Follow

What kind of security does ADASHI use?

Q: What kind of security features does ADASHI employ?

 

A: ADASHI has 3 types of security systems in place: application execution permissions, configuration lockdown, and server connection permissions. They are all turned off by default. 

 

1. Application Execution Permissions - Every ADASHI application has a Permissions configuration file which dictates what user accounts are allowed to run the program. There is an additional configuration file that turns this system on or off. In a situation where this is going to be used, an Administrator would turn the system on, set folder permissions to restrict access, and add the user accounts who will have permission to run the program. 

 

2. Configuration Lockdown - The ADASHI client has the capability to set a config password and then lock the config. When locked, users cannot get into the Options menu without entering the password. This prevents potentially harmful configuration changes by unauthorized users. 

 

3. Server Connection Permissions - The ADASHI Server has a Permissions configuration file which dictates what user accounts will be allowed to connect to the server from a client system. There is an additional configuration file that turns this system on or off. In a situation where this is going to be used, an Administrator would turn the system on and add the user accounts who will have permission to run the program. 

 

Note that there is no other security in place related to client-server communication, such as encryption. If this is a concern, ADASHI recommends users secure their client-server communication via a VPN or other method of encrypting TCP/IP traffic. 

0 Comments

Article is closed for comments.