Exceed onDemand A Technical Whitepaper

Exceed onDemand A Technical Whitepaper Exceed onDemand A Technical Whitepaper

mimage.hummingbird.com
from mimage.hummingbird.com More from this publisher
14.11.2012 Views

Exceed onDemand 5 — A Technical Whitepaper In the other words, “de-activate” option can be used as a passive license enforcement mechanism. Imagine a situation where 10 assigned/named licenses were purchased and installed. Exceed onDemand Server would keep track of all the users that ever logged on to the Server. The first time a user connected to Exceed onDemand Server, an active account would be created for that user. All 10 licenses are “assigned” after 10 users have logged on to the Server. But let’s assume one of the users was not supposed to connect to this Server. Instead of removing the user account, the administrator could deactivate it. The next time when the same user connected to the Server, the Server would not create a new active account for that user, and the user would be effectively blocked from accessing the Server again. File Management Xstart and Xconfig files can be easily managed using Exceed onDemand Server Manager. In fact, global files can only be created, modified and deleted using the Server Manager. Administrators are also given full access and full rights to manage user-defined files. In addition, administrators can distribute or relocate both global and user-defined files using this intuitive user interface. Figure 25 — Server Manager can also manage global and user-defined configuration files 46

Advanced Configuration Advanced Security Settings > Exceed onDemand 5 — A Technical Whitepaper Exceed onDemand is a connectivity solution that is targeted for all types of network connections, including WAN and Internet. In an effort to offer the best security mechanisms and support the broadest range of industry-recognized security protocols, Exceed onDemand provides a two-stage security system that allows companies to encrypt the connections using Secure Sockets Layer (SSL) and Secure Shell protocols to ensure end-to-end security and the privacy of corporate data. SSL The SSL support found in Exceed onDemand is an implementation of OpenSSL 0.9.7e. It is used to secure the connections between Exceed onDemand Client and Exceed onDemand Server. Once enabled, both the Cluster Manager and X Session connections will be secured, in which case, the user credentials, configuration data and Thin X Protocol traffic are scrambled. X Application Exceed onDemand Server Exceed onDemand Cluster Manager X Proxy Manager Exceed onDemand Proxy Figure 26 — Configuration and X session connections are secured by SSL Secure Sockets Layer Cluster Manager Connection Port 5500 Proxy Connection Port 5501 Exceed onDemand Client Only the administrator of Exceed onDemand Server can modify the SSL option. The SSL setting affects all connections to all nodes of Exceed onDemand Server. 47

Advanced Configuration<br />

Advanced Security Settings<br />

> <strong>Exceed</strong> <strong>onDemand</strong> 5 — A <strong>Technical</strong> <strong>Whitepaper</strong><br />

<strong>Exceed</strong> <strong>onDemand</strong> is a connectivity solution that is targeted for all types of network connections,<br />

including WAN and Internet. In an effort to offer the best security mechanisms and support the<br />

broadest range of industry-recognized security protocols, <strong>Exceed</strong> <strong>onDemand</strong> provides a two-stage<br />

security system that allows companies to encrypt the connections using Secure Sockets Layer (SSL)<br />

and Secure Shell protocols to ensure end-to-end security and the privacy of corporate data.<br />

SSL<br />

The SSL support found in <strong>Exceed</strong> <strong>onDemand</strong> is an implementation of OpenSSL 0.9.7e. It is used<br />

to secure the connections between <strong>Exceed</strong> <strong>onDemand</strong> Client and <strong>Exceed</strong> <strong>onDemand</strong> Server. Once<br />

enabled, both the Cluster Manager and X Session connections will be secured, in which case,<br />

the user credentials, configuration data and Thin X Protocol traffic are scrambled.<br />

X Application<br />

<strong>Exceed</strong> <strong>onDemand</strong> Server<br />

<strong>Exceed</strong> <strong>onDemand</strong><br />

Cluster Manager<br />

X Proxy Manager<br />

<strong>Exceed</strong> <strong>onDemand</strong> Proxy<br />

Figure 26 — Configuration and X session connections are secured by SSL<br />

Secure Sockets Layer<br />

Cluster Manager<br />

Connection Port 5500<br />

Proxy Connection<br />

Port 5501<br />

<strong>Exceed</strong> <strong>onDemand</strong> Client<br />

Only the administrator of <strong>Exceed</strong> <strong>onDemand</strong> Server can modify the SSL option. The SSL setting<br />

affects all connections to all nodes of <strong>Exceed</strong> <strong>onDemand</strong> Server.<br />

47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!