Anonymous Subscriber ID (ASID) - A Mobile Web Site Developers Cookbook. Version 1.0 8/7/2008. This Cookbook is written by Alex Rutgers (MoMac).
|
|
|
- Alan Pitts
- 10 years ago
- Views:
Transcription
1 Anonymous Subscriber ID (ASID) - A Mobile Web Site Developers Cookbook Version 1.0 8/7/2008 This Cookbook is written by Alex Rutgers (MoMac). With the special help of: Wim de Koning (Fenestrae) Jeroen Kok (Vodafone) Jeroen Kaandorp (KPN) Paul Brackel (Chair OMI²) Dorine Vreugdenhil (ECP.NL)
2 Introduction This cookbook is aimed at mobile developers who wish to extend their applications to support user recognition using the OMI 2 Anonymous Subscriber ID (ASID). Operators that support the OMI 2 ASID are Vodafone, T-Mobile and KPN 1 It is expected that with the integrations of the operator networks Telfort and Orange will support OMI 2 ASID in the near future too. MVNO s are explained later on. What is ASID? ASID is an identifier that uniquely identifies the mobile end user over a longer period than one session. To understand the relationship between the ASID and the mobile user, check the requirements that OMI 2 has defined for the implementation of the ASID: ASID is unique in combination with operator code; ASID is related directly to MSISDN and combined with operator code; MSISDN is not traceable from an ASID; ASID is related to SIM (or duo SIMS); ASID is not related to the mobile device; ASID changes when switching operator; ASID changes when MSISDN are reused by operators; ASID might not change when switching contract within an operator; Providing an ASID is compliant with NL privacy laws. Operators can demand contracts for providing ASID to the content providers. Applications of OMI 2 ASID The OMI 2 ASID will allow you to: Count Unique Visitors to your site / application, user click paths, etc Obtain the mobile end user settings for the site / application Execute Advertising rules like delivery capping 2 Produce full traces of mobile end users many more Obtaining the ASID for your site Without registration, except for Vodafone, the ASID is default not added to the HTTP header. In order to obtain the ASID, you must register your URL(s) with each operator and accept the terms & conditions of the operator. This OMI 2 overview shows if ASID is available and if you need to register: 1 note that KPN uses a different identifier (X-XID) 2 Delivery capping is a Ad Management term to indicate that end users only see an certain advertisement a limited number of times
3 For further information see the Memorandum of Understanding ASID, that is available via this link: ASID with Vodafone & T-Mobile Vodafone and T-Mobile add the OMI 2 ASID with the name X-ASID in the HTTP header. The full technical specification of this added header field has been documented here: ASID with KPN KPN does not support the name X-ASID but uses the name X-XID instead. The required documentation (ASID request form, detailed technical information on the X-XID and Terms & Conditions) can be requested via the [email protected]. In general the X-XID added HTTP header of KPN follows the requirements of the OMI 2 ASID although the domain of the value is different as the length of the identifier will be 12 hexadecimal characters (0-F). However note that this does not impact the capability of uniquely identifying mobile users that enter a mobile site from the KPN network.
4 ASID with MVNO s For MVNO s (Mobile Virtual Network Operators), the ASID is added to the http header when the MVNO (see also is sharing the same infrastructure. The following table shows the MVNO status per operator. Operator MVNO Vodafone Dexcom / Mydad's KPN (Telfort) - T-Mobile (Orange) unknown Note that for some MVNO s it does not make sense to implement an ASID when the MVNO does not support Mobile Internet.
