Exceed onDemand A Technical Whitepaper
Exceed onDemand A Technical Whitepaper Exceed onDemand A Technical Whitepaper
Exceed onDemand 5 — A Technical Whitepaper In the other words, “de-activate” option can be used as a passive license enforcement mechanism. Imagine a situation where 10 assigned/named licenses were purchased and installed. Exceed onDemand Server would keep track of all the users that ever logged on to the Server. The first time a user connected to Exceed onDemand Server, an active account would be created for that user. All 10 licenses are “assigned” after 10 users have logged on to the Server. But let’s assume one of the users was not supposed to connect to this Server. Instead of removing the user account, the administrator could deactivate it. The next time when the same user connected to the Server, the Server would not create a new active account for that user, and the user would be effectively blocked from accessing the Server again. File Management Xstart and Xconfig files can be easily managed using Exceed onDemand Server Manager. In fact, global files can only be created, modified and deleted using the Server Manager. Administrators are also given full access and full rights to manage user-defined files. In addition, administrators can distribute or relocate both global and user-defined files using this intuitive user interface. Figure 25 — Server Manager can also manage global and user-defined configuration files 46
Advanced Configuration Advanced Security Settings > Exceed onDemand 5 — A Technical Whitepaper Exceed onDemand is a connectivity solution that is targeted for all types of network connections, including WAN and Internet. In an effort to offer the best security mechanisms and support the broadest range of industry-recognized security protocols, Exceed onDemand provides a two-stage security system that allows companies to encrypt the connections using Secure Sockets Layer (SSL) and Secure Shell protocols to ensure end-to-end security and the privacy of corporate data. SSL The SSL support found in Exceed onDemand is an implementation of OpenSSL 0.9.7e. It is used to secure the connections between Exceed onDemand Client and Exceed onDemand Server. Once enabled, both the Cluster Manager and X Session connections will be secured, in which case, the user credentials, configuration data and Thin X Protocol traffic are scrambled. X Application Exceed onDemand Server Exceed onDemand Cluster Manager X Proxy Manager Exceed onDemand Proxy Figure 26 — Configuration and X session connections are secured by SSL Secure Sockets Layer Cluster Manager Connection Port 5500 Proxy Connection Port 5501 Exceed onDemand Client Only the administrator of Exceed onDemand Server can modify the SSL option. The SSL setting affects all connections to all nodes of Exceed onDemand Server. 47
- Page 1: Transforming Information into Intel
- Page 4 and 5: Exceed onDemand 5 — A Technical W
- Page 6 and 7: Exceed onDemand 5 — A Technical W
- Page 8 and 9: Exceed onDemand 5 — A Technical W
- Page 10 and 11: Exceed onDemand 5 — A Technical W
- Page 12 and 13: Exceed onDemand 5 — A Technical W
- Page 14 and 15: Exceed onDemand 5 — A Technical W
- Page 16 and 17: Exceed onDemand 5 — A Technical W
- Page 18 and 19: Exceed onDemand 5 — A Technical W
- Page 20 and 21: Exceed onDemand 5 — A Technical W
- Page 22 and 23: Exceed onDemand 5 — A Technical W
- Page 24 and 25: Exceed onDemand 5 — A Technical W
- Page 26 and 27: Exceed onDemand 5 — A Technical W
- Page 28 and 29: Exceed onDemand 5 — A Technical W
- Page 30 and 31: Exceed onDemand 5 — A Technical W
- Page 32 and 33: Exceed onDemand 5 — A Technical W
- Page 34 and 35: Exceed onDemand 5 — A Technical W
- Page 36 and 37: Exceed onDemand 5 — A Technical W
- Page 38 and 39: Exceed onDemand 5 — A Technical W
- Page 40 and 41: Exceed onDemand 5 — A Technical W
- Page 42 and 43: Exceed onDemand 5 — A Technical W
- Page 44 and 45: Exceed onDemand 5 — A Technical W
- Page 48 and 49: Exceed onDemand 5 — A Technical W
- Page 50 and 51: Exceed onDemand 5 — A Technical W
- Page 52 and 53: Exceed onDemand 5 — A Technical W
- Page 54 and 55: Exceed onDemand 5 — A Technical W
- Page 56 and 57: Exceed onDemand 5 — A Technical W
- Page 58 and 59: Exceed onDemand 5 — A Technical W
- Page 60 and 61: Exceed onDemand 5 — A Technical W
- Page 62: Server > Desktop Consolidation > X
Advanced Configuration<br />
Advanced Security Settings<br />
> <strong>Exceed</strong> <strong>onDemand</strong> 5 — A <strong>Technical</strong> <strong>Whitepaper</strong><br />
<strong>Exceed</strong> <strong>onDemand</strong> is a connectivity solution that is targeted for all types of network connections,<br />
including WAN and Internet. In an effort to offer the best security mechanisms and support the<br />
broadest range of industry-recognized security protocols, <strong>Exceed</strong> <strong>onDemand</strong> provides a two-stage<br />
security system that allows companies to encrypt the connections using Secure Sockets Layer (SSL)<br />
and Secure Shell protocols to ensure end-to-end security and the privacy of corporate data.<br />
SSL<br />
The SSL support found in <strong>Exceed</strong> <strong>onDemand</strong> is an implementation of OpenSSL 0.9.7e. It is used<br />
to secure the connections between <strong>Exceed</strong> <strong>onDemand</strong> Client and <strong>Exceed</strong> <strong>onDemand</strong> Server. Once<br />
enabled, both the Cluster Manager and X Session connections will be secured, in which case,<br />
the user credentials, configuration data and Thin X Protocol traffic are scrambled.<br />
X Application<br />
<strong>Exceed</strong> <strong>onDemand</strong> Server<br />
<strong>Exceed</strong> <strong>onDemand</strong><br />
Cluster Manager<br />
X Proxy Manager<br />
<strong>Exceed</strong> <strong>onDemand</strong> Proxy<br />
Figure 26 — Configuration and X session connections are secured by SSL<br />
Secure Sockets Layer<br />
Cluster Manager<br />
Connection Port 5500<br />
Proxy Connection<br />
Port 5501<br />
<strong>Exceed</strong> <strong>onDemand</strong> Client<br />
Only the administrator of <strong>Exceed</strong> <strong>onDemand</strong> Server can modify the SSL option. The SSL setting<br />
affects all connections to all nodes of <strong>Exceed</strong> <strong>onDemand</strong> Server.<br />
47