ISL Conference Proxy Manual

Transcription

ISL Conference Proxy Manual
ISL Conference Proxy Manual
ISL Conference Proxy Manual
Contents
2
Table of Contents
Foreword
0
Part I Introduction
6
...............................................................................................................................................................................
1 Starting products
7
...............................................................................................................................................................................
2 Server requirements
10
...............................................................................................................................................................................
3 Getting started
12
..............................................................................................................................................................................
ISL Online account procedures
........................................................................................................................................................................
Create account
........................................................................................................................................................................
Activate a purchased activation key
........................................................................................................................................................................
Define servers
........................................................................................................................................................................
Assign licenses
........................................................................................................................................................................
Create a packet
..............................................................................................................................................................................
Installation to the server
........................................................................................................................................................................
Installation
................................................................................................................................................................
Installation on Windows Server Core
........................................................................................................................................................................
Configuring the firewall
........................................................................................................................................................................
Testing the installation
..............................................................................................................................................................................
ISL Conference Proxy configuration
13
13
18
20
22
23
26
27
29
30
33
34
36
Part II Manual
...............................................................................................................................................................................
1 Introduction
37
...............................................................................................................................................................................
2 Upgrading from previous versions
38
...............................................................................................................................................................................
3 Upgrading from the trial version
40
...............................................................................................................................................................................
4 Unattended installation
41
...............................................................................................................................................................................
5 Settings
42
..............................................................................................................................................................................
How to use the administration interface
..............................................................................................................................................................................
Activity monitor
........................................................................................................................................................................
Servers
........................................................................................................................................................................
Clients
........................................................................................................................................................................
Database
........................................................................................................................................................................
Transfer rates
........................................................................................................................................................................
Web hits
........................................................................................................................................................................
GeoIP Status
........................................................................................................................................................................
NTP statistics
........................................................................................................................................................................
System statistics
........................................................................................................................................................................
Sessions
................................................................................................................................................................
Active
................................................................................................................................................................
History
..............................................................................................................................................................................
Configuration
........................................................................................................................................................................
Basic
........................................................................................................................................................................
General
........................................................................................................................................................................
Security
........................................................................................................................................................................
Logs
........................................................................................................................................................................
ISL AlwaysOn
........................................................................................................................................................................
ISL Groop
........................................................................................................................................................................
ISL Light
43
44
45
46
46
46
47
47
47
47
48
49
53
56
57
57
60
68
70
72
73
© 2016 ISL Online
2
ISL Conference Proxy Manual
Contents
3
........................................................................................................................................................................
ISL Pronto
76
........................................................................................................................................................................
Locale
80
........................................................................................................................................................................
System monitor
80
........................................................................................................................................................................
Advanced
81
................................................................................................................................................................
Customize
81
................................................................................................................................................................
Performance
87
................................................................................................................................................................
Web Server
88
................................................................................................................................................................
Integration
89
................................................................................................................................................................
Programs
90
................................................................................................................................................................
Plugins
90
................................................................................................................................................................
Action
91
................................................................................................................................................................
GUI Features
91
................................................................................................................................................................
Security
91
................................................................................................................................................................
Bulk Files
92
................................................................................................................................................................
File storage
92
................................................................................................................................................................
Raw data
93
........................................................................................................................................................................
PostgreSQL
93
................................................................................................................................................................
Installation
93
................................................................................................................................................................
Tables
96
................................................................................................................................................................
Indexes
96
................................................................................................................................................................
Bloat
97
................................................................................................................................................................
Settings
97
........................................................................................................................................................................
GRID
98
................................................................................................................................................................
Create
98
................................................................................................................................................................
Connect
99
................................................................................................................................................................
Load balancing
99
................................................................................................................................................................
Settings
101
................................................................................................................................................................
Synchronization
102
........................................................................................................................................................................
Storage
102
................................................................................................................................................................
Areas
102
........................................................................................................................................................................
DNS server
103
................................................................................................................................................................
Zones
103
................................................................................................................................................................
Settings
105
........................................................................................................................................................................
Network time
105
................................................................................................................................................................
Client
105
................................................................................................................................................................
Server
106
..............................................................................................................................................................................
User management
106
........................................................................................................................................................................
Users
106
........................................................................................................................................................................
Domains
119
..............................................................................................................................................................................
Manage software
132
........................................................................................................................................................................
Licenses
132
........................................................................................................................................................................
Overview
133
........................................................................................................................................................................
Online update
133
........................................................................................................................................................................
Manual update
138
........................................................................................................................................................................
Features
140
...............................................................................................................................................................................
6 Controlling the server
140
..............................................................................................................................................................................
Starting products
143
...............................................................................................................................................................................
7 Backup
146
...............................................................................................................................................................................
8 Migrating to a new server
147
...............................................................................................................................................................................
9 Enabling SSL
148
..............................................................................................................................................................................
Web pages
148
..............................................................................................................................................................................
Software connections
152
© 2016 ISL Online
3
ISL Conference Proxy Manual
Contents
4
...............................................................................................................................................................................
10 Enabling code signing
153
..............................................................................................................................................................................
Using a custom code signing certificate
154
...............................................................................................................................................................................
11 Using a reverse prox y
159
..............................................................................................................................................................................
HAProxy example
160
..............................................................................................................................................................................
Apache example
161
...............................................................................................................................................................................
12 Integration
163
..............................................................................................................................................................................
Command files
164
..............................................................................................................................................................................
HTTP events
166
..............................................................................................................................................................................
WebAPI2
168
........................................................................................................................................................................
Communication model
168
........................................................................................................................................................................
WebAPI2 Methods
171
..............................................................................................................................................................................
XMLMSG
175
........................................................................................................................................................................
User management
176
........................................................................................................................................................................
Customizations
181
........................................................................................................................................................................
System settings
184
........................................................................................................................................................................
Software permissions
187
........................................................................................................................................................................
System status
190
........................................................................................................................................................................
Code example
191
........................................................................................................................................................................
XMLMSG commands on server restart
193
..............................................................................................................................................................................
External authentication
195
........................................................................................................................................................................
Active Directory authentication step-by-step guide
195
........................................................................................................................................................................
OpenLDAP authentication step-by-step guide
203
........................................................................................................................................................................
One time password example
211
........................................................................................................................................................................
Reference
213
..............................................................................................................................................................................
DNS Load Balancer set Client Public IP
217
...............................................................................................................................................................................
13 Setting up ISL GRID
218
..............................................................................................................................................................................
Introduction
219
..............................................................................................................................................................................
Define servers
224
..............................................................................................................................................................................
Assign licenses
226
..............................................................................................................................................................................
Create packets
227
..............................................................................................................................................................................
Firewall configuration
229
........................................................................................................................................................................
Installation to the servers
230
..............................................................................................................................................................................
GRID Configuration
232
..............................................................................................................................................................................
Configuring DNS Settngs
233
...............................................................................................................................................................................
14 Uninstalling
234
...............................................................................................................................................................................
15 Report module
235
..............................................................................................................................................................................
ISL Light
238
..............................................................................................................................................................................
ISL Pronto
240
...............................................................................................................................................................................
16 User w eb pages customization
242
..............................................................................................................................................................................
Templating
..............................................................................................................................................................................
Export web pages
..............................................................................................................................................................................
Classical overrides
..............................................................................................................................................................................
Old templating
243
248
249
253
Part III FAQ
260
Part IV Step By Step Guides
262
...............................................................................................................................................................................
1 ISL Conference Prox y initial checklist
262
...............................................................................................................................................................................
2 ISL Conference Prox y configuration best practices
265
© 2016 ISL Online
4
ISL Conference Proxy Manual
Contents
5
3 ISL Conference Prox y Storage Module - Session
...............................................................................................................................................................................
267
Recordings
...............................................................................................................................................................................
4 ISL Groop Customizations
268
...............................................................................................................................................................................
5 Resetting w eb access filters
272
Index
0
© 2016 ISL Online
5
ISL Conference Proxy Manual
1
Introduction
6
Introduction
Overview
This manual covers installation and use of ISL Conference Proxy 4.0 software and
modules. For previous versions please check below
ISL Conference Proxy with its components is a server side part of ISL Online. It is meant
only for users that want to setup whole system in their premises.
This manual is meant for ISL Online Server License accounts (TRIAL and PAID).
Basics
As an introduction, let us name the two user models that are available for ISL Online:
Hosted Service: Using ISL Online as a hosted service (Subscription or PayPerUse
Coupon), a secure connection is established through the ISL Online Network - ISL
Online's massive network of servers worldwide. Therefore, you don't need to install or
configure anything. Once registered with us, you are able to connect to a remote
computer and immediately put every single first-class ISL Light feature to profitable
use.
Server License: allows you to set up your own ISL Conference Proxy server (or a grid
of servers) and use it as a connecting point for ISL Online products instead of our ISL
Grid. You should be familiar with network and server administration in order to install
and configure it properly. This setup enables you to use ISL Online products within
your company's private environment, keeping all data on your own servers. If your
company has special privacy and security requirements (e.g. insurance companies,
banks), then this is the perfect solution for you - you have everything under control (user
data, session history etc.) and you can even set up a closed environment for using ISL
Online products within your local network - your server that runs ISL Conference Proxy
does not need internet connection, you can update it manually when needed.
You are welcome to Sign Up that includes a 30-day server license trial and a 15-day
hosted service trial. This way, you can test both options and see which of the two best
suits your needs. You are then welcome to visit our online Shop and make a purchase.
Purchasing an ISL Online license will entitle you to use all four ISL Online products. All
products are priced per active connection, shared among the four products. You can
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
7
choose to remotely support clients with ISL Light, access a remote computer with ISL
AlwaysOn, chat with a website visitor using ISL Pronto, or sit an online meeting with ISL
Groop.
For information on server requirements, please go to the server requirements chapter.
Please refer to the Getting started part of the manual for basic instructions on how to
install ISL Conference Proxy and start using it.
If you are already using ISL Conference Proxy in your company and would like to
upgrade it, please go to the Upgrading from previous versions chapter.
If you are currently using a 30-day server license trial and you wish to upgrade it, please
go to the Upgrading from the trial version chapter.
If you have any questions or problems regarding ISL Conference Proxy, our ISL Online
Team is available to assist you with technical issues or other questions over the
telephone, via e-mail (support@islonline.com) or through our live chat (simply go to
http://islonline.com/ and click the Chat Live button in the top-right corner of the page).
Previous versions
This manual covers installation and use of ISL Conference Proxy 4.0 software and
modules. For versions
ISL Conference Proxy 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 you should check this link http://
www.islonline.com/help/archive.htm
If you can not find your version please contact support@islonline.com
You can also use this manual as we strive to keep this manual as a resource for recent
versions (current version and previous one).
1.1
Starting products
This chapter will provide some basic instructions for starting products using your ISL
Conference Proxy.
For advanced instructions, please refer to the following chapter in the manual: Starting
products.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
8
Important: Starting with ISL Conference Proxy 3.1, the created packet no longer
includes separate executables for ISL Light Desk and Client like in previous versions.
Once you perform the installation and upgrade procedure, all the needed files are
located on your server. To start ISL Light, please use the links below (naturally, replace
localhost with the appropriate server address). These links autodetect the operating
system and offer the latest appropriate executable for download.
General links for ISL Light (they auto-detect the network origin and provide the
appropriate package - either internet or intranet):
http://localhost:7615/start/ISLLightDesk (ISL Light Desk)
http://localhost:7615/start/ISLLightClient (ISL Light Client)
Internet links for ISL Light (forces the internet connection address):
http://localhost:7615/start/ISLLightDesk?intranet=0 (ISL Light Desk)
http://localhost:7615/start/ISLLightDesk?intranet=0 (ISL Light Client)
Intranet links for ISL Light (forces the intranet connection address - in case you
defined it when creating a package):
http://localhost:7615/start/ISLLightDesk?intranet=1 (ISL Light Desk)
http://localhost:7615/start/ISLLightDesk?intranet=1 (ISL Light Client)
Standard interface for accessing ISL Online products can be reached through the http://
localhost/ address in your browser (replace localhost in the address with the appropriate
server address for your situation):
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
9
Only the Join page (the default page) is available when not logged in - all other options
in the menu on the left will ask you to login first.
To login as a specific user, please select the Login link in the top right corner, enter the
desired username (username format \\domain\user) and password, then click Login.
Use the menu on the left to select the desired option:
Join (the default page - you can enter a provided session code and click Connect)
Usage (you can check license usage for the user that is currently logged in)
ISL AlwaysOn (use this option for managing and connecting to current ISL AlwaysOn
computers for the user that is currently logged in)
ISL Groop (use this option for managing ISL Groop sessions for the user that is
currently logged in)
ISL Light (use this option for starting a new ISL Light session and accessing ISL Light
session list for the user that is currently logged in)
ISL Pronto (use this option to download the ISL Pronto client)
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
10
For instructions and more information on using a specific ISL Online product, please
refer to its manual.
1.2
Server requirements
ISL Conference Proxy and modules released after 18th December 2014. Versions
ISL Conference Proxy 4.1.0
Modules
Important: Prior to release of ISL Conference Proxy 4.1.0 the ISL Conference Proxy
processes were running as root (administrator). With release of ISL Conference Proxy
4.1.0 the root privileges are needed only for binding ports (confproxy_service) and for
the first installation of ISL Conference Proxy. After that the ISL Conference Proxy will
run in unprivileged mode (confproxy_server). When ISL Conference Proxy is installed it
will also add a new user (islcp) under which the ISL Conference Proxy is running.
Note: Upgrading from old version of ISL Conference proxy will add user islcp to the
system and change the permissions of files in ISL Conference Proxy folder.
Note: We detected that change of permissions on Windows can take long time on
large number of files (multiple hours for bug ICP installations ~30GB). We recommend
that you try upgrading first on test server with production database (copy production
ISL Conference Proxy folder to new machine and run new ISL Conference Proxy 4.1.0
installer).
Software requirements (supported operating systems):
Windows NT 5.2 and newer*:
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2012
Microsoft Windows Vista (32-bit and 64-bit)
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
11
Microsoft Windows 7 (32-bit and 64-bit)
Microsoft Windows 8 (32-bit and 64-bit)
Linux Kernel 2.6 or newer and glibc 2.3.2 or newer
* W indows X P is not supported anym ore, because it lacks 64-bit atom ics A P I
** N ote: we support 32-bit versions of OS and IS L C onference P roxy installations, but
for new installations we strongly suggest 64-bit OS and IS L C onference P roxy.
Important notice regarding antivirus programs: If you have an antivirus program
installed on your Windows server, consider uninstalling it in order to prevent any
interference with the ISL Conference Proxy operation and achieve best performance.
Many antivirus programs add hooks for various system calls (file access, network
send/receive etc.) which can have an impact on performance or even cause
slowdowns/issues during operations.
If it is not possible to uninstall the antivirus, then at least add the ISL Conference Proxy
directory (C:\Program Files\ISL Conference Proxy) to the white list and disable all realtime scanning for that directory and all subdirectories within it.
Hardware requirements (minimum):
INTEL or AMD Processor 1.0 GHz or faster, recommended is multi core server CPU
(XEON or Opteron)
1 GB RAM, recommended is 3GB for average usage or 8GB for large usage
1 GB Free Disk Space, recommended is around 20GB for average usage or 100GB
for large usage
Important: We also support virtualization environments (such as Hyper-V, Xen,
VMware) with one of the supported operating systems installed
Internet Connection requirements (minimum):
Important: ISL Conference Proxy 4.0.0 and up includes support for reverse proxy. If
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
12
you plan to position your server behind a reverse proxy, please refer to this manual
topic for more information: Using a reverse proxy
256 Kbps DSL, recommended is 1Mbit/s+(200kbit/s*active ISL Light sessions)
+(1Mbit/s*active ISL Groop sessions) line*
Public IP address with direct access to ports 7615, 80, 443
Please note: If you are planning to do an intranet-only install (where you will use ISL
Conference Proxy only within your LAN, no external access), then you do not need a
public IP address, but only a private address in the ranges for private networks (as
specified in RFC 1918)
* P lease check IS L Light, IS L A lwaysOn, IS L Groop and IS L P ronto m anuals for exact
bandwidth usage of specific features (like video stream ing, desktop sharing)
Older versions differences
ISL Conference Proxy and modules released before 1st March 2013. Versions
ISL Conference Proxy 3.5.0 and older
Modules
support also following operating systems in addition to the OS above
Microsoft Windows 2000
Microsoft Windows XP
Linux Kernel 2.4
1.3
Getting started
This part of the manual will take you through the whole ISL Conference Proxy installation
process and help you get started using ISL Online products with it.
For more information on ISL Conference Proxy, please refer to the main manual.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
13
ISL Conference Proxy installation process is divided into three main steps:
1. ISL Online account procedures (Creating a new ISL Online account, activating
your purchased activation key, assigning licenses to the desired servers, creating a
new packet.)
2. Installation to the server (In general it is very simple - you just have to open three
TCP ports (80, 443, 7615) on your server and start the ISL Conference Proxy
configuration.)
3. ISL Conference Proxy configuration (It is performed through the ISL Conference
Proxy administration. You only need to create at least one user and you can start
using it.)
Please continue to the first main step: ISL Online account procedures.
1.3.1
ISL Online account procedures
The first main step of ISL Conference Proxy installation starts at your ISL Online account
and it involves the following steps:
1. Create an ISL Online account
2. Activate a purchased activation key
3. Define servers
4. Assign licenses
5. Create a packet
Please continue to the next step - Register ISL Online account.
1.3.1.1
Create account
This chapter describes the procedure for registering a new ISL Online account. It
involves four steps:
Sign Up
Before you start using ISL Conference Proxy, you will need to create your ISL Online
account. You are welcome to sign up now. To create an ISL Online account, you can
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
14
also navigate to http://www.islonline.com.
Please be sure that the e-mail account is accessible as the ISL Online Customer
care system will send important information to that address, including the confirmation
link and account credentials. If needed, the selected e-mail address could later be
changed.
Check "send plain text e-mail" option if your e-mail system has rigorous anti-spam
program installed.
Open Inbox
You can check your e-mail account's inbox immediately after the verification e-mail has
been sent by the registration procedure. Open the received e-mail and follow the
verification link.
If it does not work for some reason, copy the link below that link, paste it into your
browser's address line and press enter.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
15
Sometimes some of the links in the e-mail get broken into multiple lines because of
the e-mail system. In that case please compose the link back into a single line before
putting it into your browser's address line.
Finish Registration
The last form asks for some basic company information. Press Complete to finish the
registration.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
16
All credentials have been sent to your e-mail address. Please open your mailbox and
check for another e-mail from ISL Customer Care system with the subject ISL Online Login Information.
Later on you can use your username and password to log into your ISL Online Account
(My Account at http://www.islonline.com). Within your ISL Online Account you can
manage your license(s), add and edit users, see reports, activate a key after a purchase
and modify your account information.
When an account is registered for the first time, it is automatically activated with a
15-day fully functional no obligation trial mode, with two active connections. Please
select the Activate key link if you have purchased an ISL Online service item and you
wish to activate the activation key for this account.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
17
Log in
Having finished the registration procedure, your ISL Online account will be activated with
the 15-day fully functional no obligation trial mode and username and password for
accessing this account will be sent to your e-mail address. Enter your username and
password and press the Log In button to enter your ISL Online Account.
Select Forgot password? option if you do not know your password. It will be sent
to your e-mail address.
When logged in, you will be taken directly to the My Account page.
Using the Login menu drop down on the top right of the website header bar, you can
modify and configure your ISL Online Account:
My Account entry is used to access the Users, Reports, My Profile and License area.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
18
Activate Key entry is used for the activation of purchased keys (ISL Online items).
Hosted Service entry is used to access the Users, Reports, My Profile and License
area.
Server License entry is used for setting up your own ISL Conference Proxy for
running on your company's server(s).
Logout entry allows you to log out of your ISL Online account from this machine.
1.3.1.2
Activate a purchased activation key
If you have purchased an activation key for a server license, you will activate it in this
chapter.
If you have not yet purchased an activation key, there are two options:
a) you can start your free 30-day server license trial:
1. Go to the ISL Online webpage, select the Log In button at the top-right corner of the
webpage,
2. Enter your username and password and click Log In.
3. Using the Username drop down option located at the top right of the web page,
please select Server License and then follow the link called start your 30-DAY
FREE TRIAL of ISL Online - Server License now.
4.
b) you can purchase an activation key:
1. Go to our online shop and select the Server License option on the left - direct link to
the Server License shop.
2. Choose the desired license and years of support from the drop down list and click
Buy Now, then finish the shopping procedure. If you do not wish to pay with a credit
card, you can ask us for a pro forma invoice by sending an e-mail to
sales@islonline.com. When you receive the pro forma invoice, you can pay using a
bank transfer.
If you have any questions about purchasing or activating activation keys, you can contact
us over the telephone, via e-mail (support@islonline.com) or through our live chat
(simply go to http://islonline.com/ and click the Chat with Us button in the top-right
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
19
corner of the page).
If you wish to use your free 30-day server license trial and you have already started
your trial using the instructions above, you do not need to activate anything else. Using
the Username drop down option on the top right of the page, select Server License License to see information about the expiration date of your 30-day free trial. Please
continue to the next step: Define servers.
When you buy a license, you receive an activation key. In order to use it with your ISL
Online account, you need to activate it within your ISL Online account. Please follow
these steps:
1. Using the Username drop down menu at the top right of the web page, select
Activate Key.
2. Enter your activation key into the space provided, then click Continue.
3. You will be presented with a preview that shows the current state of your account on
the left and the new state of your account on the right. Please verify the data and click
Finish.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
20
4. You will receive an e-mail informing you that you have successfully activated your
activation key.
Using the Username drop down menu on the tabs at the top of the web page, select
Server License - License to see information about the expiration date of your
Extended Support Service and a list of currently unassigned licenses.
Having activated your purchased activation key(s), please continue to the next step:
Define servers.
1.3.1.3
Define servers
Now that you have activated the server license free trial you can start to add your servers
and create packets.
First you need to add a server. Follow these instructions to find out how its done.
1. Click on the Add Server option in order to create the server.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
21
2. Type in the server name, Outer IP Address or DNS Name and if appropriate, the Inner
IP Address.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
22
3. Your newly created server now appears in the servers list.
You can repeat this procedure for all the servers that you wish to use for ISL Conference
Proxy. Usually there is only one server, but you can use more than one and either use
them separately or connect them to a grid.
If you are using your free 30-day server license trial, you do not need to define your
server here - you do it in the packet creation step, where you define your outer IP
address or DNS name and your inner IP address.
Now that you have defined your servers, please continue to the next step - Assign
licenses.
1.3.1.4
Assign licenses
Assigning a license means linking a license to the specified server. This installation
guide assumes that you will assign at least one ISL Online Server License to a
previously defined server.
If you are using your free 30-day server license trial, you do not need to assign
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
23
licenses, it will get assigned automatically in the packet creation step.
Once you assign a license, you are allowed to change the assignment twice. You
can change the license assignment by selecting the assign licenses link again.
Using the Account Email drop down menu located at the top right of the web site, select
Server License then click on the License tab and then click Assign Licenses.
Select the desired server from the list of created servers to which you wish to assign the
license and click Assign to confirm.
Having assigned the desired licenses, please continue to the next step: Create a
packet.
1.3.1.5
Create a packet
First you will need to click on the Create a new packet option. There are two on the
main servers section (as shown below).
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
24
Within the Create Packet page you will be asked to enter the IP/DNS names of the
server you wish to setup ISL Conference Proxy on.
1. Select the Server and Release of ISL Conference Proxy you wish to install.
2. Check the details you have entered are OK and enter any comments into the
comments box provided in case you wish to know certain information/criteria you
may have applied to this packet at a later date.
3. Click Create Packet to complete the process.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
25
5. Once you have created the packet you will see the information relating to the packet
or any other packets you may have created in the Packets tab.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
26
6. You will be presented with a list of packets. Your newly created packet will be on top.
7. You can find some information about the created packet, such as address, license
expire, active connections and ESS expire. Below you will the file: confproxy-40.license. Please download it to your machine, as you will have to upload it to your
server later. To proceed click on Readme action which contains all the installation
instructions.
If you have more than one server, please repeat the procedure for each server. Note
that each server gets its own license file.
Now that you have created a packet, please continue to the next chapter - Installation to
the server.
1.3.2
Installation to the server
This chapter describes the procedure for installing ISL Conference Proxy on your server.