5 Technical specifications of ASID In each supported operator network 3 the ASID is added to the HTTP traffic in the message header that is defined by the IETF RFC The ASID does not represent a standard IANA header but is an extra header field and therefore has to be prefixed with an X-, which results in the name X-ASID. This is what the RFC states: Non-registered headers, called user defined fields, can have any non-registered name, according to RFC 822. The HTTP 1.0 specification also allows such headers: "Unknown header fields are treated as Entity-Header fields." [section 4.3] This means that they are treated as describing the content of the HTTP message. Example of ASID in a HTTP Header If you would examine a HTTP GET request that is forwarded to your webserver from an operator network, you will be seeing the following data: GET HTTP/1.1 Host: User-Agent: Mozilla/5.0 (iphone; U; CPU like Mac OS X; nl-nl) X-ASID: 0400acbABC12+/.. Code Examples of retrieving an ASID The availability of the ASID in you mobile internet application / site depends on the software architecture that is used (operating system, middleware, web servers..). The follow trivial examples assume that a version of Apache is used. Apache has a very simple mechanism to make the HTTP header fields available to the programmer, for each request the HTTP header field is passed on in the environment. See also Accessing the ASID via Apache & PHP $asid = $_SERVER['HTTP_X_ASID']; if (!isset($asid)) { # KPN $asid = $_SERVER['HTTP_X_XID']; } $userprofile = fetchprofile($asid); Accessing the ASID via Apache CGI & Perl my $asid = $ENV{HTTP_X_ASID} $ENV{HTTP_X_XID}; print STDERR The value of ASID = $asid\n ; my $userprofile = fetchprofile($asid); 3 Note that this excludes general WiFi networks, satellite networks etc.
6 The above examples are very simple and not meant to set a standard whatsoever, also the example shows a imaginary fetchprofile() subroutine to demonstrate how you could retrieve the mobile user s profile, the fictive subroutine is not part of the ASID whatsoever. No security requirements have been applied to the above code - like perl taint - to tag the ASID data as a potential security threat as it is external data to the application. Please consult the manuals/guides if you want to make sure you are using the correct programming technique to retrieve the http headers. On the Internet there is a huge collection of examples available, see for example: Testing the ASID in your application To make sure that your code is picking up the ASID you might want to test it first. A very useful tool to execute such a test is the FireFox Ad-On called Modify Headers: With this Ad-On you can temporary ad any http header to you browser request, like the X-ASID and/or X-XID. With another FireFox Ad-On called Live Headers you can also track your request and make sure the added header is available in the request.
7 Testing the ASID on a handset In order to find out if the ASID is actually added to the get request of an handset, you could create a test page in your site/application and display/print the value of the obtained ASID. As a courtesy to OMI 2 MoMac has setup a test page that can be accessed via this link: Accessing ASID in local (e.g. J2ME) applications Due to the current implementation of the ASID (being transported in the HTTP header) the ASID won t be directly available in a local (e.g. J2ME) mobile application. However, it is possible to extend a J2ME application to make a HTTP request to any (registered) URL. The response HTTP data will include the ASID in the HTTP header as described earlier when you have made sure the HTTP request is executed using the standard APN settings, that are also used by the default browser on the handset. ASID and HTTPS Using ASID in encrypted connections poses a problem, as the network operator is not able to add the ASID header into the encrypted stream. For this reason the ASID will not be available when using urls (SSL/TSL encrypted connections). OMI 2 is planning for enhanced versions of the ASID e.g. ASID 2.0. With this version it might be possible to obtain the ASID via a service call when a SSL/TSL connection is used. ASID & WiFi connections When a handset (user) switches the connection from a 3G to WiFi (like the N95), the ASID won t be available in the subsequent requests. As most handsets that have this feature are high end handsets with high capable mobile browsers such as WebKit/Safari, Mobile IE, Opera Mini, etc. it might be possible to extend your application in a way that the ASID is copied to a (permanent) cookie. Once the user leaves the 3G network, the cookie can take over the role of the HTTP header. Make sure when the 3G connection comes back to use the HTTP header again to assert the ASID is still okay (and check and correct the cookie when a difference is detected).
