14.11.2012 Views

Exceed onDemand A Technical Whitepaper

Exceed onDemand A Technical Whitepaper

Exceed onDemand A Technical Whitepaper

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Exceed</strong> <strong>onDemand</strong> 5 — A <strong>Technical</strong> <strong>Whitepaper</strong><br />

Figure 27 — Administrator can configure SSL settings in the Cluster Settings dialog box<br />

<strong>Exceed</strong> <strong>onDemand</strong> supports all ciphersuites that are available to OpenSSL 0.9.7e. When using<br />

ciphersuites that use the Digital Signature Standard (DSS), <strong>Exceed</strong> <strong>onDemand</strong> Client verifies the<br />

identity of the Server before establishing an SSL-encrypted session. Therefore the Server must<br />

have the private key file and certificate file. All flavors of <strong>Exceed</strong> <strong>onDemand</strong> Server come with<br />

the necessary utility to generate such files.<br />

Secure Shell<br />

While the implementation of SSL helps to secure the connections between <strong>Exceed</strong> <strong>onDemand</strong><br />

Client and <strong>Exceed</strong> <strong>onDemand</strong> Server, Secure Shell is used to secure the connections from the <strong>Exceed</strong><br />

<strong>onDemand</strong> Proxy to the host where the X applications reside. Secure Shell is an additional start<br />

method that is similar to other Remote command startup modes, such as Telnet, except it uses the<br />

SSH protocol and is able to offer strong security features that Telnet and other unsecured protocols<br />

cannot, namely encryption and X11 port forwarding.<br />

Figure 28 — Making connection using Secure Shell<br />

48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!