by INFODIGIT SNC

,

Tech Notes

Posted by

USER AUTHENTICATION

Each connection needs to authenticate by providing user name and password

USER RESTRICTION BY IP ADDRESS AND FOLDERS ACCESS

It is possibile to restrict users by their IP address and to limit filesystem access.

USER SESSIONS ISOLATION

Each connection runs in a separate server-side process, this avoids that one session crash could impact the others

ENCRYPTED LOGIN

The login mechanism is handled by a runtime generated asymmetric key exchange.

CONNECTION AUTO RECOVERY

The client library automatically restores the connection if it was lost or where it is unstable.

BLACKLIST

The service automatically put in a blacklist the IP address which fail authentication or doesn’t send recognized command after 20 times.

RAPID INSTALLATION AND CONFIGURATION

The setup quickly and simply installs all the software and write all the settings needed to taste its main features.