8 ASID FAQ, Tips and Hints Question I can t see any ASID in my HTTP header What about end user privacy? Answer/Advise You need to register your site URL with KPN and T-Mobile Make sure you are using the correct HTTP Header name to retrieve the ASID being X-ASID of X-XID. Note that your webserver and application technology can alter this name e.g. Apache adds a prefix and changes the hyphen into a underscore and presents this variable in the environment as HTTP_X_ASID or HTTP_X_XID. Make sure you adhere to the terms & conditions of each operator, and comply with the Memorandum of Understanding: wnload-memorandum-of-understanding/ When you use the ASID to link CRM information (age, address, preferences) and want to re-use or link the information make sure you ask for explicit permission (opt-in) and inform the end-user that the information might be shared with for example 3 rd parties. What about security? The ASID is secure and anonymous. However when you establish a link to CRM data you might want to encrypt such CRM data before storing so on data theft the data is easy to re-use for malicious reasons. Can I use ASID to direct settle payments and do secure transactions? Are there any groups, companies, markets etc. excluded from ASID? Will ASID work in other countries? ASID itself is transmitted unsecured and must be seen as any other public available data item such as the IP number of the content itself being transmitted over an unsecured connection No Use secure payment systems to implement your billing requirements such as: o Click2Pay (KPN Call Factory) o MiniTix (Rabo) o PayPal Mobile Checkout (Paypal UK) No, currently there is no plan to exclude any end user as the ASID is an Open concept. Yes, for Dutch roaming end users the ASID will work abroad. No, for end users in other countries (having a contract with an operator of that country) ASID will not be available. Note that in other countries other means of user identification might exists, such is provided in the PayForIt framework that is used in countries like the UK & Spain.
9 o
Cyclope Internet Filtering Proxy. - Installation Guide -
Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6
Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.
Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
Facebook Smart Card FB 121211_1800
Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any
DARTFISH PRIVACY POLICY
OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity
User Manual Version 4.0.0.5. User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000
User Manual Version 4.0.0.5 User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000 I Endpoint Protector Appliance User Manual Table of Contents 1. Endpoint Protector Appliance Setup... 1 1.1.
bank zweiplus email Gateway user manual
bank zweiplus email Gateway user manual T +41 (0)58 059 22 22, F +41 (0)58 059 22 44, www.bankzweiplus.ch 1/29 Table of contents 1 Foreword... 3 2 Important Notes... 3 2.1 General... 3 2.2 Password...
A guide to affilinet s tracking technology
A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Tinfoil attack. A study on the security threats and weaknesses of GSM-based communication in BMW cars. Thijs Houtenbos, Jurgen Kloosterman
Tinfoil attack A study on the security threats and weaknesses of GSM-based communication in BMW cars Thijs Houtenbos [email protected] Jurgen Kloosterman [email protected] February 7, 2013
Regain Your Privacy on the Internet
Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you
Sophos Mobile Control Startup guide. Product version: 3
Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos
Secure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications
By Jan De Clercq Understanding and Leveraging SSL-TLS for Secure Communications ii Contents Chapter 2: Leveraging SSL/TLS for Secure Web Communications....... 21 Setting Up SSL/TLS on a Web Server..................................
