SlideShare a Scribd company logo
1 of 12
Necto 16 Training
Necto Access Security
Objectives
• By the end of this lesson you will be able to perform Necto Access
Security setups
• Necto security
• Windows security
• Mixed security
• No Security
Agenda
•Necto Security Administration
•Allowing Necto Access from the web
Necto Security Administration
Necto Access Control
• Click to move in
and out of Necto
Management
• Access is
controlled in 2
places
Necto Security Administration
Necto Security Administration # 2
Default is to inherit
permissions from
Administration
Changes to Authentication
Type here will only be
relevant when using
component mode.
Allowing Necto access from the
Web
Necto from the World Wide Web
• You can allow people from the internet to access Necto
• Necto in your DMZ
• Necto site requires an IP address the world can access
• Necto will use Anonymous Access in IIS
• Get a Full DMZ setup document from our support site
http://support.panorama.com
Anonymous Authentication
Set the 3 highlighted items to use
Anonymous authentication
Make sure Authentication Type is set
to Necto in Administration before
doing this!
Summary
• In this lesson you have learned to Setup the Authentication types:
• Windows
• Necto
• Mixed
• Allow users from outside the domain to access Necto.
Thank you, any
questions?

More Related Content

What's hot

Security features of fedora
Security features of fedoraSecurity features of fedora
Security features of fedoraBadrul Alam
 
Managing Application Config and Secrets
Managing Application Config and SecretsManaging Application Config and Secrets
Managing Application Config and SecretsEng Teong Cheah
 
The Truth About Viruses on IBM i
The Truth About Viruses on IBM iThe Truth About Viruses on IBM i
The Truth About Viruses on IBM iHelpSystems
 
Tek systems it guidelines
Tek systems it  guidelinesTek systems it  guidelines
Tek systems it guidelinesviplavsarkar
 
Security architecture design patterns iltam 2018 - ofer rivlin
Security architecture design patterns   iltam 2018 - ofer rivlinSecurity architecture design patterns   iltam 2018 - ofer rivlin
Security architecture design patterns iltam 2018 - ofer rivlinOfer Rivlin, CISSP
 
KTLS White-paper - Cyber - Keystroke Encryption technology
KTLS White-paper - Cyber - Keystroke Encryption technologyKTLS White-paper - Cyber - Keystroke Encryption technology
KTLS White-paper - Cyber - Keystroke Encryption technologyTroy Cromwell
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Gross, Mendelsohn & Associates
 

What's hot (11)

Security features of fedora
Security features of fedoraSecurity features of fedora
Security features of fedora
 
Windows Vista Security
Windows Vista SecurityWindows Vista Security
Windows Vista Security
 
Managing Application Config and Secrets
Managing Application Config and SecretsManaging Application Config and Secrets
Managing Application Config and Secrets
 
Tizen os
Tizen osTizen os
Tizen os
 
The Truth About Viruses on IBM i
The Truth About Viruses on IBM iThe Truth About Viruses on IBM i
The Truth About Viruses on IBM i
 
Tek systems it guidelines
Tek systems it  guidelinesTek systems it  guidelines
Tek systems it guidelines
 
Security architecture design patterns iltam 2018 - ofer rivlin
Security architecture design patterns   iltam 2018 - ofer rivlinSecurity architecture design patterns   iltam 2018 - ofer rivlin
Security architecture design patterns iltam 2018 - ofer rivlin
 
KTLS White-paper - Cyber - Keystroke Encryption technology
KTLS White-paper - Cyber - Keystroke Encryption technologyKTLS White-paper - Cyber - Keystroke Encryption technology
KTLS White-paper - Cyber - Keystroke Encryption technology
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
 
Eranda me
Eranda meEranda me
Eranda me
 

Viewers also liked

Silvana DeFrancis Headshot Photography
Silvana DeFrancis Headshot PhotographySilvana DeFrancis Headshot Photography
Silvana DeFrancis Headshot PhotographySilvana DeFrancis
 