We assume that you have successfully created ISL Conference Proxy 4.1 packet within
your ISL Online Account. If you have not done that, please refer to the ISL Online Account
procedures chapter first and then return to this chapter.
ISL Conference Proxy installation includes three steps:
1. Installation (running the installation program and installing ISL Conference Proxy to
your server)
2. Configuring the firewall (opening ports 80, 443 and 7615 in the firewall)
3. Testing (performing some actions to check the installation)
Important: Prior to release of ISL Conference Proxy 4.1.0 the ISL Conference Proxy
processes were running as root (administrator). With release of ISL Conference Proxy
4.1.0 the root privileges are needed only for binding ports (confproxy_service) and for
the first installation of ISL Conference Proxy. After that the ISL Conference Proxy will
run in unprivileged mode (confproxy_server). When ISL Conference Proxy is installed it
will also add a new user (islcp) under which the ISL Conference Proxy is running.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
27
Note: Upgrading from old version of ISL Conference proxy will add user islcp to the
system and change the permissions of files in ISL Conference Proxy folder.
Note: We detected that change of permissions on Windows can take long time on
large number of files (multiple hours for bug ICP installations ~30GB). We recommend
that you try upgrading first on test server with production database (copy production
ISL Conference Proxy folder to new machine and run new ISL Conference Proxy 4.1.0
installer).
Please continue to the first step: Installation.
1.3.2.1
Installation
In the previous step, where you created a new packet, you were instructed to save the
following two files to your computer for future use: Readme.html and confproxy-40.license. Please open the Readme.html file - it includes installation instructions for
two types of situations - first installation or upgrade from previous ISL Conference Proxy
versions. This chapter is focused on the first time installation, so please follow the
appropriate instructions, depending on your server's operating system.
Instructions for first installation are included below for convenience.
Windows
If your server is running Windows Server Core, please proceed to the following topic:
Installation on Windows Server Core
1. Run the latest ISL Conference Proxy installer (please choose 32-bit or 64-bit version,
depending on your operating system) and follow the installation wizard.
32-bit: http://www.islonline.com/system/installer_latest_win32
64-bit: http://www.islonline.com/system/installer_latest_win64
2. Web administration will appear (also available from Start menu or address http://
localhost:7615/conf).
3. Login as user admi n , password as d .
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
28
4. Select Basic configuration and enter all necessary fields.
We advise you to fill in the E-mail setup section so that ISL Conference Proxy will be
able to send status information to your e-mail and inform you about critical events,
session invitations etc.
5. Select Licenses and upload the license file (confproxy-3-5.license).
6. Select Online update and download all necessary software components (ISL
Light, ...).
You may need to perform the Online update a few times, until all Conference Proxy
components are updated. Please repeat the step 6 until there are no more updates
available.
Linux
If your server does not have a graphical user interface, follow steps 1 and 2 and then
run the command c onf pr ox y c t l headl es s where you will be able to change the ISL
Conference Proxy admin password (default is as d ) and to specify trusted networks for
web administration. After that, please perform the remaining steps (starting with step 3)
from a computer with a graphical user interface that is within the specified trusted
network. Replace l oc al hos t in the address with the appropriate server address for your
situation. An alternative is to create an ssh tunnel to your server's local port 7615 and
access the web administration through the created tunnel.
1. Download the latest ISL Conference Proxy installer (please choose 32-bit or 64-bit
version, depending on your operating system).
32-bit: http://www.islonline.com/system/installer_latest_linux
64-bit: http://www.islonline.com/system/installer_latest_linux64
2. Login as root and install ISL Conference Proxy:
32-bit: s h I SL_Conf er enc e_Pr ox y _3_5_x _l i nux . bi n (where 3.5.x is the version of the
downloaded installation file)
64-bit: s h I SL_Conf er enc e_Pr ox y _3_5_x _l i nux 64. bi n (where 3.5.x is the version of the
downloaded installation file)
3. Open web administration, which is available at address http://localhost:7615/conf.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
29
4. Login as user admi n , password as d .
5. Select Basic configuration and enter all necessary fields.
We advise you to fill in the E-mail setup section so that ISL Conference Proxy will be
able to send status information to your e-mail and inform you about critical events,
session invitations etc.
6. Select Licenses and upload the license file (confproxy-3-5.license).
7. Select Online update and download all necessary software components (ISL
Light, ...).
You may need to perform the Online update a few times, until all Conference Proxy
components are updated. Please repeat the step 7 until there are no more updates
available.
After completing the above steps, you might be getting errors about binding ports like
the example below, depending on your current network and server settings:
Ser v er ( - 1) r epor t s er r or s : - Cannot bi nd TCP por t 80
All these errors regarding binding ports (if any) should be resolved after configuring your
firewall - please continue to the next step: Configuring the firewall.
1.3.2.1.1 Installation on Windows Server Core
If you are installing ISL Conference Proxy on a Windows Server Core machine, please
follow these steps:
1. Configure the firewall so that it allows incoming traffic on ports 7615, 443 and 80 for
ICP:
net s h adv f i r ewal l f i r ewal l add r ul e name=" I SL Conf er enc e Pr ox y " di r =i n
pr ot oc ol =TCP l oc al por t =7615, 443, 80 ac t i on=al l ow
2. Start Windows PowerShell:
power s hel l
3. Download the latest ICP installer (sample downloads the latest 64-bit installer, if you
are on a 32-bit machine, replace win64 below with win32):
I mpor t - Modul e bi t s t r ans f er
s t ar t - bi t s t r ans f er - s our c e ht t p: / / www. i s l onl i ne. c om/ s y s t em/
i ns t al l er _l at es t _wi n64 - des t i nat i on c : \ Us er s \ Admi ni s t r at or \ Downl oads
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
30
\ i c p. ex e
4. Exit PowerShell:
ex i t
5. Go to the downloads directory:
c d C: \ Us er s \ Admi ni s t r at or \ Downl oads
6. Run the ICP installer:
i c p. ex e
7. Follow the installation wizard and click finish when done.
8. Access the following link from your desktop machine (replace serveraddress with the
appropriate DNS name of your ICP server) and write down the IP address that is
shown (example: 192.168.0.23): http://serveraddress:7615/myip
9. On the server go to ICP installation directory:
c d C: \ Pr ogr am Fi l es \ I SL Conf er enc e Pr ox y
10.Type the following to add your desktop machine's IP (replace 192.168.0.23 with the
appropriate IP address for your case) to the trusted network for ICP administration:
ec ho 192. 168. 0. 23 > s et t i ng_t r us t ednet
11.Restart ICP so that it will apply the command file from the previous point:
net s t op c onf pr ox y
net s t ar t c onf pr ox y
12.Access the following link from your desktop machine (replace serveraddress with the
appropriate DNS name of your ICP server): http://serveraddress:7615/conf
13.Proceed to step 3 of the Windows section in the parent topic: Installation
1.3.2.2
Configuring the firewall
ISL Conference Proxy requires several TCP ports to operate properly. We advise you to
open ports 80, 443 and 7615 in your firewall.
If you have a web server running on ports 80, 443 or both of them, ISL Conference Proxy
notifies you about binding errors on all conflicting ports. Depending on your situation,
there are a three ways to resolve this issue:
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
31
a) Assign a separate IP address to ISL Conference Proxy
This is the best option, since ISL Conference Proxy will have all three ports available for
its services, allowing most users to connect.
There are two ways you can achieve this:
You can contact your ISP about obtaining an additional IP and then bind your web
server to the first IP and ISL Conference Proxy to the second IP.
If your server does not have a graphical user interface, you can use the command
confproxyctl bindip to bind ISL Conference Proxy to a different IP.
You can install install ISL Conference Proxy on another server which is reachable from
the internet and does not have a web server running.
b) Disable the web server if you do not need it
Some installations of Windows or Linux have a default web server running. To disable
Microsoft IIS, please go to Start - Control Panel - Administrative Tools - Internet
Information Services, select Default Web Site and click Stop. Please refer to
Microsoft IIS documentation for more information.
For instructions on disabling a web server on your Linux installation, please refer to your
Linux distribution's documentation.
c) Configure ISL Conference Proxy so that it will coexist with your web server
If it is not possible for you to use one of the above two ways, you can still use ISL
Conference Proxy running only on port 7615.
Important: This can prevent users behind restrictive firewalls (e.g. those that allow
only port 80) from connecting to your ISL Conference Proxy server!
Another option, which might work in some cases, is to configure ISL Conference Proxy
to use some other standard ports, e.g. 21 (FTP), 110 (POP3) or 143 (IMAP).
To set the ports that ISL Conference Proxy uses, please go to your ISL Conference
Proxy administration (http://localhost:7615/conf), login as user admin and password asd
and then go to Configuration - General - HTTPT ports. You will need to restart ISL
Conference Proxy.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
32
Please refer to the list below for more information on the ports that ISL Conference
Proxy uses and open some additional ports (e.g. 7616 if using a grid setup, 7612 if you
plan to use ISL Light 2) in your firewall if needed:
TCP port 7615 [required], the main transport port
Most of the Proxy functionality is available through the main transport port:
web administration on link http://confProxy:7615/conf
ISL Light 2 session channel
ISL Light 3 general transport channel
ISL Pronto, both web chat and ISL Pronto client access
public download directory on link http://confProxy:7615/files/
HTTP and HTTPS tunnel simulation
XML database manipulation interface on link http://confProxy:7615/xmlmsg
TCP ports 80 and 443 [recommended]
An alias for the main transport port, intended for normal ISL Pronto traffic and
connections from strictly firewalled networks.
TCP port 7612 [required for ISL Light 2 users]
Control channel port for ISL Light Desk 2, provided for backward compatibility with ISL
Light 2.
TCP port 7616 [required for GRID]
Inter-server transport port, used for multiple ISL Conference Proxy server installations.
TCP port 7617 [required for SOAP]
In case you would like to control ISL Conference Proxy with SOAP (Web service
protocol), port 7617 needs to be opened.
Now that you have configured your firewall, please continue to the next step: Testing the
installation.
© 2016 ISL Online
ISL Conference Proxy Manual
1.3.2.3
Introduction
33
Testing the installation
In order to test ISL Conference Proxy ports, please use the following commands (one by
one) within Windows command prompt or Linux shell (replace <server-address> with
your ISL Conference Proxy address).
If you have ISL Conference Proxy running on an internal IP using port forwarding on
your firewall, please perform the tests below on a computer within your local network as
well as on an external computer (so that you access your ISL Conference Proxy through
your external IP - e.g. using a modem connection from your home computer)
If you changed or disabled some of the default ports for ISL Conference Proxy,
please modify or omit the commands below accordingly.
Make sure the telnet command is enabled (Control Panel -> Programs -> Turn
Windows features on or off -> Telnet Client )
t el net <s er v er - addr es s > 7615
t el net <s er v er - addr es s > 80
t el net <s er v er - addr es s > 443
If you get
Tr y i ng <s er v er - addr es s >. . .
Unabl e t o c onnec t t o r emot e hos t : Connec t i on r ef us ed
then it is not configured properly - either firewall (closed port) or router (missing/incorrect
port forwarding). Please inspect the situation or contact your network administrator.
If you get
Connec t ed t o <s er v er - addr es s >.
Press enter and you should get
HTTP/ 1. 0 400 Bad Reques t
Ser v er : I SLCP/ 3. 5. 0 <s er v er - addr es s >
(where 3.5.0 represents your current Conference Proxy version)
If you see that output, then that port is properly configured for use with ISL Conference
Proxy.
If all ISL Conference Proxy ports are properly configured, you have successfully
completed the installation and have a running ISL Conference Proxy on your server.
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
34
Please continue to the ISL Conference Proxy configuration chapter for the final step.
1.3.3
ISL Conference Proxy configuration
In order to use ISL Online products with your ISL Conference Proxy, you need to create
at least one user, since the admin user is only used for administration purposes.
Please follow these steps to add a user:
1. Login to your ISL Conference Proxy administration (http://localhost:7615/conf).
2. Go to User management and click Create user..
3. Enter the details (User name, password, password again, full name, e-mail,
nickname) and click Create.
If you leave the password blank, the user will not be able to login or use ISL Online
© 2016 ISL Online
ISL Conference Proxy Manual
Introduction
35
products, e.g. obtain an ISL Light session code.
You have now successfully created a new user and you can use that username and
password for ISL Online products, e.g. for obtaining an ISL Light session code. For
more information on user management, refer to the User management chapter in the
manual.
ISL Conference Proxy administration provides access to a lot of configuration
options, allowing you to customize it to your needs. Please refer to the Settings chapter
in the manual for a detailed description of available options.
Please continue to the Starting products chapter to learn how to use ISL Online products
with your new ISL Conference Proxy server.
© 2016 ISL Online
ISL Conference Proxy Manual
2
Manual
36
Manual
This manual describes ISL Conference Proxy in detail.
It is divided into the following sections:
Introduction (introductory chapter)
Upgrading from previous versions (instructions for upgrading from previous versions)
Upgrading from the trial version (instructions for upgrading from the trial version)
Unattended installation (instructions for performing an unattended installation)
Settings (detailed description of all ISL Conference Proxy settings in the
administration interface)
Controlling the server (instructions on how to start / stop / restart ISL Conference
Proxy)
Backup (instructions on how to backup ISL Conference Proxy)
Migrating to a new server (instructions on how to move an existing installation of ISL
Conference Proxy to a new server)
Enabling SSL (instructions on how to enable SSL on your ISL Conference Proxy
server)
Enabling code signing (instructions on how to enable code signing for executables
downloaded from your ISL Conference Proxy server)
Using a reverse proxy (instructions on how to use ISL Conference Proxy behind a
reverse proxy server)
Integration (instructions and examples on how to integrate ISL Conferene Proxy with
your system)
Setting up ISL Grid (instructions on how to setup your own ISL GRID)
Uninstalling (instructions for uninstalling ISL Conference Proxy)
Report module (instructions for using the report module)
User web pages customization (instructions on how to change the look of user web
pages)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
37
Please continue to the Introduction chapter.
2.1
Introduction
As an introduction, let us name the two user models that are available for ISL Online:
Using ISL Online as a hosted service (ASP Subscription or PayPerUse Coupon), a
secure connection is established through the ISL Grid - ISL Online's massive network
of servers worldwide. Therefore, you don't need to install or configure anything. Once
registered with us, you are able to connect to a remote computer and immediately put
every single first-class ISL Light feature to profitable use.
Server License allows you to set up your own ISL Conference Proxy server (or a grid
of servers) and use it as a connecting point for ISL Online products instead of our ISL
Grid. You should be familiar with network and server administration in order to install
and configure it properly. This setup enables you to use ISL Online products within
your company's private environment, keeping all data on your own servers. If your
company has special privacy and security requirements (e.g. insurance companies,
banks), then this is the perfect solution for you - you have everything under control (user
data, session history etc.) and you can even set up a closed environment for using ISL
Online products within your local network - your server that runs ISL Conference Proxy
does not need internet connection, you can update it manually when needed.
You are welcome to register for a free trial that includes a 30-day server license trial
and a 15-day hosted service trial. This way, you can test both options and see which
of the two best suits your needs. You are then welcome to visit our online shop and
make a purchase. Purchasing an ISL Online license will entitle you to use all four ISL
Online products. All products are priced per active connection, shared among the four.
You can choose to remotely support clients with ISL Light, access a remote computer
with ISL AlwaysOn, chat with a website visitor using ISL Pronto, or sit an online meeting
with ISL Groop.
Please refer to the Getting started part of the manual for basic instructions on how to
install ISL Conference Proxy and start using it.
If you are already using ISL Conference Proxy in your company and would like to
upgrade it, please go to the Upgrading from previous versions chapter.
If you are currently using a 30-day server license trial and you wish to upgrade it, please
go to the Upgrading from the trial version chapter.
If you have any questions or problems regarding ISL Conference Proxy, our ISL Online
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
38
Team is available to assist you with technical issues or other questions over the
telephone, via e-mail (support@islonline.com) or through our live chat (simply go to
http://islonline.com/ and click the Chat Live button in the top-right corner of the page).
2.2
Upgrading from previous versions
This chapter describes the procedure for upgrading your ISL Conference Proxy from
versions 3.1/3.2/3.3/3.4/3.5 or versions 2/3.0.x.
ISL Conference Proxy 3.1.0+ includes online update functionality - updating is
performed through the ISL Conference Proxy administration (login to your ISL
Conference Proxy administration and select Online update on the left).
Please follow the instructions below in order to upgrade your ISL Conference Proxy
version 2 or 3.0.x to version 4.1.0.
These instructions are also available in the file Readme.html when you create a new
ISL Conference Proxy 4.1 packet.
Important: Prior to release of ISL Conference Proxy 4.1.0 the ISL Conference Proxy
processes were running as root (administrator). With release of ISL Conference Proxy
4.1.0 the root privileges are needed only for binding ports (confproxy_service) and for
the first installation of ISL Conference Proxy. After that the ISL Conference Proxy will
run in unprivileged mode (confproxy_server). When ISL Conference Proxy is installed it
will also add a new user (islcp) under which the ISL Conference Proxy is running.
Note: Upgrading from old version of ISL Conference proxy will add user islcp to the
system and change the permissions of files in ISL Conference Proxy folder.
Note: We detected that change of permissions on Windows can take long time on
large number of files (multiple hours for bug ICP installations ~30GB). We recommend
that you try upgrading first on test server with production database (copy production
ISL Conference Proxy folder to new machine and run new ISL Conference Proxy 4.1.0
installer).
Upgrade from version 3.1, 3.2, 3.3, 3.4 or 3.5
1. Open web administration (http://localhost:7615/conf).
2. Login as user admin, password asd.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
39
3. Select Licenses and upload the new license file (confproxy-4-0.license).
4. Restart ISL Conference Proxy when prompted.
5. Select Online update and download all necessary software components (ISL
Light, ...).
You may need to perform the Online update a few times, until all Conference Proxy
components are updated. Please repeat the step 8 until there are no more updates
available.
6. Review server and user configuration in case there are any options which are not
covered by automatic upgrade.
Upgrade from version 2 or 3.0.x
Windows
1. 1. Stop old ISL Conference Proxy in Control panel -> Administrative tools -> Services.
Make complete backup of old ISL Conference Proxy folder.
2. Create a new ISL Conference Proxy 4.0 packet using the instructions in the Create a
packet chapter, then continue to step 3.
3. Under the readme option run the appropriate installer for your server and follow the
installation instructions.
4. Web administration will appear (also available from Start menu or address http://
localhost:7615/conf).
5. Login as user admin, password asd.
6. Select Basic configuration and enter all necessary fields.
7. Select Licenses and upload license file (confproxy-3-5.license).
8. Select Online update and download all necessary software components (ISL
Light, ...).
You may need to perform the Online update a few times, until all Conference Proxy
components are updated. Please repeat the step 8 until there are no more updates
available.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
40
9. Review server and user configuration in case there are any options which are not
covered by automatic upgrade.
Linux
1. Login as root and stop old ISL Conference Proxy: confproxyctl stop (or killall confproxy for
version 2).
Login as root and make complete backup of old ISL Conference Proxy folder: cd /var
&& tar -czvf confproxy_backup.tgz confproxy.
2. Create a new ISL Conference Proxy 4.0 packet using the instructions in the Create a
packet chapter, then continue to step 3.
3. Under the readme option run the appropriate installer for your server and follow the
installation instructions.
4. Login
as
root
and
install
ISL
Conference
Proxy:
sh
I SL_Conf er enc e_Pr ox y _4_0_<r el eas e number >_l i nux . bi n
5. Open web administration, which is available at address http://localhost:7615/conf.
6. Login as user admin, password asd.
7. Select Basic configuration and enter all necessary fields.
8. Select Licenses and upload license file (confproxy-4-0.license).
9. Select Online update and download all necessary software components (ISL
Light, ...).
You may need to perform the Online update a few times, until all Conference Proxy
components are updated. Please repeat the step 9 until there are no more updates
available.
10.Review server and user configuration in case there are any options which are not
covered by automatic upgrade.
2.3
Upgrading from the trial version
This chapter provides information on how to upgrade from the trial version. It is a simple
procedure and it does not require you to reinstall the ISL Conference Proxy. When you
purchase a new activation key, you need to activate it, assign the new license to one of
your defined servers and create a new packet. Then you simply upload the new license
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
41
file to your ISL Conference Proxy and that concludes the upgrade procedure.
If you have been using your free 30-day server license trial and you wish to continue
using it after the trial expires, you are welcome to purchase an activation key:
1. Go to our online shop and select the Server License option on the left - direct link to
the Server License shop.
2. Choose the desired item and click Buy below it, then finish the shopping procedure.
If you do not wish to pay with a credit card, you can ask us for a proforma invoice by
sending an e-mail to sales@islonline.com. When you receive the proforma invoice,
you can pay using a bank transfer.
When you receive your activation key, you should login to your ISL Online account and
activate your activation key using the instructions in the Activate the key chapter.
Having activated your activation key, you should assign the new license to one of your
defined servers using the instructions in the Assign licenses chapter.
Now you need to create a new packet - please use the instructions in the Create a
packet chapter.
You should now have the new license file (confproxy-3-5.license) and you should
upload it to your ISL Conference Proxy using the following steps:
1. Open web administration, which is available at address http://localhost:7615/conf.
2. Login as user admi n , password as d .
3. Select Licenses and upload the license file (confproxy-3-5.license).
4. Select Online update and download all necessary software components (ISL
Light, ...).
You may need to perform the Online update a few times, until all Conference Proxy
components are updated. Please repeat the step 4 until there are no more updates
available.
This concludes the upgrade procedure. All your ISL Conference Proxy settings have
been preserved and you can continue using it.
2.4
Unattended installation
This procedure is intended for advanced users only. Please refer to this chapter
for normal installation instructions.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
42
Please follow the appropriate instructions, depending on your server's operating system.
Windows
We will use c : \ pr ox y as an example.
1.
Download the latest ZIP file with updates and save it into c : \ pr ox y \ i ns t al l _z i p
2.
Download the latest ISL Conference Proxy installation file (currently it is
I SL_Conf er enc e_Pr ox y _3_4_0_wi n32. ex e ).
3.
Put the licence file (c onf pr ox y - 3- 5. l i c ens e ) into c : \ pr ox y
4.
Open cmd.exe and
DI R=" c : \ pr ox y "
run: I SL_Conf er enc e_Pr ox y _3_5_0_wi n32. ex e / VERYSI LENT /
Linux
ISL Conference Proxy is always installed into / v ar / c onf pr ox y .
If you would like to install it somewhere else (e.g. you do not have enough space on /
var or you would like to use some other partition as the target etc.), you can create a
symbolic link so that / v ar / c onf pr ox y points to the destination of your choice.
1.
Download the latest ZIP file with updates and save it into / v ar / c onf pr ox y /
i ns t al l _z i p
2.5
2.
Download the latest ISL Conference Proxy installation file (currently it is
I SL_Conf er enc e_Pr ox y _3_5_0_l i nux . bi n ).
3.
Put the licence file (c onf pr ox y - 3- 5. l i c ens e ) into / v ar / c onf pr ox y
4.
Open the terminal and run: s h I SL_Conf er enc e_Pr ox y _3_5_0_l i nux . bi n
Settings
This chapter lists and describes all ISL Conference Proxy administration settings in
detail - it can be used as a reference point when you need further information about a
certain option that was mentioned in other parts of this manual.
To enter the ISL Conference Proxy administration, please follow these steps:
1. Point your web browser to the following address: http://localhost:7615/conf (replace
l oc al hos t with the appropriate IP address of your server if you are not accessing it
locally).
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
43
2. Login as user admi n , password as d . (as d is the default password - if you changed it,
please use the new password)
For a description of administration interface's specific features, please go to the
following topic: How to use the administration interface.
This is a list of main menu entries on the left side of the administration interface.
Please select the desired menu entry:
Activity monitor (check information about servers and sessions and perform some
actions - restarting servers, GRID (dis)connect etc.)
Configuration (configure many ISL Conference Proxy options, including security
settings, customizations and integration options)
User management (manage users and domains)
Manage software (check licence information, list of installed software, perform an
online or manual update)
Logout (logs you out of the ISL Conference Proxy admnistration)
Some entries described in this chapter might be missing in your installation,
depending on the programs that are installed on your ISL Conference Proxy (e.g. if you
do not have ISL Pronto installed, there will be no ISL Pronto entries in Configuration,
User management etc.).