Overview of Extended Validation (EV) SSL
Extended Validation SSL Order Guide 1 Ordering Guide for Extended Validation SSL 1. Vetting Preparation 2. CSR Generation 3. Online Ordering Process 4. Vetting Process 5. Receiving & Installing your Certificate
Green Pharm is committed to your privacy. We disclose our information practices below and we agree to notify you of:
Privacy Policy is committed to your privacy. We disclose our information practices below and we agree to notify you of: 1. What personally identifiable information of yours or third party personally identification
User Manual. User Manual Version 4.0.0.0
User Manual User Manual Version 4.0.0.0 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
PQ.01.01.08 v3.0. Voice over Wi-Fi. Datasheet
PQ.01.01.08 v3.0 Voice over Wi-Fi Datasheet Version 1.0 29 January 2015 Wi-Fi to the rescue Telecommunication Operators have always struggled to achieve 100% coverage, and to provide basic services like
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Sophos Mobile Control Startup guide. Product version: 3.5
Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile
Web Browsing Examples. How Web Browsing and HTTP Works
How Web Browsing and HTTP Works 1 1 2 Lets consider an example that shows how web browsing and HTTP work. The example will cover a simple, but very common case. There are many more details of HTTP that
Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11
Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about
Integrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5
USG40HE Content Filter Customization
USG40HE Content Filter Customization This guide is designed to help with the setup of the ZyWALL s content filtering feature. Supported Devices USG40HE Firmware version 4.10(AALA.0) or later Overview Content
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
Chapter 1 Load Balancing 99
Chapter 1 Load Balancing 99 asterisk indicates a required parameter. For a term in parentheses, see the corresponding argument in the table above.) Name* (name; Note: Cannot be changed for a previously
Network setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
SKoolAide Privacy Policy
SKoolAide Privacy Policy Welcome to SKoolAide. SKoolAide, LLC offers online education related services and applications that allow users to share content on the Web more easily. In addition to the sharing
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
Web Page Redirect. Application Note
Web Page Redirect Application Note Table of Contents Background... 3 Description... 3 Benefits... 3 Theory of Operation... 4 Internal Login/Splash... 4 External... 5 Configuration... 5 Web Page Redirect
Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com
Dgw v2.0 May 14, 2015 www.media5corp.com Table of Contents Configuration Backup and Restore... 3 File Servers... 4 Configuring the FTP Server...4 Configuring the TFTP Server...4 Configuring the HTTP Server...
Quick Reference Guide: Shared Hosting
: Shared Hosting TABLE OF CONTENTS GENERAL INFORMATION...2 WEB SERVER PLATFORM SPECIFIC INFORMATION...2 WEBSITE TRAFFIC ANALYSIS TOOLS...3 DETAILED STEPS ON HOW TO PUBLISH YOUR WEBSITE...6 FREQUENTLY ASKED
Transferring Your Internet Services
Page 1 of 6 Transferring Your Internet Services Below you will find the instructions necessary to move your web hosting, email, and DNS services to NuVox. The Basics Transferring your domain name Preparing
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
CONTENT of this CHAPTER
CONTENT of this CHAPTER v DNS v HTTP and WWW v EMAIL v SNMP 3.2.1 WWW and HTTP: Basic Concepts With a browser you can request for remote resource (e.g. an HTML file) Web server replies to queries (e.g.
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
Privacy Leaks in Mobile Phone Internet Access
1 Privacy Leaks in Mobile Phone Internet Access Collin Mulliner Security in Telecommunications Technische Universität Berlin / Deutsche Telekom Labs Berlin D-10587, Germany [email protected]
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
Application Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
INTRODUCTION OF IPAD USE AT UT. Introduction of ipad use at the University of Twente... 1. Content... 1. 1. Introduction... 2
CONTENT INTRODUCTION OF IPAD USE AT UT Introduction of ipad use at the University of Twente... 1 Content... 1 1. Introduction... 2 2. BEFORE YOU GET STARTED... 2 3. Setting to work... 2 3.1. Purchase...
