Team Quicken Loans: Mobile RFID Inventory Tracking System. Administrator Manual



Similar documents
Team Quicken Loans: Mobile RFID Inventory Tracking System. Project Plan. Spring 2014

RFID Tracking System Installation

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Secure Messaging Server Console... 2

Secret Server Qualys Integration Guide

Eylean server deployment guide

Bitrix Site Manager ASP.NET. Installation Guide

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx

Cloud Services ADM. Agent Deployment Guide

Polar Help Desk Installation Guide

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Okta/Dropbox Active Directory Integration Guide

This release bulletin relates to Version build 2701 of the Swivel Authentication Platform and other new capabilities.

Google Trusted Stores Setup in Magento

Training module 2 Installing VMware View

Desktop Deployment Guide ARGUS Enterprise /29/2015 ARGUS Software An Altus Group Company

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

NetWrix File Server Change Reporter. Quick Start Guide

Active Directory Management. Agent Deployment Guide

XML Export Interface. IPS Light. 2 April Contact

Creating a generic user-password application profile

Configuring and Troubleshooting Internet Information Services in Windows Server 2008

Hands-On Lab. Embracing Continuous Delivery with Release Management for Visual Studio Lab version: Last updated: 12/11/2013

System Administration Training Guide. S100 Installation and Site Management

docs.hortonworks.com

Active Directory Management. Agent Deployment Guide

Defender Token Deployment System Quick Start Guide

Composite C1 Load Balancing - Setup Guide

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x

Live Maps. for System Center Operations Manager 2007 R2 v Installation Guide

WHMCS LUXCLOUD MODULE

Phone Inventory 1.0 (1000) Installation and Administration Guide

Copyright 2013, 3CX Ltd.

Configuring user provisioning for Amazon Web Services (Amazon Specific)

TIBCO Spotfire Platform IT Brief

NTP Software VFM Administration Web Site for EMC Atmos

SortSite Enterprise Deployment Guide v1.1.13

AD Self Update 2.2. Installation and configuration. Dovestones Software

Matrix Logic WirelessDMS Service 2.0

Mobile Device Management Version 8. Last updated:

G-Lock EasyMail7. Admin Guide. Client-Server Marketing Solution for Windows. Copyright G-Lock Software. All Rights Reserved.

Installation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/ ARGUS Software, Inc.

Burst Technology bt-loganalyzer SE

PC Monitor Enterprise Server. Setup Guide

Protected Trust Directory Sync Guide

Scan to Cloud Installation Guide

enicq 5 System Administrator s Guide

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: Version: 2.2

Authentication Methods

Windows XP Exchange Client Installation Instructions

Google Apps SSO to Office 365 Integration

Toll Free: International:

tibbr Now, the Information Finds You.

MS 10978A Introduction to Azure for Developers

Setup Guide. network support pc repairs web design graphic design Internet services spam filtering hosting sales programming

Umbraco Courier 2.0. Installation guide. Per Ploug Hansen 5/24/2011

Google Apps SSO to Office 365 Integration

Kentico CMS security facts

Pcounter Web Report 3.x Installation Guide - v Pcounter Web Report Installation Guide Version 3.4

Creating a User Profile for Outlook 2013

SmartConnect User Credentials 2012

Site Monitor. Version 5.3

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Version 1.0 January Xerox Phaser 3635MFP Extensible Interface Platform

ProSystem fx Document

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

RMCS Installation Guide

Microsoft Outlook 2013 & Microsoft Outlook Microsoft Outlook Windows Live Mail 2012 & MAC Mail. Mozilla Thunderbird

IFS TOUCH APPS SERVER INSTALLATION GUIDE

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Windows Mobile 6.5 Classic Pocket Inventory Install and Setup in Windows XP

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6

NetWrix SQL Server Change Reporter. Quick Start Guide

TARGETPROCESS HELP DESK PORTAL

LearningServer Portal Manager

4cast Server Specification and Installation

Setup Guide for AD FS 3.0 on the Apprenda Platform

Setting Up Scan to SMB on TaskALFA series MFP s.

VERALAB LDAP Configuration Guide

Rights Management Services

Exchange Service ReadMe and Configuration Setup

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Jim2 ebusiness Framework Installation Notes

Kentico 8 Certified Developer Exam Preparation Guide. Kentico 8 Certified Developer Exam Preparation Guide

FaxCore 2007 Database Migration Guide :: Microsoft SQL 2008 Edition

INSTRUCTION MANUAL AND REFERENCE FOR IT DEPARTMENTS

Contents. Before You Install Server Installation Configuring Print Audit Secure... 10

To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.

Secret Server Installation Windows Server 2012

XIA Configuration Server

RoomWizard Synchronization Software Manual Installation Instructions

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

IC L05: Security.cloud Configuring DLP on to your flow & Applying security to your Office 365 or Google Apps deployment Hands-On Lab

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

PowerLink for Blackboard Vista and Campus Edition Install Guide

Active Directory Self-Service FAQ

BlackBerry Enterprise Server Resource Kit

Version Devolutions inc.

Transcription:

Team Quicken Loans: Mobile RFID Inventory Tracking System Administrator Manual

TABLE OF CONTENTS Mobile RFID Inventory Tracking System Admin Manual What s the Mobile RFID Inventory Tracking System?... 3 About... 3 You should know... 3 How do I use the system?... 4 Example Use Case #1 For Administrator... 4 Example Use Case #2 for Administrator... 4 Tour Web Application... 4 Step-by-Step... 8 Setup and Development... 9 Setup... 9 API Authentication... 9 Development... 9 2

WHAT S THE MOBILE RFID INVENTORY TRACKING SYSTEM? ABOUT The RFID mobile device tracking system automates the process of checking mobile devices in and out of a secure lockbox. The mobile device testing group at Quicken Loans had been using manual logging to keep track of who had what mobile device checked out at any given time. This caused issues such as devices missing for extended periods of time, thus the team decided that an automated process would be more desirable. The RFID mobile device tracking system utilizes RFID tagging of the mobile devices in conjunction with in-place RFID scanners and employee authentication to automate the process. Each device will have a unique RFID tag affixed to it that will identify the device. The in-place RFID scanner is responsible for detecting which tagged devices are present in the cabinet. Lastly, employees may access the storage area by authenticating themselves with their company assigned badge. A front-end web application replaces the manual logging. This application allows team members to view current inventory and check-out history. The front-end also has administrator interfaces to notify employees in possession of checked-out devices, as well as providing management functionality for devices and information pertaining to the devices. YOU SHOULD KNOW The RFID Mobile Inventory Tracking System is configured to be simple to use. For most users, the process should be highly automated. Scanning your badge at the cabinet before and after exchanging devices with the cabinet will automatically go through the entire check-in/check-out process. Users never need to touch the bundled web application, but it is available for checking device statuses beforehand. For administrators, the experience should be similar. The model for handling devices isn t too complicated, and has a simple UI in the web application. 3

HOW DO I USE THE SYSTEM? EXAMPLE USE CASE #1 FOR ADMINISTRATOR Sally Admin is in charge of managing the devices in the Mobile Device Cabinet. She receives a shipment of new devices for testing purposes. Sally logs into the front-end web application and selects the option to add a new device. She enters the information for each new device on the web application and confirms that each device was added. She then tags each device with a new RFID tag, scans her ID to open the cabinet, and places the devices inside. When the cabinet closes, the RFID reader reads the new devices and marks them as checked in. EXAMPLE USE CASE #2 FOR ADMINISTRATOR Tom Boss is also an administrator in charge of tracking the mobile devices in the cabinet. He receives a complaint from Norah Smith in the mobile device testing team that the mobile device she needs to test on has been missing for a while. When Tom logs into the front-end application to view the device inventory, he confirms that the Samsung Galaxy S3 running Android version 4.3 that Norah Smith is requesting has been checked out by Bob Smith for a year. Tom chooses the administrator option to notify and selects the option to notify the current possessor. The front-end notifies the back-end web service, and the back-end web service sends out an email to Bob Smith notifying him that the device is needed and that he has had it for too long. Bob Smith receives the email and returns the phone the next day. TOUR WEB APPLICATION The tracking system comes bundled with a web application to make viewing device statuses easy. The application should be hosted internally, and should be available where a user works with company-owned devices. In the following figures, note that the application host will vary. 4