Some settings within ISL Conference Proxy administration are specific for for a
certain ISL Online product. Only short descriptions of those option will be provided here please refer to that product's manual for installation instructions and more information.
2.5.1
How to use the administration interface
This topic provides a description of administration interface's specific features.
Mark the adequate item(s) and perform an action
You check one or more checkboxes and then perform an action on the selected items.
Example: go to the Online update menu, switch from Default (automatic install) to
Manual install, select a few plugins to be updated (check their checkboxes) and then
press Apply changes.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
44
Change options
You will notice that most of the options are greyed out and have a checked checkbox left
of the option name. In order to change the default option, you first need to click (uncheck)
the checkbox left of the option in order to enable changing it, then either select the
desired value from the list or enter a number, address, filename etc. When you are done,
click Save to save the changes.
If you do not click Save, your changes are not saved.
Example: go to the Configuration - ISL Light menu, click (uncheck) the checkbox left
of the Send Chat transcripts option, use the list to switch from No to Yes and then
press Save.
Local override
When you click the Local override link, it toggles an additional option. When you set the
new option, it overrides the default setting for the current server. This is used in GRID
environment, where you wish to set an option for a certain server only while keeping the
default settings for all other servers. If you are not using GRID, then changing options
with the Local override option has no effect.
Refresh the screen
When you press the Save button, all the changes are saved and the screen is refreshed.
If you wish to refresh the screen without saving changes, simply select the same menu
entry on the left.
2.5.2
Activity monitor
Activity monitor menu includes the following entries:
Servers (check information about servers and manage them)
Clients (check connected clients and concurrent usage)
Database (check information about the database)
Transfer rates (check information about transfer rates)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
45
NTP statistics (check NTP statistics and force synchronization)
System statistics (access hardware monitor for your servers)
Sessions (check active sessions or session history)
2.5.2.1
Servers
This menu entry provides a list with server information. If you use a single server, the list
will include only one server. If you use GRID, you will see a list of your servers.
The following information is available for each server:
Server ID (server's unique ID)
Address (server's configured network address)
Connected (sign - indicates that this is the current server; yes indicates that the
remote server is connected and data transmissions will work as expected; no
indicates that the remote server failed to connect - please check log files to see the
reason)
Version (currently installed version of ISL Conference Proxy)
Build time (time when the installed version was built)
Up time (indicates server's uptime in format HH:MM:SS)
Connected time (indicates the duration of current connection if connected, or last
connection if disconnected)
Disconnected time (indicates the duration of current disconnection if not connected,
or last disconnection if connected.)
ISL Light (indicates a number of ISL Light sessions in certain state - active,
get_code, half_connected, reconnecting)
Service usage (shows current service usage per product / component)
Socket count (shows current socket statistics - max_fds, open_fds, objects, in_pool)
You can select the desired server and perform one of the following actions (if you do not
use GRID, options two and three do not have an effect):
Restart selected
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
46
Reconnect selected in GRID
Disconnect selected from GRID
Restart selected restarts only the ISL Conference Proxy program, not your physical
server.
2.5.2.2
Clients
This menu entry shows a list of currently connected clients with the following information:
Active on server (indicates a server ID where this client is active)
Client ID (client's unique ID)
Started (indicates a starting time for the connection)
Description (provides a description of the session, e.g. ISL Light Desk)
Network address (indicates the network address that was used to initiate a
connection)
Connection type (indicates a connection type)
Service usage (indicates this connection's service usage - service type and amount)
Concurrent usage (includes some additional data for calculating concurrent usage,
e.g. user that initiated the connection)
Usage sums table is included at the bottom and it shows service usage as well as
concurrent usage per server, domain and user.
2.5.2.3
Database
This menu entry provides information about estimated file count, both local statistics and
GRID statistics. If your local server is not connected in GRID, GRID statistics are the
same as local statistics.
If your local server is connected in GRID, the GRID synchronized files table contains the
total count of inconsistent files that were synchronized between servers.
2.5.2.4
Transfer rates
This menu entry provides tables with transfer rates for several different types of traffic,
e.g. ISL Light or plugin download.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
47
Each table entry includes the server ID, address and average transfer rates for the past
minute, five minutes, fifteen minutes and one hour. The first value indicates the outgoing
rate and the second value indicates the incoming rate.
If GRID is enabled, then tables with GRID in their title provide information about interserver traffic.
2.5.2.5
Web hits
This menu entry provides a table with web hits information.
You can filter results per server and either check raw data (finished time, runtime, client
address, compressed or not, URL, referrer) or select one of the prepared queries, e.g.
Top clients.
2.5.2.6
GeoIP Status
This menu entry shows the locations where each ISL Online Server is based. You can
find a map of each server location by clicking on the link respective of the chosen
country code.
2.5.2.7
NTP statistics
This menu entry provides information about last time updates for your servers.
You can select the desired server(s) and click Force synchronization to perform time
synchronization using NTP.
2.5.2.8
System statistics
This menu entry includes two tables - Current usage and System information.
Current usage table includes the following information about your servers:
Server (indicates unique server ID)
Sys. uptime (indicates your server's uptime)
Load 1min, load 5min, load 15min (indicates server's average CPU load for the
past 1 minute, 5 minutes, 15 minutes):
krn (kernel space CPU load)
usr (user space CPU load)
irq (interrupt request CPU load)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
48
iow (input/output CPU load - note: linux only)
tot (total CPU load)
drd (disk read CPU load - note: windows only)
dwr (disk write CPU load - note: windows only)
dall (total disk CPU load - note: windows only)
cpkrn (ISL Conference Proxy kernel space CPU load)
cpusr (ISL Conference Proxy user space CPU load)
cptot (total ISL Conference Proxy CPU load)
RAM free / total (indicates server's amount of free and total RAM)
Swap used / total (indicates server's used and total amount of swap space)
Disk free / total (indicates server's used and total amount of disk space)
Sys. resources (provides some additional information about server's resources processes, maximum number of open file descriptors [max_fds], currently opened file
descriptors [open_fds])
TCP listen / connected / other (indicates amount of server's used TCP sockets listening, connected and other)
Disk status (provides some additional information about server's disks - inodes
status, number of reads and writes etc.)
Network status (provides information about server's network interfaces - amount of
received and transmitted data per interface)
System information table includes some basic information about your servers - the
operating system type and version in the first and a list of CPUs in the second column.
2.5.2.9
Sessions
Sessions menu includes the following entries:
Active (browse active sessions)
History (browse session history)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
49
2.5.2.9.1 Active
This menu provides a list of active sessions per product (ISL AlwaysOn, ISL Groop, ISL
Light, ISL Pronto). Please select the appropriate tab to view active sessions for the
desired product.
ISL AlwaysOn
There are four tables in this tab:
Grid Stats
Computers (indicates the number of ISL AlwaysOn computers connected - available
in ISL Conference Proxy 4.2.3+)
This server Stats
Controls (indicates the number of controls)
Computers (indicates the number of computers operational)
Unknown computers (indicates the number of unknown computers operational)
Clients (indicates a number of clients)
Users (indicates a number of users)
Links Computers/Clients/Web (this is an internal parameter)
DB Flushing (indicates the amount of database flushing to disk)
This server Clients
Address (indicates the address)
GUI Version (indicates the GUI version)
Protocol (client, server) (indicates the protocol)
User Name (indicates the user name)
This server Computers/Unknow n Computers
Name (name of the computer)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
50
Address (IP address of the computer)
GUI Version (ISL AlwaysOn version installed)
Protocol (client, server) (client and server protocol information)
Support Upgrade (shows whether the computer supports upgrades)
Connects to (shows the IP Address of the computer using the connection)
Opened Channels (list of opened channels)
ISL AlwaysOn 1.2.2 or newer allows you to push upgrades to one or more computers that have this option
enabled - simply select the desired computers from the list (they need to have the value yes in the
Supports
Upgrade column), select the desired program version and click Execute.
ISL Groop
The following columns are available for each active ISL Groop session:
Session ID (unique session ID)
Session code (the session code for this ISL Groop session)
Public (indicates whether a session is public or not)
Session name (name of the session)
Session Active (indicates whether a session is active and if yes, for how many users)
Created By (information about the session creator - name, IP address, e-mail
address)
Running on server (indicates the server that is hosting this session)
Time Running (indicates the current duration of the session)
Users Present (number of users present)
To see more information about a certain active session, please click that session's
session ID.
ISL Light
The following columns are available for each active ISL Light session:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
51
Select (allows you to select the connection so you can drop the session or reconnect)
Session ID (unique session ID)
Active on server (contains ID of the server where this session is currently active both ISL Light Desk and ISL Light Client are always connected to the same server
when a connection is established)
Session code (the session code for this ISL Light session)
Created on (time when the session was created, i.e. when ISL Light Desk obtained
the session code)
User (user name of the user that obtained the session code)
Duration (the amount of time that the session has been active)
Last transfer (time of the last sent network packet, measured from the start of the
session)
Bytes transferred (total amount of bytes that were transferred during the session)
Average B/s (average transfer rate)
Reconnects (number of reconnects during the session)
Desk (information about ISL Light Desk - platform, version, IP address, type of
network transport)
Client (information about ISL Light Client - platform, version, IP address, type of
network transport)
Desk location (ISL Light Desk's geographic location - country code, country, city;
available only when GeoIP is installed)
Client location (ISL Light Client's geographic location - country code, country, city;
available only when GeoIP is installed)
To see more information about a certain active session, please click that session's
session ID.
You can select one or more active sessions (by clicking the Select check box) and click
Drop selected - a notification is shown to the ISL Light Desk and ISL Light Client users
and the session is terminated.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
52
ISL Pronto
Chats on this server
Server (server name)
Database ID (unique database ID)
Chat Transcript (shows the detail of the chat transcript)
Started (starting time of the chat)
Domain (name of the domain where the chat is active)
Requestor (contains chat requester's name and email address)
Supporter (contains supporter's name)
Clients in chat (indicates the number of clients in the chat)
Supporters in chat (indicates the number of supporters in the chat)
Language (client's language)
Template (shows what template is being used)
Clients on this server
IP (client's IP address)
Location (client's location)
Supporters on this server
User (contains supporter's user name)
Name (contains supporter's name)
Software (information about supporter's version, platform and language of ISL
Pronto)
IP (supporter's IP address)
Location (supporter's location)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
53
ISL Pronto Proactive
Local Domains
Select (select local domain)
Domain (name of the domain where the chat is active)
Supporters (contains supporters' names)
Clients Online (indicates the number of supporters in chat)
Clients Offline (indicates the number of inactive clients)
Drop and redirect selected (drop connection of selected supporters and clients and
redirect to another server)
Drop and redirect all (drop connection of all supporters and clients and redirect to
another server)
Supporters
User (contains supporter's user name)
Domain (name of domain where supporter is active)
Address (IP address of supporter)
ConnType (shows whether supporter has a persistent connection)
Visitors
Visit ID (unique ID of visitor)
Domain (name of domain where visitor is active)
Address (IP address of visitor)
ConnType (shows whether visitor has a persistent connection)
2.5.2.9.2 History
This menu provides a list of previous sessions per product (ISL Groop, ISL Light).
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
54
Please select the appropriate tab to view session history for the desired product.
ISL Groop
You will be presented with a list of ISL Groop sessions. There is an option to filter
sessions based on the user - it is possible to use wildcards, e.g. \\domain\*.
The following columns are available for each ISL Groop session:
Session ID (unique session ID)
Session code (the session code for this ISL Groop session)
Public (indicates whether a session is public or not)
Created By (information about the session creator - name, IP address, e-mail
address)
Starting At (indicates the session's starting time)
Duration (this is an internal parameter)
Session name (name of the session)
Time Active (indicates the amount of time the session has been active)
Max Users (indicates the highest number of users that were present in the session)
To see more information about a certain session in the history, please click that
session's session ID.
ISL Light
You will be presented with a list of ISL Light sessions. There is an option to filter
sessions based on the creation date (Created after / before) and based on the user - it
is possible to use wildcards, e.g. \\domain\*.
The following columns are available for each ISL Light session:
Session ID (unique session ID)
Active on server (contains ID of the server where this session was active - both ISL
Light Desk and ISL Light Client are always connected to the same server when a
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
55
connection is established)
Session code (the session code for this ISL Light session)
Created on (time when the session was created, i.e. when ISL Light Desk obtained
the session code)
User (user name of the user that obtained the session code)
Duration (the amount of time that the session has been active)
Last transfer (time of the last sent network packet, measured from the start of the
session)
Bytes transferred (total amount of bytes that were transferred during the session)
Average B/s (average transfer rate)
Reconnects (number of reconnects during the session)
Desk (information about ISL Light Desk - platform, version, IP address, type of
network transport)
Client (information about ISL Light Client - platform, version, IP address, type of
network transport)
Desk location (ISL Light Desk's geographic location - country code, country, city;
available only when GeoIP is installed)
Client location (ISL Light Client's geographic location - country code, country, city;
available only when GeoIP is installed)
To see more information about a certain session in the history, please click that
session's session ID.
ISL Pronto
You will be presented with a list of ISL Pronto sessions. There is an option to filter
sessions based on the time frame, domain, requestor, requestor e-mail, supporter - it is
possible to use wildcards, e.g. \\domain\*.
The following columns are available for each ISL Groop session:
Database ID (unique database ID)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
56
Chat transcript (you can download this session's chat transcript)
Started (indicates the session's starting time)
Domain (indicates the domain where this session was started)
Requestor (requestor's name)
Requestor e-mail (requestor's e-mail address, if provided)
Supporter (supporter's name)
Language (language the chat was started in)
IP (requestor's IP address)
Browser (requestor's browser information)
Location (requestor's location)
To see more information about a certain session in the history, please click that
session's session ID.
2.5.3
Configuration
Configuration menu includes the following entries:
Basic (provides basic settings, e.g. administrative password, e-mail notification
settings)
General (used for system environment settings, e.g. HTTP ports, software update
URL, SSL settings)
Security (used for changing security settings, e.g. allowed
administration, settings for viewing and controlling sessions)
IP addresses for
ISL AlwaysOn (used for ISL AlwaysOn-specific settings)
ISL Groop (used for ISL Groop-specific settings)
ISL Light (used for ISL Light-specific settings)
ISL Pronto (used for ISL Pronto-specific settings)
Advanced (used for advanced features, e.g. customization, integration)
GRID (used for setting up GRID)
Storage (set up external storage support)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
57
DNS server (used for changing the built-in DNS server settings)
Network time (used for changing the built-in NTP server and client settings)
Some options can be set on various levels - as a GRID setting (general setting), as a
server setting (reachable through Local override), as a domain setting, as a user
setting. Sometimes you can specify Deny override or Allow override when disabling a
certain option - if you allow override, it can be set on a lower level (e.g. for a specific domain or user).
Some of the settings might require a server restart - in those cases, a message in
red as well as a Restart server button will be shown just below the main title.
2.5.3.1
Basic
The main purpose of these basic settings is to lead the user through the necessary
procedures when performing the ISL Conference Proxy installation.
The first setting is Administrator password. Default password is asd - please change it
as soon as possible.
Administrator account cannot be used for ISL Online products, e.g. obtaining a
session code for ISL Light.
The second setting, E-mail setup, allows you to set mail server and e-mail address for
notifications. You can add your own SMTP Server, save the e-mail settings and send a
test e-mail. Apart from sending a test e-mail, all e-mail settings are accessible in the
General menu entry.
When you select SSL/TLS from the SMTP Connection Type and Plain Text from
the SMTP Authentication option, you will need to type in your SMTP Username and
Password. If SMTP Authentication is set to None then you will not need your SMTP
Username and Password.
All other settings on this page are reachable from other menu entries and will be
discussed at their respective locations (please refer to Licenses, Online update, User
management).
2.5.3.2
General
The following settings are available in this menu:
Database secret (the password that needs to be defined if you intend to update the
ISL Conference Proxy database or retrieve data through the XMLMSG interface)
Outgoing mail server (Set this to your company's mail server - you might need to
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
58
open the port 25 in your firewall for the ISL Conference Proxy server. If the
administrator mail account is not local to the mail server, you might need to enable
mail relaying for the ISL Conference Proxy server.)
SMTP Port (specify your SMTP Port number ISL Conference Proxy should use,
default is 25)
SMTP Connection (specify the type of SMTP connection ISL Conference Proxy
should use, choose between Normal and SSL/TLS)
SMTP Authentication (specify the SMTP Authentication type ISL Conference Proxy
should use. Choose between None and Plain Text)
SMTP Username (specify the SMTP Username you wish to use in ISL Conference
Proxy)
SMTP Password (specify the SMTP Password you wish to use in ISL Conference
Proxy)
Default e-mail from address (Set this field to the administrator email address or any
other system e-mail address. This e-mail address does not need to be valid, but make
sure that the domain name of the email address does exist. If it doesn't exist, ISL
Conference Proxy might not be able to send e-mail notifications.)
System e-mail goes to (Set this to the administrator's e-mail address. You can enter
multiple addresses - use comma to separate them. The provided e-mail addresses
must be valid.)
Installation name (this is an internal parameter and it should not be changed)
Bind IP on server -1 (Use this setting to instruct ISL Conference Proxy to listen only
on a specific IP address. Uncheck the "undefined" and then enter the IP address for
specified server. After saving the settings, restart the ISL Conference Proxy.)
If you are running ISL Conference Proxy on a Linux server, you can also use the
command confproxyctl bindip to bind a specific IP.
HTTPT ports (specify one or more ports (separate them with commas) that ISL
Conference Proxy should use)
HTTPT use SSL (set to Yes to allow only connections that are encrypted with SSL)
HTTPT SSL certificate (use this option to specify the SSL certificate file)
HTTPT SSL key (use this option to specify the SSL key file)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
59
HTTPT SSL key passphrase (use this option to specify the pass phrase for the SSL
key if needed)
HTTPT SSL certificate chain (set this option to the appropriate value if you need to
use SSLCertificateChainFile)
HTTPT SSL protocol (use this option to specify the protocol limitations)
HTTPT SSL cipher suite (use this option to limit the cipher suite)
Important: Before making any permanent changes to protocol or cipher suite
settings we strongly suggest testing all your main use cases to make sure these
changes will not break backward compatibility where this is not acceptable. Suggested
further reading:
https://en.wikipedia.org/wiki/Transport_Layer_Security#Applications_and_adoption
[wikipedia.org]
https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations
[mozilla.org]
UDP ports (UDP ports to use, default is port 7615)
Software update URL (use this option to specify an address that is used for software
update)
Use software release policy
Expand server messages
Show debugging menu (use this option to enable/disable the debugging menu, this
also enables you to download installed certificates in ZIP file once you enable
debugging menu.)
Login enabled (use this option to enable/disable user login)
Login valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Login valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Password expiration interval (1w 2d 3h 4m 5s) (manually set password expiration
time)
Default domain for user authentication (use this option to set the default domain
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
60
for user authentication - members of that domain will not need to specify the domain
name when logging in, e.g. they will be able to use user1 instead of \\default\user1, while
members of non-default domains will need to provide the domain prefix, like this: \
\domain\user2)
Default program customization (enter the name of an existing customization to set
it as the default program customization)
Max concurrent usage (hard limit) (specify the max concurrent limit for server)
Max concurrent usage (per user setting) (set max concurrent usage for each user
on the server, but not for server itself)
Software release policy country
Allow multilicense IDs
Deny XMLMSG updates (Set whether to allow or deny updates using XMLMSG)
Allow group hierarchy creation [unsupported preview] (select whether group
hierarchy is allowed -> adding group to group)
2.5.3.3
Security
The following settings are available in this menu:
Server public address template (Added support for external load balancer for ISL
Conference Proxy)
Use single public address in GRID (This option has to be enabled to use external
load balancer for ISL Conference Proxy, make sure you also set Server public
address template (above) and have correct settings in DNS Server Zones tab.)
Do not use service public addresses for web pages
Alternate (for CDN) addresses for web pages (Enter alternate addresses of web
pages used by Content delivery network)
Alternate (for CDN) addresses for other services (Enter alternate addresses for
services used by Content delivery network)
Allow X-Forwarded-For header (for CDN) for IP ranges:
Record client IPs (Enable to record client IP addresses)
Max recorded client IPs to hold in memory (Number of IP addresses stored)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
61
Save recorded client IPs interval in seconds
Disable automatic SSL usage on web pages (enable/disable automatic usage of
SSL on web pages)
Force SSL for all user web pages (enable/disable forcing SSL for user web
pages)
Use SSL only for login on user web pages
Hide server version in HTTP response (allow/deny server version to be shown in
HTTP response)
Disable autocomplete for web login forms (Disable autocomplete function for
forms on login pages)
Do not cache encrypted web pages to disk (Enable/disable caching of encrypted
web pages to disk)
Hide account status when performing forgotten password procedure
Allow sending forgotten password emails to unregistered email accounts
(Allow sending forgotten password emails to addresses not registered with ISL Online
account)
Enable insecure redirect handler (backwards compatibility only)
Disable framing of web pages
Force SSL for WebSockets (enable/disable forcing SSL for WebSockets)
Force SSL for WEBAPI (enable/disable forcing SSL for WEBAPI)
Force SSL for WEBAPI2 (enable/disable forcing SSL for WEBAPI2)
Filters that define access to webapi2 (Define filters for accessing webapi2 and
web pages. Example of filter syntax:
[ us er _i d=s - 1_0_0| pat h=/ us er s / i s l l i ght ]
al l ow_i p 1. 2. 3. 0/ 24;
[ / us er s / i s l l i ght ]
[ / us er s ]
al l ow_i p 1. 2. 3. 0/ 24;
In the example above -> user web pages can be accessed only from 1.2.3.0/24.
ISL Light cannot be accessed by anyone except user with id s-1_0_0 in
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
62
1.2.3.0/24
#[ i p 172. 16. 120. 180]
#f i l t er deny _met hod ut i l s / c ount er s / quer y ;
#f i l t er deny _us er s 20_1_1
Filters that define access to web pages (Similar syntax applies than for the filters
that define access for webapi/webapi2)
[ / us er s / mai n/ l ogi n. ht ml ]
al l ow_i p 1. 2. 3. 0/ 24;
al l ow_i p 172. 16. 1. 0/ 24;
al l ow_i p 172. 16. 99. 0/ 24;
User privileges settings
User can view list of domains on server (specifies whether users can view a list of
their own domains on the server)
User can view list of users in own domain (specifies whether users can view other
users in the domain)
User can view list of users on server (specifies whether users can view a list of
other users who have access to the server)
User can view own sessions (specifies whether users can view their own sessions)
User can control own sessions (specifies whether users can terminate their own
sessions)
User can view sessions in domain (specifies whether users can view sessions
within their domains)
User can control sessions in domain (specifies whether users can terminate any
sessions within their domains)
User can view all sessions on server (specifies whether users can view all
sessions on server)
User can control all sessions on server (specifies whether users can terminate
any sessions on server)
View network status in /network_status (specifies whether users can view network
status at /network_status )
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
63
Enable system information in /sysinfo (specifies whether to enable system
information in /sysinfo)
Enable public file list in /files (backwards compatibility only)
Allow stress test (Allow the stress test to be performed)
User can change full name (specifies whether users can change full names)
User can change e-mail (specifies whether users can change e-mail addresses)
User can change nickname (specifies whether users can change nicknames)
User can change password (specifies whether users can change passwords)
User can change time zone (specifies whether users can change time zones)
Store last used language in account (specifies whether to save the last used
language in account)
Mail template for forgotten password (Customize template for email sent when
user forgets his or hers password)
Mail template for forgotten password (backwards compatibility v1) (Mail template
for forgotten password used for backwards compatibility)
Forgot password e-mail token expiry in seconds (Expiry time for forgotten
password toke, if the password isn't changed in this time, a new password has to be
requested again)
Valid password format (regex) (use this option to specify a valid password format
using a regular expression)
Invalid e-mail error (use this option to modify the invalid e-mail error notification)
Valid e-mail format (regex) (use this option to specify a valid e-mail format using a
regular expression)
Invalid e-mail error (use this option to modify the invalid e-mail error notification)
Error message for disabled module (Use this option if you wish to show an error
message when using disabled mode)
License specification
Application SSL test port
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
64
Application SSL protocol
Application SSL cipher suite
HTTP proxy for web client (you can use this option to specify a web proxy that
should be used by ISL Conference Proxy, the syntax is pr ox y addr es s : pr ox y por t or
us er name: pas s wor d@pr ox y addr es s : pr ox y por t if you need to specify a username and
a password for your web proxy)
Do not use HTTP proxy for addresses (if you set the option above, you can use
this setting to specify the addresses where a web proxy should not be used; use
commas to separate the addresses)
Allowed IP addresses for administration (By default, you can only access ISL
Conference Proxy administration from a local machine - you can specify allowed IP
addresses in two ways, either list the IP addresses separated with commas or specify
an allowed subnet, e.g. 192.168.0.1/255.255.255.0.)
Must use SSL for administration (set to Yes to allow only SSL encrypted access to
ISL Conference Proxy administration - note that you will need to use the appropriate
https link for administration: https://localhost:7615/conf)
Allowed IP addresses for XMLMSG (use this option to set allowed IP addresses
that can use the XMLMSG interface for ISL Conference Proxy administration)
Must use SSL for XMLMSG (set to Yes to allow only SSL encrypted access to ISL
Conference Proxy administration through the XMLMSG interface - note that you will
need to use the appropriate https link for administration: https://localhost:7615/
xmlmsg)
Force networks to public internet address (use this option to override server's
autodetect for internet/intranet)
Force networks to private intranet address (use this option to override server's
autodetect for internet/intranet)
Internet Explorer plugin trusted sites (this setting is used when installing ISL
WebStart from the server)
Enable email matching on authentication (Enable users to also log in with their
account e-mail address instead of their username)
Max accounts when authenticating with email matching
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
65
Maximum failed logins for user (default 5) - maximum number of failed attempts to
log in as specific user
Maximum failed logins for address (default 5) - maximum number of failed attempts
to log in from a specific IP address
Maximum failed logins period in seconds (default 60) - time period defined in
seconds for limiting the above two rules
GRID-wide maximum failed logins (default YES) - option to define whether above
login settings are defined on whole GRID network
System hashed password scheme (Select the scheme for storing passwords and
account settings for services that don't require reversible storing scheme)
Note:
Passwords on ISL Conference Proxy were stored as plain text. With ISL Conference
Proxy 4.1.0 new account and password resets use islhash1 scheme for encrpytion/
hashing of passwords. User accounts and settings are no longer stored in plain text.
Account created before updating to ISL Conference Proxy 4.1 will be still stored as
plain text, password change is needed for all old accounts.
You can select between following options:
islhash1 - selected by default, most secure amongst the available options. It uses
the following algorithm for encrypting passwords:
r ounds = 10000
s al t = r andom_by t es ( 16)
out put = r ounds + ' : ' + bas e64( s al t ) + ' : ' +
bas e64( PKCS5_PBKDF2_HMAC( pas s wor d, s al t , r ounds , s ha512) )
v er i f y = unbas e64( out put [ 2] ) == PKCS5_PBKDF2_HMAC( pas s wor d,
unbas e64( out put [ 1] ) , out put [ 0] , s ha512)
islstatic1 - Internal reversible password scheme - LESS SECURE
plain text - passwords are stored in plain text
System reversible password scheme (Select the scheme for storing passwords
and account settings for services that require reversible storing scheme)
You can select between following options:
islstatic1 - Internal reversible password scheme
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
66
plain text - passwords are stored in plain text
Login password scheme (Select scheme for hashing and storing login passwords)
You can select between following options:
islhash1 - selected by default, most secure amongst the available options.
islstatic1 - Internal reversible password scheme - LESS SECURE
plain text - passwords are stored in plain text
islhash1 salt size (Set the salt size in bytes, default value is 16)
islhash1 rounds (Set the number of rounds when hashing the passwords, default
value is 10 000)
Possible problems when using islhash1 (PBKDF2):
ISL Light Desk 3.2.1 or older cannot authenticate (3.2.2+ sends password correctly), if
the user account has password stored with PBKDF2 scheme, change scheme to
plain/reversible and set the password again
ISL AlwaysOn: light::web_session was committed in https://fisheye.islonline.com/
changelog/ISL?cs=14670, ISL AlwaysOn Connect 1.2.0 is required for normal
operation (uses web session id), 1.1.0 or older will ask for password and won't
connect automatically.
ISL Pronto: latest build of module (2.2.1beta48+) is required for normal operation,
otherwise ISL Light Desk will ask for password and won't connect automatically
Other important info:
Latest ISL Conference Proxy (4.0.3beta1+), will automatically start using islhash1
scheme for all new accounts or password resets. However, you must use ISL Pronto
module 2.2.1beta48+, otherwise ISLCP will keep default mode as plain text!
Latest ISL AlwaysOn module (2.2.3beta7+) is required, if you wish to support users
with ISL AlwaysOn Connect 1.1.0 or older and using reversible encryption for
passwords (islstatic1)
Require signature for Online update (Check validity of index.xml and
software_policy.xml downloaded from http://www.islonline.com/system/updates when
determining which updates are available. If this is disabled it is possible to trick ISL
Conference Proxy to download third party files, but ISL Conference Proxy will reject
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
67
them once they are downloaded as all update files are signed.)
Require signature for Manual update (Check validity of index.xml and
software_policy.xml stored localy when determining which updates are available
during a Manual upadte. If this is disabled it is possible to trick ISL Conference Proxy
to download third party files, but ISL Conference Proxy will reject them once they are
downloaded as all the update files are signed.)
External authenticator (use this option to specify an external authenticator for all
users, you can use existing Microsoft Active Directory, Novell eDirectory, OpenLDAP,
Radius or FreeRADIUS for user authentication)
External authenticator allows empty passwords (default value: no , added
support for preventing empty password being passed on to external authenticator)
External authenticator backend error reports
One time passwords (Set to allow one time passwords for login)
Authenticode tool
Use authenticode from license (Set whether code signing should be done from
license or from certificate file )
Use authenticode packed parameters (BASE64) (the input expects base64
encoded authenticode license key. This setting overrides other authenticode settings
including the setting defined in license)
Note:
Software downloaded from ISL Conference Proxy is by default now signed with two
different certificates (SHA-1 & SHA-2) to follow latest security standards and at the
same time enable backwards compatibility for systems that only support SHA-1
signatures. The options below are duplicated, first set of settings enable you to set up
your own SHA-2 certificate, and [compat] settings enable you to set up your own
SHA-1 certificate.
Authenticode enabled (Use this option to enable/disable authenticode - code
signing for all executables downloaded from the server)
Authenticode hash function (Select hash algorithm used by authenticode, you can
select between MD5, SHA1, SHA256 , SHA384 and SHA512. Default value:
Autodetect)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
68
Authenticode publisher certificate file (PKCS#7) (use this option to set the
certificate file - in DER PKCS#7 format)
Authenticode private key file (PEM) (use this option to set the private key file)
Authenticode private key passphrase (use this option to set the private key
passphrase in case you use an encrypted private key)
Authenticode enabled [compat] (Use this option to enable/disable authenticode code signing for all executables downloaded from the server)
Authenticode hash function [compat]
(Select hash algorithm used by
authenticode, you can select between MD5, SHA1, SHA256 , SHA384 and SHA512.
Default value: Autodetect)
Authenticode publisher certificate file [compat] (PKCS#7) (use this option to set
the certificate file - in DER PKCS#7 format)
Authenticode private key file [compat] (PEM) (use this option to set the private key
file)
Authenticode private key passphrase [compat] (use this option to set the private
key passphrase in case you use an encrypted private key)
2.5.3.4
Logs
The following settings are available in this menu (toggle to set which events should be
logged):
Log only critical evetns (use this option to enable/disable logging of critical events
only)
Always log mail sender events
Log debug content
Log debug transports (use this option to enable/disable logging of debug
transports)
Log XMLMSGS request/responses
Max log size in MB (use this option to limit the log file size)
Max number of log file (use this option to limit the number of log files)
Log quick statistics (interval in seconds)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
69
Log database queries
Max crash report age in seconds
Crash report name filter (<Regex>)
Record activity log
Counter settings (Set how the counter behaves and what it should notify, example
bellow:
#Comment s t ar t s wi t h ' #'
c har
#[ des t i nat i on c ount er name or emai l
name]
#Cr eat e c ount er t hat i s di f f er enc e of c ur r ent and pr ev i ous c ount er v al ue.
#t r end=c ount er _name
#Cr eat e c ount er t hat i s di f f er enc e of c ount es . You c an put mul t i pl e
c ount er s s epar at ed by c omma.
#di f f =c ount er 1, c ount er 2, c ount er 3
#Cr eat e c ount er t hat i s s um of c ount es . You c an put mul t i pl e c ount er s
s epar at ed by c omma.
#s um=c ount er 1, c ount er 2, c ount er 3
#
#Key not i f y _t ex t wi l l mak e emai l not i f i c at i on when c ount er get s t o c er t ai n
l i mi t . Not i f i c at i ons c hec k s ar e per f or med ev er y 10s . Li mi t mus t be mor e
t han 1.
#not i f y _t ex t =number of t r ans por t s s eems hi gh ( t r ans por t s =%1%)
#not i f y _l i mi t =1000
#Emai l wi l l not be s ent dur i ng s i l enc e per i od f r om s i nc e not i f i c at i on.
Si l enc e per i od i s i gnor ed i f undef i ned or 0. Thi s par amet er i s us ef ul f or
non- i nc r eas i ng c ount er s .
#not i f y _s i l ent =60
#When l i mi t i s r eac hed and not i f y of f s et i s enabl ed t he new l i mi t wi l l
of f s et by c ur r ent v al ue.
be
#not i f y _of f s et =t r ue
#I ns t ead of s i l ent per i od y ou c an s et hy s t er es i s . The emai l s wi l l not be
s ent unt i l t he v al ue dr ops bel ow c ur r ent l i mi t and hy s t er es i s v al ue.
#not i f y _hy s t er es i s =10
#Res et i nt er nal
s t at e ev er y not i f y _r es et s ec onds .
#not i f y _r es et =3600
[ WEBTOKEN: er r _pop]
not i f y _t ex t =we ar e get t i ng v al i d but s t r ange webt ok ens ( c ount =%1%)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
70
not i f y _l i mi t =1
not i f y _s i l ent =3600
not i f y _r es et =3600
[ WEBTOKEN: er r _c r y pt o]
not i f y _t ex t =we ar e get t i ng i nv al i d webt ok ens ( c ount =%1%)
not i f y _l i mi t =10
not i f y _s i l ent =3600
not i f y _r es et =3600
[ WEBTOKEN: er r _v er s i on]
not i f y _t ex t =we ar e get t i ng unk nown v er s i on ( c ount =%1%)
not i f y _l i mi t =1
not i f y _s i l ent =3600
not i f y _r es et =3600
2.5.3.5
ISL AlwaysOn
The following settings are available in this menu:
ISL AlwaysOn enabled (use this option to enable/disable ISL AlwaysOn)
ISL AlwaysOn valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL AlwaysOn valid before (use a time stamp value in the following form: YYYY-MMDD HH:MM:SS)
Use ISL AlwaysOn username for ISL Light Desk
ISL Light Desk username (use this option to set the desired username that will be
used for ISL Light Desk for this user)
ISL Light Desk password (use this option to set the password for the username
defined in the previous option)
ISL AlwaysOn start options (allows you to customize the way ISL AlwaysOn starts a
session)
Use grouping functionality (use this option to enable/disable the sharing of
computers in the list between other users in the domain)
User (as guest) can share connection with owner in same domain (specify
whether users can share computers with same domain users)
User (as guest) can share connection with owner on same server (specify
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
71
whether users can share computers with same server users)
Maximum time span in session search (days) (use this option to limit the
maximum time span for search)
User can use actions functionality (specify whether users are granted access to
the actions area in the ISL AlwaysOn computers list)
User can use files functionality (specify whether users are granted access to the
files shared for the computers in the ISL AlwaysOn list)
Special grant access cmd line (grant access to users by specifying a specific cmd
line)
Which version of ISL AlwaysOn web interface to show (Select whether a newer
version of ISL AlwaysOn web interface is displayed, older version is shown by default,
to enable new version of the interface uncheck this option and set the value to 0, to
enable the old one, check this option again or uncheck it and set the value to 1)
Which version of ISL AlwaysOn web interface to show (allow users to access a
certain version of ISL AlwaysOn web interface)
Allow public file shares (specify whether the file shared for the computers are can
be viewed publicly)
Return websid when user is querried in XMLMSG (bugfix)
Use sets functionality (experimantal) (this is an internal parameter and should not
be changed)
Automatically update database (this is an internal parameter and it should not be
changed)
Automatically upgrade computers to latest version of a program (Upgrades
users to the latest version of ISL AlwaysOn)
Enable push install on computer side (use this option to enable push install)
Protect configuration on computer side (reconnect required) (use this option to
turn on configuration protection)
Allow computer to go into sleep mode (reconnect required) (specify whether the
computer can be sent into sleep mode)
Hide WakeOnLan functionality (reconnect required) (specify whether the
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
72
WakeOnLan feature is disabled or not)
Allow connect to existing computer session (specify whether user can connect
into existing ISL AlwaysOn session)
Remove granted connections on server during ISL AlwaysOn program
uninstall (reconnect required) (specify whether the ISL AlwaysOn computers for
users are removed after an uninstall)
Use only downloaded clients (reconect required) (When this option is set,
connecting to an AlwaysOn computer will always force the download of ISL Light Client
on remote side instead of using embedded ISL Light Fast.)
Mail template for session start (allows you to customize the mail template when the
session starts)
Mail template for session end (allows you to customize the mail template for when
the session ends)
Mail template for file access (allows you to customize the mail template for when you
send files once session is established)
Mail template for grant access invitation (allows you to customize the mail
template shown when you grant a user an remote desktop invitation)
Mail template for file access invitation (allows you to customize the mail template
shown when you send a user a file sharing invitation)
ISL AlwaysOn custom options (Quickstart&Overview) (allows you to specify what
options/messages users see in the Quickstart and Overview panel)
Send email when db location missmatch occurs
Clear error after db location missmatch occurs (seconds)
Set computer location in database
2.5.3.6
ISL Groop
The following settings are available in this menu:
ISL Groop enabled (use this option to enable/disable ISL Groop)
ISL Groop valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
73
ISL Groop valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Enable session HTTP Events (use this option to enable/disable session HTTP
events)
Enable user HTTP Events (use this option to enable/disable user HTTP events)
Periodically dump session status to log (Log session status after a time interval)
Sender address for email invitations (use this option to specify the sender address
for e-mail invitations)
The footer for ISL Groop email messages (use this option to modify the footer of
ISL Groop e-mail messages)
User can change personal image (specify whether users can change personal
images)
User has sent invitations email history (enable/disable email history for sent
invitations)
Which version of ISL Groop web interface to show (Set which version of ISL
Groop to be shown)
Enable AutoTransportUDP communication (experimental)
Maximum size of file uploaded to file box (in MB) (Set maximum upload size)
URL used for session join link
2.5.3.7
ISL Light
The following settings are available in this menu:
ISL Light enabled (use this option to enable/disable ISL Light)
ISL Light valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL Light valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
If ISL Light Desk is trying to obtain a code outside of the limits specified above or if a
session is active and the time limit is reached, an error message is shown.
Time limit (seconds) (use this option to specify the longest possible duration of an
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
74
ISL Light session - when it is reached, ISL Conference Proxy terminates the session
and a message "The connection was closed by the Proxy" appears in the ISL Light
Desk, while ISL Light Client receives no message)
Allow termination of sessions from desk (enable this option to enable ISL Light
versions prior to 3.1.1 to terminate a random session when concurrent limit has been
reached)
Show user information (change this setting if you wish to omit some fields when
showing session info)
Send network interface list (enable this option to send a list of network interfaces
upon connect)
Send chat transcripts after the session (set this option to Yes if you want chat
contents to be saved in the session history)
Global message file (use this option to specify a file that contains a global definition
of messages - it will be applied to all ISL Conference Proxy users and cannot be overridden in lower
level settings, e.g. domains or users)
Message (use this option for specifying an inline definition of messages)
Message file (use this option to specify a file that contains a definition of messages)
Desk dialog (use this option for specifying an inline definition of ISL Light Desk's endof-session dialog - it must be a single line)
Desk dialog file (use this option for specifying a file that contains a definition of ISL
Light Desk's end-of-session dialog)
Desk runtime dialog packets ()
Client dialog (use this option for specifying an inline definition of ISL Light Client's
end-of-session dialog - it must be a single line)
Client dialog file (use this option for specifying a file that contains a definition of ISL
Light Client's end-of-session dialog)
Important: Only an end-of-session dialog can be specified using these four dialog
options. To use other types of session dialogs, you need to create a customization.
Please refer to the ISL Light manual for more information on using session dialogs.
Client runtime dialog packets ()
Desk code request IP filter (Use this option to limit code generation based on the IP
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
75
and/or MAC address)
Desk user to Client IP filter ()
Program version filter (Use thi option to limit usage based on program version)
Generate short codes (use this option to enable the generation of short(er) session
codes)
Maximum new sessions per IP in 10 seconds (allows you to specify the number of
new sessions made per IP address every 10 seconds)
WebAPI poll minimum interval in ms (define the minimum interval in (ms) for the
WebAPI poll)
WebAPI poll maximum interval in ms (define the maximum interval in (ms) for the
WebAPI poll)
WebAPI poll CPU load exponent in ms (define the CPU load exponent in (ms) for
the WebAPI poll)
Custom join page link (use this option to specify a custom join page link that will be
used within instructions on user web pages)
RPC port for ISL Light 2 (this setting is provided for backward compatibility - use it
to set the port that is used by ISL Light version 2)
Enable search on user web pages (use this option to enable the user to search on
user web pages)
Save transfer information interval ()
Save transfer information full flush
Automatically update database (this is an internal parameter and it should not be
changed)
Use TCP no delay (this setting controls TCP packet batching - if set to Yes, the
batching is enabled; if set to No, it is disabled)
Dump all relayed packets (this is an internal parameter and it should not be
changed)
Use text code notify (Enable 5s delay when entering the session code on the server
that hasn't yet synced the entered session code. In this time the sync will be performed
and you will be able to join session if the session code is correct. This option is enable
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
76
if you have a private cloud consisting of more than one server)
Mail template for session code (change the default template for session code
email)
Mail template for session end notification (change the default template for the end
of session notification box that appears when you end an ISL Light connection)
Mail template for session transfer (change the default template for session transfer
email, when inviting another supporter to take over)
Which version of ISL Light web interface to show
Stop session if features are unknown (Decide if the session should be stopped if
older client connect, which does not support all the features)
2.5.3.8
ISL Pronto
The following settings are available in this menu:
ISL Pronto enabled (use this option to enable/disable ISL Pronto)
ISL Pronto valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL Pronto valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Public global concurrent request limit ()
Public domain concurrent request limit ()
Stop compressing responses when CPU reaches % (Stop compressing responses, to
save bandwidth, once the CPU reaches a certain load)
Obtain domain after web requests in 10s ()
Chat window title (use this option to set the chat window title)
Link to template chat images (use this option to specify the location of the required
images for ISL Pronto)
Link to logo image (use this option to specify the location of the logo image for ISL
Pronto)
Chat background (use this option to set the chat window's background color)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
77
Open link when client closes chat (use this option to open a link at the client side
after closing the chat)
Open link for leave a message (use this option to open a link at the client side if
there are no available supporters, e.g. a leave a message form)
Leave a message transcript e-mail (use this option to specify an email address for
receiving email notifications whenever a user submits a leave a message form)
Chat finished transcript e-mail (use this option to specify an email address for
receiving a chat transcript as soon as a chat is finished)
Limit referer regex (e.g. https?://({^/}+\.)?example\.com(/.*)?) (it is possible to use
this setting to provide a regex for locations which should be allowed to start a chat,
e.g. your website - everyone else will get an error 403 [forbidden])
Show ISL Light chat messages (use this option to enable/disable automatic
sending of ISL Light messages to live chat as comments)
User can change link to photo (use this option to specify whether users can change
the link to the photo)
See client's text as they type (use this option to specify if users can see what a
client is typing before actually sending it)
See supporter's text as they type (use this option to specify if users can see what a
supporter is typing before actually sending it)
View other supporter's public chats (use this option to specify if users can see
other supporter's public chats)
View other supporter's private chats (use this option to specify if users can see
other supporter's private chats)
Delete chat content (use this option to specify if users can delete chat content)
Close client chats (use this option to specify if users can close client chats)
Edit canned responses (allow users to edit the canned responses)
Reports custom field list (add custom report fields by id, each id separated by
comma will create a new custom field in pronto report module e.g. f i el d1, f i el d2,
f 3)
Reports custom field titles (Assign titles to custom report fields, by default the title
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
78
for custom field will be its id, you can change that by by assigning titles to ids
separated by & sign e.g. f i el d1=Fi r s t Cus t om Fi el d&f i el d2=Sec ond Fi el d )
Show e-mail to clients (allow users to see the email address of the supporter during
chat)
Start sound effects after (in seconds) (use this option to set the delayed start of
chat notification sound effects)
Disable sound effects after (in seconds) (use this option to set the delay when to
stop chat notification sound effects)
Scheduled hours (like 1-4=09:00-15:00;5=09:00-13:00) (use this option to set
scheduled hours per day or per a group of days)
Close chat automatically when client leaves (enable this to close the chat when
client leaves the chat session)
Close chat automatically when only the user is left (enable this to close the chat
when client leaves the chat session and a supporter is the only one left in the chat)
End chat automatically when operator closes chat
Show clients not matching the supporter's (Set whether ISL Pronto clients
(operator programs) should show all chats in Clients widget or just the chats matching
filters they are members of )
Delete chat automatically when client leaves (Set whether the chat is deleted
once the client leaves)
Chat info link (specify the desired link here)
Open chat info when chat with client is closed (enable this to open the link
specified above when the supporter closes the chat with a client)
Custom client info columns (tag1:title1;tag2:title2) (use this option to specify
additional client info columns - tag1:title1, tag2:title2 etc.)
Custom client info data file ( Users can add JSON file with description of modifiable
fileds and their values and type in Configuration -> ISL Pronto)
Hide URL field (enable this to hide URL in client data, both in current chat sessions
and in the chat history)
Notify user, when client sees no available supporters (enable this to show a
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
79
notification window if a supporter is a member of a certain filter and a client requests a
supporter from another filter, but there are currently no supporters for that filter
available)
Do not change to busy status when running ISL Light
ISL Light Desk custom parameters (use this option to specify custom parameters
for ISL Light Desk that can be started within ISL Pronto)
ISL Light Desk command line (use this option to specify the command line for ISL
Light Desk that can be started within ISL Pronto)
ISL Light Desk username (use this option to specify the username for ISL Light
Desk that can be started within ISL Pronto)
ISL Light Desk password (use this option to specify the password for ISL Light
Desk that can be started within ISL Pronto)
ISL Light Client custom parameters (use this option to specify custom parameters
for ISL Light Client that can be started through a link within ISL Pronto)
ISL Light Client command line (use this option to specify the command line for ISL
Light Client that can be started through a link within ISL Pronto)
Report status with HTTP events (use this option to enable/disable supporters'
status reporting through HTTP events)
Status HTTP event interval in seconds (use this option to set the desired status
reporting interval)
Report javascript errors in log (use this option to enable/disable the reporting of
javascript errors)
Report received messages in log (use this option to enable/disable the reporting of
received messages)
External command for processing chat lines (Enable external translation engine )
External chat message parameters
External chat message timeout (in ms) (Timeout for waiting on response from
external script)
Limit external chat message commands (Set which which of the following events:
c hat _c r eat e, c hat _i ni t , c hat _end, f i l t er should be sent to external scripts for
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
80
further processing.)
Restart external command after requests (Set the number of request before
external script is killed. 0 - killing is off)
Maximum number of chats (Set maximum amount of ongoing chats)
Maximum chat query range (in days)
Treat chats inactive after seconds of inactivity (Set interval (in seconds) after
which the chat will be treated as inactive)
Open chat with client automatically (If this setting is enabled, all chats will be
automatically assigned based on client assignment scheme)
Force open chat with client automatically (works with auto open)
Client assignment scheme (Set how the client chats are assigned: Ring All operator will be selected randomly, Least busy - least busy operator will be selected,
based on number of chats and last client chat time)
Assignment override when no operator available
Enable proactive chat (Enable the operator to see additional information about
online visitor once he/she is selected. By clicking on the visitor the supporter can invite
him directly to the chat)
2.5.3.9
Locale
Map IP to timezone (default: class_intranet = server)
2.5.3.10 System monitor
Enable GRID port checker: (enable/disable port checker for GRID)
GRID port checker run every (in seconds) (Set the interval for running port checker,
default is 900s = 15 min)
GRID port checker total timeout (in seconds)
GRID port checker try next server (in seconds)
GRID port checker connection timeout (in seconds) (Time after which the connection
will be recognized as inactive)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
81
2.5.3.11 Advanced
Advanced menu includes the following entries:
Customize
Integration
Programs
Plugins
File storage
Raw data
2.5.3.11.1 Customize
This menu entry includes a button Create new customization and a list of existing
customizations (if any) with the following columns:
Name (name that was assigned to this customization)
Default for domains (indicates whether this customization is set as a default
customization for one or more domains)
Default for users (indicates whether this customization is set as a default
customization for one or more users)
When you click Create new customization or you click on an existing customization's
name, you are presented with a new page.
