WHERE (ReportID = :ReportID) Modify the ProviderFlags for the primary key CommentID to set pfinupdate to False, and pfinkey to True, ensuring the primary key CommentID is never sent to the server as assignment, but used in the WHERE clause to locate records. Stepping through the result of the master, each time we move one record in the master record set, we must reset the detail by closing and reopening sqlcomments
7 This enforces the detail query to be executed for every master record, filling the nested dataset at the server side before exporting the TDataSetProvider to the client. The event is named AS_sqlReportUserAfterScroll and not the default sqlreportuserafterscroll to ensure it s not visible as server method. We need to assign the AssignedTo and ReporterID parameters in the BeforeGetRecords event handler of the TDataSetProviderm, using the UserID of the current user. This ensures that all parameters of sqlreportuser are filled before the query is opened, so any user who requests the Report and Comments records from dspreportuserwithcomments will only get the reports where the user was either the reporter (ReporterID) or the one assigned to it (AssignedTo). TDataSetProvider Role Based Authorization The Roles property of the TDSAuthenticationManager contains a collection of Role items with ApplyTo, AuthorizedRoles and DeniedRoles properties. Use ApplyTo to specify a method name, class name, or class name followed by a dot and a method name. Only the role Developer should be allowed to call the 7 pre-defined IAppServerFastCall methods, so add these 7 methods to the Apply property as follows: Server Deployment The DataSnap D.I.R.T. Server is deployed as ISAPI DLL in Microsoft s Internet Information Services (IIS) using the HTTPS protocol. Alternately, it can be deployed as stand-alone DataSnap server with RSA and PC1 filters to encrypt the transport channels. In the latter case, use TCP/IP as transport protocol and not HTTP, since TCP/IP is a lot faster
8 In IIS we can configure application pools with automatic load balancing, recycling, and limitation of the CPU and memory usage of the server. An SSL certificate is required for the HTTPS option, like done for domain A virtual directory DataSnapXE and application pool are configured, and the DirtServer.dll is available as Apart from the DirtServer.dll, the required database driver: dbxmss.dll for SQL Server 2008 must also be deployed (but with the MidasLib unit in the uses clause, the MIDAS.dll does not have to be deployed). Deploying the DataSnap standalone server, using TCP/IP and the RSA and PC1 filters, also requires two Indy SSL DLLs: libeay32.dll and ssleay32.dll., needed for the RSA filter (which encrypts the password used by the PC1 filter). Theese DLLs are also required by the DataSnap client, whether connected to the TCP/IP server using the RSA and PC1 filters, or to the ISAPI filter using HTTPS. DataSnap Client The DataSnap client uses a TSQLConnection with Driver property set to Datasnap, https as CommunicationProtocol, Port 443 and HostName set to (feel free to connect to your own server). URLPath is /DataSnapXE/DirtServer.dll, and LoginPrompt set to False. Login The username and password can be assigned dynamically to the TSQLConnection Params, hashing the password: procedure TFormClient.Login1Click(Sender: TObject); <snipped> SQLConnection1.Params.Values['DSAuthenticationUser'] := Username; MD5 := TIdHashMessageDigest5.Create; try SQLConnection1.Params.Values['DSAuthenticationPassword'] := LowerCase(MD5.HashStringAsHex(Password, TEncoding.UTF8)); SQLConnection1.Connected := True; // try to login... Server := TServerMethods1Client.Create(SQLConnection1.DBXConnection); try UserRoles := Server.GetCurrentUserRoles; <snipped> Data Module and server methods A TsqlServerMethod, TDataSetProvider, TClientDataSet and TDataSource component are needed next
9 The SqlServerMethodGetIssues calls TServerMethods1.GetIssues server only allowed by Manager role, returning a read-only dataset with all issues. Assign a value to MinStatus and MaxStatus parameters as follows: procedure TFormClient.ViewAllIssues1Click(Sender: TObject); // Manager - all reports (read-only) begin <snipped> DataModule1.SqlServerMethodGetIssues.Params. ParamByName('MinStatus').AsInteger := MinStatus; DataModule1.SqlServerMethodGetIssues.Params. ParamByName('MaxStatus').AsInteger := MaxStatus; <snipped> The resulting dataset contains IssueType, Priority and Status as integer values. Map these integer values into more human-friendly string values using OnGetText events. DSProviderConnection Reported issues for users with the Developer or Tester role are retrieved from the dspreportuserwithcomments TDataSetProvider, using a TDSProviderConnection, two TClientDataSets and one TDataSource: - 9 -
