Advanced Search
Search Results
541 total results found
Bruteforce
In order to prevent bruteforce attacks on passwords to meaures are implemented Maximum number of retries for passwords Detection of spread attacks across multiple accounts Maximum login retries Configuration options for Maximum number of login retries ...
Data restrictions
Understanding permissions Data access is retricted in two ways Mandatory permissions granting access to Certain groups of fields (blocks) Records in certain status Optional filters binding certain data to certain users Owner user (the user ...
Encryption
HTTPS / SSL is readily supported as the interface is indifferent of which protocol is used by the user. It is however possible to force the user to use SSL by tweaking the configuration Force SSL during logins Force SSL in interface Users making specif...
Security baseline
Security by design The platform is security designed in accordance with OWASP version 4: Level 2: Compliant Level 3: +90% supported In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001,...
Security built-in
Password Policies (recommended) TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as: Mimimum passwor...
Security external
Virus scanning Scanning of uploaded files are left to software installed on the system. The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected. Storage encrypti...
Compliance built-in
Activity and data logging (optional) Activity and Data Logging includes the automatic creation of a series of log files. Logging can be set up for each entity in an application providing insight and transparency in relation to: user activity, creation, change...
Compliance external
Request logging The webserver itself can be set up to do make detailed logs in file , containing for example Request timestamp, IP and session ID Stacktraces on errors Depending on your security setup you might want to log these to a central repository
Styling
Note: Dashboard styling is under development Dashboard styling For CSS flex ordering dashboard elements you can add one of these classes to the dashboard tsDashboardLayoutRow tsDashboardLayoutColumn Widget styling The following classes can freely be ...
Get started
This information is also applicable to the field Visual extra: SQL: Diagram query. This site only describes the specifics of the diagram widgets, for general widget configuration click here. This article will only cover the newest version of graphs implement...
Data and Internationalization
An SQL Query may extract almost anything from the database. This process ignores the security restrictions in the system, so you will have to implement them yourself. Structure The structure is the same for all graphs. The first row of data will be used fo...
Adding functionality
It is possible to add some simple funktionality to charts, by adding links. This feature is limited to one link pr x-axis value. To add a link, add a column named "Link" to the query. Whatever this column contains will become a link, that can be navigated t...
Graph defaults
The graphs all reference the js object tsChartDefaultOptions, with a couple of tweaks. To see the defaults, open the terminal in you browser, on a page that has a graph and type the name of the object. Specifik defaults These can't be overwritten. Area sta...
Colors
The colors used, can be overwritten in the Policy diagramChartJSColors. The structure of the policy is very strict. The policy has to be formatted as a js array of strings that represent an rgb color. Thus: It has to start with [ and and with , ]. Each col...
Many pages / long page name
The following code will shorten page selectors, unless they are hovered or active .tablePageSelector td a { max-width: 80px; overflow: hidden; text-overflow: ellipsis; font-size: 80%; } .tablePageSelector .tablePageSelectorElementAct...
Rounded corners missing in simple menu mode
When a user is running in the context of a simple user certain buttons will be hidden, and on displayed in the expanded menu ("burger"). Previous buttons might have their corners correctly, which can be mitigated by removing the items (they are normally just h...
Install components
Before you start ensure Java 8 is the default Certificate Ensure you have a valid certificate sudo nano /mnt/sda/certs/doc2mail.pke Copy paste contents of the certificate sudo chmod 777 /mnt/sda/certs/doc2mail.pke Binaries Download OneTooX implementatio...
Test commandline setup
In this step you will configure and test the configuration for the commandline Update the parameters below i: Location of a test PDF t: Name of the document type r: A real CPR number Execute the following command java -cp .:/mnt/sda/deploy/doc2mail/*...
Server configuration: Linux
In this step you will deploy the commandline configuration Make the following substitutions i: $DOCUMENT title: $TITLE r: $CPR testmode: 0 The connection string should look something like java -cp .:/mnt/sda/deploy/doc2mail/* dk.doc2mail.client.File...
Server configuration : Windows
In this step you will deploy the commandline configuration Make the following substitutions i: @@DOCUMENT@@ title: @@TITLE@@ r:@@CPR@@ testmode: 0 The connection string should look something like java -cp .:/mnt/sda/deploy/doc2mail/* dk.doc2mail.cli...