The amount of options depends on versions of programs that are installed on your
ISL Conference Proxy. Your list of options may differ from the list in this manual. Use this
list as a general reference and refer to the right column (Applies to) to see which
programs are affected by which setting.
The following options are available, once you click the Create new customization
button, or when you decide to edit an existing customization:
Show expert settings (if you select this checkbox, you are presented with more
settings - see below for a list of expert settings)
Customization name (allows you to change a name that was assigned to this
customization - a random string is a starting value for a new customization)
Use customization by default (allows you to enable/disable the customization by
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
82
default)
Desk dialog INI file (specify a file for session dialogs that applies to ISL Light Desk)
Client dialog INI file (specify a file for session dialogs that applies to ISL Light Client)
Desk custom command line (allows you to set a custom command line for when
running ISL Light Desk. To see a list of customization options click here.)
Client custom command line (use this setting to add your own custom command
line strings. For more information on how to create command line please click here)
Logo image (BMP 80x80) (use this setting to upload a logo image that will be shown
in ISL Light)
Icon for ISL Light (use this setting to upload a icon image that will be shown as ISL
Light icon)
ISL Light Mac DMG Background image (use this setting to upload a background
image)
ISL Light Mac DMG DS_Store file
ISL Light Mac DMG Volume icon (use this setting to upload volume icon)
Icon for executable (PNG) (allows you to set an icon for an executable, e.g. ISL
AlwaysOn Connect)
Icon for ISL Pronto
Icon for ISL Pronto (large PNG)
ISL Groop customizations (allows you to add your own ISL Groop customizations
for more information on customizations please click here)
ISL Groop program Icon (PNG)
Icon for ISL Light Client
Icon for ISL Light Desk
Chat window title (Set custom title for chat window)
Link to template chat images
Link to logo image
Chat background (allows you to customize the layout of the chat background by
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
83
adding a color name or HEX code )
Open link when client closes chat (Open link on client side, once the chat closes)
Open link for leave a message
Leave a message transcript e-mail
Chat finished transcript e-mail
Custom messages
There might be some seemingly duplicate entries - e.g. Client dialog INI file option
listed twice, but it applies to different versions of ISL Light. Please refer to the right
column (Applies to) to see which versions of programs are affected by which setting.
Such entries are shown only once in the list above.
Enable push install on computer side (this setting allows you to specify if the
installation of ISL AlwaysOn can be pushed to the computer side. The setting is set to
Enabled by default)
Protect configuration on computer side (allows the computer side to be protected
against supporter from changing computer configuration. The setting is set to
Disabled by default)
Icon for ISL Light Client (PNG) (allows you to upload your own company logo in the
ISL Light Client GUI)
Icon for ISL Light Desk (PNG) (allows you to upload your own company logo in the
ISL Light Desk GUI)
Enable automatic updates (allows you to set the option for all supporters to get hold
of automatic updates when new versions of ISL Pronto are released. The default
setting is set to disabled. Untick the button to set to enabled)
Dialog INI file (specify a file with session dialogs)
Chat window title (allows you to change the default chat window title for ISL Pronto)
Link to template chat images (allows you to show the link to the images shown in
ISL Pronto chat)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
84
Link to logo image (allows you to share the link for the company logo when chatting
on ISL Pronto)
Chat background (allows you to customize the layout of the chat background by
adding a color name or HEX code )
Open link when client closes chat (allows you to type in a link that when a chat is
closed opens on the client side)
Custom messages (click the Click here... button to design your own custom
messages. Here you can define the detail of the messages that are shown for both the
supporter and client when using ISL Pronto. Once you are happy with the changes you
have made click Save at the bottom to confirm changes have been made)
If you check Show expert settings, you are presented with the following additional
settings (default values are set to use system settings):
Extra query parameters (allows you to specify a new title of the program. Eg:
Changebase=Support.exe will change the name given for the program to Support.exe)
Extra query parameters for ISL AlwaysOn
Extra query parameters for ISL AlwaysOn Connect
Extra query parameters for ISL Groop
Extra query parameters for ISL Light
Extra query parameters for ISL Light Client
Extra query parameters for ISL Light Desk
Extra query parameters for ISL Network Start
Extra query parameters for ISL Player
Extra query parameters for ISL Pronto
Extra query parameters for ISL Tester
Extra query parameters for ISL WebStart
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
85
Custom qml gui (ZIP)
Command line (use this setting to specify command line parameters)
Branch parameters (use this setting to specify one or more branches)
Server installation name (use this option to specify the server installation name)
Server installation ID (use this option to specify the server installation ID)
Customization (allows you to customize ISL Light Desk and Client connections)
Service address [ISL Light] (specify an address that is used for connection)
Additional addresses [ISL Light] (specify additional addresses)
tcp_ports
Connection port (specify the connection port)
Use HTTP (port 80) (specify whether to use the HTTP port for connection or not)
Use HTTPS (port 443) (specify whether to use the HTTPS port for connection or not)
Substitute ISL Light translation
translations)
(allows you to specify custom ISL Light
public_link
Custom texts (Quickstart and Overview) (allows you to customize the text for
Quickstart and Overview panels in ISL AlwaysOn)
Substitute ISL Pronto texts
ISL Pronto installer application name
ISL Pronto Windows installer default path
Customization (allows you to customize ISL Pronto connections)
Monitor process time ratio (allows you to specify a process time ratio for ISL
Pronto)
ISL Light Client command line parameters (newer ISL Light versions allow you to
specify separate ISL Light Client command line parameters)
ISL Light Desk command line parameters (newer ISL Light versions allow you to
specify separate ISL Light Desk command line parameters)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
86
ISL Groop Custom Images
ISL Recording Player command line parameters (Recording player allows you to
specify command line parameters)
Substitute ISL Recording Player translation (allows you to specify custom ISL
Recording Player translations)
Send crash dumps
Custom Client runtime dialogs (ZIP) (allows you to upload your own runtime dialog
customizations)
Custom skin package (ZIP) (allows you to upload your own customized skin
packages to change the layout of the ISL Light GUI)
Make log file on desktop (specify whether Network Start should make a log file on
desktop or not)
Custom Desk runtime dialogs (ZIP) (allows you to upload your own runtime dialog
customizations)
Force transport (force a certain transport type)
MTU (in bytes) (allows you to set the maximum transmission unit for the Connection
tester. Default is set to 0)
Repeat count (allows you to specify the number of times the connection tester runs
the test. Default is set to 1)
Transfer bytes (specify number of bytes that should be transferred with Connection
tester)
Run connection tester in system local account (allows you to run the connection
tester in local system accounts)
Window title (allows you to enter the name of the window title for ISL Network Start)
Internet Explorer plugin trusted domains (allows you to specify either default
system settings or customize the ISL Tools/Webstart plugin for trusted domains)
Internet Explorer plugin trusted IPs (allows you to specify either the default system
settings or customize the trusted IP addresses for ISL Tools/Webstart)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
87
There might be some seemingly duplicate entries (e.g. Use HTTP (port 80),
service address,...) listed a few times, but it applies to different programs or different
program versions. Please refer to the right column (Applies to) to see which versions of
programs are affected by which setting. Duplicate entries are not listed above.
When you are done with changing settings, you can save this customization by pressing
the Save button at the bottom.
If you want to delete the customization, check the checkbox next to the Delete
customization button, then click the Delete customization button.
2.5.3.11.2 Performance
This menu entry includes the following options:
Enable process watchdog (Enable watchdog service process, that ensures that
process is always running)
File cache limit file count (use this setting to set the cache limit by number of files)
Hhash cache limit file count
PostgreSQL VFS cache limit in MB
Packet generator file cache limit (Limit the amount of cached files created by
package generator)
Packet generator volatile marker cache limit
Packet generator cache time limit in seconds
Oldest packet generator task record in seconds
Keep maximum packet generator task records
Packet generator report max execution time in seconds (Receive notification
when creation process of an executable program exceeds set time).
Packet generator internal error max execution time in seconds (Warning that
creation process has exceeded the set time)
Automatic database rebuild (default value: yes, set whether server should just stop
or go into automatic rebuild of tables)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
88
2.5.3.11.3 Web Server
This menu entry includes the following options:
Enable WEBAPI2
Crypto webtokens version
Websession timeout
Online update timeout
Default Page Location ... (use this setting to determine the location of the web page.
/join is set by default.)
Web cache (<PathRegex><CacheControl>)
Web server URL cache (in MB)
Web server page cache (in MB)
Max web hit memory log (in MB)
Max web session per IP in 10 seconds: (use this setting to determine the number
of web sessions within a 10 second period per IP address)
Max web session penalty in seconds: (use this setting to determine the number of
seconds it takes for the server to allow connections after a penalty has been made)
Report web server internal errors: (use this setting to report any internal errors with
the web server)
Web server internal error l.b. penalty
File server directory
Comet request timeout in ms: (use this setting to set the number of milliseconds it
takes for a request to timeout)
Comet ping timeout in ms: (use this setting to set the ping timeout in milliseconds)
Comet poll interval in ms: (use this setting to set the interval measured in
milliseconds it takes to display polls)
Comet hold time in ms: (use this setting to set the hold time in milliseconds)
Comet minimal switch time in ms: (use this setting to set the minimal number of
milliseconds it takes for the web server to switch)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
89
Enable GRID reverse proxy web exports
GRID reverse proxy timeout in seconds (Set the timeout for reverse proxy in
GRID)
GRID reverse proxy load balance interval in seconds
GRID server2server connection expiry in seconds
Allow IP addresses for frontends
Enable HTTP frontend
HTTP frontend port
HTTP frontend port (secure)
Use X-Forwarded-For in HTTP frontend
Use X-Forwarded-Host in HTTP frontend
Enable FastCGI frontend (Enable support for HTTP/FastCGI on ISL Conference
Proxy. This feature can be used if Apache web proxy is used for proxying traffic for ISL
Conference Proxy)
FastCGI frontend port (Set the port the FastCGI will use)
FastCGI frontend port (secure) (Set the secure port the FastCGI will use)
Forgot password UI version
Google Re-Captcha secret: (Input for the defined secret to validate Google ReCaptcha - Response validated with external/google/recaptcha/validate/1 webapi2 call)
2.5.3.11.4 Integration
This menu entry includes the following options:
Per-domain HTTP events (Use this option to enable or disable per-domain HTTP
events - this allows you to execute different scripts for different domains.)
Per-domain HTTP events strict error checking (Use this option to enable or
disable per-domain strict error checking for HTTP events.)
Global HTTP events (Use this option to enable or disable global HTTP events.)
Global HTTP events server (Specify the server address where the script that
handles global HTTP events resides, e.g. localhost:8080)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
90
Global HTTP events path (Specify the path to the script that handles global HTTP
events, e.g. /isl-cp-example-events-to-sql.aspx )
Global HTTP events strict error checking (Use this option to enable or disable
strict error checking for global HTTP events)
Save HTTP events into session objects
External WebAPI locator URL
External WebAPI call timeout in seconds
Use external WebAPI for sign up
Use external WebAPI for forgotten password
For more information on integration, please refer to the Integration chapter.
2.5.3.11.5 Programs
This menu entry includes the following options:
Allow program ... (use this setting to enable or disable a certain program)
Use branches for ... (use this setting to set branch preferences for a certain
program)
Order index for ... (Use this option to define the program download order - default
value is 0. Program with the highest order index has the highest priority and it will be
downloaded instead of the latest version. If all program order indexes are the same,
the latest version among them is used.)
2.5.3.11.6 Plugins
This menu entry includes the following options:
Allow plugin ... (use this setting to enable or disable a certain plugin)
Download plugin ... (if set to Yes, a certain plugin is loaded immediately, if set to
No, it is loaded on demand)
Use branches for ... (use this setting to set branch preferences for a certain plugin)
Order index for ... (Use this option to define the plugin download order - default value
is 0. Plugin with the highest order index has the highest priority and it will be
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
91
downloaded instead of the latest version. If all plugin order indexes are the same, the
latest version among them is used.)
2.5.3.11.7 Action
This menu entry includes the following options:
Allow action ... (use this setting to enable or disable a certain action)
Use branches for ... (use this setting to set branch preferences for a certain action)
Order index for ... (Use this option to define the action execution order - default value
is 0. Action with the highest order index has the highest priority and it will be executed
instead of the latest version. If all action order indexes are the same, the latest version
among them is used.)
2.5.3.11.8 GUI Features
In GUI Features you can toggle following options regarding ISL Light (light_v1 and light_v2):
Enable clipboard for view and stream
Allow desktop streaming
Allow control on desktop stream
Allow desktop viewing
Allow control on desktop view
Allow file receiving
Allow file sending
2.5.3.11.9 Security
This menu entry includes the following options:
Software Signatures
Client to server connections
Client to client connections
Each setting allows you to specify the software security preferences. You can chose
between medium and high security and specify the generated RSA key and DH
parameter bits.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
92
Important: Generating your own custom crypto keys on this page will require you to
create a
backup of "C:\Program Files (x86)\ISL Conference Proxy\objects
\advsec_key_*" Downloaded programs will require crypto keys to match and will
otherwise refuse connections if keys are missing in ISL Conference Proxy. If you have
existing machines with old keys, you will need to remove them from registry - remove the
appropriate entry for your server from HKEY_LOCAL_MACHI NE\ SOFTWARE\ WOW6432Node\ I SL
Onl i ne\ Gr i d and/or HKEY_CURRENT_USER\ SOFTWARE\ I SL Onl i ne\ Gr i d , then download a
new program and run it.
2.5.3.11.10 Bulk Files
This section is where you would upload the files you would need to use on your server. You can store any type
of file and any size. Click on "Chose Files" to upload a specified file.
The following columns are available for each file.
Select (allows you to select the file by checking the tick box)
Created by module (shows the name of the module the file is created by)
Parent object (shows the server it is located on)
File (shows the name of the file)
Download (allows you to download the file)
Size (shows the size of the file uploaded)
On srv. -1 (shows whether the file is shown on the server or not)
2.5.3.11.11 File storage
This menu entry includes the following tabs that represent different regions:
Public (this region can be used as a file storage - a list of files in this region is
accessible to everyone at the following address: http://localhost:7615/files, access to a
certain file in this region is possible through a direct link, e.g. if you upload a file called
My Publ i c Fi l e. t x t , it is accessible at http://localhost:7615/files/MyPublicFile.txt)
Private (these files are used internally when you have servers connected in GRID)
Programs (this is a list of installed programs)
Plugins (this is a list of installed plugins)
Translations (this is a list of installed translation files)
Modules (this is a list of installed ISL Conference Proxy modules)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
93
Upgrade (this is a list of pending ISL Conference Proxy upgrades - when you perform
an online update, updates get copied here)
Warning: If you remove modules / programs / plugins from the list, certain programs
or ISL Conference Proxy components may stop operating properly. Vast majority of
users do not need to use the Private, Programs, Translations, Modules and
Upgrade file storage options and should perform updating procedures through the
Online update option - please refer to this topic for more information.
All region files are stored within the directory where ISL Conference Proxy is
installed.
Based on the selected tab, you see a list of files that are present on your ISL
Conference Proxy (e.g. if you click on the Programs tab, you see a list of programs).
To upload a file, use the interface above the list - click Choose, select the desired file,
then click Upload to upload the file.
To delete one or more files, check the appropriate checkboxes left of the file names and
click Delete selected at the bottom.
Warning: Selected files are deleted immediately, there is no additional confirmation
after you press the Delete selected button!
2.5.3.11.12 Raw data
This menu entry includes a low-level interface for creating a new key, modifying an
existing key value or deleting an existing key.
Warning: Please use this menu entry only when instructed to do so by our technical
support team. In such situations, you will receive detailed step-by-step instructions.
Please use other menus for configuring your ISL Conference Proxy.
2.5.3.12 PostgreSQL
Settings regarding PostgreSQL database backend, provided in this module. This settings become available
once you install PostgreSQL module via Online or Manual update.
2.5.3.12.1 Installation
Under installation settings you can view information about PostgreSQL status, version,
etc. with few additional options as seen below:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
94
Beside Execute options available, you can also view and modify parameters displayed
under Configuration tab.
checkpoint_segments: Maximum number of log file segments between automatic
WAL(Write-Ahead Log) checkpoints (each segment is normally 16 megabytes). The
default is three segments. Increasing this parameter can increase the amount of time
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
95
needed for crash recovery. This parameter can only be set in the postgresql.conf file
or on the server command line.
default_text_search_config: Specifies the name of the default configuration, which is
the one used by text search functions if an explicit configuration parameter is omitted
lc_messages: Language of messages
lc_monetary: Formatting of currency amounts
lc_numeric: Formatting of numbers
lc_time: Formatting of dates and times
listen_addresses: Specifies the TCP/IP address(es) on which the server is to listen for
connections from client applications.
log_destination: PostgreSQL supports several methods for logging server messages,
including stderr, csvlog and syslog. On Windows, eventlog is also supported. Set this
parameter to a list of desired log destinations separated by commas. The default is to
log to stderr. If csvlog is included in log_destination, log entries are output in "comma
separated value" (CSV) format.
log_line_prefix: This is a printf-style string that is output at the beginning of each log
line. % characters begin "escape sequences" that are replaced with status information
as outlined below. Unrecognized escapes are ignored. Other characters are copied
straight to the log line. %t prints out timestamp at the begining of each line¸, %m prints
timestamp with miliseconds, %u prints username,...
log_min_duration_statement: Causes the duration of each completed statement to be
logged if the statement ran for at least the specified number of milliseconds. Setting
this to zero prints all statement durations. Minus-one (the default) disables logging
statement durations.
log_rotation_size: When logging_collector is enabled, this parameter determines the
maximum size of an individual log file. After this many kilobytes have been emitted into
a log file, a new log file will be created. Set to zero to disable size-based creation of
new log files. This parameter can only be set in the postgresql.conf file or on the server
command line.
logging_collector: This parameter enables the logging collector, which is a
background process that captures log messages sent to stderr and redirects them
into log files.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
96
2.5.3.12.2 Tables
Gives you the overview of PostgreSQL tables and information about them.
2.5.3.12.3 Indexes
Gives you the overview of PostgreSQL indexes available and information about them.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
97
2.5.3.12.4 Bloat
View and monitor index bloat in real time.
2.5.3.12.5 Settings
The following settings are available under Settings tab for PostgreSQL:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
98
Maximum number of log files (Default value: 10000, set maximum number of log
files that can be created)
Maximum total log size in MB (Default value: 100, set the maximum size the log files
can take up)
2.5.3.13 GRID
GRID menu includes the following entries:
Create
Connect
Load balancing
Settings
Synchronization
2.5.3.13.1 Create
The following options are available on this page:
Unique server ID (use this to assign a server ID to this server when creating a new
GRID)
Server public address (set this server's public address that will be used to create a
new GRID)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
99
New server ID (use this option to assign a server ID that will be used when creating a
GRID connection file)
New server public address (use this option to set a public server address that will
be used when creating a GRID connection file)
New server license file (use this option to set an appropriate license file that will be
used when creating a GRID connection file)
GRID unique identifier (use this option if you are restoring an existing GRID setup)
2.5.3.13.2 Connect
The following option is available on this page:
GRID connection file (use this option to upload a created GRID connection file)
2.5.3.13.3 Load balancing
This menu entry allows you to change the load balancing settings.
Various load factor, load power and boost options can be used to control load
balancing - you can perform a test run using the interface at the bottom of the Service
settings page.
The following tabs are available on this page:
Overview
Service settings
Geolocation
Global IP boost
Country boost
Overview
You are presented with a list of services and their status, with a column for each of the
servers that are connected to your GRID.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
100
Service settings
You can choose the Service type from the list at the top and then you can change the
following options for the selected service type:
Service is available (enable or disable currently selected service type for the whole
GRID or for a specific server through local override)
Custom DNS name mappings (use this option to assign custom DNS mappings)
CPU load factor ()
CPU load power ()
Custom user load factor ()
Static boost ()
Distance (km) penalty factor ()
Disconnects penalty factor ()
Same country static boost ()
IP boost on server -1 ()
Country boost on server -1 ()
You can then perform a test run using the interface at the bottom - enter the IP address
and click Run to start it.
Geolocation
You can set the following options:
Reconnect client when moves at least (in km) ()
Reconnect client when in different country ()
Manual geolocation on server -1 ()
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
101
Global IP boost
You are presented with short instructions and an option to change global IP boost.
Country boost
You are presented with short instructions and an option to change global country boost.
2.5.3.13.4 Settings
The following options are available:
GRID enabled on server ... (use this option to enable or disable GRID for a specific
server)
GRID IP address on server ... (use this option to set the IP address for a specific
server)
GRID port (use this option to set the GRID port - default value is 7616)
GRID SSL certificate (use this option to specify the GRID SSL certificate)
GRID SSL certificate subject (use this option to specify the GRID SSL certificate
subject)
GRID SSL certificate validity (days) (use this option to specify the GRID SSL
certificate validity)
GRID SSL key (use this option to specify the GRID SSL key)
GRID SSL key bits (use this option to specify the GRID SSL key size)
GRID connect timeout (secs) (use this option to set the GRID connect timeout)
GRID alive timeout (secs) (use this option to set the GRID alive timeout)
GRID MTU limit (bytes) (use this option to set the GRID MTU limit)
GRID debugging bandwidth stats (use this option to enable or disable GRID
debugging bandwidth stats)
GRID debugging bandwidth stats interval (secs) (use this option to set the interval
for GRID debugging bandwidth stats)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
102
GRID messages log (use this option to enable/disable the GRID messages log)
2.5.3.13.5 Synchronization
The following options are available:
GRID automatic synchronization (use this option to enable or disable automatic
GRID synchronization)
Full speed synchronization (use this option to enable or disable the full speed
synchronization)
Limit synchronization to servers (use this option if you wish to limit the
synchronization to certain servers only)
2.5.3.14 Storage
Storage menu includes the following entries:
Areas
2.5.3.14.1 Areas
Storage areas
Create new storage area (press to create a new storage area)
Name (user defined name of storage area)
Server (server where storage area is located)
Type (type of storage)
Description (defined path of storage area)
Status (shows whether storage area is active)
Actions (browse files in storage area)
Edit storage area
Name (user defined name of storage area)
Server (user selected server number for location of storage area)
Type (type of storage)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
103
Path (user defined path to storage area on server. E.g storage://isllight/recordings)
Save
Remove storage area (check box and press button to delete the storage area)
2.5.3.15 DNS server
DNS server menu includes the following entries:
Zones
Settings
2.5.3.15.1 Zones
This menu entry includes a list of existing DNS zones (if any) and a button Create new
zone.
When you click Create new zone or you click on an existing DNS zone, you are
presented with a new page.
Many settings that are available here are too advanced to be covered in this manual those settings do not include a description. If you do not know what a certain setting
does, it is best to leave it at its default value. Please refer to DNS documentation (e.g.
browse RFC - http://tools.ietf.org/rfc/) for more information and/or contact your network
administrator.
Basic
Enable zone (use this option to enable or disable this DNS zone)
Domains (use this option to set the domains in the zone)
IP limit ()
Default TTL ()
Click Save to save the changes made to this section.
Start of Authority (SOA)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
104
TTL ()
MName (primary NS) ()
RName (hostmaster) ()
Serial base ()
Serial ()
Refresh ()
Retry ()
Expire ()
Minimum ()
Click Save to save the changes made to this section.
Zone
Enter DNS records for this zone into the provided space and click Save.
