Design of a Generic Administrator Module and User Component in Yii-based Web Applications using the Concept of Observatory
|
|
- Natalie Chambers
- 6 years ago
- Views:
Transcription
1 Design of a Generic Administrator Module and User Component in Yii-based Web Applications using the Concept of Observatory 1,2 Percy Okae, 3 Amos David 1 Computer Science Department, African University of Science & Technology (AUST), Abuja, Nigeria 2 Computer Engineering Department, School of Engineering Sciences, College of Basic & Applied Sciences (CBAS), University of Ghana, Legon, Accra, Ghana * Corresponding author perokae@hotmail.com Mobile: University of Lorraine, Nancy 2, Nancy, France amos.david@univ-lorraine.fr Mobile : * Corresponding author perokae@hotmail.com Abstract This study implemented an administrator module in a Web application developed using the Yii PHP component framework. This is to address the administrative needs of the application as a whole. A system administrator should be able to log in to delete, view or update any record, and also moderate all comments. For proper system integrity, the functionalities often exposed to the system administrator are often completely different from those exposed to ordinary users. We want to keep these administrator functions completely different from the rest of the application. This is normally accomplished by building a module to house the administrator functionalities and features. Also, the developed system is meant to be user-centered and so we implemented a user management component in the Web application. The concepts used in this study to develop the underlying database of the Web application are observatory, competitive intelligence, and data warehousing. The proposed model is such that the competitive intelligence products are aggregated into a repository called an observatory which subsequently generates data for the data warehouse. Keywords: administrator module, user management, observatory, competitive intelligence, data warehouse. 100
2 1. Introduction A module is simply a mini-application running within the main application because it cannot run on its own. Just like the main application in Yii, it also has its own model-view-controller (MVC) architecture pattern. One foremost module of the Yii framework is the Web-based Giimodule which is automatically generated in the configuration file once we build the shell of a Yii-based application from the command line. For every Web application developed using the Yii PHP component framework, we can implement an administrator module in order to facilitate site moderation by the system administrator. This is the premise upon which a generic admin module is proposed so that it will be reusable in any application irrespective of its subject matter. Similarly, a generic user component that identifies every user of the application, log in time, specified functions, and access to type of data is also defined. For this study, the underlying database of the Web application is developed using the concepts of observatory and competitive intelligence as presented in Figure 1. Methodology Proposed model Our proposed model is presented in Figure 1. In the model, the competitive intelligence (CI) products are fed into the observatory mounted purposely as a repository of data for our eventual data warehouse (DWH). Figure 1: Proposed model of research showing the critical concepts of CI, observatory, and data warehouse 101
3 The sources of data identified in this study are: Commissioned research; Internal staff; Third-party interviews; and Published information. Once our data sources are identified, we subject the assembled data through a CI process cycle. Figure 2 is the adopted cycle utilized in this research as they strictly show the most crucial stages of the CI process. Figure 2: The CI process cycle adopted in this study Datasets on the following can be contributed to the observatory by individuals who have them (NASA, 2013). These include but not limited to: The house numbers of houses in one s community The social brackets that a particular community or household fallsunder The kinds of road networks in that community Environmental threats such as quarries, refineries, power plants, markets etc. Land cover or zoning Average population per household Proximity of a particular coverage area to a contracted organization s premises Information on competitors Information on mergers and acquisitions Information on the attitude and work culture of field workers Customers opinions about the charges they pay to contracted companies The above listed guidelines and any other workable ones can be compiled and fed into the observatory and thus provide an idea of what to model and what to expect (Turnock and Gibson, 2001). 102
4 Creating the system module The system administrator module is christened as admin and we generate all the necessary files using the Gii module. To do that we navigate to and choose the Module Generator from the list of menu items on the Gii tool in Figure 3. Figure 3: A screenshot of the module generator page Once we input our Module ID in the text field shown, in this case admin, and click on preview, we can see all the files that will be generated as seen in Figure 4. Figure 4: A screenshot of the files generated under folder admin 103
5 Using the generatedadmin module in Web application In order to use the generated files in the Web application, we have to alter the application configuration file so that the new module admin will be accessible. To fire it up within our application, we need to alter the application configuration file to include the admin module as below in bold: 'modules'=>array( // uncomment the following to enable the Gii tool /*'gii'=>array ( 'class'=>'system.gii.giimodule', 'password'=>'yourpassword', // If removed, Gii defaults to localhost only. Edit carefully to taste. 'ipfilters'=>array (' ',), ), 'admin', ), */ Once this is done, we can access our admin module anywhere within the application. However, we also need to organize the system RBAC authorization hierarchy such that it is only users with administrator authorization who can access the admin module set up within our Web application. We implement this hierarchy by defining the roles of various categories of users and restrict them as to what they can do and what they cannot do (Winesett, 2010). The logic for the implementation from the command line (CLI) is done using the yiic shell command. The logical steps involved are to navigate to the YiiRoot as well as the Webroot then call the yiic shell command. The YiiRoot is the folder where the Yii framework is installed whilst the Webroot is also the Web application folder of our system development; i.e., where resolves to. In our case, this is C:/xampp/htdocs/mswproject/. We thus navigate to the Webroot as follows using the yiic shell command so as to implement our RBAC hierarchy: c: > cd/xampp c:\xampp > cd htdocs c:\xampp\htdocs > cd yii c:\xampp\htdocs\yii > cd framework c:\xampp\htdocs\yii\framework >yiic shell /xampp/htdocs/mswproject/index.php 104
6 By definition, a module is a mini application that runs inside the main application. It cannot exist independently on its own even though it has all the features and functionalities that the main application has. Our admin module is no exception and its interface is as shown in Figure 5. Figure 5: Screenshot of admin console for site administrator Figure 6 also displays the system message from the site administrator for any user who logs into or visits the Web site. Figure 6: Site homepage showing the time-bound greeting message from site administrator 105
7 Implementation of User Management Component Although the auto generated code by the Yii framework contains a static authentication component, it is not enough and a much secured security option for large and commercial Web applications that have many users. The static username/password pair auto-generated by the framework uses demo/demo or admin/admin. However, this option defeats the purpose of authenticating against the database tables which is more secure(ullman, 2013). User Authentication and Authorization User authentication is simply the process of ensuring that a user of our site has the all-clear to use the site. This we can do by providing a registration feature within the site for all new users to register. Typically on Web sites, this is accomplished by asking the user to provide a username/password or /password combination etc. if none of these is fulfilled; the user is then classified as an anonymous or guest user, in which case access to various functionalities within the site are limited. Besides authentication, user authorization will also determine whether a current user can perform a specific task or not. For a fact, a user will not need to be necessarily authenticated to be authorized. For example, a guest user can view a home page or a listing of items on a site without needing to login. Authorization always determines whether a user is assigned the role of an administrator, co-administrator, authenticated user without administrator rights etc. The user component implementation of the site will proceed as follows: Create the physical user table in the database; Use Gii to generate all the required Yii files; i.e., User.php, the controller, and all the CRUD files; and Customize the generated code to authenticate against the user table as well as authorize access to the site by modifying the controller files. We first create a user table within our MySQL database application. The user table is as below: CREATE TABLE USER ( id INT(10) UNSIGNED NOT NULL AUTO_INCREMENT, VARCHAR(128) NOT NULL, username VARCHAR (128) NOT NULL, password CHAR(128) NOT NULL, last_login_time DATETIME, PRIMARY KEY (id), UNIQUE INDEX username_unique (username ASC), 106
8 UNIQUE INDEX _unique ( ASC) )ENGINE=InnoDB DEFAULT CHARSET=utf8; We next activate the Gii module of Yii to create our User AR class as well as the controller and CRUD files by first logging in to Gii as we did in the generation of the module. However, in this casewe use only two of the options for our purposes as those two will suffice our needs. These are the Model Generator to create the User AR class and the Crud Generator to create the corresponding controller file as well as all the view files required. If everything goes well, we get the following files generated (Yii Framework, 2012n): User.phpuser AR Model class (php code) usercontroller.phpuser controller file (php code) _form.php search.php view.php admin.php create.phpuser view files (HTML and php code) index.php update.php view.php This work uses localhost as the Web server and so our IP address is The solution stack also used for this work is the XAMPP solution stack which already has Apache, PHP, phpmyadmin and MySQL which we need for our project. Subsequently, we build the shell of our Web application using the yiic webapp tool from the command line as follows: cd\xampp c:\xampp > cd htdocs c:\xampp\htdocs>cd yii c:\xampp\htdocs\yii>cd framework c:\xampp\htdocs\yii\framework>yiic webapp..\..\mswproject To access the shell of our Web application, we navigate to our Webroot directory located at C:\xampp\htdocs which is equivalent to and the resulting output is as shown in Figure
9 Figure 7: A screenshot of the shell of the Web site In our underlying database, we create as a test case two users to test our design whether it works to expectation. The following screenshots indicate what happens. Figure 8: A screenshot of the create user form for user authentication 108
10 Figure 9: A screenshot of listings of users authenticated by the Web application 3. Discussion of Results Our system is a Web application so we implement a system security so as to guide against system intrusion. Thus user authentication and authorization is of prime importance here. Instead of sticking with the autogenerated static authentication that Yii generates for us through the Web-based tool called Gii, it is best to implement a system that authenticates a potential user of the Web application against the database as is the norm for most applications. In Figure 6, we see that the user password has been encrypted against the user table and hence against the system database to forestall a security breach. If a user whose password has been encrypted in a particular order logs into the system and a match is found, then we say that the user has been authenticated and access is subsequently granted. 4. Conclusions A user management system component has been in-built into our application to forestall a system security breach by encrypting user passwords. Any time an already existing user tries to log into the application, the entered password is compared against the stored encrypted password and if there is a match, the user is passed, otherwise he is denied. 109
11 References: Ullman, L. (2013). The Yii Book, Developing Web Applications Using the Yii PHP Framework, Self-published. Winesett, J. (2010). Agile Web Application Development with Yii 1.1 and PHP5, Packt Publishing, Birmingham, UK. Yii Framework 2012n. Performance of Yii. Accessed on from NASA, Earth Observatory. Retrieved September 25, 2013 from
Advanced Web Tutorial 10
Advanced Web Tutorial 10 Editor Brackets / Visual Studio Code Goals Creating a blog with PHP and MySql. - Set up and configuration of Xampp - Learning Data flow using Create/Read/Update and Delete Things
More informationThe connection has timed out
1 of 7 2/17/2018, 7:46 AM Mukesh Chapagain Blog PHP Magento jquery SQL Wordpress Joomla Programming & Tutorial HOME ABOUT CONTACT ADVERTISE ARCHIVES CATEGORIES MAGENTO Home» PHP PHP: CRUD (Add, Edit, Delete,
More informationBlog site (cont.) theme, 202 view creations, 205 Browser tools, 196 Buytaert, Dries, 185
Index A Administration, 157 backups and restore (see Backups and restore website) file system, 161 log files, 162 tasks, 157 updates and security patches, 165 user accounts, 166 Aggregator module, 218
More informationIntroduction to relational databases and MySQL
Chapter 3 Introduction to relational databases and MySQL A products table Columns 2017, Mike Murach & Associates, Inc. C3, Slide 1 2017, Mike Murach & Associates, Inc. C3, Slide 4 Objectives Applied 1.
More informationWhat is SQL? Toolkit for this guide. Learning SQL Using phpmyadmin
http://www.php-editors.com/articles/sql_phpmyadmin.php 1 of 8 Members Login User Name: Article: Learning SQL using phpmyadmin Password: Remember Me? register now! Main Menu PHP Tools PHP Help Request PHP
More informationChapter 3. Introduction to relational databases and MySQL. 2010, Mike Murach & Associates, Inc. Murach's PHP and MySQL, C3
1 Chapter 3 Introduction to relational databases and MySQL Slide 2 Objectives Applied 1. Use phpmyadmin to review the data and structure of the tables in a database, to import and run SQL scripts that
More informationHello everyone! Page 1. Your folder should look like this. To start with Run your XAMPP app and start your Apache and MySQL.
Hello everyone! Welcome to our PHP + MySQL (Easy to learn) E.T.L. free online course Hope you have installed your XAMPP? And you have created your forms inside the studio file in the htdocs folder using
More informationRunning A MyDNS Name Server On OpenBSD (MySQL/PHP + MyDNS + MyDNSConfig)
By ZcWorld (Shane Ebert) Published: 2008-03-31 18:28 Running A MyDNS Name Server On OpenBSD (MySQL/PHP + MyDNS + MyDNSConfig) This tutorial shows how to run a MyDNS name server on an OpenBSD server. It
More informationESS Security Enhancements
ESS Security Enhancements payentry.com Employee Self Service Enhancements 1 Table of Contents INTRODUCTION 3 EXISTING EMPLOYEES 3 Existing Employee -Email Address 4 Existing Employee - Username 4 Existing
More informationThe MANUAL. 1 P a g e
The MANUAL 1 P a g e http://wasimrlis.blogspot.in https://coprofessionals.wordpress.com 2 P a g e Guided to search tools are used to help library users to find the resources they are seeking. Originally
More informationDigitized Engineering Notebook
Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2017 Digitized Engineering Notebook Sandeep Kumar Gudivada Governors State University
More informationONLINE VOTING SYSTEM
ONLINE VOTING SYSTEM M. Deepa 1,, M.B.Benjula Anbu Malar 2, S.Deepikaa 3, K.Santhi 4 1,2,3,4 School of Information Technology and Engineering, VIT University, Vellore, Tamilnadu, (India) ABSTRACT Online
More informationWebEA Quick Start Guide
1.1 WebEA Quick Start Guide The purpose of the WebEA Quick Start Guide is to provide the complete process for quickly installing and configuring WebEA in a new environment using the most common options.
More informationDigitized Engineering Notebook
Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2017 Digitized Engineering Notebook Syed Jalaluddin Governors State University
More informationInstalling WordPress CMS
Installing WordPress CMS Extract the contents of the wordpress zip file to D:/public_html/wordpress folder as shown in diagram 1. D:/public_html/wordpress is a virtual domain controlled by Apache Web server
More informationChapter 10: MySQL & PHP. PHP and MySQL CIS 86 Mission College
Chapter 10: MySQL & PHP PHP and MySQL CIS 86 Mission College Tonight s agenda Drop the class? Login file Connecting to a MySQL database Object-oriented PHP Executing a query Fetching a result Fetching
More informationWebcart Documentation
Webcart Documentation Webcart E-Commerce Solution Webcart is a powerful multi-store shopping cart software that can help you to start and manage your online stores with ease. It supports multiple storefronts
More informationbispark software, Dharwad
License agreement Permitted use You are permitted to use copy modify and distribute the Software and its documentation with or without modification for any purpose provided you understand and agree the
More informationConfiguring TACACS+ Finding Feature Information. Prerequisites for TACACS+
Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software
More informationJackson State University Department of Computer Science CSC / Advanced Information Security Spring 2013 Lab Project # 3
Jackson State University Department of Computer Science CSC 439-01/539-02 Advanced Information Security Spring 2013 Lab Project # 3 Use of CAPTCHA (Image Identification Strategy) to Prevent XSRF Attacks
More informationAgile Web Application Development with Yii 1.1 and PHP5
Agile Web Application Development with Yii 1.1 and PHP5 Fast-track your web application development by harnessing the power of the Yii PHP Framework Jeffery Winesett BIRMINGHAM - MUMBAI Agile Web Application
More informationCV. Techno Media Pratama. Hari Pratomo [COURIER MANAGEMENT SYSTEM]
2017 CV. Techno Media Pratama Hari Pratomo [COURIER MANAGEMENT SYSTEM] Courier Management System is a program that is sent or designed to facilitate the delivery business. Courier Management System Demo
More informationK-RATE INSTALLATION MANUAL
K-RATE INSTALLATION MANUAL K-Rate Installation Manual Contents SYSTEM REQUIREMENTS... 3 1. DOWNLOADING K-RATE... 4 STEP 1: LOGIN TO YOUR MEMBER ACCOUNT... 4 STEP 2: ENTER DOMAIN NAME... 5 STEP 3: DOWNLOAD
More informationHost at 2freehosting.Com
Host at 2freehosting.Com This document will help you to upload your website to a free website hosting account at www.2freehosting.com/. Follow all the steps carefully in the order that they appear to ensure
More informationFinal Project Instructions
CPT283: PHP Programming I Final Project Instructions CPT283 Final Project Instructions Version Date: April 19, 2018 Project Name: Vehicle Log Project Purpose: Vehicle Log is a maintenance management program
More informationHCW Human Centred Web. HuCEL: Keywords Experiment Manual. School of Computer Science. Information Management Group
HCW HuCEL Technical Report 1, June 2009 School of Computer Science Information Management Group HuCEL: Keywords Experiment Manual Paul Waring Human Centred Web Lab School of Computer Science University
More informationHOW TO CREATE A BOOKING USING E-DIRECT / GROUP E-DIRECT
HOW TO CREATE A BOOKING USING E-DIRECT / GROUP E-DIRECT An E-direct link shall be emailed to you. Clicking on this link will direct you to the landing page specific to your company s negotiated rate or
More informationSimulation Manager Configuration Guide
Cornell University College of Veterinary Medicine Student Training Simulation Project Simulation Manager Configuration Guide 2018-Oct-1 Version 1.9 Prepared by: I-Town Design David Weiner 117 Burleigh
More informationDatabase Systems. phpmyadmin Tutorial
phpmyadmin Tutorial Please begin by logging into your Student Webspace. You will access the Student Webspace by logging into the Campus Common site. Go to the bottom of the page and click on the Go button
More informationThings to note: Each week Xampp will need to be installed. Xampp is Windows software, similar software is available for Mac, called Mamp.
Tutorial 8 Editor Brackets Goals Introduction to PHP and MySql. - Set up and configuration of Xampp - Learning Data flow Things to note: Each week Xampp will need to be installed. Xampp is Windows software,
More informationUser Guide Version 1.3
CCNA Publishing Distributors User Guide Version 1.3 Prepared by TRIMAP Communications Inc. 1210 Sheppard Ave E., Toronto, ON, M2K 1E3 Tel: 416.492.2114 April 15, 2008 Table of Contents User Profile and
More informationColligo Engage Outlook App 7.1. Offline Mode - User Guide
Colligo Engage Outlook App 7.1 Offline Mode - User Guide Contents Colligo Engage Outlook App 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Engage Outlook App 3 Checking
More informationMedia Services Online Mohammed Abukhiran. Report 13 on the work of Week 13
Media Services Online Mohammed Abukhiran Report 13 on the work of Week 13 Berea College Nov 30, 2010 Application Development Project Concept Proposal Media Services at Berea College uses Voyger (Database
More informationYii User Identity Error Code 100
Yii User Identity Error Code 100 It's 100% free, no registration required. In the login page, after submit the form, it displays the following error $model-_attributes=$_post('loginform'), // validate
More informationGetting Started with PHP
SECTION I AL Getting Started with PHP LESSON 3: Learning PHP Syntax LESSON 5: Debugging Code MA LESSON 4: Working with Variables TE LESSON 2: Adding PHP to a Web Page RI LESSON 1: Setting Up Your Workspace
More informationXAMPP Web Development Stack
Overview @author R.L. Martinez, Ph.D. The steps below outline the processes for installing the XAMPP stack on a local machine. The XAMPP (pronounced Zamp) stack includes the following: Apache HTTP Server,
More informationOracle Fusion Middleware. 1 Oracle Team Productivity Center Server System Requirements. 2 Installing the Oracle Team Productivity Center Server
Oracle Fusion Middleware Installation Guide for Oracle Team Productivity Center Server 11g Release 1 (11.1.1) E14156-05 June 2010 This document provides information on: Section 1, "Oracle Team Productivity
More informationGetting Started with Phalcon
Getting Started with Phalcon Stephan A. Miller Chapter No. 1 "Installing Phalcon" In this package, you will find: A Biography of the author of the book A preview chapter from the book, Chapter NO.1 "Installing
More informationprotel Air HTML5 Creating and editing users User Guide protel hotelsoftware GmbH 2018
protel Air HTML5 Creating and editing users User Guide protel hotelsoftware GmbH 2018 www.protel.net Table of Contents About protel documents... 3 Introduction... 4 Creating HTML5 user... 6 Registration
More informationDatabases. Web applications in PHP to query a database. Practice n. 4
Databases Web applications in PHP to query a database Practice n. 4 The purpose of this practice is to build a simple web application in PHP to query a database. Preliminary steps This practice is based
More informationAppWizard Installation/Upgrade Guide (v.4.00)
AppWizard Installation/Upgrade Guide (v.4.00) Last Updated: 15 September 2010 1 Introduction This manual is intended for the installation or upgrade of AppWizard 5.00. Please ensure that all steps are
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationSMS Extender Set Up Guide
SMS Extender Set Up Guide 1 Preparing for Set Up 1. Make sure your school s SMS data is correct and up to date. The SMS at your school is the source of truth for all student and staff data. For that reason
More informationCYAN SECURE WEB Installing on Windows
CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy
More informationMobile Login Extension User Manual
Extension User Manual Magento provides secured and convenient login to Magento stores through mobile number along with OTP. Table of Content 1. Extension Installation Guide 2. API Configuration 3. General
More informationLocate your Advanced Tools and Applications
. phpmyadmin is a web-based application used to manage a MySQL database. It is free and open-source software. We have modified phpmyadmin so that it functions without errors on a shared hosting platform.