Necto 16 training 17 - administration
Necto 16 training 17 -  administrationNecto 16 training 17 -  administration
Necto 16 training 17 - administrationPanorama Software
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailInDefense Security
 
Discovery at Vinted (new categories case study)
Discovery at Vinted (new categories case study)Discovery at Vinted (new categories case study)
Discovery at Vinted (new categories case study)Tautvydas Gylys
 
Customer segmentation powerpoint presentation templates
Customer segmentation powerpoint presentation templatesCustomer segmentation powerpoint presentation templates
Customer segmentation powerpoint presentation templatesSlideTeam.net
 
Beacons: The Retail Revolution
Beacons: The Retail RevolutionBeacons: The Retail Revolution
Beacons: The Retail Revolutionkontakt.io
 
Beacon Technology for Airports
Beacon Technology for AirportsBeacon Technology for Airports
Beacon Technology for Airportsbfonics
 
digitalSTROM Developer Day 2011: digitalSTROM-Server-Apps
digitalSTROM Developer Day 2011: digitalSTROM-Server-AppsdigitalSTROM Developer Day 2011: digitalSTROM-Server-Apps
digitalSTROM Developer Day 2011: digitalSTROM-Server-AppsdigitalSTROM.org
 
Shops for sale in noida
Shops for sale in noidaShops for sale in noida
Shops for sale in noidaDhra Sharma
 

Viewers also liked (14)

Mon futur
Mon futur Mon futur
Mon futur
 
Cuento2
Cuento2Cuento2
Cuento2
 
Silvana DeFrancis Headshot Photography
Silvana DeFrancis Headshot PhotographySilvana DeFrancis Headshot Photography
Silvana DeFrancis Headshot Photography
 
Workplace Behaviour
Workplace BehaviourWorkplace Behaviour
Workplace Behaviour
 
Necto 16 training 17 - administration
Necto 16 training 17 -  administrationNecto 16 training 17 -  administration
Necto 16 training 17 - administration
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for Retail
 
Discovery at Vinted (new categories case study)
Discovery at Vinted (new categories case study)Discovery at Vinted (new categories case study)
Discovery at Vinted (new categories case study)
 
Customer segmentation powerpoint presentation templates
Customer segmentation powerpoint presentation templatesCustomer segmentation powerpoint presentation templates
Customer segmentation powerpoint presentation templates
 
AFD7 Agitation and Mixing
AFD7 Agitation and MixingAFD7 Agitation and Mixing
AFD7 Agitation and Mixing
 
Beacons: The Retail Revolution
Beacons: The Retail RevolutionBeacons: The Retail Revolution
Beacons: The Retail Revolution
 
vikas
vikasvikas
vikas
 
Beacon Technology for Airports
Beacon Technology for AirportsBeacon Technology for Airports
Beacon Technology for Airports
 
digitalSTROM Developer Day 2011: digitalSTROM-Server-Apps
digitalSTROM Developer Day 2011: digitalSTROM-Server-AppsdigitalSTROM Developer Day 2011: digitalSTROM-Server-Apps
digitalSTROM Developer Day 2011: digitalSTROM-Server-Apps
 
Shops for sale in noida
Shops for sale in noidaShops for sale in noida
Shops for sale in noida
 

Similar to Necto 16 training 18 access security

CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoNCCOMMS
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12gameaxt
 
Docker Containers Security
Docker Containers SecurityDocker Containers Security
Docker Containers SecurityStephane Woillez
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerTom Keetch
 
All You Need is One - A ClickOnce Love Story - Secure360 2015
All You Need is One -  A ClickOnce Love Story - Secure360 2015All You Need is One -  A ClickOnce Love Story - Secure360 2015
All You Need is One - A ClickOnce Love Story - Secure360 2015NetSPI
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMITamas K Lengyel
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
Magento Security and Us
Magento Security and UsMagento Security and Us
Magento Security and UsLee Saferite
 
Android Security, From the Ground Up
Android Security, From the Ground UpAndroid Security, From the Ground Up
Android Security, From the Ground UpOpersys inc.
 
Getting started kali linux
Getting started kali linuxGetting started kali linux
Getting started kali linuxDhruv Sharma
 
Docker Enterprise Deployment Planning
Docker Enterprise Deployment PlanningDocker Enterprise Deployment Planning
Docker Enterprise Deployment PlanningStephane Woillez
 
Strategy, planning and governance for enterprise deployments of containers - ...
Strategy, planning and governance for enterprise deployments of containers - ...Strategy, planning and governance for enterprise deployments of containers - ...
Strategy, planning and governance for enterprise deployments of containers - ...The Incredible Automation Day
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun Owens
 
Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7aesthetics00
 
Necto 16 training 21 - single sign on
Necto 16 training 21 -  single sign onNecto 16 training 21 -  single sign on
Necto 16 training 21 - single sign onPanorama Software
 
Ecase direct servlet acess v1
Ecase direct servlet acess  v1Ecase direct servlet acess  v1
Ecase direct servlet acess v1Damir Delija
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 

Similar to Necto 16 training 18 access security (20)

Windows 10
Windows 10Windows 10
Windows 10
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
Docker Containers Security
Docker Containers SecurityDocker Containers Security
Docker Containers Security
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
 
All You Need is One - A ClickOnce Love Story - Secure360 2015
All You Need is One -  A ClickOnce Love Story - Secure360 2015All You Need is One -  A ClickOnce Love Story - Secure360 2015
All You Need is One - A ClickOnce Love Story - Secure360 2015
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMI
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
Magento Security and Us
Magento Security and UsMagento Security and Us
Magento Security and Us
 
Android Security, From the Ground Up
Android Security, From the Ground UpAndroid Security, From the Ground Up
Android Security, From the Ground Up
 
Getting started kali linux
Getting started kali linuxGetting started kali linux
Getting started kali linux
 
Introduction to chrome os
Introduction to chrome osIntroduction to chrome os
Introduction to chrome os
 
Docker Enterprise Deployment Planning
Docker Enterprise Deployment PlanningDocker Enterprise Deployment Planning
Docker Enterprise Deployment Planning
 
Strategy, planning and governance for enterprise deployments of containers - ...
Strategy, planning and governance for enterprise deployments of containers - ...Strategy, planning and governance for enterprise deployments of containers - ...
Strategy, planning and governance for enterprise deployments of containers - ...
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7
 
Necto 16 training 21 - single sign on
Necto 16 training 21 -  single sign onNecto 16 training 21 -  single sign on
Necto 16 training 21 - single sign on
 
Ecase direct servlet acess v1
Ecase direct servlet acess  v1Ecase direct servlet acess  v1
Ecase direct servlet acess v1
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 

More from Panorama Software

Top BI trends and predictions for 2017
Top BI trends and predictions for 2017Top BI trends and predictions for 2017
Top BI trends and predictions for 2017Panorama Software
 
Centralized BI - IT and the Business
Centralized BI - IT and the BusinessCentralized BI - IT and the Business
Centralized BI - IT and the BusinessPanorama Software
 
Centralized BI in Healthcare
Centralized BI in HealthcareCentralized BI in Healthcare
Centralized BI in HealthcarePanorama Software
 
Panorama Necto the most secure, centralized and state of the art Business i...
Panorama Necto   the most secure, centralized and state of the art Business i...Panorama Necto   the most secure, centralized and state of the art Business i...
Panorama Necto the most secure, centralized and state of the art Business i...Panorama Software
 
Necto 16 training 22 necto server
Necto 16 training 22   necto serverNecto 16 training 22   necto server
Necto 16 training 22 necto serverPanorama Software
 
Necto 16 training 15 formulas and exceptions
Necto 16 training 15   formulas and exceptionsNecto 16 training 15   formulas and exceptions
Necto 16 training 15 formulas and exceptionsPanorama Software
 
Necto 16 training 5 dimension selector
Necto 16 training 5   dimension selectorNecto 16 training 5   dimension selector
Necto 16 training 5 dimension selectorPanorama Software
 
Necto 16 training 9 navigation component
Necto 16 training 9   navigation componentNecto 16 training 9   navigation component
Necto 16 training 9 navigation componentPanorama Software
 
Necto 16 training 1 navigation around necto
Necto 16 training 1   navigation around nectoNecto 16 training 1   navigation around necto
Necto 16 training 1 navigation around nectoPanorama Software
 
Necto 16 training 24 (archive) nova view to necto migration
Necto 16 training 24 (archive)   nova view to necto migrationNecto 16 training 24 (archive)   nova view to necto migration
Necto 16 training 24 (archive) nova view to necto migrationPanorama Software
 
Necto 16 training 20 component mode & java script
Necto 16 training 20   component mode & java scriptNecto 16 training 20   component mode & java script
Necto 16 training 20 component mode & java scriptPanorama Software
 
Necto 16 training 16 workboard properties and advanced features
Necto 16 training 16   workboard properties and advanced featuresNecto 16 training 16   workboard properties and advanced features
Necto 16 training 16 workboard properties and advanced featuresPanorama Software
 
Necto 16 training 11 infographics
Necto 16 training 11   infographicsNecto 16 training 11   infographics
Necto 16 training 11 infographicsPanorama Software
 
Necto 16 training 7 geo-analytics
Necto 16 training 7   geo-analyticsNecto 16 training 7   geo-analytics
Necto 16 training 7 geo-analyticsPanorama Software
 
Necto 16 training 25 - necto insights
Necto 16 training 25  - necto insightsNecto 16 training 25  - necto insights
Necto 16 training 25 - necto insightsPanorama Software
 
Necto 16 training 23 - visual studio modeling
Necto 16 training 23 -  visual studio modelingNecto 16 training 23 -  visual studio modeling
Necto 16 training 23 - visual studio modelingPanorama Software
 
Necto 16 training 14 - one click insight
Necto 16 training 14 -  one click insightNecto 16 training 14 -  one click insight
Necto 16 training 14 - one click insightPanorama Software
 
Necto 16 training 13 - save to a private root
Necto 16 training 13 -  save to a private rootNecto 16 training 13 -  save to a private root
Necto 16 training 13 - save to a private rootPanorama Software
 

More from Panorama Software (20)

Top BI trends and predictions for 2017
Top BI trends and predictions for 2017Top BI trends and predictions for 2017
Top BI trends and predictions for 2017
 
Centralized BI - IT and the Business
Centralized BI - IT and the BusinessCentralized BI - IT and the Business
Centralized BI - IT and the Business
 
Centralized BI in Healthcare
Centralized BI in HealthcareCentralized BI in Healthcare
Centralized BI in Healthcare
 
Panorama Necto 16
Panorama Necto 16Panorama Necto 16
Panorama Necto 16
 
Panorama Necto the most secure, centralized and state of the art Business i...
Panorama Necto   the most secure, centralized and state of the art Business i...Panorama Necto   the most secure, centralized and state of the art Business i...
Panorama Necto the most secure, centralized and state of the art Business i...
 