Advanced
Enable load balancing support (use this option to enable or disable load balancing
support for this zone)
Primary zone for load balancing (use this option to set this zone as the primary
zone for load balancing)
Enable backward compatible load balancing support for ISL Light 3.0.4 and
older (check this option if you need load balancing support for older versions of ISL
Light)
Enable GRID server names (use this option to enable or disable GRID server
names)
Primary zone for GRID server names (use this option to set this zone as the
primary zone for GRID server names)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
105
Click Save to save the changes made to this section.
Zone status
This section shows the zone status. It is empty when creating a new zone.
If you want to delete the zone, check the checkbox next to the Delete zone button, then
click the Delete zone button.
2.5.3.15.2 Settings
This menu entry includes the following options:
Enable DNS server (use this option to enable or disable the DNS server)
UDP port (use this option to set the UDP port for the DNS server)
TCP port (use this option to set the TCP port for the DNS server)
Enable DiG log file (use this option to enable/disable a DiG log file)
2.5.3.16 Network time
Network time menu includes the following entries:
Client
Server
2.5.3.16.1 Client
This menu entry includes the following options:
Enable NTP client (use this option to enable/disable the NTP client)
NTP servers (use this option to list the NTP servers)
UDP port (use this option to set the UDP port)
Synchronize interval in seconds (use this option to specify the synchronization
interval)
Maximum change in single update (use this option to specify the maximum change
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
106
per update)
Maximum server stratum (server time source setting, higher the number the more
the time can differ from actual time, but there is more servers to synchronize from)
Server must be synchronized
DNS resolver timeout in ms (option to limit DNS resolving timeout in NTP module,
for cases where resolving would not work and ICP would be killed by watchdog)
2.5.3.16.2 Server
This menu entry includes the following options:
Enable NTP server (use this option to enable/disable the NTP server)
UDP port (use this option to set the UDP port for the server)
Stratum (use this option to set the stratum of the server)
Reference Identifier (use this option to set the server's reference identifier)
2.5.4
User management
This menu entry includes two tabs - Users and Domains. For readability purposes, this
topic has been split into two parts - please select the desired topic:
Users
Domains
2.5.4.1
Users
When you select the Users tab, you are presented with a list of users.
You can filter the list by domain and/or by username and you can use standard wildcards
like * and ?.
If you click Create user..., you will be presented with the following options:
Domain (it is set to the default domain name, you can change it by clicking change...)
User name (enter the desired username)
Password (enter the desired password)
If you leave the password blank, the user will not be able to login or use ISL Online
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
107
products, e.g. obtain an ISL Light session code.
Password again (confirm the password by entering it again)
Full name (enter user's full name)
E-mail (enter user's e-mail address - recommended, so that the user can receive
session invitations)
Nickname (enter user's nickname)
Click Create to create a new user.
After creating a new user or after clicking on an existing user, you will be presented with
the following tabs:
General
Security
Programs
Plugins
ISL AlwaysOn
ISL Groop
ISL Light
ISL Pronto
Raw data
Please refer to the appropriate section below for more information about a certain tab:
General
The following options are available in this tab:
Login as user... (Log into ISL Conference Proxy user web pages as this user without
using a password)
Domain (use this option to change this user's domain)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
108
Username (use this option to change the username)
Full name (use this option to change this user's full name)
E-Mail (use this option to change this user's e-mail address)
Nickname (use this option to change this user's nickname)
Password (use this option to change this user's password)
Login enabled (use this option to enable/disable this user)
Login valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Login valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Last password change (timestamp of last password change performed by this user)
User must change password (yes|no , set whether this user has to change their
password)
Password expiration interval ( 1w 2d 3h 4m 5s) (set custom password expiration
time for this user)
Default program customization (enter the name of an existing customization to set
it as the default program customization for this user)
Max concurrent usage (specify the concurrent limit for this user)
Software release policy country
Allow multilicense IDs (this is an internal parameter and it should not be changed)
External ID (this option is used for communication with external username
databases)
Deny XMLMSG updates (To disable the XMLMSG functionality for this user, set this
option to Yes.)
Click Save to save the changes made to this section.
If you want to delete this user, check the checkbox next to the Delete user button, then
click the Delete user button.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
109
Security
The following options are available in this tab:
User privileges settings
User can view list of domains on server
User can view list of users in own domain
User can view list of users on server
User can view own sessions (specifies whether this user can view
sessions)
his own
User can control own sessions (specifies whether this user can terminate his own
sessions)
User can view sessions in domain (specifies whether this user can view sessions
within his domain)
User can control sessions in domain (specifies whether this user can terminate
any sessions within his domain)
User can view all sessions on server (specifies whether this user can view all
sessions on server)
User can control all sessions on server (specifies whether this user can terminate
any sessions on server)
View network status in /network_status (specifies whether users can view network
status at /network_status )
User can change full name (specifies whether this user can change full name)
User can change e-mail (specifies whether this user can change e-mail address)
User can change nickname (specifies whether this user can change nickname)
User can change password (specifies whether this user can change password)
User can change time zone (specifies whether this user can change time zone)
Store last used language in account (specifies whether to save the last used
language in account)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
110
Valid password format (regex) (use this option to specify a valid password format
using a regular expression)
Invalid password error (use this option to modify the invalid password error
message)
Valid e-mail format (regex) (use this option to specify a valid e-mail format using a
regular expression)
Invalid e-mail error (use this option to modify the invalid e-mail error message)
Error message for disabled mode (define the error message given when modules
are disabled)
License specification ()
Enable email matching on authentication
Login password scheme (Select scheme for hashing and storing login passwords)
You can select between following options:
islhash1 - SHA-512 hash, selected by default, most secure amongst the available
options.
islstatic1 - Internal reversible password scheme - LESS SECURE
plain text - passwords are stored in plain text
Use external authentication
One time passwords
Click Save to save the changes made to this section.
Programs
The following options are available in this tab:
Allow program ... (use this setting to enable or disable a certain program for this
user)
Use branches for ... (use this setting to set branch preferences for a certain program
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
111
for this user)
Order index for ... (Use this option to define the program download order for this user
- default value is 0. Program with the highest order index has the highest priority and it
will be downloaded instead of the latest version. If all program order indexes are the
same, the latest version among them is used.)
Click Save to save the changes made to this section.
Plugins
The following options are available in this tab:
Allow plugin ... (use this setting to enable or disable a certain plugin for this user)
Download plugin ... (if set to Yes, a certain plugin is loaded immediately for this
user, if set to No, it is loaded on demand)
Use branches for ... (use this setting to set branch preferences for a certain plugin for
this user)
Order index for ... (Use this option to define the plugin download order for this user default value is 0. Plugin with the highest order index has the highest priority and it will
be downloaded instead of the latest version. If all plugin order indexes are the same,
the latest version among them is used.)
Click Save to save the changes made to this section.
Actions
The following options are available in this tab:
Allow action ... (use this setting to enable or disable a certain plugin for this user)
Use branches ... (use this setting to set branch preferences for a certain action for
this user)
Order Index ... (Use this option to define the action execution order for this user default value is 0. Action with the highest order index has the highest priority and it will
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
112
be executed instead of the latest version. If all actions order indexes are the same, the
latest version among them is used.)
Click Save to save the changes made to this section.
ISL AlwaysOn
The following options are available in this tab:
ISL AlwaysOn enabled (use this option to enable/disable ISL AlwaysOn for this user)
ISL AlwaysOn valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL AlwaysOn valid before (use a time stamp value in the following form: YYYY-MMDD HH:MM:SS)
Use ISL AlwaysOn username for ISL Light Desk (use this option to set whether
ISL Light Desk uses the ISL AlwaysOn username or not)
ISL Light Desk username (use this option to set the desired username that will be
used for ISL Light Desk for this user)
ISL Light Desk password (use this option to set the password for the username
defined in the previous option)
ISL AlwaysOn start options (allows you to customize the way ISL AlwaysOn starts a
session)
Use grouping functionality (use this option to enable/disable the sharing of
computers in the list)
User (as guest) can share connection with owner in same domain (specify
whether user can share computers with same domain users)
User (as guest) can share connection with owner on same server (specify
whether user can share computers with same server users)
Maximum time span in session search (days) (use this option to limit the
maximum time span for search)
User can use actions functionality (specify whether user is granted access to the
actions area in the ISL AlwaysOn computers list)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
113
User can use files functionality (specify whether user is granted access to the files
shared for the computers in the ISL AlwaysOn list)
Special grant access cmd line (grant access to user by specifying a specific cmd
line)
Which version of ISL AlwaysOn web interface to show
Execute following actions when access is granted (Automatically share newly
created computer connection with specified user or all the users of specified domain)
Mail template for grant access invitation (allows you to customize the mail
template shown when you grant a user an remote desktop invitation)
Mail template for file access invitation (allows you to customize the mail template
for when you send files once session is established)
ISL AlwaysOn custom options (Quickstart&Overview)
Click Save to save the changes made to this section.
ISL Groop
The following options are available in this tab:
ISL Groop enabled (use this option to enable/disable ISL Groop for this user)
ISL Groop valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL Groop valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
User can change personal image (user this setting to allow/prohibit the user to
change the personal image)
User has sent invitations email history (use this setting to enable/disable sent
invitations email history for this user)
Which version of ISL Groop web interface to show
Enable AutoTransportUDP communication (experimental)
Maximum size of file uploaded to file box (in MB)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
114
Click Save to save the changes made to this section.
ISL Light
The following options are available in this tab:
ISL Light enabled (use this option to enable/disable ISL Light for this user)
ISL Light valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL Light valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Time limit (seconds) (use this option to set the maximum session duration for this
user)
Allow termination of sessions from desk (enable this option to enable ISL Light
versions prior to 3.1.1 to terminate a random session when concurrent limit has been
reached)
Show user information (change this setting if you wish to omit some fields when
showing session info for this user)
Send network interface list (enable this option to send a list of network interfaces
upon connect)
Send chat transcripts after the session (set this option to Yes if you want chat
contents to be saved in the session history)
Send live chat transcripts (use this option to enable/disable the sending of live chat
transcripts for this user)
Message (use this option for specifying an inline definition of messages for this user)
Message file (use this option to specify a file that contains a definition of messages
for this user)
Desk dialog (use this option for specifying an inline definition of ISL Light Desk's endof-session dialog for this user - it must be a single line)
Desk dialog file (use this option for specifying a file that contains a definition of ISL
Light Desk's end-of-session dialog for this user)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
115
Desk runtime dialog packets ()
Client dialog (use this option for specifying an inline definition of ISL Light Client's
end-of-session dialog for this user - it must be a single line)
Client dialog file (use this option for specifying a file that contains a definition of ISL
Light Client's end-of-session dialog for this user)
Important: Only an end-of-session dialog can be specified using these four dialog
options. To use other types of session dialogs, you need to create a customization.
Please refer to the ISL Light manual for more information on using session dialogs.
Client runtime dialog packets ()
Desk code request IP filter (use this option to limit access for this user based on the
IP and/or MAC address)
Desk user to Client IP filter ()
Program version filter ()
Generate short codes (use this option to enable the generation of short(er) session
codes for this user)
Mail template for session code
Mail template for session end notification
Mail template for session transfer
Which version of ISL Light web interface to show
Stop session if features are unknown
Click Save to save the changes made to this section.
ISL Pronto
The following options are available in this tab:
ISL Pronto enabled (use this option to enable/disable ISL Pronto for this user)
ISL Pronto valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL Pronto valid before (use a time stamp value in the following form: YYYY-MM-DD
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
116
HH:MM:SS)
Link to photo (use this option to specify the link to this user's photo - the image
should have the same widht and height, optimally 85x85 pixels)
User can change link to photo (use this option to specify whether this user can
change the link to the photo)
See client's text as they type (use this option to specify if this user can see what a
client is typing before actually sending it)
See supporter's text as they type (use this option to specify if this user can see
what a supporter is typing before actually sending it)
View other supporter's public chats (use this option to specify if this user can see
other supporter's public chats)
View other supporter's private chats (use this option to specify if this user can see
other supporter's private chats)
Delete chat content (use this option to specify if this user can delete chat content)
Close client chats (use this option to specify if this user can close client chats)
Edit canned responses
Reports custom field list (add custom report fields by id, each id separated by
comma will create a new custom field in pronto report module e.g. f i el d1, f i el d2,
f 3 admin has to enable this option first, before you can add custom fields as a
standard user)
Reports custom field titles (assign titles to custom report fields, by default the title
for custom field will be its id, you can change that by by assigning titles to ids
separated by & sign e.g. f i el d1=Fi r s t Cus t om Fi el d&f i el d2=Sec ond Fi el d )
Show e-mail to clients
Start sound effects after (in seconds) (use this option to set the delayed start of
chat notification sound effects)
Disable sound effects after (in seconds) (use this option to set the delay when to
stop chat notification sound effects)
Scheduled hours (like 1-4=09:00-15:00;5=09:00-13:00) (use this option to set
scheduled hours per day or per a group of days)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
117
Close chat automatically when client leaves (enable this to close the chat when
client leaves the chat session)
Close chat automatically when only the user is left (enable this to close the chat
when client leaves the chat session and a supporter is the only one left in the chat)
End chat automatically when operator closes chat
Show clients not matching the supporter's filter (Set whether ISL Pronto client
(operator program) should show all chats in Clients widget or just the chats matching
filters they are a member of.)
Chat info link (specify the desired link here)
Open chat info when chat with client is closed (enable this to open the link
specified above when the supporter closes the chat with a client)
Custom client info columns (tag1:title1;tag2:title2) (use this option to specify
additional client info columns - tag1:title1, tag2:title2 etc.)
Custom client info data file
Hide URL field (enable this to hide URL in client data, both in current chat sessions
and in the chat history)
Notify user, when client sees no available supporters (enable this to show a
notification window if a supporter is a member of a certain filter and a client requests a
supporter from another filter, but there are currently no supporters for that filter
available)
Do not change to busy status when running ISL Light
ISL Light Desk custom parameters (use this option to specify custom parameters
for ISL Light Desk that can be started within ISL Pronto)
ISL Light Desk command line (use this option to specify the command line for ISL
Light Desk that can be started within ISL Pronto)
ISL Light Desk username (use this option to specify the username for ISL Light
Desk that can be started within ISL Pronto)
ISL Light Desk password (use this option to specify the password for ISL Light
Desk that can be started within ISL Pronto)
ISL Light Client custom parameters (use this option to specify custom parameters
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
118
for ISL Light Client that can be started through a link within ISL Pronto)
ISL Light Client command line (use this option to specify the command line for ISL
Light Client that can be started through a link within ISL Pronto)
Report status with HTTP events (use this option to enable/disable supporters'
status reporting through HTTP events)
Status HTTP event interval in seconds (use this option to set the desired status
reporting interval)
Maximum number of chats
Click Save to save the changes made to this section.
Bulk Files
The following options are available in this tab:
Upload file (allows you to select the file you wish to upload to Conference Proxy)
Select (allows you to select the file by checking the tick box)
Created by module (shows the name of the module the file is created by)
Parent object (shows the server it is located on)
File (shows the name of the file)
Download (allows you to download the file)
Size (shows the size of the file uploaded)
On srv. -1 (shows whether the file is shown on the server or not)
Raw data
This tab includes a low-level interface for creating a new key, modifying an existing key
value or deleting an existing key.
Warning: Please use this menu entry only when instructed to do so by our technical
support team. In such situations, you will receive detailed step-by-step instructions.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
119
Please use other tabs for configuring your ISL Conference Proxy users.
2.5.4.2
Domains
When you select the Domains tab, you are presented with a list of domains.
You can filter the list by domain and you can use standard wildcards like * and ?.
If you click Create domain..., you will need to enter a new domain name and click
Create.
After creating a new domain or after clicking on an existing domain, you will be
presented with the following tabs:
General
Security
Integration
Programs
Plugins
ISL AlwaysOn
ISL Groop
ISL Light
ISL Pronto
Raw data
Please refer to the appropriate section below for more information about a certain tab:
General
The following options are available in this tab:
Name (use this option to change the name of this domain)
Secret (use this option to set the password for domain synchronization - please note
that this feature is intended for advanced users only)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
120
Login enabled (use this option to enable/disable this domain)
Login valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Login valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Default program customization (enter the name of an existing customization to set
it as the default program customization for this domain)
Max concurrent usage (specify the concurrent limit for this domain)
Max concurrent usage (set concurrent limit for every user in this domain, but not for
domain itself)
Software release policy country
Allow multilicense IDs (this is an internal parameter and it should not be changed)
External ID (this option is used for communication with external username
databases)
Deny XMLMSG updates (To disable the XMLMSG functionality for this domain, set
this option to Yes.)
Click Save to save the changes made to this section.
If you want to delete this domain, check the checkbox next to the Delete domain button,
then click the Delete domain button.
Warning: Deleting a domain automatically deletes all users within that domain.
Security
The following options are available in this tab:
User privleges settings
User can view list of domains on server
User can view list of users in own domain
User can view list of users on server
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
User can view own sessions (specifies whether users can view
sessions)
121
their own
User can control own sessions (specifies whether users can terminate their own
sessions)
User can view sessions in domain (specifies whether users can view sessions
within their domains)
User can control sessions in domain (specifies whether users can terminate any
sessions within their domains)
User can view all sessions on server (specifies whether users can view all
sessions on server)
User can control all sessions on server (specifies whether users can terminate
any sessions on server)
View network status in /network_status (specifies whether users can view network
status at /network_status )
User can change full name (specifies whether users can change full names)
User can change e-mail (specifies whether users can change e-mail addresses)
User can change nickname (specifies whether users can change nicknames)
User can change password (specifies whether users can change passwords)
User can change time zone (specifies whether users can change time zones)
Store last used language in account (specifies whether to save the last used
language in account)
Valid password format (regex) (use this option to specify a valid password format
using a regular expression)
Invalid password error (use this option to modify the invalid password error
message)
Valid e-mail format (regex) (use this option to specify a valid e-mail format using a
regular expression)
Invalid e-mail error (use this option to modify the invalid e-mail error message)
Error message for disabled mode (define the error message given when modules
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
122
are disabled)
License specification ()
Enable email matching on authentication:
Login password scheme (Select scheme for hashing and storing login passwords)
You can select between following options:
islhash1 - SHA-512 hash, selected by default, most secure amongst the available
options.
islstatic1 - Internal reversible password scheme - LESS SECURE
plain text - passwords are stored in plain text
External authenticator (use this option to specify an external authenticator for this
domain)
External authenticator backend error reports
One time passwords
Click Save to save the changes made to this section.
Integration
The following options are available in this tab:
Per-domain HTTP events (Use this option to enable or disable per-domain HTTP
events - this allows you to execute different scripts for different domains.)
Per-domain HTTP events server (Specify the server address where the script that
handles this domain's HTTP events resides, e.g. localhost:8080)
Per-domain HTTP events path (Specify the path to the script that handles this
domain's HTTP events, e.g. /isl-cp-example-events-to-sql.aspx )
Per-domain HTTP events strict error checking (Use this option to enable or
disable strict error checking for this domain's HTTP events)
Click Save to save the changes made to this section.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
123
Programs
The following options are available in this tab:
Allow program ... (use this setting to enable or disable a certain program for this
domain)
Use branches for ... (use this setting to set branch preferences for a certain program
for this domain)
Order index for ... (Use this option to define the program download order for this
domain - default value is 0. Program with the highest order index has the highest
priority and it will be downloaded instead of the latest version. If all program order
indexes are the same, the latest version among them is used.)
Click Save to save the changes made to this section.
Plugins
The following options are available in this tab:
Allow plugin ... (use this setting to enable or disable a certain plugin for this domain)
Download plugin ... (if set to Yes, a certain plugin is loaded immediately for this
domain, if set to No, it is loaded on demand)
Use branches for ... (use this setting to set branch preferences for a certain plugin for
this domain)
Order index for ... (Use this option to define the plugin download order for this
domain - default value is 0. Plugin with the highest order index has the highest priority
and it will be downloaded instead of the latest version. If all plugin order indexes are
the same, the latest version among them is used.)
Click Save to save the changes made to this section.
Action
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
124
The following options are available in this tab:
Allow action execute ... (use this setting to enable or disable a certain action for this
domain)
Use branches for ... (use this setting to set branch preferences for a certain action
for this domain)
Order index for ... (Use this option to define the action execution order for this
domain - default value is 0. Action with the highest order index has the highest priority
and it will be executed instead of the latest version. If all actions order indexes are the
same, the latest version among them is used.)
Click Save to save the changes made to this section.
ISL AlwaysOn
The following options are available in this tab:
ISL AlwaysOn enabled (use this option to enable/disable ISL AlwaysOn for this
domain)
ISL AlwaysOn valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL AlwaysOn valid before (use a time stamp value in the following form: YYYY-MMDD HH:MM:SS)
Use ISL AlwaysOn username for ISL Light Desk
ISL Light Desk username
ISL Light Desk password
ISL AlwaysOn start options (allows you to customize the way ISL AlwaysOn starts a
session)
Use grouping functionality (use this option to enable/disable the sharing of
computers in the list)
User (as guest) can share connection with owner in same domain (specify
whether users can share computers with same domain users)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
125
User (as guest) can share connection with owner on same server (specify
whether users can share computers with same server users)
Maximum time span in session search (days) (use this option to limit the
maximum time span for search)
User can use actions functionality (specify whether users are granted access the
actions area in the ISL AlwaysOn computers list)
User can use files functionality (specify whether users are granted access to the
files shared for the computers in the ISL AlwaysOn list)
Special grant access cmd line (grant access to users by specifying a specific cmd
line)
Which version of ISL AlwaysOn web interface to show (allow users to access a
certain version of ISL AlwaysOn web interface)
Execute following action when access is granted
Mail template for grant access invitation (allows you to customize the mail
template shown when you grant a user an remote desktop invitation)
Mail template for file access invitation (allows you to customize the mail template
shown when you send a user a file sharing invitation)
ISL AlwaysOn custom options (Quickstart&Overview) (allows you to specify what
options/messages users see in the Quickstart and Overview panel)
Click Save to save the changes made to this section.
ISL Groop
The following options are available in this tab:
ISL Groop enabled (use this option to enable/disable ISL Groop for this domain)
ISL Groop valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL Groop valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
126
User can change personal image (user this setting to allow/prohibit the users in this
domain to change the personal image)
User has sent invitations email history (use this setting to enable/disable sent
invitations email history for this domain)
Which version of ISL Groop web interface to show
Enable AutoTransportUDP communication (experimental)
Maximum size of file uploaded to file box (in MB)
Click Save to save the changes made to this section.
ISL Light
The following options are available in this tab:
ISL Light enabled (use this option to enable/disable ISL Light for this domain)
ISL Light valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL Light valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Time limit (seconds) (use this option to set the maximum session duration for this
domain)
Allow termination of sessions from desk (enable this option to enable ISL Light
versions prior to 3.1.1 to terminate a random session when concurrent limit has been
reached)
Show user information (change this setting if you wish to omit some fields when
showing session info for this domain)
Send network interface list (enable this option to send a list of network interfaces
upon connect)
Send chat transcripts after the session (set this option to Yes if you want chat
contents to be saved in the session history)
Send live chat transcripts (use this option to enable/disable the sending of live chat
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
127
transcripts for this domain)
Message (use this option for specifying an inline definition of messages for this
domain)
Message file (use this option to specify a file that contains a definition of messages
for this domain)
Desk dialog (use this option for specifying an inline definition of ISL Light Desk's endof-session dialog for this domain - it must be a single line)
Desk dialog file (use this option for specifying a file that contains a definition of ISL
Light Desk's end-of-session dialog for this domain)
Desk runtime dialog packets ()
Client dialog (use this option for specifying an inline definition of ISL Light Client's
end-of-session dialog for this domain - it must be a single line)
Client dialog file (use this option for specifying a file that contains a definition of ISL
Light Client's end-of-session dialog for this domain)
Important: Only an end-of-session dialog can be specified using these four dialog
options. To use other types of session dialogs, you need to create a customization.
Please refer to the ISL Light manual for more information on using session dialogs.
Client runtime dialog packets ()
Desk code request IP filter (use this option to limit access for this user based on the
IP and/or MAC address)
Desk user to Client IP filter ()
Program version filter ()
Generate short codes (use this option to enable the generation of short(er) session
codes for this domain)
Mail template for session code (change this setting if you wish to modify the default
send code via email template)
Mail template for session end notification (change the default template for the end
of session notification box that appears when you end an ISL Light connection)
Mail template for session transfer
Which version of ISL Light web interface to show
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
128
Stop session if features are unknown
Click Save to save the changes made to this section.