Overview of Domain SSL
Domain Validated SSL Order Guide 1 Ordering Guide for Domain SSL 1. Creating a CSR 2. The Ordering Process 3. The Vetting Process 4. Receiving your SSL Certificate 5. Installing your SSL Certificate. Overview
Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index
Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
Vulnerabilità dei protocolli SSL/TLS
Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
Quick Installation Guide DIR-620. Multifunction Wireless Router Supporting GSM, CDMA, WiMAX with Built-in 4-port Switch
DIR-620 Multifunction Wireless Router Supporting GSM, CDMA, WiMAX with Built-in 4-port Switch BEFORE YOU BEGIN Delivery Package Multifunction wireless router DIR-620 Power adapter DC 5V/2.5A Ethernet cable
LIDL PRIVACY POLICY. Effective Date: June 11, 2015
LIDL PRIVACY POLICY Effective Date: June 11, 2015 Thank you for visiting Lidl US, LLC's (3500 S. Clark Street, Arlington, VA 22202) website (collectively, "Lidl," "we," or "us"). We are committed to providing
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
G-router GSM/GPRS to RS-232 and Ethernet Gateway Roaming HOWTO guide
G-router GSM/GPRS to RS-232 and Ethernet Gateway Roaming HOWTO guide Author Hardware Release Roaming Howto Version Date Covering Product code 026C 12-12-2008 G-router, RE.40.QGSM Contents 1 Roaming HOWTO
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Managing Mobility. 10 top tips for Enterprise Mobility Management
Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
How to Configure edgebox as a Web Server
intelligence at the edge of the network www.critical-links.com edgebox V4.5 Introduction: The Web Server panel allows the simple creation of multiple web sites using the Apache web server. Each website
Office 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
FiOS Quantum TM. Gateway GUEST WI-FI SETUP GUIDE FOR BUSINESS CUSTOMERS
FiOS Quantum TM Gateway GUEST WI-FI SETUP GUIDE FOR BUSINESS CUSTOMERS Table of Contents Guest Wi-Fi Router Feature for Business Customers...1-2 Logging Into the Router Interface...3-5 Setting up Your
Front-End Performance Testing and Optimization
Front-End Performance Testing and Optimization Abstract Today, web user turnaround starts from more than 3 seconds of response time. This demands performance optimization on all application levels. Client
NHSmail mobile configuration guide Apple iphone
Only the Apple iphone 3GS and iphone 4 support encryption at rest. The iphone 3G and iphone 2G will not connect to NHSmail NHSmail mobile configuration guide Apple iphone Version: V.6 Date: November 2011
ONLINE PRIVACY POLICY
ONLINE PRIVACY POLICY The City of New Westminster is committed to protecting your privacy. Any personal information collected, used or disclosed by the City is in accordance with the Freedom of Information
Office 365 deploym. ployment checklists. Chapter 27
Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Mobile Device Management Fleet manager s guide. Philippe CAJET Admin Guide MDM R1.6_2013 August 1 st _V 1
Mobile Device Management Fleet manager s guide Philippe CAJET Admin Guide MDM R1.6_2013 August 1 st _V 1 2 Summary Pages Pages Mobile Device Management Fleet manager s guide 1 SUMMARY 2 SUMMARY 3 0. connection
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
User s guide. Version 2.0. August 2010 1 / 23
User s guide Version 2.0 August 2010 1 / 23 1 CONTENTS 2 Introduction... 3 2.1 What is Mouseflow?... 3 2.2 What can Mouseflow be used for?... 3 2.3 How does Mouseflow work?... 3 2.4 Who is the target audience?...
The LRS File Transfer Service offers a way to send and receive files in a secured environment
File Transfer Service The LRS File Transfer Service offers a way to send and receive files in a secured environment using HTTPS or FTPS. It also supports unsecured standard FTP transfers. The service supports
An Introduction To The Web File Manager
An Introduction To The Web File Manager When clients need to use a Web browser to access your FTP site, use the Web File Manager to provide a more reliable, consistent, and inviting interface. Popular
Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
WebMail Forensics. Thomas Akin, CISSP. Director, Southeast Cybercrime Institute Kennesaw State University
WebMail Forensics Thomas Akin, CISSP Director, Southeast Cybercrime Institute Kennesaw State University Overview Web Browser Forensics Internet Explorer Netscape WebMail Services Cookies, History, & Cache,
Setting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
Wharf T&T Cloud Backup Service User & Installation Guide
Wharf T&T Cloud Backup Service User & Installation Guide Version 1.6 Feb 2013 Table of contents BEFORE YOU INSTALL 3 Page Section 1. Installation of Client Software 5 Section 2. Account Activation 8 Section
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring the Forefront TMG HTTP Filter Abstract In this article I will show you how to configure
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Public Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting your privacy.
PRIVACY POLICY 2015 PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE Public Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting
Parallels Plesk Panel 11 for your Windows Server
Getting Started Guide Parallels Plesk Panel 11 for your Windows Server Getting Started Guide Page 1 Getting Started Guide: Parallels Plesk Panel 11, Windows Server Version 1.1 (11.1.2012) Copyright 2012.
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.
Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved
