Akamai Workbook QUICK 30 MIN TUTORIALS VERSION 2

Size: px
Start display at page:

Download "Akamai Workbook QUICK 30 MIN TUTORIALS VERSION 2"

Transcription

1 Akamai Workbook QUICK 30 MIN TUTORIALS VERSION 2

2 Akamai Workbook Part 2 More adventures, for users who have completed the Akamai Workbook

3 Sign up for the Akamai Developer Program Get access to the latest developer tools, exclusive BETAs, upcoming events, and so much more. bit.ly/akamaidev Page 1

4 Table of Contents Advanced Web Performance with Cloudlets 4 Prerequisites 4 Create the Edge Redirector Cloudlet 4 Configure Edge Redirector in Property Manager 5 Summary 6 Create the Visitor Prioritization Cloudlet 7 Configure Visitor Prioritization in Property Manager 8 Summary 8 Test the Cloudlets 8 Summary 9 Environment Management 10 Prerequisites 10 Tools Required 10 Tutorial 1: Create a variable-based configuration 10 Objective 10 Create the configuration 11 Identify the host names and origins 11 Create environment variable 12 Extract and set the correct environment variable 13 Set the origin 15 Add CP Code 15 Cleanup non-related rules 16 Save and activate to staging 17 Testing 17 Tutorial 2: Use PAPI to toggle a feature 17 Objective 17 Add a toggle variable 17 Add behavior to handle the feature 18 Enable feature on QA and Dev 19 Add the check for feature flag and enable feature 22 Save, activate and test 26 Tutorial 3: Toggle Feature Flag with CLI (optional) 26 Objective 26 Install CLI and generate credentials 26 Modify the Feature Flag variable 27 Page 2

5 Dynamic Caching 30 Prerequisites 30 Tools Required 30 Homepage Dynamic Page Caching 30 Device characterization: Desktop vs Mobile 30 Dynamic page caching: Session vs No Session 33 See device characterization and advanced caching in action 34 Product page caching 35 Create a rule for caching product pages 35 Look at Debug Headers 40 Move query string parameters to the Cache ID 40 Look at Debug Headers (Again) 42 Purge cached data 43 HTTP Streaming with Token Authentication 44 Implement Token Authentication with HTTP Streaming 44 Generating tokens and testing 48 Summary 52 Page 3

6 Advanced Web Performance with Cloudlets Cloudlets are smart, value-add applications at the Akamai Edge that help simplify your web operations and improve end-user experience. In this tutorial, you will implement and test the Edge Redirector and Visitor Prioritization Cloudlets. Both these Cloudlets will help manage high volumes of traffic by offloading data from the origin and redirecting some users to waiting rooms. Prerequisites You must first complete Getting Started with Akamai Web Performance. After doing that tutorial, you ll have an Akamai property with the hostname edge2017-[yourid]. which you ll use in this tutorial. Create the Edge Redirector Cloudlet The Edge Redirector Cloudlet offloads data from the origin to servers located on the edge of the network. In this tutorial, we ll enable this feature for your website. 1. Click the Ion Premier-3-1A42HS1 breadcrumb trail below the context selector icon. 2. Click the CONFIGURE tab. 3. Click the Cloudlets Policy Manager link. Page 4

7 4. Click Create New Policy. 5. Select Edge Redirector from the Cloudlet Type drop-down menu. 6. Specify the Policy Name : Redirect_Edge2017_[YourID] (e.g. Redirect_Edge2017_001 ) 7. Select Ion Premier-3-1A42HS1 in the Group Association box. This should be the same group as your Property delivery configuration. 8. Enter any additional information you want to specify in the Additional Notes field. 9. Select the property you want to link the policy with from the drop-down list. 10. Click Create Policy. 11. Click Add Rule. Page 5

8 12. Specify in the Source URL field. For example: www-001.edge2017.akamaiuweb.com/akamai 13. Specify in the Redirect URL field. For example: Select either Permanent (301) or Temporary (302) from the Redirect Type drop-down. 15. Click Save Rule. 16. Back in the Version Details screen, click Save Changes. 17. Click Activate Version. 18. Be sure select the Staging environment and add the Property associated with this Cloudlet Policy. Configure Edge Redirector in Property Manager 1. Edit a new version of your configuration in Property Manager (there are multiple ways of doing this - one way is to click into the most recent version of your property and click the Edit New Version button). Page 6

9 2. Add the Edge Redirector Cloudle t behavior to your Default Rule, and specify the policy name you gave to your cloudlet. Click the Add Behavior button and select the Edge Redirector Cloudlet behavior. 3. Save and activate your configuration in Property Manager. Note: You will need to wait for both the Cloudlet Policy and the Property Manager configuration to activate before you can test it. You ll activate the Visitor Prioritization Cloudlet, then come back to this later. Summary In this lab, you learned how to: Create an Edge Redirector Cloudlet Policy using the Cloudlets Policy Manager. Configure the Edge Redirector behavior in the Ion Premier configuration you ve used so far and activating it on the Staging network. Activate the Edge Redirector Cloudlet Policy on the Staging network. Page 7

10 Create the Visitor Prioritization Cloudlet Configure a Visitor Prioritization Cloudlet policy to redirect some of your end users to waiting rooms when traffic volume is high. 1. Click the Ion Premier-3-1A42HS1 breadcrumb trail below the context selector icon. 2. Click the CONFIGURE tab. 3. Click the Cloudlets Policy Manager link. 4. Click Create New Policy. 5. Select Visitor Prioritization from the Cloudlet Type drop-down. 6. Specify the Policy Name: VP_Edge2017_[YourID] (e.g. VP_Edge2017_001 ) 7. Select the Ion Premier-3-1A42HS1 in the Group Association box. This should be the same group as your Property delivery configuration. 8. Enter any additional information you want to specify in the Additional Notes field. 9. Click Create Policy. 10. Click Add Rule. 11. Specify the match condition. For example, when should Akamai check for the waiting room? In our example, you can set this to match on the top level path /. 12. Specify the percentage you would like to send to the origin. For this tutorial, set it to Always send to Waiting Room. 13. Click Save Rule. 14. Back in the Version Details screen, click Save Changes. 15. Click Activate Version. 16. Be sure select the Staging environment and add the Property associated with this Cloudlet Policy. 17. Note how fast this Policy is activated! The policy is active when the policy changes to GREEN. Page 8

11 Configure Visitor Prioritization in Property Manager 1. Edit a new version of your configuration in Property Manager. 2. Add the Visitor Prioritization Cloudlet behavior to your Default Rule, and specify the name you gave to your cloudlet. 3. Use the same name for the Instance Label. 4. For the NetStorage section use: AkamaiUniversity ( akamaiu.download.akamai.com/ ) 5. The directory should be /edge Set the Waiting Room Duration to 10 seconds. 7. Save and activate your configuration in Property Manager. Note: You will need to wait for both the Cloudlet Policy and the Property Manager configuration to activate before you can test it. Summary In this lab, you learned how to: 1. Create a Visitor Prioritization Cloudlet Policy using the Cloudlets Policy Manager. 2. Configure the Visitor Prioritization behavior in the Ion Premier configuration you ve used so far and activating it on the Staging network. 3. Activate the Visitor Prioritization Cloudlet Policy on the Staging network. Test the Cloudlets In this section, you test the Edge Redirector and Visitor Prioritization Cloudlet policies. 1. To test Edge Redirector, make a request for and see if it redirects properly to your company s website. 2. To test Visitor Prioritization: a. Make a request to (top level). b. This should now show the waiting room. c. Open a new tab, and go back into Luna. d. Go back to the Cloudlet Policy Manager and create a new version of the VP Cloudlet. e. Edit the policy to allow the request to go through at 100% to Origin and activate it to staging. f. Notice how fast the Cloudlet responds to the changes. g. Go back to the tab with the Waiting Room page. h. Wait for the page to reload to see what happens (please wait for the timer to run out a couple times). Page 9