ISL Pronto
The following options are available in this tab:
ISL Pronto enabled (use this option to enable/disable ISL Pronto for this domain)
ISL Pronto valid after (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
ISL Pronto valid before (use a time stamp value in the following form: YYYY-MM-DD
HH:MM:SS)
Chat window title (use this option to set the chat window title)
Link to template chat images (use this option to specify the location of the required
images for ISL Pronto)
Link to logo image ()
Chat background (use this option to set the chat window's background color)
Open link when client closes chat (use this option to open a link at the client side
after closing the chat)
Open link for leave a message
Leave a message transcript e-mail
Limit referer regex (e.g. https?://({^/}+\.)?example\.com(/.*)?) ()
Show ISL Light chat messages (use this option to enable/disable automatic
sending of ISL Light messages to live chat as comments)
User can change link to photo (use this option to specify whether users can change
the link to the photo)
See client's text as they type (use this option to specify if users can see what a
client is typing before actually sending it)
See supporter's text as they type (use this option to specify if users can see what a
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
129
supporter is typing before actually sending it)
View other supporter's public chats (use this option to specify if users can see
other supporter's public chats)
View other supporter's private chats (use this option to specify if users can see
other supporter's private chats)
Delete chat content (use this option to specify if users can delete chat content)
Close client chats (use this option to specify if users can close client chats)
Edit canned responses ()
Show email to client ()
Start sound effects after (in seconds) (use this option to set the delayed start of
chat notification sound effects)
Disable sound effects after (in seconds) (use this option to set the delay when to
stop chat notification sound effects)
Scheduled hours (like 1-4=09:00-15:00;5=09:00-13:00) (use this option to set
scheduled hours per day or per a group of days)
Close chat automatically when client leaves (enable this to close the chat when
client leaves the chat session)
Close chat automatically when only the user is left (enable this to close the chat
when client leaves the chat session and a supporter is the only one left in the chat)
End chat automatically when client leaves
Chat info link (specify the desired link here)
Open chat info when chat with client is closed (enable this to open the link
specified above when the supporter closes the chat with a client)
Custom client info columns (tag1:title1;tag2:title2) (use this option to specify
additional client info columns - tag1:title1, tag2:title2 etc.)
Custom client info data file
Hide URL field (enable this to hide URL in client data, both in current chat sessions
and in the chat history)
Notify user, when client sees no available supporters (enable this to show a
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
130
notification window if a supporter is a member of a certain filter and a client requests a
supporter from another filter, but there are currently no supporters for that filter
available)
Do not change to busy status when running ISL Light
ISL Light Desk custom parameters (use this option to specify custom parameters
for ISL Light Desk that can be started within ISL Pronto)
ISL Light Desk command line (use this option to specify the command line for ISL
Light Desk that can be started within ISL Pronto)
ISL Light Desk username (use this option to specify the username for ISL Light
Desk that can be started within ISL Pronto)
ISL Light Desk password (use this option to specify the password for ISL Light
Desk that can be started within ISL Pronto)
ISL Light Client custom parameters (use this option to specify custom parameters
for ISL Light Client that can be started through a link within ISL Pronto)
ISL Light Client command line (use this option to specify the command line for ISL
Light Client that can be started through a link within ISL Pronto)
Report status with HTTP events (use this option to enable/disable supporters'
status reporting through HTTP events)
Status HTTP event interval in seconds (use this option to set the desired status
reporting interval)
Report javascript errors in log (use this option to enable/disable the reporting of
javascript errors)
Report received errors in log (use this option to enable/disable reporting in
received errors)
External command for processing chat lines
External chat message parameters
External chat message timeout (in ms)
Limit external chat message commands
Restart external command after requests
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
131
Maximum number of chats
Maximum chat query range (in days)
Treat chats inactive after seconds of inactivity
Open chat with client automatically
Force open chat with client automatically (works with auto open)
Client assignment scheme
Assignment override when no operator available
Enable proactive chat
Click Save to save the changes made to this section.
Bulk files
The following columns are available for each file.
Upload file (allows you to select the file you wish to upload to Conference Proxy)
Select (allows you to select the file by checking the tick box)
Created by module (shows the name of the module the file is created by)
Parent object (shows the server it is located on)
File (shows the name of the file)
Download (allows you to download the file)
Size (shows the size of the file uploaded)
On srv. -1 (shows whether the file is shown on the server or not)
Raw data
This tab includes a low-level interface for creating a new key, modifying an existing key
value or deleting an existing key.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
132
Warning: Please use this menu entry only when instructed to do so by our technical
support team. In such situations, you will receive detailed step-by-step instructions.
Please use other tabs for configuring your ISL Conference Proxy domains.
2.5.5
Manage software
Manage software menu includes the following entries:
Licenses
Overview
Online update
Install ZIP / Manual update
2.5.5.1
Licenses
This option provides an interface to install a license file. Below the interface you can find
information about the currently installed license.
When you purchase a new activation key for your server license and activate it within
your ISL Online account, you should create a new Conference Proxy packet and upload
the new license file to your server using this interface in order to use the newly
purchased functionality.
The following information is available about the currently installed license:
License version (version of the license file)
Module (name of the module that this license file is for - currently there is a single
license file for everything and this module is called I SL CONFERENCE PROXY)
Release Country (the name of the country the license is legal for)
Public address (addresses of the servers where this server license can operate while there is no limit for changing the internal IP address, external IP address can be
changed twice)
Not valid before (The date the license can be used from)
Not valid after (the date the license cannot be used after)
Max release date (represents the last date for upgrades - depends on your purchase
date and additionally purchased ESS, if any)
License key (this is a unique ID that represents your purchased functionality)
© 2016 ISL Online
ISL Conference Proxy Manual
2.5.5.2
Manual
133
Overview
This option shows the list of everything that is installed on your ISL Conference Proxy.
This list includes a lot of technical information, e.g. protocol versions, plugin
interfaces, translation versions etc. Vast majority of users will only be interested in the
name, platform, version and release date.
The list is divided into the following sections:
Modules (these represent Conference Proxy modules for ISL Online products as well
as modules for internal use, e.g. System Monitor)
Programs (these represent the programs that you can start using your Conference
Proxy, e.g. ISL Light, ISL AlwaysOn etc.)
Plugins (these represent the plugins that the programs in the list above use - currently
only ISL Light uses plugins)
Translation files (shows installed translation files)
Translations (shows more information about the translation files - per product/plugin)
2.5.5.3
Online update
This option provides access to the online update functionality.
You are presented with a table that lists all modules, installed version and release date
(if not installed, it states not installed) and action.
The following actions are available:
Default (the default action - it is set to automatic install)
No change (by selecting this action, you tell the update system that you do not wish to
change this item)
Automatic install (this action automatically installs a newer version if it is available)
Manual install (this action opens a list of all available modules / programs / plugins
and you can (de)select the desired entries manually)
Uninstall (this action uninstalls the module and all its components)
Manual install is the only way to install beta releases, since Automatic install only
updates to a newer stable release and ignores beta releases.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
134
Most upgrades will require ISL Conference Proxy restart. Please do so, when the
notification appears. Be sure to check online updates again, when upgrading ISL
Conference Proxy itself, since more module updates might be available afterward.
Online update will also work with HTTP Proxy, but additional setting has to be set
before you can start the Online update. Make sure that you set the HTTP Proxy for web
client to your proxy server under the following tab on the left hand side: I SL Conf er enc e
Pr ox y - > Admi ni s t r at i on - > Conf i gur at i on - > Sec ur i t y - > HTTP pr ox y f or
web
Depending on your HTTP proxy, the information should be entered in one of
two ways: pr ox y addr es s : pr ox y por t or us er name: pas s wor d@pr ox y addr es s : pr ox y por t
if you need to specify username and password.
c l i ent .
Below the table there is a button Apply changes - click it to perform the desired actions.
When you click it, it will dim your web browser's window and show a progress bar while
it performs the actions.
For more information follow the example bellow:
In the side menu go to Manage Software -> Auto update and the following table will
be displayed, showing you all the installed modules and available updates. Press the
Check for updates button to check for latest available releases of ISL Conference
proxy modules.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
135
Bellow the Apply changes button, there will be a more detailed description of what
will take place during the update. Which modules will be removed or added and their
description.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
136
First all the new files will be downloaded
Once the files are downloaded, you will be prompted to restart the server in order for
the update to be installed
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
137
During the update the server will not be available, but server status will be displayed
(restarting->checking->unavailable->available) once the server is back online, you
can click the "Please click here to go back to the session" link, to return to the
basic server overview.
© 2016 ISL Online
ISL Conference Proxy Manual
2.5.5.4
Manual
138
Manual update
If your ISL Conference Proxy is not connected to the internet (or behind a firewall that
prohibits outgoing internet access), you are not able to update it using the online update
option, so you should use the manual update procedure.
You should follow the instructions that are shown at the Manage software -> Manual
update page, the steps below are included as a reference.
Please follow the instructions on this page to complete the manual update.
1. Download the latest ISL Online software repository file from http://www.islonline.com/
system/ISL_Online_software_repository.zip (note: the file is approx. 3 GB!) and
extract it into a folder of your choice (e.g. C: \ I SL_Onl i ne_s of t war e_r epos i t or y on
Windows or / opt / I SL_Onl i ne_s of t war e_r epos i t or y on linux).
2. Enter the full path to the software repository:
You
have
two
choices
here
-
either use the standard location (C:
\ I SL_Onl i ne_s of t war e_r epos i t or y
on
Windows
or
/ opt /
I SL_Onl i ne_s of t war e_r epos i t or y on linux) or use the custom path where you extracted
the zip file in step 1.
You will notice the software update URL notification shows the current location that the
software updates from. You can change this by going to Configuration>General if
necessary.
3. Now you are ready to run the update. Click the Online Update link to start.
Important for ISL Conference Proxy 3.3.2 or newer: The Install ZIP option has
been removed and this setting is now called Manual update. Please follow the
instructions that are shown in ISL Conference Proxy administration.
Important for ISL Conference Proxy 3.3.1 or older: The Install ZIP option in the
ISL Conference Proxy administration interface is now obsolete and should not be
used! Instead, please download the appropriate ZIP file below (depending on your
server's operating system), copy the file into the $CPDI R/ i ns t al l _z i p directory (where
$CPDI R is ISL Conference Proxy installation directory - C: \ Pr ogr am Fi l es \ XLAB I SL
Conf er enc e Pr ox y on Windows or / v ar / c onf pr ox y on Linux) and then restart ISL
Conference Proxy. It will detect the update file and perform the update to the latest
version of ISL Conference Proxy. After that please follow the instructions above to
download and use the ISL Online software repository.
ZIP files containing the update to the latest ISL Conference Proxy, please choose the
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
139
one that matches your current ISL Conference Proxy installation:
Linux (32-bit): http://www.islonline.com/system/updates_latest_linux.zip
Linux (64-bit): http://www.islonline.com/system/updates_latest_linux64.zip
Windows: http://www.islonline.com/system/updates_latest_win32.zip
For more information follow the example bellow:
In the side menu go to Manage Software -> Manual update. Click the link under
step 1. to download the software repository and save it to your computer. Extract the
file to a standard location for your operating system ( Displayed in step 2.) or to a
custom location in which case you will have to enter the full path to the repository in
step 2. under Use custom location.
Once you extract the zip file, press Save and the Current software update URL
should change to file:///...<local path to folder>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
140
Press the Online update link in step 3. and follow the procedure in Online update
topic here. The procedure is the same from here on, only difference is that files won't
be downloaded from the web, but will be installed from local repository.
2.5.5.5
Features
Allow development software builds [unsupported feature]
Disable AcceptEx system call in case of NIC/VPN driver or antivirus software
incompatibilities [not recommended]
Database replication method (choose database replication method)
Database storage backend (select storage backend for your database)
Database storage direct tables (when this setting is enabled it removes the WAL
hashes column from database table thus increasing performance)
Apply and restart ISL Conference Proxy (to apply settings you have changed, you
will have to restart ISL Conference Proxy, which can be quickly done using this button)
Note:
With ISL Conference Proxy a new feature was added and set as default procedure.
When a column is now added to database it will be set as NULL, and the database
rewrite will not be needed, thus eliminating performance decrease.
2.6
Controlling the server
This section describes how to start, stop or restart the ISL Conference Proxy service.
Please refer to the appropriate section below based on your server's operating system.
This is the usual way of restarting ISL Conference Proxy:
1. Open ISL Conference Proxy administration (http://localhost:7615/conf).
2. Go to Activity monitor - Servers.
3. You will be presented with a list of servers.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
141
4. Check the checkbox next to the desired server and click Restart selected to restart
it.
5. The server will respond with the following screen:
6. Please wait a few seconds, then click on the Return to the session link. If the server
has restarted in the meantime, you can already log into the ISL Conference Proxy and
continue working. If the server has not yet restarted, please wait some more and try
pressing the link "Return to the session" again. The server restart time varies from a
few seconds to a few minutes.
Microsoft Windows
Open Administrative tools - Services, then right-click the XLAB ISL Conference Proxy
entry and you will be presented with a menu where you can start, stop or restart this
service.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
142
Another way is to open the Command Prompt (Start - Run, enter cmd, press enter) and
execute net start confproxy to start the service or net stop confproxy to stop it.
Linux
Execute the following commands on the server as root (to start, stop, restart server or
print server status):
c onf pr ox y c t l
s t ar t
c onf pr ox y c t l
s t op
© 2016 ISL Online
ISL Conference Proxy Manual
2.6.1
c onf pr ox y c t l
r es t ar t
c onf pr ox y c t l
s t at us
Manual
143
Starting products
Important: Starting with ISL Conference Proxy 3.1, the created packet no longer
includes separate executables for ISL Light Desk and Client like in previous versions.
Once you perform the installation and upgrade procedure, all the needed files are
located on your server. To start ISL Light, please use the links below (naturally, replace
localhost with the appropriate server address). These links autodetect the operating
system and offer the latest appropriate executable for download.
General links for ISL Light (they auto-detect the network origin and provide the
appropriate package - either internet or intranet):
http://localhost:7615/start/ISLLightDesk (ISL Light Desk)
http://localhost:7615/start/ISLLightClient (ISL Light Client)
Internet links for ISL Light (forces the internet connection address):
http://localhost:7615/start/ISLLightDesk?intranet=0 (ISL Light Desk)
http://localhost:7615/start/ISLLightClient?intranet=0 (ISL Light Client)
Intranet links for ISL Light (forces the intranet connection address - in case you
defined it when creating a package):
http://localhost:7615/start/ISLLightDesk?intranet=1 (ISL Light Desk)
http://localhost:7615/start/ISLLightClient?intranet=1 (ISL Light Client)
Standard interface for accessing ISL Online products can be reached through the http://
localhost/ address in your browser (replace l oc al hos t in the address with the
appropriate server address for your situation):
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
144
Only the Join page (the default page) is available when not logged in - all other options
in the menu on the left will ask you to login first.
To login as a specific user, please select the Login link in the top right corner, enter the
desired user name (user name format \ \ domai n\ us er ) and password, then click Login.
Use the menu on the left to select the desired option:
Join (the default page - you can enter a provided session code and click Connect)
Usage (you can check license usage for the user that is currently logged in)
ISL AlwaysOn (use this option for managing and connecting to current ISL AlwaysOn
computers for the user that is currently logged in)
ISL Groop (use this option for managing ISL Groop sessions for the user that is
currently logged in)
ISL Light (use this option for starting a new ISL Light session and accessing ISL Light
session list for the user that is currently logged in)
ISL Pronto (use this option to download the ISL Pronto client)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
145
For instructions and more information on using a specific ISL Online product, please
refer to its manual.
Advanced start mode
1. Go to http://localhost:7615/start.
2. You will be presented with a page that looks like this:
3. You will see several categories / criteria, e.g. Download type, Branch, Program name,
Platform etc. Please refer to the list below for more information on these criteria:
Download type (Automatic updater selects the net start version that checks for new
versions on startup, while Normal selects the full version)
Branch (use this criterion to set which branches should be used - default value is
stable)
Stable since (YYYY-MM-DD) (use this criterion to specify the earliest release date that
should be considered when choosing a program)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
146
Max date (YYYY-MM-DD) (use this criterion to specify the latest release date that
should be considered when choosing a program)
Program name (use this criterion to select the desired program name, e.g. ISL Light
Desk)
Platform (use this criterion to select the desired platform - default value is to autodetect the current operating system)
Customization (use this option to specify a certain customization name that should be
used)
Intranet (use this criterion to specify whether the downloaded program should be
configured for intranet use or internet use)
4. As you select the desired options for the desired criteria, those criteria disappear
from the view since they have already been defined and they are.
5. After you have selected at least Program name and Download type, you will see
Download link below the last not yet defined criterion, as well as a list of files that
match your currently set criteria. If you click the Download link, it will download the
latest version that matches your selected criteria (latest from the list displayed below).
If you wish to download a specific version from the list below, click the direct
download link next to the desired version.
2.7
Backup
Please follow the appropriate instructions, depending on your server's operating system.
Windows
1. Stop ISL Conference Proxy service (run net s t op c onf pr ox y )
2. Backup installation directory (default location is C: \ Pr ogr am f i l es \ I SL Conf er enc e
Pr ox y )
3. Start ISL Conference Proxy service (run net s t ar t c onf pr ox y )
Linux
1. Stop ISL Conference Proxy service (run c onf pr ox y c t l s t op as root)
2. Backup installation directory / v ar / c onf pr ox y
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
147
3. Start ISL Conference Proxy service (run c onf pr ox y c t l s t ar t as root)
2.8
Migrating to a new server
Important: If you have set the setting for binding a specific IP (Configuration ->
General -> Bind IPs on server) on your current server, you will need to either reset this
setting (by creating a command file r es et _por t s ) or set it to a new value (by creating a
command file s et t i ng_bi ndi p with the desired IP address as file content content) on the
new server, otherwise ISL Conference Proxy will fail to bind the old address and as a
result you will not be able to access the web administration.
Please make sure your ISL Conference Proxy server is fully updated before
starting the migration procedure.
You should keep in mind that the steps below apply only to migrations where the target
platform is the same as the source platform.
Please follow the appropriate instructions, depending on your server's operating system.
If you have any doubts, migration questions or if you get stuck at one of the steps, you
can contact us via e-mail (support@islonline.com) or come to our live chat (at http://
www.islonline.com/) and we will be glad to help.
Windows
1. Stop ISL Conference Proxy service (run net s t op c onf pr ox y as administrator).
2. Backup all the files and subdirectories in the installation directory (default location is
C: \ Pr ogr am f i l es \ I SL Conf er enc e Pr ox y ).
3. Transfer the backup to the new server and extract it to the desired target directory
(default location is C: \ Pr ogr am f i l es \ I SL Conf er enc e Pr ox y ).
4. Run the ISL Conference Proxy installer (you can use the latest installer from the ISL
Conference Proxy directory).
5. ISL Conference Proxy will detect existing data (settings, session history etc.) and
proceed with the startup. Eventually you should be able to access the web
administration.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
148
Linux
1. Stop ISL Conference Proxy service (run c onf pr ox y c t l s t op as root)
2. Backup all the files and subdirectories in the installation directory (/ v ar / c onf pr ox y ).
3. Transfer the backup to the new server and extract it to the appropriate target directory
( / v ar / c onf pr ox y ).
4. Run the ISL Conference Proxy installer (you can use the latest installer from the ISL
Conference Proxy directory).
5. ISL Conference Proxy will detect existing data (settings, session history etc.) and
proceed with the startup. Eventually you should be able to access the web
administration.
2.9
Enabling SSL
There are two subsets of SSL configuration in ISL Conference Proxy, please select the
desired subset:
web pages (i.e. SSL which is used for product login, administration pages etc.)
software connections (i.e. SSL which is used by ISL Online products for connections)
2.9.1
Web pages
There are two basic ways to enable SSL on your ISL Conference Proxy server:
using a purchased certificate (obviously you need to pay for it, wildcard certificates
are usually more expensive than standard certificates)
using a self-signed certificate (no purchase necessary, but your visitors will get a
warning that the certificate is signed by an unknown CA)
Please decide which option you prefer and then refer to the appropriate section below
for instructions.
Using a purchased certificate
Part 1 - general information
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
149
If you use ISL Light, ISL AlwaysOn, ISL Groop, but not ISL Pronto, then you need a
standard certificate.
If you intend to use ISL Pronto, you will need a wildcard certificate (e.g.
* . i s l . ex ampl e. c om) - a wildcard certificate is usually more expensive.
Please follow certificate provider's Apache(-SSL) HTTPD instructions, they are the most
similar to ISL Conference Proxy.
Examples:
https://knowledge.verisign.com/support/ssl-certificates-support/index?
page=content&id=AR235
https://www.thawte.com/ssl-digital-certificates/technical-support/keygen/
https://www.digicert.com/csr-creation.htm
OpenSSL for Windows can be found here:
http://www.slproweb.com/products/Win32OpenSSL.html
Part 2 - preparing certificate files
Having followed the instructions in the first part, you will have received a signed
certificate from your provider.
ISL Conference Proxy requires SSL certificate files to be in the PEM format, so you
might need to convert your files appropriately before proceeding. Please refer to your
certificate provider's instructions.
Please save the SSL certificate in PEM format as web- c er t . pem. You can check if it is
ok through the following OpenSSL command - it should print your certificate info such as
issuer, validity etc.:
opens s l
x 509 - i nf or m pem - i n web- c er t . pem - noout - t ex t
Please save your private key in PEM format as web- k ey . pem. You can check if it is ok
through the following OpenSSL command - it should print RSA k ey ok :
opens s l
r s a - i nf or m pem - i n web- k ey . pem - noout - c hec k
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
150
Important: This command will ask you to enter the appropriate passphrase if you
set one when exporting your private key. It is considered best practice to always protect
your private keys with a passphrase.
In order to avoid potential issues, especially when renewing a certificate and replacing
the existing one, it is recommended to check the modulus of your private key and your
SSL certificate, just to make sure they match. The output of the following two commands
should be the same (Modul us =. . . ):
opens s l
x 509 - i nf or m pem - i n web- c er t . pem - noout - modul us
opens s l
r s a - i nf or m pem - i n web- k ey . pem - noout - modul us
Important: This command will ask you to enter the appropriate passphrase if you
set one when exporting your private key. It is considered best practice to always protect
your private keys with a passphrase.
If your certificate provider requires you to use one or more intermediate certificates, it
will be mentioned in your certificate provider's instructions. In that case please save the
appropriate intermediate certificate file in PEM format as web- i nt er medi at e. pem. If
such a file is not required by your certificate provider, you can skip this step.
Part 3 - uploading certificate files to ISL Conference Proxy
The easiest way to put all the required files to ISL Conference Proxy is to upload them to
the private file storage by following these steps:
1. Login to your ISL Conference Proxy administration (http://localhost:7615/conf).
2. Go to Configuration -> Advanced ->File storage -> Private.
3. Click Choose..., select the private key file web- k ey . pem and click Upload.
4. Click Choose..., select the SSL certificate file web- c er t . pem and click Upload.
5. If you need to use an intermediate certificate, click Choose..., select the intermediate
certificate file web- i nt er medi at e. pem and click Upload.
6. Your uploaded files will be shown in the list below - upload complete.
Now you are ready to enable SSL for web pages served by ISL Conference Proxy.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
151
Part 4 - enabling SSL for web pages
1. Login to your ISL Conference Proxy administration (http://localhost:7615/conf).
2. Go to Configuration -> General.
3. Uncheck the checkbox in front of HTTPT SSL certificate and change the setting to
point to the appropriate uploaded file: obj ec t s / web- c er t . pem
4. Uncheck the checkbox in front of HTTPT SSL key and change the setting to point to
the appropriate uploaded file: obj ec t s / web- k ey . pem
5. If you need to use an intermediate certificate, uncheck the checkbox in front of
HTTPT SSL certificate chain and change the setting to point to the appropriate
uploaded file: obj ec t s / web- i nt er medi at e. pem
6. Click Save to apply the settings you changed so far.
7. If you protected your private key with a passphrase, click the change link next to the
HTTPT SSL key passphrase and enter the appropriate passphrase.
8. Uncheck the checkbox in front of HTTPT use SSL and change the setting to Yes.
9. Click Save to apply these settings.
10.Go to Configuration -> Security.
11. Uncheck the checkbox in front of Force SSL for all user web pages and change
the setting to Yes.
12.Click Save to apply.