Figure 1: Web Application Device Inventory Page As shown in figure 1, the web application displays the list of all registered devices with their current status and information. Administrators can delete devices off of this main page. Delete devices when you re no longer interested in tracking them with the system. When devices are checked out, the user to whom the device is checked out and the time they checked that device out are shown. This can be used to know the whereabouts of a device. 5

Figure 2: User History Page Figure 2 shows the web application s view of all known sessions in which that user checked a device out and checked it back in. Each user s history is accessible and recorded. The web service provides the list of all known users and their histories. This may be useful to see if a device will likely be inaccessible when a user has historically used that device frequently. As an administrator, you ll be able to notify users of all devices they have checked out. The web service will send an email containing information about all the devices a user has, and request they be returned to the cabinet. 6

Figure 3: Device History Page Figure 3 displays the web application s device history view. A device s history consists of all known sessions in which any user checked that device out and later checked it back in. Each device has its corresponding history tracked and can be viewed via the web application. This may be useful to see a typical availability schedule of a device. As an administrator, you can notify by device as well. By clicking the button on the web application, the web service will send an email to the current device s possessor, requesting the device be returned to the cabinet. To manipulate devices and their information, the web application comes with administrator functionality restricted with administrator access. 7

Figure 4: The landing page for administrator functions Figure 4 displays the landing page for administrator functions. From this page, you may manipulate information of devices you wish to track. Devices require a device type, RFID tag number, and name. Administrators can manage devices, device types, manufacturers, and operating systems. A device has a device type; in turn, a device type has a manufacturer and operating system. STEP-BY-STEP The following section will detail all the steps needed to check devices in and out of the cabinet in a similar case to the sample user case. Note that the below process encompasses all steps you ll need to both take devices from and return them to the cabinet. 1. Locate the badge scanner, which should be attached to a computer nearby your device cabinet. 2. Scan your badge over the scanner using RFID technology, the scanner should easily be able to pick up your badge. 3. Depending on the snapshot length configured in the Cabinet Guard application, you may have to wait a moment before grabbing devices. Usually, this delay should be very short or non-existent. 4. Grab from the cabinet any devices you want to work with. If you have any devices you want to return, replace them back into the cabinet. 5. Scan your badge on the badge scanner. This will let the system know you re done, and that it can figure out what devices have moved. 8

SETUP AND DEVELOPMENT SETUP This system is intended to be deployed to a Microsoft Server with.net framework 4.5.1 or above. Refer to the <appsettings> area of the web.config files of the API and MVC projects to change the following key/value pairs: 1. Smtpserver/port the server and port from which notification emails will be sent 2. Sender Email/password the credentials the system will use to send emails out 3. Admin email the email to which additional administrator notifications will be sent 4. API password the shared secret to be used by the API and other applications with which it will communicate. The cabinet guard runs on Windows machines. The machine running cabinet guard needs to be able to access the RFID scanner over the network, and can be targeted via the XML file in cabinet guard s own UI. The badge scanner should be connected via USB to the computer running cabinet guard to receive its input. The cabinet guard can be configured by hand through an XML file named config.xml that it expects to be in the same directory as the application itself. This file also contains credentials for authenticating the application to the API. To generate the database model used by our system, run the SQL script bundled with the source code to create the model. Next, change the web.config file in the MVC application to target the location at which the API is hosted, and target this url in the config.xml file as well. API AUTHENTICATION The API uses basic HTTP authentication to secure sensitive API calls. The web.config for the API contains a field for an API shared secret, shared between the API and the front-end web application. The authentication is also notable in the config.xml file for the Cabinet Guard, which contains fields for authentication to the API. For basic HTTP authentication to be secure, the server should communicate over SSL. To remove or alter API authentication, alter the custom message handler in the API project. DEVELOPMENT To change membership over to Active Directory, change the membership provider in both the MVC and API projects to the Active Directory provider, which is configured in each web.config file. To change the database model correspondingly, remove the ASP.NET membership table in the database. The SQL role provider is bundled with the membership provider, which can be 9

removed in web.config of the API and MVC projects; the permissions table in the database can be deleted correspondingly. 10