10 DSProviderConnection connects to TServerMethods1 (in the ServerClassName property). The cdsreports retrieves dspreportuserwithcomments with two parameters: MinStatus and MaxStatus. Using the Fields Editor on cdsreports, Add all Fields to show 13 fields including sqlcomments. The sqlcomments contains the nested detail records, used as DataSetField of cdscomments, containing detail records for the current master record in cdsreports. Both TClientDataSets need configuration for their autoincrement primary keys (ReportID and CommentID), setting ProviderFlags pfinupdate to False and pfinkey to True
11 Adding Lookup Fields The cdsreports includes integer fields that can be translated, like IssueType, Priority and Status, using OnGetText event handlers shown before. Two other fields, containing a UserID value, should also be replaced using a cdsusernames lookup table, to produce ReporterName and AssignedName lookup fields: Autoincrement Fields We cannot send a value for ReportID and CommentID primary keys to the server, but we still need to assign a temporary value at the client to allow us to create new issues and new comments. For new records, use negative key values, implemented using the AfterInsert event of the two TClientDataSets: cdsreportsreportid.asinteger := -1; The client application should send updates back to the server right after a post or delete. Implement the AfterDelete and AfterPost event handlers of both TClientDataSets, which can be shared in one event handler. This ensures that ApplyUpdates is called to send changes to the server, followed by a Refresh to het fresh data from the server (including the actual autoincrement primary key values). When implementing view issues for a user with the role Developer or Tester, you may want to hide the nested dataset field // hide nested dataset field DBGridReports.Columns[DBGridReports.Columns.Count-1].Visible := False; The code to display the reported issues is similar to the code for the Manager s call to the GetIssues server method, exposed by the SqlServerMethodGetIssues. However, where the Manager s result is read-only, the Developer and Tester get a dataset where modifications can be made
12 Reported Issue Form The Reported Issue Form can be used to edit a new or existing report, and consists of two TDataSources (dscomments and dsreports) and a number of data-aware controls. Comments are displayed in a TDBGrid, with the current comment details shown in the TDBMemo. Adding a comment is not be done in the grid but in a new form (not shown here), which also offers the option to change the status of the reported issue, and hence get actual progress. Client Deployment With the MidasLib unit to the uses clause of the DataSnap Client, we end up with an almost stand-alone executable. However, since the ISAPI DLL uses HTTPS, and the TCP/IP stand-alone server uses the RSA and PC1 filters, the libeay32.dll and ssleay32.dll files must also be deployed with the DataSnap Client. Summary This article described a small but real-world secure DataSnap Server application, deployed on Microsoft s Internet Information Services as an ISAPI DLL. Security was implemented using authentication and authorization as well as HTTPS (or RSA/PC1 filters for a stand-alone server) for a secure transport channel. You can find actual code for the application at
13 action/datasnap-xe. Techniques were shown to connect the DataSnap Client to the DataSnap Server in order to call server methods and work with exported DataSetProviders. Details included how to work with autoincrement fields, especially in combination with master-detail and nested datasets. The application would not have been possible without the many new features and enhancements in found in DataSnap XE. With the release of Delphi XE, DataSnap was again substantially expanded and enhanced compared to DataSnap 2010 or 2009, and a lot improved since the COM-based original versions of DataSnap and MIDAS. References For code sample of the application describe in this article, see RAD Studio in Action DataSnap 2010 white paper Delphi XE DataSnap Development courseware manual
Delphi 2010 DataSnap: Your data where you want it, how you want it.
White Paper Delphi 2010 DataSnap: Your data where you want it, how you want it. Bob Swart Bob Swart Training & Consultancy (ebob42) October 2009 Corporate Headquarters EMEA Headquarters Asia-Pacific Headquarters
More informationunigui Developer's Manual 2014 FMSoft Co. Ltd.
2 Table of Contents Foreword 0 3 Part I Installation 1 Requirements... 3 2 Installation... Instructions 4 9 Part II Developer's Guide 1 Web... Deployment 9 Sencha License... Considerations 9 Adjusting...
More information4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
More informationINTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:
INTRODUCTION: You can extract data (i.e. the total cost report) directly from the Truck Tracker SQL Server database by using a 3 rd party data tools such as Excel or Crystal Reports. Basically any software
More informationTMS RemoteDB Documentation
TMS SOFTWARE TMS RemoteDB Documentation TMS RemoteDB Documentation August, 2015 Copyright (c) 2015 by tmssoftware.com bvba Web: http://www.tmssoftware.com E-mail: info@tmssoftware.com I TMS RemoteDB Documentation
More informationManaging Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
More informationTutorial: Creating a CLX Database Application
Tutorial: Creating a CLX Database Application Borland Delphi 7 for Windows Borland Software Corporation 100 Enterprise Way, Scotts Valley, CA 95066-3249 www.borland.com COPYRIGHT 2001 2002 Borland Software
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationAvatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationIntegration Client Guide
Integration Client Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationCloud Services. Introduction...2 Overview...2. Security considerations... 2. Installation...3 Server Configuration...4
Contents Introduction...2 Overview...2 Security considerations... 2 Installation...3 Server Configuration...4 Management Client Connection...4 General Settings... 4 Enterprise Architect Client Connection
More informationProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
More informationStep-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition
Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationTurbo C++ 2006 & C++Builder 2006. Database. Development. Turbo C++ & C++Builder Database Development September 2006
Turbo C++ 2006 & C++Builder 2006 Database Development Turbo C++ & C++Builder Database Development September 2006 Bob Swart (aka Dr.Bob) http://www.drbob42.com Table of Contents 0. Database Development
More informationCloud Services. Introduction...2 Overview...2 Simple Setup...2
Contents Introduction...2 Overview...2 Simple Setup...2 Requirements... 3 Installation... 3 Test the connection... 4 Open from another workstation... 5 Security considerations...6 Installation...6 Server
More informationSample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationRelease Notes For Versant/ODBC On Windows. Release 7.0.1.4
Release Notes For Versant/ODBC On Windows Release 7.0.1.4 Table of Contents CHAPTER 1: Release Notes... 3 Description of Release... 4 System Requirements... 4 Capabilities of the Drivers... 5 Restrictions
More informationUsing DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
More informationEkran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
More informationIIS SECURE ACCESS FILTER 1.3
OTP SERVER INTEGRATION MODULE IIS SECURE ACCESS FILTER 1.3 Copyright, NordicEdge, 2006 www.nordicedge.se Copyright, 2006, Nordic Edge AB Page 1 of 14 1 Introduction 1.1 Overview Nordic Edge One Time Password
More informationMicrosoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
More informationUsing SQL-server as database engine
This tutorial explains on a step by step base how to configure YDOC-Insights for usage with a SQL-server database. (How to manage SQL-server itself is not part of this tutorial) CONTENTS CONTENTS 1 1.
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationINSTALLING MOODLE 2.5 ON A MICROSOFT PLATFORM
INSTALLING MOODLE 2.5 ON A MICROSOFT PLATFORM Install Moodle 2.5 on Server 2012 R2 with SQL 2012 Ryan Mangan SysTech IT Solutions www.systechitsolutions.co.uk Contents Introduction... 2 Configuring basic
More informationOmniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
More informationTenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
More informationUser Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationConfiguring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
More informationInterworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
More informationXerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
More informationWS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.
User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to
More informationUser Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
More informationDatabase Applications with VDBT Components
Database Applications with VDBT Components Ted Faison 96/4/23 Developing database applications has always been a very slow process, hindered by a myriad of low-level details imposed by the underlying database
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationCustomer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
More informationDEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web
More informationGroup Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationCustomer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview
Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the
More informationSOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
More informationTraining module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
More informationmultiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158
Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory
More informationPC Monitor Enterprise Server. Setup Guide
PC Monitor Enterprise Server Setup Guide Prerequisites Server Requirements - Microsoft Windows Server 2008 R2 or 2012-2GB RAM - IIS 7.5 or IIS 8.0 (with ASP.NET 4.0 installed) - Microsoft SQL Server 2008
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationAccessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute
Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute JMP provides a variety of mechanisms for interfacing to other products and getting data into JMP. The connection
More informationUser Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationKentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
More informationOwner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
More informationOracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i
Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i $Q2UDFOH7HFKQLFDO:KLWHSDSHU 0DUFK Secure Web.Show_Document() calls to Oracle Reports Server 6i Introduction...3 solution
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationHow To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2
DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...
More informationSecure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
More informationFREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
More informationMicrosoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationSetup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.
Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will
More informationInstallation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
More informationINSTRUCTION MANUAL AND REFERENCE FOR IT DEPARTMENTS
1 INSTRUCTION MANUAL AND REFERENCE FOR IT DEPARTMENTS CLOCKWORK5 INSTALL GUIDE WITH SQL SERVER SETUP TechnoPro Computer Solutions, Inc. 2 Table of Contents Installation Overview... 3 System Requirements...
More informationInstallation and Configuration Guide
Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service
More informationTMS SECURITY SYSTEM DEVELOPERS QUICK START GUIDE
DEVELOPERS QUICK START GUIDE Sep 2013 Copyright 2003 2013 by tmssoftware.com bvba Web: http://www.tmssoftware.com Email : info@tmssoftware.com 1 Contents Supported Delphi and C++Builder versions Supported
More informationSAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24 Data Federation Administration Tool Guide Content 1 What's new in the.... 5 2 Introduction to administration
More informationHow To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
More informationKnowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?
Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database? Date: January 11th, 2011 Last Update: January 21st, 2013 (see Section 2, C, 4) Problem: You want to create
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationNetwork Management Card Security Implementation
[ APPLICATION NOTE #67 ] OFFER AT A GLANCE Offers Involved Network Management Card, APC Security Wizard Applications Configuration and monitoring of network managed devices Broad Customer Problem Secure
More informationTSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
More informationCyber-Ark Software. Version 4.5
Cyber-Ark Software One-Click Transfer User Guide The Cyber-Ark Vault Version 4.5 All rights reserved. This document contains information and ideas, which are proprietary to Cyber-Ark Software. No part
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More information1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
More informationDeployment Guide Microsoft IIS 7.0
Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...
More informationSurfCop for Microsoft ISA Server. System Administrator s Guide
SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know
More informationManual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
More informationTechnical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
More informationSECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
More informationHELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationMICROSTRATEGY 9.3 Supplement Files Setup Transaction Services for Dashboard and App Developers
NOTE: You can use these instructions to configure instructor and student machines. Software Required Microsoft Access 2007, 2010 MicroStrategy 9.3 Microsoft SQL Server Express 2008 R2 (free from Microsoft)
More informationServer Installation, Administration and Integration Guide
Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management
More informationThe SyncBack Management System
The SyncBack Management System An Introduction to the SyncBack Management System The purpose of the SyncBack Management System is designed to manage and monitor multiple remote installations of SyncBackPro.
More informationLepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
More informationSharePoint Integration Framework Developers Cookbook
Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook Rev: 2013-11-28 Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook A Guide
More informationXIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
More informationHow To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
More informationENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
More informationUsing RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
More informationV Series Rapid Deployment Version 7.5
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
More informationDelphi Developer Certification Exam Study Guide
Delphi Developer Certification Exam Study Guide Embarcadero Technologies Americas Headquarters EMEA Headquarters Asia-Pacific Headquarters 100 California Street, 12th Floor San Francisco, California 94111
More informationSafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
More informationLANDESK Service Desk. Desktop Manager
LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,
More informationMIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER
MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER This document provides instructions for migrating to Avalanche 5.0 from an installation of Avalanche MC 4.6 or newer using MS SQL Server 2005. You can continue
More informationLogi Ad Hoc Reporting Configuration for Load Balancing (Sticky Sessions)
Logi Ad Hoc Reporting Configuration for Load Balancing (Sticky Sessions) Version 10 Last Updated: December 2010 Page 2 Table of Contents About This Paper... 3 What Are Sticky Sessions?... 3 Configuration...
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More information