MACROMEDIA FLASH MEDIA SERVER 2-USING FLASH MEDIA SERVER EDGE SERVERS Guia do Utilizador Página 21

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 25
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 20
ADOBE CONNECT 6.0
Technical Overview
17
A trusted third party, called a certification authority, verifies the identity of a client and binds a certificate in X.509
format (also called a public key) to that client. When a client connects to Enterprise Server, a proxy negotiates the
connection for PKI. If the client has a cookie from a previous session or has a valid certificate, the client is connected
to Enterprise Server.
Note: Use HTTP header-based authentication to implement PKI. For more information, see HTTP header-based
authentication.
Database security
Whether or not you are hosting your database on the same server as Enterprise Server, you must be certain that your
database is secure. Computers hosting a database must be in a physically secure location. Additional precautions
include installing the database in the secure zone of your organizations intranet, never connecting the database
directly to the Internet, and backing up all data regularly and storing copies in a secure off-site location.
To further secure your Microsoft SQL database, see the Microsoft security website
(www.microsoft.com/sql/technologies/security/). It contains information that applies to SQL Server 2000, SQL
Server 2005, and the embedded database engine (MSDE).
Note: Enterprise Server supports SQL authentication only; you must select SQL Server with mixed-mode authenti-
cation. Enterprise Server does not support Windows Authentication mode.
The Enterprise Server application server is designed to prevent unauthorized remote access to the database. Enter-
prise Server uses only prepared statements to communicate with the database, thereby preventing the most common
remote SQL exploits. Enterprise Server further checks the validity of arguments to the database, and finally performs
a security check on each access to every key in the database. The Enterprise Server security systems default behavior
is to deny access where permission is not explicitly granted to a given row.
Enterprise Server also encrypts columns in the database that contain sensitive data. Even someone with full access
to the database server is not able to access user passwords or other sensitive information.
Content access
Adobe Acrobat Connect Enterprise Manager is a web application that acts as an access and control point for all
Enterprise Server applications. Enterprise Manager not only allows you to set up and manage meetings, seminars,
and training courses and curriculums, but also enables you to manage and control content that you can share
through meetings, presentations, training courses, and events.
To secure content, you can use the user management component of Enterprise Manager to set access permissions for
the users of the content and the administration of the content itself through a simple, intuitive user interface. All
Enterprise Server content is contained and organized in a directory of folders called the Content library, which you
access though Enterprise Manager.
Furthermore, not everyone can use all the Enterprise Manager features. These access-controlled features depend on
the Enterprise Server configuration and each user’s permissions. For example, if a user is not a member of the
Administrators group, they cannot access the Administration tab in Enterprise Manager. For more information on
securing content and working with the Content library, see the Adobe Connect Enterprise User Guide available online
at www.adobe.com/go/connect_documentation_en.
Vista de página 20
1 2 ... 16 17 18 19 20 21 22 23 24 25

Comentários a estes Manuais

Sem comentários