More informationWebsite Backend Manual
Website Backend Manual Page Table of Contents Introduction Introduction to Drupal CMS User Login Content Management Content Overview Adding New Content Editing Homepage Slider Translating Content Blocks
More informationGrandstream Networks, Inc. Captive Portal Authentication via Twitter
Grandstream Networks, Inc. Table of Content SUPPORTED DEVICES... 4 INTRODUCTION... 5 CAPTIVE PORTAL SETTINGS... 6 Policy Configuration Page... 6 Landing Page Redirection... 8 Pre-Authentication Rules...
More informationUnderstanding Admin Access and RBAC Policies on ISE
Understanding Admin Access and RBAC Policies on ISE Contents Introduction Prerequisites Requirements Components Used Configure Authentication Settings Configure Admin Groups Configure Admin Users Configure
More informationDistributed telecommunications network access using the TMOS IntraWeb Gateway
Distributed telecommunications access using the IntraWeb Gateway Magnus Ekhed, Peter Gundersen and Olav Queseth In an increasingly competitive marketplace, operator success depends more and more on usage.
More informationComponents of a Puppet architecture
Components of a Puppet architecture This tutorial has been taken from the second edition of Extending Puppet. Until January 9th you can pick it up for just $5. In fact - you can pick up any ebook or video
More informationAbout the Tutorial. Audience. Prerequisites. Copyright & Disclaimer. Joomla
About the Tutorial Joomla is an open source Content Management System (CMS), which is used to build websites and online applications. It is free and extendable which is separated into frontend templates
More informationCakePHP. Getting ready. Downloading CakePHP. Now that you have PHP installed let s create a place in htdocs for your CakePHP development:
CakePHP Getting ready Now that you have PHP installed let s create a place in htdocs for your CakePHP development: [tblgrant@silo htdocs]$ pwd /u/tblgrant/apache/htdocs [tblgrant@silo htdocs]$ mkdir cakewalks
More informationNetworked Restaurant Reservation
Networked Restaurant Reservation Rushika Verma SIES Graduate School of Technology, Navi Mumbai, Maharashtra Abstract:- This paper presents procedures for automating a reservation made at a restaurant.
More informationPublish Joomla! Article
Enterprise Architect User Guide Series Publish Joomla! Article Sparx Systems Enterprise Architect supports publishing an entire model, or part of the model, in a local Joomla! Repository as Articles (HTML
More informationCHAPTER III PLANNING
CHAPTER III PLANNING Table 1: Project Management Activities August September October Analysis Install VirtualBox Installation and update Ubuntu 14.04, Fedora 22 dan opensuse 13.1 Configuration VirtualBox
More informationPrerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)
Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure
More informationPublish Joomla! Article
Enterprise Architect User Guide Series Publish Joomla! Article Author: Sparx Systems Date: 10/05/2018 Version: 1.0 CREATED WITH Table of Contents Publish Joomla! Article 3 Install Joomla! Locally 4 Set
More informationIntegration Service. Admin Console User Guide. On-Premises
Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and
More informationC H A P T E R 1. Drilling Down on PHP
C H A P T E R 1 Setting Up the PHP Development Environment Getting a working development environment put together can be intimidating, especially for the absolute beginner. To follow along with the project
More informationDatabases. Web applications in PHP to query a database. Practice n. 4
Databases Web applications in PHP to query a database Practice n. 4 The purpose of this practice is to build a simple web application in PHP to insert and update data in a database. Preliminary steps This
More informationApplying for EMSWCD Small Project and Community Events (SPACE) Grants
ZOOMGRANTS TUTORIAL Applying for EMSWCD Small Project and Community Events (SPACE) Grants Instructions for ZoomGrants ZoomGrants is an online tool that helps facilitate grant applications, committee review,
More informationServer Side Scripting Report
Server Side Scripting Report David Nelson 205CDE Developing the Modern Web Assignment 2 Student ID: 3622926 Computing BSc 29 th March, 2013 http://creative.coventry.ac.uk/~nelsond/ - Page 1 - Contents
More informationOpen Source Digitalization Application. Installation Manual
Open Source Digitalization Application Installation Manual Easyndexer by Raúl Diez This is version 1.1 of the Easyndexer manual. This work is licensed under the Creative Commons Attribution 3.0 Unported
More informationIEMS 5722 Mobile Network Programming and Distributed Server Architecture Semester 2
IEMS 5722 Mobile Network Programming and Distributed Server Architecture 2016-2017 Semester 2 Assignment 3: Developing a Server Application Due Date: 10 th March, 2017 Notes: i.) Read carefully the instructions
More informationIntegration Service. Admin Console User Guide. On-Premises
Kony Fabric Integration Service Admin Console User Guide On-Premises Release V8 SP1 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the
More informationV-CUBE Meeting User Manual
V-CUBE Meeting User Manual 2. Preparing for Meetings V-cube, Inc. 2013 V-cube, Inc. All Rights Reserved. Revision history Revision date Details 2013/09/10 - Added a folder feature to the storage functionality
More informationOnline Document Delivery Service (ODDS):
Online Document Delivery Service (ODDS): An Open Source Software Initiative for DDS Management SOFTWARE MANUAL Prepared by Dr. B.Sutradhar, Librarian & Mr. M.Manivannan, Information Analyst Central Library
More informationSchoolBooking LDAP Integration Guide
SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your
More informationPORTAL RESOURCES INFORMATION SYSTEM: THE DESIGN AND DEVELOPMENT OF AN ONLINE DATABASE FOR TRACKING WEB RESOURCES.
PORTAL RESOURCES INFORMATION SYSTEM: THE DESIGN AND DEVELOPMENT OF AN ONLINE DATABASE FOR TRACKING WEB RESOURCES by Richard Spinks A Master s paper submitted to the faculty of the School of Information
More informationFireFox. CIS 231 Windows 10 Install Lab # 3. 1) Use either Chrome of Firefox to access the VMware vsphere web Client.
CIS 231 Windows 10 Install Lab # 3 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced
More information205CDE Developing the Modern Web. Assignment 2 Server Side Scripting. Scenario D: Bookshop
205CDE Developing the Modern Web Assignment 2 Server Side Scripting Scenario D: Bookshop Introduction This assignment was written using PHP programming language for interactions with the website and the
More informationManage Administrators and Admin Access Policies
Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on
More informationCCMS Installation Instructions
CCMS Installation Instructions August 2012 Rev. 1.8.0 Ceedo Technologies, Ltd. 21 Hamelacha St. P.O. Box 11695 Park Afek, Rosh-Haayin, Israel 48091 T +972-7-322-322-00 www.ceedo.com 2012 Ceedo Technologies,
More informationInstalling and Confi guring Joomla! 1.5 and Jobs! Pro 1.3.2
Installing and Confi guring Joomla! 1.5 and Jobs! Pro 1.3.2 Joomla! has earned a reputation of being one of the most powerful CMS programs around, as its core team emerged from another popular open source
More informationQuick Start Manual for Mechanical TA
Quick Start Manual for Mechanical TA Chris Thornton cwthornt@cs.ubc.ca August 18, 2013 Contents 1 Quick Install 1 2 Creating Courses 2 3 User Management 2 4 Assignment Management 3 4.1 Peer Review Assignment
More informationCIS 231 Windows 10 Install Lab # 3
CIS 231 Windows 10 Install Lab # 3 1) To avoid certain problems later in the lab, use Chrome as your browser: open this url: https://vweb.bristolcc.edu 2) Here again, to avoid certain problems later in
More informationCoveo Platform 7.0. Yammer Connector Guide
Coveo Platform 7.0 Yammer Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing market conditions,
More informationINSTALLING RACHEL ON SYNOLOGY GIAKONDA IT
INSTALLING RACHEL ON SYNOLOGY GIAKONDA IT To add RACHEL to a Synology server there are a few stages to go through. First we need to ready the server for web use. Then we have to obtain a copy of the RACHEL
More informationPaperWeight s User Manual (Admin Area)
PaperWeight s User Manual (Admin Area) Prepared by: FATbit Technologies Copyright 2004 2014 FATbit Technologies. All Rights Reserved. The information contained in this document represents the current views,
More informationInstalling Cisco MSE in a VMware Virtual Machine
Installing Cisco MSE in a VMware Virtual Machine This chapter describes how to install and deploy a Cisco Mobility Services Engine (MSE) virtual appliance. Cisco MSE is a prebuilt software solution that
More informationDigital Municipal. Computer Science and Engineering, St Joseph Engineering College, Vamanjoor, India
International Journal of Internet of Things 2017, 6(2): 62-66 DOI: 10.5923/j.ijit.20170602.11 Digital Municipal Anusha Prakash, Arzoo V. Dadhania, Janice Carlin D Silva *, Sudhamshu Vidyananda, Gayana
More informationWeb Database Applications: Report. Name. Institution of Affiliation
Web Database Applications: Report Name Institution of Affiliation 1 Table of Contents Assumptions... 3 Validation Constraints... 3 Test plan... 6 Customer registration... 6 Customer authentication... 8
More informationSetting up the Master Computer
Setting up the Master Computer for gofish the O FISH-AL Sales Program Be forwarned, non-technical translation for what is to come: blah, blah, doze off and blah-blah. Last updated March 12, 2016 I appologize
More informationTangeloHub Documentation
TangeloHub Documentation Release None Kitware, Inc. September 21, 2015 Contents 1 User s Guide 3 1.1 Managing Data.............................................. 3 1.2 Running an Analysis...........................................
More informationRunning Head: LAB 4 - EMVI PROTOTYPE USER MANUAL 1
Running Head: LAB 4 - EMVI PROTOTYPE USER MANUAL 1 Lab 4 EmVi Prototype User Manual Orange Team CS 411W Janet Brunelle December 5th, 2013 Version 2 LAB 4 - EMVI PROTOTYPE USER MANUAL 2 TABLE OF CONTENTS
More informationHOTDOCS DOCUMENT SERVICES
HotDocs Document Services ~ February 2012 Page 1 HOTDOCS DOCUMENT SERVICES Getting Started in the Cloud AT A GLANCE Sign up for HotDocs Document Services Receive contract order confirmation email Install
More informationManage Administrators and Admin Access Policies
Manage Administrators and Admin Access Policies Role-Based Access Control, page 1 Cisco ISE Administrators, page 1 Cisco ISE Administrator Groups, page 3 Administrative Access to Cisco ISE, page 11 Role-Based
More informationBitnami HHVM for Huawei Enterprise Cloud
Bitnami HHVM for Huawei Enterprise Cloud Description HHVM is an open source virtual machine designed for executing programs written in Hack and PHP. HHVM uses a just-in-time (JIT) compilation approach
More informationJoomla 3.X Global Settings Part III Server Settings
Joomla 3.X Global Settings Part III Server Settings Diagram 1 Path to Temp Folder: This is a text box adjacent to this prompt which holds the path to Joomla s temp folder on the web server. This is the
More informationSystem Admin Manual <SNAPVALET> <Team No- 03>
System Admin Manual Name Brian Vanover Brian Bousman Ditong Ding Molly Karcher Patrick Horng Ridhima Manjrekar Role Project Manager, Developer Operational Concept Engineer, Developer
More informationPasswords. Twitter UN: IDANRV Twitter PW: idanrv1. Thank You
Passwords Twitter UN: IDANRV Twitter PW: idanrv1 Thank You USER'S MANUAL TABLE OF CONTENTS Page # 1.1 SYSTEM OVERVIEW... 4 1.2 DEFINITIONS & ACRONYMS... 4 1.3 REFERENCES... 4 2.0 INSTALLATION... 5 2.1
More informationDATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2016
DATABASE SYSTEMS Introduction to MySQL Database System Course, 2016 AGENDA FOR TODAY Administration Database Architecture on the web Database history in a brief Databases today MySQL What is it How to
More informationCSC 3300 Homework 3 Security & Languages
CSC 3300 Homework 3 Security & Languages Description Homework 3 has two parts. Part 1 is an exercise in database security. In particular, Part 1 has practice problems in which your will add constraints
More informationCounterACT External Classifier Plugin
CounterACT External Classifier Plugin Version 2.2.2 and Above Table of Contents About the Plugin... 3 How It Works... 3 Requirements... 4 What to Do... 4 Deployment Considerations... 5 Install the Plugin...
More informationISQua Collaborate User Guide for Surveyors
2017 ISQua Collaborate User Guide for Surveyors THE INTERNATIONAL SOCIETY FOR QUALITY IN HEALTH CARE LTD TABLE OF CONTENTS About ISQua Collaborate... 2 Getting started... 2 Logging in... 3 Dashboard...
More informationInstalling MediaWiki using VirtualBox
Installing MediaWiki using VirtualBox Install VirtualBox with your package manager or download it from the https://www.virtualbox.org/ website and follow the installation instructions. Load an Image For
More informationAn Online Interactive Database Platform For Career Searching
22 Int'l Conf. Information and Knowledge Engineering IKE'18 An Online Interactive Database Platform For Career Searching Brandon St. Amour Zizhong John Wang Department of Mathematics and Computer Science
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More informationEfed Management Suite
Efed Management Suite Version 1.0.1 Alpha Release Document Updated Author Software Version Revision Version 1.0.0 6/6/18 Benjamin Halkum V.0.5 Pre-Alpha Initial Documentation Layout 1.0.1 6/6/18 Benjamin
More information