Necto 16 training 22 necto server
Necto 16 training 22   necto serverNecto 16 training 22   necto server
Necto 16 training 22 necto server
 
Necto 16 training 15 formulas and exceptions
Necto 16 training 15   formulas and exceptionsNecto 16 training 15   formulas and exceptions
Necto 16 training 15 formulas and exceptions
 
Necto 16 training 5 dimension selector
Necto 16 training 5   dimension selectorNecto 16 training 5   dimension selector
Necto 16 training 5 dimension selector
 
Necto 16 training 9 navigation component
Necto 16 training 9   navigation componentNecto 16 training 9   navigation component
Necto 16 training 9 navigation component
 
Necto 16 training 1 navigation around necto
Necto 16 training 1   navigation around nectoNecto 16 training 1   navigation around necto
Necto 16 training 1 navigation around necto
 
Necto 16 training 24 (archive) nova view to necto migration
Necto 16 training 24 (archive)   nova view to necto migrationNecto 16 training 24 (archive)   nova view to necto migration
Necto 16 training 24 (archive) nova view to necto migration
 
Necto 16 training 20 component mode & java script
Necto 16 training 20   component mode & java scriptNecto 16 training 20   component mode & java script
Necto 16 training 20 component mode & java script
 
Necto 16 training 16 workboard properties and advanced features
Necto 16 training 16   workboard properties and advanced featuresNecto 16 training 16   workboard properties and advanced features
Necto 16 training 16 workboard properties and advanced features
 
Necto 16 training 11 infographics
Necto 16 training 11   infographicsNecto 16 training 11   infographics
Necto 16 training 11 infographics
 
Necto 16 training 7 geo-analytics
Necto 16 training 7   geo-analyticsNecto 16 training 7   geo-analytics
Necto 16 training 7 geo-analytics
 
Necto 16 training 3 ribbon
Necto 16 training 3   ribbonNecto 16 training 3   ribbon
Necto 16 training 3 ribbon
 
Necto 16 training 25 - necto insights
Necto 16 training 25  - necto insightsNecto 16 training 25  - necto insights
Necto 16 training 25 - necto insights
 
Necto 16 training 23 - visual studio modeling
Necto 16 training 23 -  visual studio modelingNecto 16 training 23 -  visual studio modeling
Necto 16 training 23 - visual studio modeling
 
Necto 16 training 14 - one click insight
Necto 16 training 14 -  one click insightNecto 16 training 14 -  one click insight
Necto 16 training 14 - one click insight
 
Necto 16 training 13 - save to a private root
Necto 16 training 13 -  save to a private rootNecto 16 training 13 -  save to a private root
Necto 16 training 13 - save to a private root
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Necto 16 training 18 access security

Editor's Notes

  1. Authentication type – how are users authenticated Windows – Necto supports integration with Active Directory users and Windows Integrated Authentication. This means that users already authenticated to a domain will have transparent access to dashboard pages, and will not be asked for user name and password. Necto – Users can also be created in the Necto administration interface. These application users, in contrast to AD users, will be redirected to a login page when accessing the dashboard, where he or she will have to provide user name and password. Mixed – if a Windows user is not identified by Necto, user is prompted to enter the username and password. Security Mode – How data is filtered for users (will be expanded upon in the Data Security module) No Security –Necto users will not be restricted on the data that they see OLAP – Windows users will have restrictions placed on their data viewing capabilities based on the roles that they are in on the OLAP cubes Necto – Windows users and Necto users will have restrictions placed on their data viewing capabilities based on definitions within Necto
  2. Authentication type – Changes made are only relevant if the user opens Necto in Component mode. Necto’s component mode supports components of the following types: View (or grid) Workboard – shows a single Workboard Folder – shows a single Workboards folder Dashboard – full Necto application and can be accessed via URL or HTM page where every Necto component is defined by BeginNovaView() / EndNovaView() functions pair, and one or several AttachParameter() function calls between them. NOTE: Applications settings do override settings in the Administration area (if using component mode) so even if you set Necto security in Administration but here you choose Windows, then Windows is the default security for Necto in component mode.
  3. The DMZ setup can be requested from the Panorama Customer Success team
  4. Anonymous Authentication – Once this is set the Authentication type must be set to Necto, this is because IIS has no way to prioritize Authentication (IIS 7.5 and lower) so even if Windows Authentication is enabled it is effectively ignored once Anonymous Authentication is enabled.