12 Summary You ve now learned how to configure two of the Akamai Cloudlets. For information on the broader range of available cloudlets, visit the Akamai Marketplace online or Page 10

13 Environment Management The purpose of this tutorial is to show you a mechanism to use the Property Manager variables. We ll then use this setup for creating dynamic configurations that can select origin domains based on the incoming host header. Finally, we ll use the variable mechanism to implement a feature toggle that represents a real life scenario. In these tutorials, you will create a variable-based configuration and use PAPI to toggle features in your Akamai environment. Prerequisites You must first complete Getting Started with Akamai Web Performance. After doing that tutorial, you ll have an Akamai property with the hostname edge2017-[yourid]. which you ll use in this tutorial. The tutorial also assumes that you are familiar with Property Manager, you can create a configuration, and you are able to override your machine s DNS settings to spoof and test the setup. Optionally, if you the Akamai CLI installed, you can follow along by using the CLI for activation and minor configuration tweaks. The Akamai CLI is required for Tutorial 3. Tools Required The laptops in the Developer Zone all have Chrome with built-in Developer Tools and Modify Headers. If you re using your own laptop, you must have these installed. Tutorial 1: Create a variable-based configuration Objective In this tutorial, you will create a property that will use property manager variables and regular expression behavior to dynamically set the correct origin and route traffic for three different domains. You will architect the configuration such that the origin name will be derived from the host name. So, will get mapped to origin- In other words, we ll assume that the hostname to origin mapping follows a fixed pattern. Page 11

14 Create the configuration Create a new configuration to work with the environment management. Click Configure > Property Manager (New Property) to get started. You can name the configuration as env-yourid.lab1 where YourID is the unique identifier you created. Enter the name and select Create Property. Leave the product selection as it is. To verify, Ion Premier should be selected automatically. Identify the host names and origins Create a configuration that can accept traffic for the following three hostnames: www-yourid.edge2017.akamaiuweb.com qa-yourid.edge2017.akamaiuweb.com dev-yourid.edge2017.akamaiuweb.com Page 12

15 Substitute your unique identifier for YourID. In the screenshot below, 100 is used as the ID. To add the hostnames, click the Add button under Property Hostnames. Enter the hostnames and complete the steps to add an edge hostname.for simplicity, create these configurations as non-secure domains, so we will not need to use any TLS certificates. These hostnames will use the following as origin: Hostname www-yourid.edge2017.akamaiuweb.com qa-yourid.edge2017.akamaiuweb.com dev-yourid.edge2017.akamiuweb.com Origin edge edge2017-qa.origins.akamaiuweb.com edge2017-dev.origins.akamaiuweb.com Create environment variable Next, we will create a Property Manager variable called PMUSER_ENV to hold the environment. Set the initial value of this variable as prod, give it the description Holds the environment information, and select Visible from the Security Settings menu. Page 13

16 Extract and set the correct environment variable The environment type is decided by the hostname. In this step, we rewrite the PMUSER_ENV to extract the value from the hostname. In this example, PMUSER_ENV refers to the first part of hostname before the hyphen ( - ). Possible values include: www, qa, and dev. To extract the correct variable, do the following: 1. Click Default Rule within the Property Configuration Settings. 2. Choose Add Behavio r. 3. Search for Set Variable and then add this behavior. When you do this, the behavior will be added as the last behavior in the Behaviors section. 4. Move the behavior up so that it is the first rule in the section. 5. Now, update this behavior to use regular expressions and extract the environment details: In the Variable drop-down, choose PMUSER_ENV In the Expression field, type {{builtin.ak_host}} In the Operation drop-down for the Set Variable behavior, select the option Substitute. Enter (\-.+) for the Regex field. Leave the Replacement field blank. Page 14

17 We now have a behavior where we are using AK_HOST (the incoming HTTP Host header) to extract the environment name ( www, qa or dev ) and setting the variable PMUSER_ENV. We disregard anything after www, qa or dev in the incoming hostname. Page 15

18 Set the origin In the Default Rule section, there is a behavior named Origin Server. Enter the value edge2017-{{user.pmuser_env}}.origins.akamaiuweb.com as the Origin Server Hostname. This value will automatically map the request to correct origin based on the environment variable you set previously. Add CP Code We will need to add a Content Provider Code (CP Code) to the configuration. Use the CP Code Environment Lab CP Code. Page 16

19 Cleanup non-related rules For this tutorial, we don t need all the rules. So, delete the following rules: Performance Offload To remove a rule, click the gear icon and select Delete. Page 17

20 You can leave the rest of the rules as is. Save and activate to staging Once you have set up the configuration, save and activate the configuration to Akamai staging network. Testing Once the configuration is active, you can test to verify that your website is now accessible using the www, qa, and dev host names. Just make a request to your dev, qa and production (www) hostnames and you should see the home page. Tutorial 2: Use PAPI to toggle a feature Objective In this tutorial, you will add a feature flag capability. If the user sends a query-string change-origin=true for the home page, the response will be fetched from the origin By default, this feature is applied for qa and dev environments. By toggling the feature flag variable, this feature could be applied to prod domain as well. Add a toggle variable Create a new variable named PMUSER_FEATURE_TOGGLE with the default value of OFF. This variable will be used to control if the new feature will be applied for the client request. Page 18

21 Add behavior to handle the feature You will now use a modularized behavior. First, create an empty rule by clicking Add Rule > Blank Rule Template and name the feature New Fabulous Feature. Page 19

22 Add a condition to enable this feature only if: the request is for the for the home page (file path: /), and the query string change-origin=true is present. Enable feature on QA and Dev Add a rule to this behavior so the rule applies only to the home page. Click the New Fabulous Feature rule. Then, click the Add Rule menu and choose Child-Rule. Page 20

23 Then, add another blank rule and name it Feature Trigger. Within this rule, add a condition: if the current environment is dev or qa. To do this, click Add Match and select Variable from the drop-down. Then, add a check on PMUSER_ENV for the values of dev and qa. Page 21

24 Next, add a behavior set the feature flag value to be ON, as shown below. To do this: Click Add Behavior Search for the behavior named Set Variable In the Variable box, select PMUSER_FEATURE_TOGGLE Set the Expression value to be ON Page 22

25 Add the check for feature flag and enable feature Again, create a child rule for New Fabulous Feature. Name it as Apply Feature. To ensure correct nesting, do the following: Click New Fabulous Feature. Click Add Rule > Child Rule Select the Blank Rule option and name it as Apply Feature Page 23

26 Within the Apply Feature section, add the following condition: If variable PMUSER_FEATURE_TOGGLE is set to ON. For this, follow similar process as previous rule by selecting Add Match and selecting Variable. Once the match is added, set the variable name to be PMUSER_FEATURE_TOGGLE and the value to be ON. Page 24

27 Now, add the following behavior: Choose Add Behavior Choose the behavior Origin Server Page 25

28 Within the behavior, make the following changes: Add the origin name as Change the Forward Host Header drop-down value to Origin Hostname. This will ensure that we send the HTTP host header as when we go to origin. Page 26

29 Save, activate and test Now, save the configuration and activate it to staging. Spoofing should already be effect. When testing, you should see the following behavior: URL Result m/ m/ m/?change-origin=true m/?change-origin=true Ecommerce home page Ecommerce home page Ecommerce home page Ecommerce home page Example.com home page Example.com home page Tutorial 3: Toggle Feature Flag with CLI (optional) Objective Assuming that you have a feature that has been tested and you d like to push it to the production network, you can use the Akamai CLI to quickly modify variable values and activate the configuration. Install CLI and generate credentials The installation steps for CLI is covered in detail on the Getting Started section of the developer.akamai.com website. Here are some quick links related to the CLI: Akamai CLI: Akamai CLI for property manager: API documentation for Property Manager: Page 27

30 Modify the Feature Flag variable In Tutorial 2, we created the configuration with the feature toggle flag as PMUSER_FEATURE_TOGGLE with the default value of OFF. Now, we will toggle the variable to have a default value of ON. First, pull down the rules of the activated configuration: $ akamai property retrieve env100.lab1 --file rules.json Retrieving env100.lab1... retrieved rules formats: ms... searching propertyname for env100.lab1... getting info for prp_ Retrieving env100.lab1 v2... retrieving property (env100.lab1) v2... retrieving: ms Writing env100.lab1 rules to rules.json Update back with the same rules to create a new version of the configuration: $ akamai property update env100.lab1 --file rules.json Updating property env100.lab1... retrieved rules formats: ms... searching propertyname for env100.lab1... getting info for prp_ Updating [object Object]... copy property ([object Object]) v2... copy: ms Retrieving env100.lab1 v3... retrieving property (env100.lab1) v3... retrieving: ms... updating property ([object Object]) v3... updating: ms Update Complete Update: mins Page 28

31 Create a variable toggle file. In this file, set the value of PMUSER_FEATURE_TOGGLE to ON. Save this in a file. In this example, the file is named toggle.txt. [{ "name": "PMUSER_FEATURE_TOGGLE", "value": "ON", "description": "This feature is now world-deployed", "hidden": false, "sensitive": false, "action":["update"] }] Update the configuration to toggle the variable value: $ akamai property modify env100.lab1 --variables ~/Downloads/toggle.txt Modifying property env100.lab1... retrieved rules formats: ms... searching propertyname for env100.lab1... getting info for prp_ retrieving property (env100.lab1) v3... retrieving: ms... updating existing variable PMUSER_FEATURE_TOGGLE... updating property (env100.lab1) v3... updating: ms Modify: mins Activate the configuration: $ akamai property activate env100.lab1 --network STAG Activating env100.lab1 on STAG... retrieved rules formats: ms... searching propertyname for env100.lab1... getting info for prp_ Activating env100.lab1 to STAGING... activating property (env100.lab1) v3 on STAGING... activating: ms... automatically acknowledging 5 warnings!... activating property (env100.lab1) v3 on STAGING... activating: ms... waiting 30s... waiting 30s... waiting 30s... waiting 30s Activation Complete Activation: mins Page 29

32 Now, if you run the tests again, you should see the following behavior: URL origin=true gin=true rigin=true Result Ecommerce home page Ecommerce home page Ecommerce home page Example.com home page Example.com home page Example.com home page Page 30

33 Dynamic Caching Caching stores frequently-used content near the edge of the Akamai network, so end users can load webpages quickly. This increases the responsiveness of your site and improves the user experience. Static caches store common objects, like your site s logo, that are used across many pages, for many users, over longer periods of time. Dynamic caches, on the other hand, store objects which change frequently or which are personalized to a specific end user or small group of end users. You might use dynamic cache for breaking news images or the items stored in your customer s shopping cart. Prerequisites You must first complete Getting Started with Akamai Web Performance. After doing that tutorial, you ll have an Akamai property with the hostname edge2017-[yourid]. which you ll use in this tutorial. Tools Required The laptops in the Developer Zone all have Chrome with built-in Developer Tools and Modify Headers. If you re using your own laptop, you must have these installed. Homepage Dynamic Page Caching Your homepage is one of the most frequently accessed parts of your site, and can benefit the most from fast load times and responsiveness that dynamic caching can provide. Device characterization: Desktop vs Mobile First you ll create a rule called Desktop vs Mobile. This will be useful for serving content which is different on the mobile or desktop versions of your homepage. Page 31

34 1. Select the Default Rule and then click the Add Rule button. 2. Choose the Blank Rule Template and give it the name Desktop vs Mobile. Page 32

35 3. Now set up the match condition. Within your Desktop vs Mobile rule, match on the homepage paths ( / and /index.php ). 4. Next you ll add two behaviors, one to send the Device Characteristics parameter is_mobile to the origin server as a header (so the origin can make intelligent use of it), and another to add this value to the cache key. Use the Add Behavior button to add the Device Characterization Forward in Header behavior. 5. Use the Add Behavior button to add the Device Characterization Define Cached Content behavior. Note: So far we have setup the cache key for the homepage so that it will include the is_mobile parameter, but we haven t actually cached it. Page 33

36 Dynamic page caching: Session vs No Session Now you ll add another rule called Session vs No Session. If an end user is not logged in to a session, they may not have dynamic content such as a shopping cart that needs to be served. 1. Select the Default rule and then add another child rule, as in the Desktop vs Mobile section above. 2. Choose the Blank Rule Template and give your rule the name Session vs No Session. 3. Just like the previous step, match on the homepage paths ( / and /index.php ) 4. Now add Edge Caching. Add a Caching Option rule to cache these pages at the edge. Use a time to live (TTL) Max-age of one day. 5. Now create a sub-rule of the Session vs No Session rule. Select the Session vs No Session rule, then select Child Rule from the Add Rule menu. Page 34

37 6. Name your new child rule Session Exists. Create a match condition which matches on the condition if a Request Cookie called PHPSESSID exists. 7. Add the Caching Option behavior Bypass Cache. 8. Save and activate your configuration. Page 35

38 See device characterization and advanced caching in action Now that you have your rules and behaviors established, let s see how they perform on the site. 1. Make sure you have Modify Headers enabled in your browser and that you are adding the Akamai Pragma headers required for debugging: Pragma: akamai-x-get-request-id, akamai-x-cache-on, akamai-x-cache-remote-on, akamai-x-check-cacheable, akamai-x-get-cache-key, akamai-x-get-extracted-values, akamai-x-get-nonces, akamai-x-get-ssl-client-session-id, akamai-x-get-true-cache-key, akamai-x-serial-no If you want to copy and paste these header values, you can do so from: 2. Open your browser to the homepage of your unique site: 3. To view Debug Headers, open Developer Tools and go to the Network tab. 4. Make sure the browser caching is disabled (this is an option within Developer Tools). 5. Reload your product page. Then click into the first object (the / page) and look at the response headers. You should see that: The X-Check-Cacheable is YES The X-Cache-Key indicates a time to live of 1d (one day) The X-Cacke-Key has cid= EDC_IS_MOBILE=false If you want, you can also verify that X-Cacke-Key has cid= EDC_IS_MOBILE=true when you view the page with Chrome s mobile emulation mode enabled. 6. On your site, click a product page of your choice and add it to your cart. This will create a session cookie, allowing you to test the dynamic caching. You should also see that you then have one item in your cart (top-right). 7. Now go back to your homepage and look at the debug headers. You should now see: The X-Check-Cacheable is NO. This is because the edge cache is being bypassed because you now have a session cookie. Product page caching In this tutorial you create an initial rule to cache product pages. Create a rule for caching product pages 1. Create a new, editable version of your property. Select the Default rule and click Add Rule. Page 36

39 Page 37

40 2. Select Blank Rule Template and give it the name Product Pages. 3. Give your new rule a match condition. Select your new Product Pages rule. Click the Add Match button. Select a Path match and insert the path /product.php, as shown here: Page 38

41 4. Under Behaviors in the Product Pages rule, click Add Behavior and insert a Caching rule. Select Cache from the Caching Option menu, and select Serve stale if unable to validate from the Force Revalidation of State Objects menu, as shown here: 5. Configure your Caching rule with a TTL of 30 days. Set Max-age to 30 and select days from the menu, as shown here: Page 39

42 6. Now add a child rule. Select your Product Pages rule. Select Child Rule from the Add Rule menu. 7. Select Blank Rule Template and give it the name No Session. Page 40

43 8. Give your sub-rule a match condition. Within your sub-rule, click Add Match to insert a match condition. Select a Request Cookie match and match if PHPSESSID exists. 9. Add a Caching behavior to your child rule to bypass cache. In the Behaviors section of your No Session child rule, click Add Behavior and insert an instance of the Caching behavior. Configure it so that, when a PHPSESSID cookie exists, the request will bypass cache, going to origin. Page 41

44 10. Save and then Activate on Staging. Look at Debug Headers Verify that the debugging tools you have enabled are working as expected. 1. Make sure you added the Akamai Pragma headers required for debugging in See device characterization and advanced caching in action section. 2. Open your browser to the homepage of your unique site: 3. Once there, click a product image to go to a product page of your choice. 4. In a previous step, you established a session on your site. Delete the PHPSESSID cookie before proceeding. You can do this by clearing all your browser history, cache, and cookies, or you can choose just this cookie by going to the Application tab within Developer Tools. 5. Open Debug Headers and go to the Network tab. Make sure the browser caching is disabled (this is an option with Developer Tools). 6. Reload your product page and then click into the first object (the /product.php page) and look at the response headers. You should see that: The X-Check-Cacheable is YES. (Note: it will be NO if you have a PHPSESSID cookie. Clear this cookie if you want to get back to a no-session state). Your page has a TTL of 30 days The productid query string parameter is in the main part of the Cache Key, not the cid= part Your page is likely cached at the edge (and if it isn t, try reloading it). 7. Now try loading a different product page and notice how the productid query string parameter is always included in the main part of the cache key (not in the cid= ). Therefore, each URL is fully unique. 8. If you purge one product page URL, including the query string parameter, you will see that the other product page URLs are still cached. Try this using Fast Purge: PUBLISH > Fast Purge. Move query string parameters to the Cache ID 1. Create a new editable version of your property. Page 42

45 2. Edit your Product Pages rule. Select your Product Pages rule. In the behaviors section, use the Add Behavior button to add an instance of the Cache ID Modification behavior. Chose the action Include all query parameters to move the query string parameters to the Cache ID (the cid= part of the Cache Key): 3. Add an instance of the Cache Key Query Parameters behavior and chose to reorder the parameters, by selecting Include all parameters (reorder alphabetically) from the menu. 4. Although this application only has the one query string parameter ( productid= ) on the product.php pages, it s generally a good idea to choose the reorder alphabetically option, since in applications where there are more than one query string parameter, the order of the parameters can easily get confused, creating duplicate cache keys or cache IDs. Page 43

46 5. It is best to place the Cache ID Modification behaviors above the actual Caching behavior. You can drag and drop the behaviors. In the end, your behaviors stack should look like this: 6. Save and then Activate on Staging. Look at Debug Headers (Again) Refer to Look at Debug Headers for more details. 1. Load a product page in your browser. First open the homepage of your unique site: 2. Once there, click on a product image to go to a product page of your choice. 3. Open Debug Headers and go to the Network tab. 4. Make sure the browser caching is disabled. Page 44

47 5. Reload your product page. Then, click the first object (the /product.php page) and look at the response headers. You should see that: Your productid query string parameter is now in the Cache ID cid= part of the Cache Key The X-Check-Cacheable is YES. (Note: it will be NO if you have a PHPSESSID cookie. Clear this cookie if you want to get back to a no-session state). your page has a TTL of 30 days your page is likely cached at the Edge (and if it isn t, try reloading it) Purge cached data Explore your website, and try purging data to observe how caching works. 1. Try loading a different product page and notice how the productid query string parameter is now always contained in the Cache ID part of the Cache Key, i.e. the cid= part. This means that all these pages are variants of the main Cache Key and therefore can be purged with a single URL. Therefore each URL is fully unique. 2. Now you purge all product pages by using Fast Purge to purge the URL: You can do this either by using Fast Purge ( PUBLISH > Fast Purge ) or by using the purge page built into your website. To use the purge page: 3. Go to the purge page URL ( ) 4. Select /product.php 5. Under Method, select Purge 6. Click Generate Code to generate the content refresh code (shown in the Refresh Code text area) 7. Click Run Refresh API to run the content refresh (this uses the CCUv3 API) After purging your object, you can then reload any product page with Developer Tools open, and sending your Akamai Pragma headers, and you should see the X-Cache header indicate TCP_MISS. This confirms that all product pages were purged by purging just a single object ( /product.php ). Page 45

48 HTTP Streaming with Token Authentication Token Authentication is a common security method that requires an end user to present a cryptographically signed token as part of a URL request. Typically, this token is generated by a service that performs a lookup of the end user to ensure they should be granted access. Here is an example of a URL with a token appended to it as a query string: Tokens can also be passed to the server via a cookie in the request. In fact, Akamai relies on both query strings and cookies to secure HTTP streaming content when the Edge Authorization behavior is enabled on a property. Implement Token Authentication with HTTP Streaming Akamai delivers HTTP streaming content via Adaptive Media Delivery. In this step, you log in to an account and configure a new configuration with Token Authentication. 1. Navigate to Luna at 2. Log in with these credentials: User: md16@akamaiuniversity.com Password: media Click Configure and then New Property. 4. From the dropdown, select Create new Property in PM. Page 46

49 5. In the Products list, select Adaptive Media Delivery, and then give it a name that follows the pattern [YOUR IDENTIFIER].edgelab.2017 where [YOUR IDENTIFIER] is something unique to you like your initials, name, postal code, etc. Then click Create Property. This brings you to Property Manager, the tool you use to create, modify, and control your HTTP streaming configurations on Akamai s platform. When creating a configuration, you ll want to provide complete details including a delivery hostname, an origin server, and a Content Provider Code (CP Code). For the purpose of this tutorial, we ll ignore those elements and focus on implementing Token Authentication. Property Manager is a rules-based system, allowing you to specify conditions and then assign behaviors that occur in those cases. For this tutorial, we want to create a new rule that applies token security to any URLs with /protected/ in the path. 1. In the upper left corner, click Add Rule. 2. Click Blank Rule Template. Name it Token Authentication and click Insert Rule. 3. You now have a blank rule ready to have a matching criteria specified, along with the desired behavior. Click Add Match. Page 47

50 4. Change the values to reflect a Path that matches one of /protected/*. Note the asterisk at the end of the path. That s critical when we want to protect everything in that directory. 5. Now, tell the configuration how to handle requests with this path. Click Add Behavior. Page 48

51 6. From the drop-down of available behaviors, choose Access Control & Security. 7. You are now looking at various behaviors that control various methods of protecting your content. For HTTP Streaming delivery, choose the Segmented Media Protection behavior and click Insert Behavior. Page 49

52 This behavior not only applies a token protection scheme on the initial request for content (like your streaming in M3U8, MPD, or other formats), but also provides intelligence specific to HTTP Streaming. It extends that security you apply on the manifest to each subsequent media fragment request, as well as any companion files like individual bitrate manifests, encryption keys, etc. 8. Specify the Encryption key that will be used to generate your tokens. The value has to be a hexadecimal. A simple button generates a random one that can be used. 9. Now Save the configuration and deploy it to Staging or Production. By adding the Segmented Media Protection behavior to your configuration, you ve managed to implement the latest in token authentication security for HTTP Streaming. Generating tokens and testing Now that you know how to apply the correct behavior to a configuration, you ll learn how to create tokens for access to your content. Recall that tokens are cryptographically signed strings that you would append to a URL as a query string. The method for generating those signed strings is provided for you in several libraries available for download from the Luna Control Center here: Page 50

53 For convenience, the machines in the Hands-on Lab area already have the necessary libraries downloaded and ready to use on them. In this exercise, use the Python version of those libraries to generate a token at the command line. Other languages use the same basic methods and options for generating appropriate keys. In order to test this, you need an existing configuration that already has the Segmented Media Protection behavior enabled and live on the Akamai platform. Here s a sample URL that is protected with Segmented Media Protection: Examine this URL and work to generate a valid token. 1. Open the Terminal application from the dock. 2. Change your working directory to the location of the Python Token Authentication library: cd ~/bin/edgeauth/python/akamai_token_v2/ 3. In this directory is a script called akamai_token_v2.py. It generates a valid token. Before we start, however, verify that the URL above is indeed protected by the platform. In the terminal, use this command to see the Access Denied error from Akamai: curl Page 51

54 4. The token can be generated using the following: a. The key we generated in the configuration during the set up. The -k option specifies the key that we set up in the configuration to generate this key. b. A window in seconds that tells how long the token should be valid. The -w option specifies in seconds how long the token is good for. We choose 900 for this value, which is 15 minutes. c. An access control list (ACL) that gives a window of paths where the token is valid. The -a option specifies the ACL for which this token will be used. d. There are also several other options available in the tool. For the complete set of what s available, you can either look at the source directly or run the command with -h only. 5. This particular configuration uses the following key: dbcfa7def8ba49e7772af2a4. All of our protected content is stored in the /protected/* folder. With this information, create a token that is valid for 15 minutes: python akamai_token_v2.py -w 900 -k dbcfa7def8ba49e7772af2a4 -a "/protected/*" The tool provides the ability to specify an ACL with a wildcard using the asterisk like this, or by using a single URL. Remember that the Segmented Media Protection behavior not only protects the initial manifest, but also the subsequent fragment requests. That means that all of the streaming files that are referenced in the manifest also need a valid token. If we used the URL option when generating the token for just the manifest, the token would be locked only to the Page 52

55 manifest and would cause a failure in the subsequent media fragments. That s why we use the ACL option to make the token flexible for all content in this directory. You can further restrict the token to deeper subdirectories or file naming conventions depending on how you ve set up your content library. For our purpose, a simple ACL of /protected/* will suffice. The output produced by the tool can be used directly with our protected URL to grant access to the content. 1. Let s put the URL and the newly generated token together to see the streaming manifest. Again, using curl, put the original URL together with the freshly generated token and see the output. Not only are we seeing an HTTP/ OK success message, but the server is now setting a series of cookies that will be used by the player to request the subsequent streaming fragments. Recall that Segmented Media Protection had intelligence built in to handle all subsequent requests. You re seeing this in action here. There are a few devices that do not properly support cookies for subsequent authentication of the fragments. Fortunately, our Edge Servers know which are the most common devices and can rewrite the manifest on the fly to include the appropriate tokens as query strings on those fragment requests. Page 53

56 2. You can now take that URL you ve generated, along with the token, and place it into the DASH Support Player we have at Summary When streaming HTTP based formats, you should use the A daptive Media Delivery product. By leveraging Property Manager, you are able to quickly and easily implement intelligent Token Authentication with the Segmented Media Protection behavior. The Token Generator is available in Luna s Support section, and the tokens can be generated with just the key, an ACL, and a time w indow that the token will live. Page 54

Akamai Quick Start Guides

Akamai Quick Start Guides $ akamai get akamai-open/cli-property Attempting to fetch command... [OK] Installing... [OK] Available Commands: update help list get property See "akamai help [command]" for details. Akamai Quick Start

More information

Akamai Workbook. Attempting to fetch command... [OK] $ akamai get akamai-open/cli-property

Akamai Workbook. Attempting to fetch command... [OK] $ akamai get akamai-open/cli-property $ akamai get akamai-open/cli-property Attempting to fetch command... [OK] Installing... [OK] Available Commands: update help list get property See "akamai help [command]" for details. Akamai Workbook QUICK

More information

Course Overview and Agenda

Course Overview and Agenda kamai Technologies Inc. Course Overview and Agenda Akamai Web Performance Foundations Version 1.0 Course Overview The Akamai Web Performance Foundations course for Akamai University is designed to familiarize

More information

Configuring Caching Services

Configuring Caching Services CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.

More information

EDGE, MICROSOFT S BROWSER

EDGE, MICROSOFT S BROWSER EDGE, MICROSOFT S BROWSER To launch Microsoft Edge, click the Microsoft Edge button (it s the solid blue E) on the Windows Taskbar. Edge Replaces Internet Explorer Internet Explorer is no longer the default

More information

HOW TO BUILD YOUR FIRST ROBOT

HOW TO BUILD YOUR FIRST ROBOT Kofax Kapow TM HOW TO BUILD YOUR FIRST ROBOT INSTRUCTION GUIDE Table of Contents How to Make the Most of This Tutorial Series... 1 Part 1: Installing and Licensing Kofax Kapow... 2 Install the Software...

More information

Roxen Content Provider

Roxen Content Provider Roxen Content Provider Generation 3 Templates Purpose This workbook is designed to provide a training and reference tool for placing University of Alaska information on the World Wide Web (WWW) using the

More information

SharePoint General Instructions

SharePoint General Instructions SharePoint General Instructions Table of Content What is GC Drive?... 2 Access GC Drive... 2 Navigate GC Drive... 2 View and Edit My Profile... 3 OneDrive for Business... 3 What is OneDrive for Business...

More information

Using SourceTree on the Development Server

Using SourceTree on the Development Server Using SourceTree on the Development Server This content has been modified to exclude client information. Such omissions include the client name and details of the client s infrastructure, such as domain

More information

Learn how to login to Sitefinity and what possible errors you can get if you do not have proper permissions.

Learn how to login to Sitefinity and what possible errors you can get if you do not have proper permissions. USER GUIDE This guide is intended for users of all levels of expertise. The guide describes in detail Sitefinity user interface - from logging to completing a project. Use it to learn how to create pages

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Control for CloudFlare - Installation and Preparations

Control for CloudFlare - Installation and Preparations Control for CloudFlare - Installation and Preparations Installation Backup your web directory and Magento 2 store database; Download Control for CloudFlare installation package; Copy files to /app/firebear/cloudflare/

More information

Infoblox Authenticated DHCP

Infoblox Authenticated DHCP Infoblox Authenticated DHCP Unified Visitor Management amigopod Technical Note Revision 1.1 5 July 2010 United States of America +1 (888) 590-0882 Europe, Middle East & Asia +34 91 766 57 22 Australia

More information

DevOps at the Edge. Nick Tran, VP of Developer Relations, Akamai. 1 AKAMAI Edge EMEA 2018

DevOps at the Edge. Nick Tran, VP of Developer Relations, Akamai. 1 AKAMAI Edge EMEA 2018 DevOps at the Edge Nick Tran, VP of Developer Relations, Akamai 1 AKAMAI Edge EMEA 2018 Speaker Nick Tran VP, Developer Relations @tranmanyo Agenda Part 1 Akamai for DevOps Part 2 Testing New Configurations

More information

NQF ONLINE MEASURE SUBMISSION FORM USERS GUIDE

NQF ONLINE MEASURE SUBMISSION FORM USERS GUIDE NQF ONLINE MEASURE SUBMISSION FORM USERS GUIDE VERSION 1.1 Guide Version 1.0 01/11 TABLE OF CONTENTS PART 1: TECHNICAL SUPPORT FOR SUBMISSION FORM TABLE OF CONTENTS... CREATING AN INDIVIDUAL ACCOUNT...

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

Content Rules. Feature Description

Content Rules. Feature Description Feature Description UPDATED: 11 January 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Adobe Marketing Cloud Best Practices Implementing Adobe Target using Dynamic Tag Management

Adobe Marketing Cloud Best Practices Implementing Adobe Target using Dynamic Tag Management Adobe Marketing Cloud Best Practices Implementing Adobe Target using Dynamic Tag Management Contents Best Practices for Implementing Adobe Target using Dynamic Tag Management.3 Dynamic Tag Management Implementation...4

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate

More information

EMC ApplicationXtender Web Access.NET eroom Integration 6.0

EMC ApplicationXtender Web Access.NET eroom Integration 6.0 EMC ApplicationXtender Web Access.NET eroom Integration 6.0 Administrator s Guide 300-008-282 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Using the elab LMS Integration Tool in a Canvas Course

Using the elab LMS Integration Tool in a Canvas Course Using the elab LMS Integration Tool in a Canvas Course Introduction The elab LMS integration tool allows educators to add single sign-on links to elab resources such as videos, Guide Me tutorials, WebSims,

More information

Secure Web Appliance. Basic Usage Guide

Secure Web Appliance. Basic Usage Guide Secure Web Appliance Basic Usage Guide Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About this Manual... 1 1.2.1. Document Conventions... 1 2. Description of the

More information

Sophos UTM Web Application Firewall For: Microsoft Exchange Services

Sophos UTM Web Application Firewall For: Microsoft Exchange Services How to configure: Sophos UTM Web Application Firewall For: Microsoft Exchange Services This guide explains how to configure your Sophos UTM 9.3+ to allow access to the relevant Microsoft Exchange services

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident

More information

maxecurity Product Suite

maxecurity Product Suite maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...

More information

Table of Contents HOL-1757-MBL-6

Table of Contents HOL-1757-MBL-6 Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...

More information

Managing your content with the Adobe Experience Manager Template Editor. Gabriel Walt Product Manager twitter.com/gabrielwalt

Managing your content with the Adobe Experience Manager Template Editor. Gabriel Walt Product Manager twitter.com/gabrielwalt Managing your content with the Adobe Experience Manager Template Editor Gabriel Walt Product Manager twitter.com/gabrielwalt Table of Contents 1. Introduction 3 1.1 Overview 3 1.2 Prerequisites 3 2. Getting

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.0.0 The owncloud developers December 14, 2017 CONTENTS 1 Using the owncloud Android App 1 1.1 Getting the owncloud Android App...................................

More information

Running the Setup Web UI

Running the Setup Web UI The Cisco Prime IP Express setup interview in the web UI takes you through a series of consecutive pages to set up a basic configuration. For an introduction and details on the basic navigation for the

More information

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions Passwordstate Remote Session Launcher Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Site Owners: Cascade Basics. May 2017

Site Owners: Cascade Basics. May 2017 Site Owners: Cascade Basics May 2017 Page 2 Logging In & Your Site Logging In Open a browser and enter the following URL (or click this link): http://mordac.itcs.northwestern.edu/ OR http://www.northwestern.edu/cms/

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

Republicbank.com Supported Browsers and Settings (Updated 03/12/13)

Republicbank.com Supported Browsers and Settings (Updated 03/12/13) Republicbank.com Supported Browsers and Settings (Updated 03/12/13) We support the Internet Explorer 8.0 & 9.0. If you are using Internet Explorer 7.0 or earlier you will need to update your browser. Click

More information

CSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP

CSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP Objectives CSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP To get familiar with capturing network packets using Wireshark. To explore the HTTP message formats and basic operations of HTTP protocol.

More information

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE GUIDE MARCH 2019 PRINTED 28 MARCH 2019 CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE VMware Workspace ONE Table of Contents Overview Introduction Audience AD FS

More information

The Connector. Version 1.2 Microsoft Project to Atlassian JIRA Connectivity. User Manual

The Connector.  Version 1.2 Microsoft Project to Atlassian JIRA Connectivity. User Manual The Connector Version 1.2 Microsoft Project to Atlassian JIRA Connectivity User Manual Ecliptic Technologies, Inc. Copyright 2008 www.the-connector.com Page 1 of 86 Copyright and Disclaimer All rights

More information

AWS Remote Access VPC Bundle

AWS Remote Access VPC Bundle AWS Remote Access VPC Bundle Deployment Guide Last updated: April 11, 2017 Aviatrix Systems, Inc. 411 High Street Palo Alto CA 94301 USA http://www.aviatrix.com Tel: +1 844.262.3100 Page 1 of 12 TABLE

More information

Client Setup (.NET, Internet Explorer)

Client Setup (.NET, Internet Explorer) Powered By: Version 2.0 Created December, 2008 .NET & Internet Explorer Setup Client Setup (.NET, Internet Explorer) The WebTMS application itself is a windows executable program. In order to run WebTMS,

More information

ReadyTalk for HubSpot User Guide

ReadyTalk for HubSpot User Guide ReadyTalk for HubSpot User Guide Revised March 2016 2 Contents Overview... 3 Configuring ReadyTalk & HubSpot... 4 Configure Sync for Additional Webinar Data... 6 How to Setup the Sync for Additional Webinar

More information

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL

More information

IBM Security Access Manager Version January Federation Administration topics IBM

IBM Security Access Manager Version January Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM ii IBM Security

More information

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Table of Contents Lab Overview - HOL-1857-03-UEM - Workspace ONE UEM with App & Access Management... 2 Lab Guidance... 3 Module 1 - Workspace

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

Visitor Management Host User Guide

Visitor Management Host User Guide Visitor Management Host User Guide Table of Contents CHAPTER 1 Introduction............................................. 5 Conventions Used in this Documentation.............................................5

More information

Instructions For Configuring Your Browser Settings and Online Banking FAQ's

Instructions For Configuring Your Browser Settings and Online Banking FAQ's Instructions For Configuring Your Browser Settings and Online Banking FAQ's Instructions By Browser Type Google Chrome Firefox Internet Explorer 8 Internet Explorer 9 Safari Online Banking FAQ's Google

More information

Optimal Browser Settings Disable File Caching:

Optimal Browser Settings Disable File Caching: Optimal Browser Settings Disable File Caching: ICE Health Systems recommends that you disable any type of file caching in your internet browser, to avoid issues with storing older versions of documents

More information

ReCPro TM User Manual Version 1.15

ReCPro TM User Manual Version 1.15 Contents Web Module (recpro.net)... 2 Login... 2 Site Content... 3 Create a New Content Block... 4 Add / Edit Content Item... 5 Navigation Toolbar... 6 Other Site Tools... 7 Menu... 7 Media... 8 Documents...

More information

Remote Desktop Services Deployment Guide

Remote Desktop Services Deployment Guide Deployment Guide VERSION: 10.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.7.0 The owncloud developers October 30, 2018 CONTENTS 1 Release Notes 1 1.1 Changes in 2.7.0............................................. 1 1.2 Changes in 2.6.0.............................................

More information

TL4: Integrating Experience Manager with Adobe Analytics, Target and DTM

TL4: Integrating Experience Manager with Adobe Analytics, Target and DTM TL4: Integrating Experience Manager with Adobe Analytics, Target and DTM TL04: Integrating Experience Manager with Adobe Analytics, Target and DTM 1 Table of Contents Lab Overview... 4 Objectives... 4

More information

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM ii IBM Security Access

More information

WebDirect Configuration Guide

WebDirect Configuration Guide WebDirect Configuration Guide (The following graphics are screen shots from Microsoft ISA Server 2004/2006 which is the property of Microsoft Corp. and are included here for instructive use. Some images

More information

Adobe Document Cloud esign Services. for Salesforce Version 17 Installation and Customization Guide

Adobe Document Cloud esign Services. for Salesforce Version 17 Installation and Customization Guide Adobe Document Cloud esign Services for Salesforce Version 17 Installation and Customization Guide 2015 Adobe Systems Incorporated. All rights reserved. Last Updated: August 28, 2015 Table of Contents

More information

Adobe Dreamweaver CC 17 Tutorial

Adobe Dreamweaver CC 17 Tutorial Adobe Dreamweaver CC 17 Tutorial GETTING STARTED This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

EDITING AN EXISTING REPORT

EDITING AN EXISTING REPORT Report Writing in NMU Cognos Administrative Reporting 1 This guide assumes that you have had basic report writing training for Cognos. It is simple guide for the new upgrade. Basic usage of report running

More information

APP-J: WHAT IS APPLICATION JUKEBOX?

APP-J: WHAT IS APPLICATION JUKEBOX? APP-J: WHAT IS APPLICATION JUKEBOX? Use Application Jukebox (App-J) to run University software on any Windows PC or laptop. Launch apps from the Application Jukebox web page Install the Application Jukebox

More information

Cmpt 101 Lab 1 - Outline

Cmpt 101 Lab 1 - Outline Cmpt 101 Lab 1 - Outline Instructions: Work through this outline completely once directed to by your Lab Instructor and fill in the Lab 1 Worksheet as indicated. Contents PART 1: GETTING STARTED... 2 PART

More information

HOW TO PASS WA ECART DATA TO MY SECURE SERVER

HOW TO PASS WA ECART DATA TO MY SECURE SERVER HOW TO PASS WA ECART DATA TO MY SECURE SERVER Introduction WA ecart users are able to keep shoppers on their ecommerce sites without passing them to a payment gateway site: we call this process local checkout.

More information

FlightPATH. User Manual:

FlightPATH. User Manual: User Manual: FlightPATH Author: Andrew Knowlson Review: Greg Howett Version: 1.0-DRAFT Date: 05 st April 2011 Created: 05 st April 2011 Modified ---------------- Contents: What is FlightPATH? So what can

More information

ChatBlazer 8 Site Administrator Usage Guide

ChatBlazer 8 Site Administrator Usage Guide ChatBlazer 8 Site Administrator Usage Guide Using the Site Adminstrator Other than the modification of ChatBlazer 8 s client configuration to affect the Flash chat client s runtime behavior, the Site Administrator

More information

DESIGN MOBILE APPS FOR ANDROID DEVICES

DESIGN MOBILE APPS FOR ANDROID DEVICES DESIGN MOBILE APPS FOR ANDROID DEVICES Thank you for participating in a workshop at MicroStrategy World 2019. If you missed or did not finish an exercise and want to complete it after the conference,

More information

How to Edit Your Website

How to Edit Your Website How to Edit Your Website A guide to using your Content Management System Overview 2 Accessing the CMS 2 Choosing Your Language 2 Resetting Your Password 3 Sites 4 Favorites 4 Pages 5 Creating Pages 5 Managing

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

Monitoring the Device

Monitoring the Device The system includes dashboards and an Event Viewer that you can use to monitor the device and traffic that is passing through the device. Enable Logging to Obtain Traffic Statistics, page 1 Monitoring

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s

Instructions for Configuring Your Browser Settings and Online Security FAQ s Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.

More information

Visitor Management Host User Guide

Visitor Management Host User Guide Visitor Management Host User Guide PERPETUAL INNOVATION Lenel OnGuard 2010 Visitor Management Host User Guide, product version 6.4 This guide is item number DOC-802, revision 1.038, April 2010 Copyright

More information

PROCESS AUTOMATION. MANUAL VisuNet Control Center Version 4.1

PROCESS AUTOMATION. MANUAL VisuNet Control Center Version 4.1 PROCESS AUTOMATION MANUAL VisuNet Control Center Version 4.1 With regard to the supply of products, the current issue of the following document is applicable: The General Terms of Delivery for Products

More information

Breeze at Penn State. About meeting roles and permissions

Breeze at Penn State. About meeting roles and permissions Breeze at Penn State About meeting roles and permissions There are three roles for meeting room attendees: the Host role, the Presenter role, and the Participant role. Each role has different rights in

More information

Remote Desktop Services. Deployment Guide

Remote Desktop Services. Deployment Guide Deployment Guide UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP

More information

Coveo Platform 6.5. Microsoft SharePoint Connector Guide

Coveo Platform 6.5. Microsoft SharePoint Connector Guide Coveo Platform 6.5 Microsoft SharePoint Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

ADOBE DREAMWEAVER CS4 BASICS

ADOBE DREAMWEAVER CS4 BASICS ADOBE DREAMWEAVER CS4 BASICS Dreamweaver CS4 2 This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site layout,

More information

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

EdgeCast Networks Inc. Smooth Streaming Administration Guide

EdgeCast Networks Inc. Smooth Streaming Administration Guide EdgeCast Networks Inc. Smooth Streaming Administration Guide Disclaimer Care was taken in the creation of this guide. However, EdgeCast Networks Inc. cannot accept any responsibility for errors or omissions.

More information

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Remote Desktop Gateway

More information

ASA Clientless SSL VPN (WebVPN) Troubleshooting Tech Note

ASA Clientless SSL VPN (WebVPN) Troubleshooting Tech Note ASA Clientless SSL VPN (WebVPN) Troubleshooting Tech Note Document ID: 104298 Contents Introduction Prerequisites Requirements Components Used Conventions Troubleshooting ASA Version 7.1/7.2 Clientless

More information

Learning vrealize Orchestrator in action V M U G L A B

Learning vrealize Orchestrator in action V M U G L A B Learning vrealize Orchestrator in action V M U G L A B Lab Learning vrealize Orchestrator in action Code examples If you don t feel like typing the code you can download it from the webserver running on

More information

Volunteers for Salesforce Installation & Configuration Guide Version 3.79

Volunteers for Salesforce Installation & Configuration Guide Version 3.79 Volunteers for Salesforce Installation & Configuration Guide Version 3.79 January 1, 2016 Djhconsulting.com 1 CONTENTS 1. Overview... 4 2. Installation Instructions... 4 2.1 Requirements Before Upgrading...

More information

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites Oracle Database Real Application Security Administration 12c Release 1 (12.1) E61899-04 May 2015 Oracle Database Real Application Security Administration (RASADM) lets you create Real Application Security

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 42.0, Spring 18 @salesforcedocs Last updated: February 13, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Hands-on Lab Exercise Guide

Hands-on Lab Exercise Guide 611: NetScaler is the Gatekeeper. Become the Keymaster. Hands-on Lab Exercise Guide Christopher Rudolph May 2015 1 Table of Contents Table of Contents... 2 Overview... 3 Lab Preparation... 6 Exercise 1:

More information

Web Push Notification

Web Push Notification Web Push Notification webkul.com/blog/web-push-notification-for-magento2/ On - January 13, 2017 This impressive module allows you to send push notification messages directly to the web browser. The biggest

More information

Installing Dolphin on Your PC

Installing Dolphin on Your PC Installing Dolphin on Your PC Note: When installing Dolphin as a test platform on the PC there are a few things you can overlook. Thus, this installation guide won t help you with installing Dolphin on

More information

FireFox. CIS 231 Windows 10 Install Lab # 3. 1) Use either Chrome of Firefox to access the VMware vsphere web Client.

FireFox. CIS 231 Windows 10 Install Lab # 3. 1) Use either Chrome of Firefox to access the VMware vsphere web Client. CIS 231 Windows 10 Install Lab # 3 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced

More information

ForeScout CounterACT. Configuration Guide. Version 3.4

ForeScout CounterACT. Configuration Guide. Version 3.4 ForeScout CounterACT Open Integration Module: Data Exchange Version 3.4 Table of Contents About the Data Exchange Module... 4 About Support for Dual Stack Environments... 4 Requirements... 4 CounterACT

More information

Table of Content. Last updated: June 16th, 2015

Table of Content. Last updated: June 16th, 2015 BROWSER SETTINGS MASTER DOCUMENT Last updated: June 16th, 2015 Table of Content General Information... 2 Internet Explorer 8,9, & 11 Settings... 3 Safari Settings... 5 Firefox Settings... 6 Google Chrome

More information

D&B Optimizer for Microsoft Installation Guide

D&B Optimizer for Microsoft Installation Guide D&B Optimizer for Microsoft Installation Guide Version 2.0 July 13, 2018 Contents 1. INTRODUCTION... 3 WHAT IS IT?... 3 FEATURES... 3 GETTING SUPPORT... 4 2. GETTING STARTED... 4 MICROSOFT LICENSING CHECKLIST...

More information

Edge Side Includes (ESI) Overview

Edge Side Includes (ESI) Overview Edge Side Includes (ESI) Overview Abstract: Edge Side Includes (ESI) accelerates dynamic Web-based applications by defining a simple markup language to describe cacheable and non-cacheable Web page components

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

How to Troubleshoot Panopto Viewing Issues

How to Troubleshoot Panopto Viewing Issues How to Troubleshoot Panopto Viewing Issues Overview This documentation will go over how to troubleshoot Panopto Viewing Issues. Our current release of Panopto uses a combination of Adobe Flash Player and

More information

LabTech Ignite Installation

LabTech Ignite Installation LabTech LabTech Ignite Installation LABTECH IGNITE INSTALLATION... 1 Overview... 1 Readiness Checklist... 1 Server Installation... 2 Creating a Client Import File... 17 Using SSL Connections... 18 SSL

More information

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing Managing Your Website with Convert Community My MU Health and My MU Health Nursing Managing Your Website with Convert Community LOGGING IN... 4 LOG IN TO CONVERT COMMUNITY... 4 LOG OFF CORRECTLY... 4 GETTING

More information

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

If your webpage looks like the screen below please go to your browsers tools section and clear out all history.

If your webpage looks like the screen below please go to your browsers tools section and clear out all history. Quick Notes: Please use internet explorer 9 or higher to have an optimal experience New URL to access the Nav Web Digital experience is http://navweb.mom365.com/login.aspx o You will be redirected to the

More information

Anaplan Connector Guide Document Version 2.1 (updated 14-MAR-2017) Document Version 2.1

Anaplan Connector Guide Document Version 2.1 (updated 14-MAR-2017) Document Version 2.1 Document Version 2.1 (updated 14-MAR-2017) Document Version 2.1 Version Control Version Number Date Changes 2.1 MAR 2017 New Template applied Anaplan 2017 i Document Version 2.1 1 Introduction... 1 1.1.

More information

Highwinds CDN Content Protection Products. August 2009

Highwinds CDN Content Protection Products. August 2009 Highwinds CDN Content Protection Products August 2009 1 Highwinds CDN Content Protection Products August 2009 Table of Contents CDN SECURITY INTRO... 3 CONTENT PROTECTION BY CDN DELIVERY PRODUCT... 3 HTTP

More information

How to make a Work Profile for Windows 10

How to make a Work Profile for Windows 10 How to make a Work Profile for Windows 10 Setting up a new profile for Windows 10 requires you to navigate some screens that may lead you to create the wrong type of account. By following this guide, we

More information

Wireshark HTTP. Introduction. The Basic HTTP GET/response interaction

Wireshark HTTP. Introduction. The Basic HTTP GET/response interaction Wireshark HTTP Introduction Having gotten our feet wet with the Wireshark packet sniffer in the introductory lab, we re now ready to use Wireshark to investigate protocols in operation. In this lab, we

More information

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance. CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server

More information