Create isochrone shapes showing the area around an origin which can be reached in a given time period and using a specified mode of transport.
Retrieve directions for your journeys. Configurable options include the start or arrival date/time and a mode of transport,
Upload a collection of origin and destination points along with a mode of transport and maximum journey time. Travel Time will return only the destinations which can be reached in the given time period along with the distance and time taken to reach the location.
<mobilewebserver ... reloadOnAjaxAuthFail="true" ...>
https://omniscope.me/Bond+prices.iok?download
https\:\/\/omniscope\.me\/.*
http://yourserver/https%3A%2F%2Fomniscope.me%2FBond%2Bprices.iok%3Fdownload/
<schedulerConfig> ...
<mobileWebServerConfig>
<mobilewebserver ... remoteUrlPattern="https\:\/\/omniscope\.me\/.*" ... >
]]><exportview templateFile="my_template.xlsx" worksheet="Data" column="2" row="5" includeHeaders="true" />
...
<anonymous>
<permissions listDirectory="false" downloadFile="false" viewInMobile="false" fileManagement="false" getStatic="true" viewServerState="false" />
</anonymous>
...
<anonymous>
element describes the unauthenticated permissions, and is also used as default values for per-user permissions.<user>
element describes the credentials and the permissions per user, and is made by the following elements/attributes:<?xml version="1.0" encoding="UTF-8"?>
<mobilefolder>
<anonymous>
<permissions listDirectory="true" downloadFile="false" viewInMobile="true" fileManagement="false" getStatic="false" viewServerState="false"/>
</anonymous>
<users>
<user enabled="true">
<credentials>
<credentials username="antonio" password="9aeb94180027a7081352cba05e6a3782" />
</credentials>
<permissions>
<permissions listDirectory="true" downloadFile="true" viewInMobile="true" fileManagement="true" getStatic="true" viewServerState="true" />
</permissions>
</user>
<user enabled="true">
<credentials>
<credentials username="guest" password="4aeb93180027a708186hy4505e6a6465" />
</credentials>
<permissions>
<permissions listDirectory="true" viewInMobile="true" getStatic="true" />
</permissions>
</user>
</users>
</mobilefolder>
<?xml version="1.0" encoding="UTF-8"?>
<mobilefolder>
<anonymous>
<permissions listDirectory="false" downloadFile="false" viewInMobile="false" fileManagement="false" getStatic="false" viewServerState="false"/>
</anonymous>
<users>
<user enabled="true">
<credentials>
<credentials username="admin" password="9aeb94180027a7081352cba05e6a3782" />
</credentials>
<permissions>
<permissions listDirectory="true" downloadFile="true" viewInMobile="true" fileManagement="true" getStatic="true" viewServerState="true" />
</permissions>
</user>
<user enabled="true">
<credentials>
<credentials username="guest" password="4aeb93180027a708186hy4505e6a6465" />
</credentials>
<permissions>
<permissions listDirectory="true" viewInMobile="true" getStatic="true" />
</permissions>
</user>
</users>
</mobilefolder>
<?xml version="1.0" encoding="UTF-8"?>
<mobilefolder>
<anonymous>
<permissions listDirectory="true" getStatic="true" />
</anonymous>
<users>
<user enabled="true">
<credentials>
<credentials username="guest" password="4aeb93180027a708186hy4505e6a6465" />
</credentials>
<permissions>
<permissions listDirectory="true" viewInMobile="true" getStatic="true" />
</permissions>
</user>
</users>
</mobilefolder>
<anonymous>
element describes the unauthenticated permissions, and is also used as default values for per-group permissions.<group>
element describes the authentication group and its permissions, and is made by the following elements/attributes:<listOfUsers>
<users>
<credentials username="test" password="098f6b627b4f6" />
<credentials username="visokio" password="72261efef7c41" />
</users>
</listOfUsers>
<spnegoMechanism>
<userNames>
