Recently Updated Pages
Security baseline
Security by design The platform is security designed in accordance with OWASP version 4: Leve...
Compliance external
Request logging The webserver itself can be set up to do make detailed logs in file , containing...
Compliance built-in
Activity and data logging (optional) Activity and Data Logging includes the automatic creation o...
Security Setup
The following security and compliance features are enabled and active: Password policy The ena...
Encryption
HTTPS / SSL is readily supported as the interface is indifferent of which protocol is used by the...
Data restrictions
Understanding permissions Data access is retricted in two ways Mandatory permissions granting...
Protection
System name Display name Explantion Extra info bruteforceCooldownMinutes Brutefo...
Bruteforce
In order to prevent bruteforce attacks on passwords to meaures are implemented Maximum number ...
Licenses
Normal users Only active users are paid for, down to a minimum of 5. A service can be configure...
Requirements
Languages Frontend can run multiple languages simultaneously. Preconfigured languages Engl...
Hosting
TS recommends using hosted cloud servers, but on prem setup is also possible. Read about Require...
Security
Authentication Authentication is based on username/password. Optionally 2-factor authentication...
Data handling
Storage and backup You can choose between On premisis (customer location) Cloud hosting C...
Requirements
Hardware requirements Tempus Serva is a highly optimized platform, that will run on even the sma...
Tomcat7
Windows As Tomcat 6 except for step 2 cd "C:\Program Files\Apache Software Foundation\Tomcat 7....
Tomcat6
Windows The service can be changed by Open prompt as Administrator Run the following command...
JBoss 7.x
Windows Edit [JBoss home]\bin\standalone.conf.bat Ensure the following value is present s...
Tomcat8
Windows As Tomcat 7 except for step 2 cd "C:\Program Files\Apache Software Foundation\Tomcat 8....
Problems with wrappers
The usage of wrappers can result in SSL warnings. If your solution is depending on the use of Wr...
SQL Query
An SQL Query may extract almost anything from the database. This process ignores the security re...