Setting Up Security Parameters

To set up security parameters, go to the Settings tab in the Security subsection:

Encryption

To set encryption, select the API, Control Panel checkboxes next to the protocols:

NOTE. HTTP protocol is used by default.

After executing the operations traffic encryption is set.

Using Relay Server

To use Relay server, select the Use Relay Server checkbox.

Relay server is a server, at which Relay service is deployed. Relay service enables the user to establish a connection between a mobile device and mobile platform server on heightened requirements to protection of internal corporate network data. In this case DMZ ports into internal network are closed, only ports from internal network into external network are opened.

To set Relay server, see the Installing Relay Server section.

Connection with the Relay server is established on the mobile platform server side. The Relay service enables the user to accept request from mobile platform server to establish connection. The established connection is used to redirect requests from mobile client to mobile platform server.

NOTE. When Relay server is used, interaction between mobile client and mobile platform server is slowed down.

The scheme of interaction between mobile client, Relay server, and mobile platform server:

The mobile platform server establishes connection with the Relay server.

The mobile client exchanges data with the mobile platform server using the Relay server located in DMZ.

The Relay server interacts with the mobile client and mobile platform server:

To use Relay server, fill in the boxes:

The Relay server is addressed from the mobile client after the connection is established on the mobile platform server side via the 10080 (http) or 10443 (https) port.

Authentication Settings

When executing authentication on the mobile platform server the API user or administrator token is generated.

To change JWT token expiration time for API users or administrators, specify the number of days and hours next to the JWT Token Expiration Time for API Users, JWT Token Expiration Time for Administrators parameters. The default token expiration time is 14 days.

NOTE. When the token expiration time is changed, all the current tokens are invalid, it is required to repeat authentication for API users and administrators.

To set session lifetime when the administrator is inactive, specify expiration time as follows: <hours : minutes> next to the Session Lifetime when Administrator is Inactive parameter. On an attempt to execute an operation in the administrator console after the specified time expires, the administrator should repeat authentication to continue working in the administrator console. The session lifetime is not set by default.

To set expiration time for all accounts of API users, specify the number of days in the User Account Expiration Time (in days) box. By default, validity is not set, accounts are not limited in time.

To set validity for a specific API user, use the Account Validity box in API user parameters. If validity is set for a specific API user, the specified user account validity is ignored in authentication settings.

Handling Authorization Failures

To handle API user failures, determine the parameters:

If the specified number of authorization failures for the specific time period is exceeded, the mobile device is locked for the specified period. When the mobile device is locked, API user cannot be authorized on this device. If the number of mobile device locks for the specific time period is exceeded, API user is locked for the specified period. When the specified parameters of authorization failure handling are changed for locked API users, locking time is recalculated.

When API user is locked, the Locked for Security Reasons checkbox is automatically selected, and the message "Locked until <Date>" is displayed in specific API user parameters. When API user is locked, authorization is disabled, user session is interrupted on all mobile devices.

To unlock API user, deselect the Locked for Security Reasons checkbox or wait until the end of the specified user lock period.

See also:

Setting Up System Security | Managing Passwords