<userName userName="johnsmith" />
<userName userName="johndoe" />
</userNames>
</spnegoMechanism>
<?xml version="1.0" encoding="UTF-8"?>
<mobilefolder>
<anonymous>
<permissions listDirectory="false" downloadFile="false" viewInMobile="false"
fileManagement="false" getStatic="false" viewServerState="false"
exportData="false" />
</anonymous>
<groups>
<group enabled="true" name="Data Analysts">
<permissions>
<permissions listDirectory="true" downloadFile="true" viewInMobile="true"
fileManagement="false" getStatic="false" viewServerState="false"
exportData="false" />
</permissions>
<mechanisms>
<spnegoMechanism>
<userNames>
<userName userName="john" />
</userNames>
</spnegoMechanism>
<ldapQuery
distinguishedName="CN=Users,DC=example,DC=com"
url="ldap://ldapserver.example.com:389"
ignoreSslIssues="false"
securityAuthentication="simple"
principalNameFormat="{Name}@DOMAIN"
principalDomain="example.com">
</ldapQuery>
<listOfUsers>
<users>
<credentials username="Tester" password="f5d1277e04873b9" />
</users>
</listOfUsers>
</mechanisms>
</group>
</groups>
</mobilefolder>
<?xml version="1.0" encoding="UTF-8"?>
<mobilefolder>
<anonymous>
<permissions listDirectory="false" downloadFile="false" viewInMobile="false"
fileManagement="false" getStatic="false" viewServerState="false"
exportData="false" />
</anonymous>
<groups>
<group enabled="true" name="Administrators">
<permissions>
<permissions listDirectory="true" downloadFile="true" viewInMobile="true"
fileManagement="true" getStatic="true" viewServerState="true"
exportData="true" />
</permissions>
<mechanisms>
<listOfUsers>
<users>
<credentials username="admin" password="5d141e04873b9" />
</users>
</listOfUsers>
</mechanisms>
</group>
<group enabled="true" name="Guests">
<permissions>
<permissions listDirectory="true" viewInMobile="true"
getStatic="true" />
</permissions>
<mechanisms>
<listOfUsers>
<users>
<credentials username="guest" password="f5d1ee04873b9" />
<credentials username="visitor" password="43ffge14197e45" />
</users>
</listOfUsers>
</mechanisms>
</group>
</groups>
</mobilefolder>
<?xml version="1.0" encoding="UTF-8"?>
<mobilefolder>
<anonymous>
<permissions listDirectory="false" downloadFile="false" viewInMobile="false"
fileManagement="false" getStatic="false" viewServerState="false"
exportData="false" />
</anonymous>
<groups>
<group enabled="true" name="Administrators">
<permissions>
<permissions listDirectory="true" downloadFile="true" viewInMobile="true"
fileManagement="true" getStatic="true" viewServerState="true"
exportData="true" />
</permissions>
<mechanisms>
<ldapQuery
distinguishedName="CN=Administrators,DC=example,DC=com"
url="ldap://ldapserver.example.com:389"
ignoreSslIssues="false"
securityAuthentication="simple"
principalNameFormat="{Name}@DOMAIN"
principalDomain="example.com">
</ldapQuery>
</mechanisms>
</group>
<group enabled="true" name="Employee">
<permissions>
<permissions listDirectory="true" downloadFile="true" viewInMobile="true"
fileManagement="false" getStatic="true" viewServerState="false"
exportData="false" />
</permissions>
<mechanisms>
<spnegoMechanism>
<userNames>
<!-- User 'john' with password 'SomePassword' is defined on the
LDAP server and logged in the client machine to test SPNEGO -->
<userName userName="john" />
</userNames>
</spnegoMechanism>
<ldapQuery
distinguishedName="CN=Users,DC=example,DC=com"
url="ldap://ldapserver.example.com:389"
ignoreSslIssues="false"
securityAuthentication="simple"
principalNameFormat="{Name}@DOMAIN"
principalDomain="example.com">
</ldapQuery>
<listOfUsers>
<users>
<credentials username="NewEmployee" password="d1274e417e04" />
</users>
</listOfUsers>
</mechanisms>
</group>
</groups>
</mobilefolder>
Java Cryptography Extension (JCE) Unlimited Strength includes two jar files that contain only configuration settings enabling unlimited strength cryptography algorithms in Java.
To enable JCE unlimited strength download it from http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html
The downloaded file contains three files
To install JCE unlimited strength, the client needs to put these two jars in
- {OMNISCOPE LOCATION}\x86\lib\security
- {OMNISCOPE LOCATION}\x64\lib\security
while creating a backup for the existing (default) two files and restart the application
Besides Single-Sign-On (SPNEGO) and LDAP Query mechanisms which authenticate users that are stored and managed on other servers like LDAP, Omniscope Mobile server may be configured to validate Omniscope users by manually adding custom users on server. Those users are stored in Omniscope Server configuration files (config.xml, folder.xml).
Users are grouped automatically based on their permissions and whether users are enabled or disabled.
E.g.
Legacy users:
At least three machines are involved in a Single-Sign-On setup:
setspn -A HTTP/omniscopeserver.example.com omniscopeuser
where example.com is your network domain
omniscopeserver is the name of the machine running Omniscope server
omniscopeuser is user logon name of the dedicated LDAP user
HTTP/omniscopeserver.example.com has never been mapped before with other user. If it has, you need to remove it first:setspn -D HTTP/omniscopeserver.example.com otheruser
ktpass -princ HTTP/omniscopeserver.example.com@EXAMPLE.COM -pass YourPassword -mapuser omniscopeuser@EXAMPLE.COM -out omniscopeuser.HTTP.keytab -crypto RC4-HMAC-NT -kvno 0
HTTP/omniscopeserver.example.com
A realm defines a protection space. Realms allow the protected resources on the server to be partitioned into a set of protection spaces, each with its own authentication and authorization settings.
By default, all protected resources on the server are configured in the config.xml file. This is the (Home) realm. Specific folders may be manually configured to have their own set of permissions and authentication groups. For more information about folder permissions read this post.
Server permissions may be configured for anonymous users and for authentication groups.
A group may have a list of authentication mechanisms and server permissions.
For instance, the server may be configured to have a group named 'Data Analysts' with permissions to:
- List directory
- View in mobile
- Export view data
and authenticate users through LDAP Query and List Of Users.
List Of Users mechanism let's you define custom Omniscope users that are stored and managed by the Omniscope Mobile server. No third party servers/services are involved. Users are manually added/edited/removed by an administrator of the server.
A user name and a password has to be added for each individual user. Read this post for more information about List Of Users mechanism configuration.
LDAP Query authentication mechanism let's you configure Omniscope Mobile server to query an LDAP server to validate user credentials.
To learn how to configure Omniscope server to use LDAP Query read this post.
SPNEGO (Single-Sign-On) mechanism allows users to authenticate automatically with their LDAP/AD account without asking them for credentials. Having a proper setup, authorized users never type their credentials in any dialog or form. Unauthorized users, however, are either prompted for credentials or are denied server access.
How does SPNEGO work ?
The browser negotiates with the LDAP/AD server and gets a temporary ticket which is further used to generate temporary unique tokens that are included in every client/browser request sent to Omniscope Mobile server. The tokens contain no information about client user name, password, or any other sensitive data, they are simple strings that can be verified only by the LDAP/AD server. Whenever Omniscope Mobile receives requests having SPNEGO tokens, Omniscope Mobile asks the LDAP/AD for token validation and if the token is valid, LDAP/AD provides only the user name associated with that token. Omniscope server checks whether this user is authorized to be served the requested resource and proceeds accordingly.
To learn how to configure Omniscope server to use SPNEGO mechanism read this post.
A group may have multiple authentication mechanisms. Each mechanism will be used during authentication until the user authenticates successfully. If no group authorizes the action that has been requested by the user, the access will be denied.
You may want to temporarily disable groups instead of deleting them and then adding them back later when needed. Disabled groups are disregarded during authentication.