Now you can open https://serveraddress/ (replace serveraddress with the appropriate
DNS name of your server) and test, the page should load successfully and your web
browser should indicate that the connection is secure..
Default protocol and cipher suite settings should be a good starting point and in case
you have no specific requirements you should leave them at their default values. If
needed, you can adjust them - please refer to ISL Conference Proxy configuration best
practices (point 7).
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
152
Using a self-signed certificate
The easiest way to generate a self-signed certificate is to use OpenSSL executable that
is already present in the ISL Conference Proxy install directory. This example is for linux,
adjust accordingly for windows.
Important: You need to perform these commands as root.
c d / v ar / c onf pr ox y
opens s l
genr s a 2048 > mai n. k ey
opens s l r eq - new - x 509 - s ubj
9999 > mai n. c er t
" / CN=* . i s l . ex ampl e. c om" - k ey mai n. k ey - day s
c hmod 600 mai n. k ey
c hmod 600 mai n. c er t
c hown i s l c p: i s l c p mai n. k ey
c hown i s l c p: i s l c p mai n. c er t
Important: chown is needed in ICP 4.1 and newer as ICP will drop root privileges
since ICP 4.1.0 release. Before (ICP 4.0, ICP 3.x) you should not chown as islcp user
does not exists.
After that, go to ISL Conference Proxy administration (http://localhost:7615/conf) and
select Configuration - General. Change HTTPT use SSL option to Yes and click
Save.
If you wish to force SSL for user web pages too, then set the option Force SSL for user
web pages to Yes.
Default protocol and cipher suite settings should be a good starting point and in case
you have no specific requirements you should leave them at their default values. If
needed, you can adjust them - please refer to ISL Conference Proxy configuration best
practices (point 7).
Now you can open https://serveraddress/ (replace serveraddress with the appropriate
DNS name of your server) and test.
Important: A self-signed certificate is not suitable for production use since website
visitors will be presented with a warning about an untrusted certificate.
2.9.2
Software connections
You can decide to generate your own crypto keys, usually with RSA size 2048 or 4096
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
153
and DH size 1024.
Please go to ISL Conference Proxy administration (http://localhost:7615/conf) and select
Configuration - Advanced - Security. Use the option Generate new keys (high
security) for all the sections and enter the desired key sizes. Do not forget to click
Apply after modifying each section.
Warning: All users will need to download new ISL software executables to get new
crypto keys. Affected files are I SL Li ght Des k . ex e , I SL Li ght Cl i ent . ex e , I SL
Gr oop. ex e and so on. If you generate new crypto keys and try running old executables
(i.e. the ones that have old keys), they will fail to connect.
2.10
Enabling code signing
By default executables downloaded from ISL Conference Proxy (e.g. ISL Light Desk,
ISL Light Client etc.) are digitally signed using our special code signing certificate
(name of signer ISL Online Ltd.). This means that they should not trigger any
warnings/errors (such as Microsoft SmartScreen Filter download warnings) that could
be caused by unsigned executables or executables signed by code signing
certificates that are no longer trusted (e.g. SHA-1).
Important: This applies to all customers with valid ESS who have created their
licence file after 2015-04-16.
Important: Please make sure your licence file and ISL Conference Proxy are up to
date. You should create a new packet every time you extend your ESS so that the
resulting licence file includes the latest code signing specifications and your actual ESS
date, allowing you to update your server to the latest released versions at any moment.
Important dates and sample scenarios:
2013-09-09 (This is when we introduced the embedded code signing functionality
using SHA-1.)
2015-04-16 (This is when we introduced the dual sign functionality, meaning that the
executables are signed with SHA-1 and SHA-2, for maximum compatibility.)
If you have created your current licence before 2013-09-09, then your ISL Conference
Proxy is serving unsigned executables (unless you are using a valid custom code
signing certificate).
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
154
If you have created your current licence between 2013-09-09 and 2015-04-16, then your
ISL Conference Proxy is serving executables signed with a SHA-1 certificate only. Such
a code sign certificate is no longer trusted by Microsoft since 2016-01-01.
In both cases you should create a new packet, apply the resulting licence to your server
and fully update it. Please check the following blog post for more information.
Important: If you do not have valid ESS when creating a packet, the resulting
licence will not include the code signing functionality! In that case please extend it
(direct link to ESS extension in our online shop) first, then proceed to create a new
packet.
If your company has registered for a server licence trial and would like to test the code
signing functionality before purchasing, please contact us at support@islonline.com.
If you are an advanced user and wish to use your own code signing certificate instead,
please check the following topic: Using a custom code signing certificate
In case of problems or additional questions regarding code signing please contact us
via e-mail (support@islonline.com) or come to our live chat (at http://www.islonline.com/)
and we will be glad to help.
2.10.1 Using a custom code signing certificate
Important: This topic is for advanced users who want to use a custom (non-default)
certificate - if you only want to enable code signing with the default settings, it should
work out of the box. Please check the main topic: Enabling code signing
It is possible to enable custom code signing by uploading the appropriate certificate for
your company (this certificate is also known as Microsoft Authenticode certificate) to the
ISL Conference Proxy and enabling appropriate options. This means that executables
downloaded from ISL Conference Proxy (e.g. ISL Light Desk, ISL Light Client etc.) will
be digitally signed using your certificate with the appropriate issuer name (e.g.
MyCompany Ltd.).
The general procedure is described below, please refer to your certificate provider's
website for detailed instructions about verifying your identity, submitting your CSR and
downloading the resulting certificate.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
155
You will need two files:
your private key (you use this private key to generate a CSR for your certificate
provider)
your code signing certificate (you get this file from your certificate provider as a
reply to your CSR)
Useful OpenSSL conversion commands
Usually you receive a PKCS#7 file (usually called SPC) from your certificate provider this is your code signing certificate, save it as c odes i gn- c er t . p7b . You have generated
your private key when generating your CSR. Save your private key as c odes i gnk ey . pem and proceed to the next section.
In some cases you receive a PKCS#12 bundle (sometimes called PFX) from your
certificate provider and this file contains both the private key and the certificate, so you
will need to extract the private key and the code signing certificate from it before
proceeding.
The easiest way to do this is through a series of OpenSSL commands (we refer to the
bundle as c odes i gn_bundl e. pf x ):
1. Extract the private key from the bundle:
$ opens s l
pk c s 12 - i n c odes i gn_bundl e. pf x - out c odes i gn- k ey . pem - noc er t s
2. Extract the code signing certificate from the bundle:
$ opens s l
pk c s 12 - i n c odes i gn_bundl e. pf x - out c odes i gn- c er t . pem - nok ey s
3. Convert the code signing certificate into PKCS#7 binary format (DER):
$ opens s l c r l 2pk c s 7 - c er t f i l e c odes i gn- c er t . pem - noc r l
c odes i gn- c er t . p7b
- out f or m DER - out
Now you have both required files and you can proceed with the steps below.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
156
Private key
The private key file for ISL Conference Proxy (we will refer to it as c odes i gn- k ey . pem in
this example) needs to be in plain text (PEM format) - if you open it with any text editor,
you should see the following:
- - - - - BEGI N RSA PRI VATE KEY- - - - -
(... your private key ...)
- - - - - END RSA PRI VATE KEY- - - - -
You can check your private key with the following command:
$ opens s l
r s a - i n c odes i gn- k ey . pem - c hec k - noout
It should output RSA k ey ok .
If your private key is protected by a passphrase, you will need to enter it later on in the
ISL Conference Proxy settings.
Code signing certificate
The code signing certificate needs to be in PKCS#7 binary format (DER).
You can check the file with the following command:
$ opens s l
pk c s 7 - i n c odes i gn- c er t . p7b - i nf or m DER - pr i nt _c er t s
It should output the appropriate subject and issuer and below it, the certificate in PEM
format:
s ubj ec t = (... your code
i s s uer = (... info
sign certificate subject ...)
about the issuer ...)
- - - - - BEGI N CERTI FI CATE- - - - -
(... your code sign certificate...)
- - - - - END CERTI FI CATE- - - - © 2016 ISL Online
ISL Conference Proxy Manual
Manual
157
Important: If there is more than one certificate in your p7b file, please check that the
first certificate in the list is your certificate (check the CN part of the subject line), not the
certificate vendor's root or intermediate certificate. If your certificate is not the first, you
will need to reorder it - these are the steps:
Copy the output of the previous command into a new text file, then adjust the order of the
certificates so that your certificate is placed first. Save this as c odes i gn- c er t - new. pem
and then use the following openssl command to convert it into the binary format (DER):
$ opens s l c r l 2pk c s 7 - c er t f i l e c odes i gn- c er t - new. pem - noc r l
out c odes i gn- c er t . p7b
- out f or m DER -
Check the new (reordered and converted) c odes i gn- c er t . p7b file:
$ opens s l
pk c s 7 - i n c odes i gn- c er t . p7b - i nf or m DER - pr i nt _c er t s
If the first certificate in the output is your certificate, then you can proceed.
Once you have both files in the required format, you can put them to the ISL Conference
Proxy server.
Uploading certificate files to ISL Conference Proxy
The easiest way to put both files to ISL Conference Proxy is to upload them to the
private file storage by following these steps:
1. Login to your ISL Conference Proxy administration (http://localhost:7615/conf).
2. Go to Configuration -> Advanced ->File storage -> Private.
3. Click Choose..., select the private key file and click Upload.
4. Repeat step 3 for the code signing certificate file.
5. Both files will be shown in the list below - upload complete.
Now you are ready to enable the code signing.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
158
Enabling code signing
1. Login to your ISL Conference Proxy administration (http://localhost:7615/conf).
2. Go to Configuration -> Security.
3. Scroll to the bottom, uncheck the checkbox in front of Use authenticode from
license and change the setting to No.
4. Scroll to the bottom, uncheck the checkbox in front of Authenticode enabled and
change the setting to Yes.
5. Uncheck the checkbox in front of Authenticode publisher certificate file (PKCS#7)
and paste the appropriate file location - in this case: obj ec t s / c odes i gn- c er t . p7b
6. Uncheck the checkbox in front of Authenticode private key file (PEM) and paste
the appropriate file location - in this case: obj ec t s / c odes i gn- k ey . pem
7. If your private key is protected by a passphrase, click change next to Authenticode
private key passphrase and enter the appropriate passphrase.
8. Click Save to apply these settings.
Now you can proceed to testing.
Testing
Now you can test if it works properly - simply download ISL Light Client (http://
serveraddress:7615/start/ISLLightClient) and save it to your desktop. Right-click the
executable and select Properties - you should see the Digital Signatures tab with
details about the signature.
Important: If you get an internal server error when trying to download, then code
signing failed. In that case please go back into settings and disable authenticode, then
check both certificate files again and make sure they are in the correct format. If you are
using an encrypted private key, please make sure the passphrase is set correctly.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
159
If everything seems fine but it still does not work properly or if you get stuck at one of the
steps, you can contact us via e-mail (support@islonline.com) or come to our live chat
(at http://www.islonline.com/) and we will be glad to help.
2.11
Using a reverse proxy
Starting with ISL Conference Proxy 4.0.0 it is now possible to place your ISL
Conference Proxy server behind a reverse proxy/load balancer if required.
Important: Please note that placing your ISL Conference Proxy server behind a
reverse proxy is not an optimal setup since it adds another single point of failure and
introduces potential delays. If possible we recommend avoiding a reverse proxy and
suggest opening ports directly.
Prerequisites:
Decide on a DNS name for your ISL Conference Proxy server (isl.example.com in our
examples) and create the appropriate licence file.
Write down your reverse proxy's IP address (A.B.C.D in our examples).
Write down your ISL Conference Proxy's IP address (E.F.G.H in our examples).
Make sure that the chosen DNS name resolves to the reverse proxy's IP address
(isl.example.com -> A.B.C.D).
The next step is to configure the required settings in ISL Conference Proxy
administration:
1. Go to Configuration - Advanced - Web server.
2. Set Allowed IP addresses for frontends to the appropriate value: A.B.C.D
3. Set External ports for frontends to: 80,443
4. Set Enable HTTP frontend to: Yes
5. Set Use X-Forwarded-For in HTTP frontend to: Yes
6. Set Use X-Forwarded-Host in HTTP frontend to: Yes
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
160
Important: Make sure you enable access on ports 7620 and 7621 from A.B.C.D to
E.F.G.H in your firewall.
You can now proceed to setting up your reverse proxy. We have tested and provide
examples for the following options:
HAProxy example
Apache example
2.11.1 HAProxy example
This topic describes steps to set up HAProxy as a reverse proxy for ISL Conference
Proxy.
We have included a sample configuration file, tested with HAProxy 1.5.8.
The file my s s l . bundl e is a bundle file containing the appropriate certificate and the
matching private key for the chosen DNS name (e.g. isl.example.com), modify
appropriately.
You should adjust the list of supported ciphers to fit your requirements, values below are
just an example.
Important: Make sure you modify the settings to match your requirements and your
environment. Perform detailed connection and usage tests before placing such a server
in production. Please refer to the HAProxy documentation for details.
Sample configuration file for HAProxy (haproxy.cfg):
gl obal
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
161
daemon
max c onn 256
t une. s s l . def aul t - dh- par am 2048
def aul t s
mode ht t p
t i meout c onnec t 5000ms
t i meout c l i ent 50000ms
t i meout s er v er 50000ms
opt i on f or war df or
f r ont end my ht t p
bi nd * : 80
def aul t _bac k end bk _ht t p
f r ont end my ht t ps
bi nd * : 443 s s l c r t / et c / s s l / pr i v at e/ my s s l . bundl e c i pher s ECDHE- RSAAES128- GCM- SHA256: ECDHE- ECDSA- AES128- GCM- SHA256: ECDHE- RSA- AES256- GCMSHA384: ECDHE- ECDSA- AES256- GCM- SHA384: DHE- RSA- AES128- GCM- SHA256: DHE- DSSAES128- GCM- SHA256: k EDH+AESGCM: ECDHE- RSA- AES128- SHA256: ECDHE- ECDSA- AES128SHA256: ECDHE- RSA- AES128- SHA: ECDHE- ECDSA- AES128- SHA: ECDHE- RSA- AES256SHA384: ECDHE- ECDSA- AES256- SHA384: ECDHE- RSA- AES256- SHA: ECDHE- ECDSA- AES256SHA: DHE- RSA- AES128- SHA256: DHE- RSA- AES128- SHA: DHE- DSS- AES128- SHA256: DHE- RSAAES256- SHA256: DHE- DSS- AES256- SHA: DHE- RSA- AES256- SHA: AES128- GCMSHA256: AES256- GCM- SHA384: AES128- SHA: AES256- SHA: AES: CAMELLI A: DES- CBC3SHA: ! aNULL: ! eNULL: ! EXPORT: ! DES: ! RC4: ! MD5: ! PSK: ! aECDH: ! EDH- DSS- DES- CBC3SHA: ! EDH- RSA- DES- CBC3- SHA: ! KRB5- DES- CBC3- SHA: @STRENGTH no- s s l v 3
def aul t _bac k end bk _ht t ps
bac k end bk _ht t p
bal anc e r oundr obi n
s er v er s 1 E. F. G. H: 7620 max c onn 32
bac k end bk _ht t ps
bal anc e r oundr obi n
s er v er s 1 E. F. G. H: 7621 max c onn 32
2.11.2 Apache example
This topic describes steps to set up Apache as a reverse proxy for ISL Conference
Proxy.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
162
Apart from the steps mentioned in the parent topic you will need to change the following
setting in ISL Conference Proxy administration:
1. Set Enable FastCGI frontend to: Yes
Important: Make sure you also enable access on ports 7622 and 7623 from
A.B.C.D to E.F.G.H in your firewall.
We have included a sample configuration file, tested with Apache 2.4.10.
The file my s s l . c er t is a file containing the appropriate certificate for the chosen DNS
name (e.g. isl.example.com), modify appropriately.
The file my s s l . k ey is a file containing the private key for the certificate above, modify
appropriately.
You should adjust the list of supported ciphers to fit your requirements, values below are
just an example.
Important: Make sure you modify the settings to match your requirements and your
environment. Perform detailed connection and usage tests before placing such a server
in production. Please refer to the Apache documentation for details.
Sample configuration file for Apache (000-default.conf):
Rewr i t eEngi ne On
<Vi r t ual Hos t * : 80>
Pr ox y Pas s / us er s ht t p: / / E. F. G. H: 7620/ us er s
Pr ox y Pas s / j oi n ht t p: / / E. F. G. H: 7620/ j oi n
Pr ox y Pas s / s t ar t ht t p: / / E. F. G. H: 7620/ s t ar t
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
163
Pr ox y Pas s / downl oad ht t p: / / E. F. G. H: 7620/ downl oad
Rewr i t eCond %{ REQUEST_METHOD} GET
Rewr i t eRul e ^ / webac c es s / ( . * ) ht t p: / / E. F. G. H: 7620/ webac c es s / $1 [ P]
Rewr i t eCond %{ REQUEST_METHOD} POST
Rewr i t eRul e ^ / webac c es s / ( . * ) f c gi : / / E. F. G. H: 7622/ webac c es s / $1 [ P]
Pr ox y Pas s / ht t p: / / E. F. G. H: 7620/
</ Vi r t ual Hos t >
<Vi r t ual Hos t * : 443>
SSLEngi ne On
SSLCer t i f i c at eFi l e / et c / s s l / c er t s / my s s l . c er t
SSLCer t i f i c at eKey Fi l e / et c / s s l / pr i v at e/ my s s l . k ey
SSLPr ot oc ol
- ALL +TLSv 1 +TLSv 1. 1 +TLSv 1. 2
SSLCi pher Sui t e ECDHE- RSA- AES129- GCM- SHA256: ECDHE- ECDSA- AES128- GCMSHA256: ECDHE- RSA- AES256- GCM- SHA384: ECDHE- ECDSA- AES256- GCM- SHA384: DHE- RSAAES128- GCM- SHA256: DHE- DSS- AES128- GCM- SHA256: k EDH+AESGCM: ECDHE- RSA- AES128SHA256: ECDHE- ECDSA- AES128- SHA256: ECDHE- RSA- AES128- SHA: ECDHE- ECDSA- AES128SHA: ECDHE- RSA- AES256- SHA384: ECDHE- ECDSA- AES256- SHA384: ECDHE- RSA- AES256SHA: ECDHE- ECDSA- AES256- SHA: DHE- RSA- AES128- SHA256: DHE- RSA- AES128- SHA: DHEDSS- AES128- SHA256: DHE- RSA- AES256- SHA256: DHE- DSS- AES256- SHA: DHE- RSA- AES256SHA: AES128- GCM- SHA256: AES256- GCM- SHA384: AES128- SHA: AES256SHA: AES: CAMELLI A: DES- CBC3SHA: ! aNULL: ! eNULL: ! EXPORT: ! DES: ! RC4: ! MD5: ! PSK: ! aECDH: ! EDH- DSS- DES- CBC3SHA: ! EDH- RSA- DES- CBC3- SHA: ! KRB5- DES- CBC3- SHA: @STRENGTH
Pr ox y Pas s / us er s ht t p: / / E. F. G. H: 7621/ us er s
Pr ox y Pas s / j oi n ht t p: / / E. F. G. H: 7621/ j oi n
Pr ox y Pas s / s t ar t ht t p: / / E. F. G. H: 7621/ s t ar t
Pr ox y Pas s / downl oad ht t p: / / E. F. G. H: 7621/ downl oad
Rewr i t eCond %{ REQUEST_METHOD} GET
Rewr i t eRul e ^ / webac c es s / ( . * ) ht t p: / / E. F. G. H: 7621/ webac c es s / $1 [ P]
Rewr i t eCond %{ REQUEST_METHOD} POST
Rewr i t eRul e ^ / webac c es s / ( . * ) f c gi : / / E. F. G. H: 7623/ webac c es s / $1 [ P]
Pr ox y Pas s / ht t p: / / E. F. G. H: 7621/
</ Vi r t ual Hos t >
2.12
Integration
ISL Conference Proxy allows integration into other systems such as CRM, ERP etc.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
164
The following means of integration are available:
WEBAPI2 (user access to ISL functionalities)
HTTP events (live notifications of ISL Online products' events with possibilities to
control the session on the fly)
XMLMSG (ISL Conference Proxy administration can be performed through the
XMLMSG interface)
External authentication (you can use existing Microsoft Active Directory, Novell
eDirectory, OpenLDAP, Radius or FreeRADIUS for user authentication)
SOAP (SOAP interface offers most of the XMLMSG functionalities for integration into
high-level applications, e.g. MS Info Path, usage from VS.NET etc.)
SOAP integration is now deprecated and it will not be covered in this manual please use XMLMSG instead.
This chapter includes the following sections:
WEBAPI2
HTTP events
XMLMSG
External authentication
Only a basic description of ISL Conference Proxy integration capabilities is
presented here - for integration instructions regarding specific ISL Online products,
please refer to that product's manual (e.g. ISL Light integration is discussed in the ISL
Light manual):
ISL Light integration
ISL AlwaysOn integration
ISL Groop integration
ISL Pronto intregration
2.12.1 Command files
There are several files, that can be placed into ISL Conference Proxy installation
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
165
directory, which are read when the service starts. If you wish for the command file to take
effect, while the service is running, the service will need to be restarted.
dbrebuild - reread all database files and recreate indexes
enable_debuglog - enable debugging log
purge - create command files: purge_db, purge_objects_all, purge_messages,
purge_bulk
purge_bulk - delete bulk files
purge_db - delete database
purge_messages - delete messages (HTTP events, mails)
purge_objects - delete file storage (except modules and upgrade)
purge_objects_all - delete file storage
reset_adminpwd - admin password will be reset to the default value
reset_ports - HTTPT ports and Bind IP settings will be reset to default values
setting_adminpwd - file contents will be used as admin password
setting_bindip - file contents will be used as the IP to be bound
setting_license - file contents will be used as a license
setting_manipulate_db_secret - file contents will be used as the manipulate
database secret
setting_trustednet - file contents will be used as the setting for web administration
allowed IP
postgresql_install - if you have installed ISL Conference Proxy Postgresql module, you
can request installation of managed Postgresql on restart of ISL Conference Proxy by
creating this file
dboptions - user can setup some options for controlling integrated DB behaviour
Description
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
166
dboptions
fast_file_init
f as t _f i l e_i ni t =1
It will enable faster GRID low bandwidth file init even for hhasher (default empty keys
won't be transmitted to remote servers). The feature currently conflicts with ISL Groop
module previous to 2.4.3 (index in table "timed_events"), some hhashes/files might be
resent multiple times. This option is relevant only in GRID environments.
pg_serverhigh_index
pg_s er v er hi gh_i ndex =1
Additional index (server,high) will be created in data tables when using PostgreSQL
backend. Operations involving snapshot sending in GRID will be faster. This option
applies to Postgresql backend version 1 introduced in 3.5.0 (recheck needed).
pg_walsnp_connection_timeout
pg_wal s np_c onnec t i on_t i meout =<mi l l i s ec onds >
How much time to wait for PostgreSQL to return cache block of file hashes. Default
value is 500.
2.12.2 HTTP events
ISL Online products send notifications when certain events occur. You can use these
events for various purposes, e.g. save certain data to your database, respond to certain
events through the XMLMSG interface etc.
Each HTTP event notification consists of the following parameters:
TI MESTAMP (event creation timestamp
MODULE (module
I SL_LI GHT)
EVENT
in unix timestmp format (unsigned long long))
name which created event - e.g. for ISL Light events it will be
(event name)
SERVERI D (GRID
ID number of server who created and sent event)
© 2016 ISL Online
ISL Conference Proxy Manual
DOMAI N_I D (id
Manual
167
of ISL domain where event originated)
Depending on the event type, there are additional parameters present. Please refer
to the specific ISL Product's manual for information on parameters that are available for
the events triggered by that product.
You will probably write a PHP / ASP / ASP.NET script that will parse the POST values of
HTTP notifications and act accordingly.
To access a filed in the POST part of the HTTP request, you would use something like
this:
in PHP:
$i s l _modul e = $_POST[ " MODULE" ] ;
in ASP / ASP.NET:
i s l _modul e = Reques t . For m( " MODULE" )
Your script should respond appropriately. If you set Global HTTP events strict error
checking to Yes, it is mandatory to respond with valid XML content.
If you do not wish to send a message to the XMLMSG interface after a certain event,
respond like this:
in PHP:
ec ho " <nomes s age/ >" ;
in ASP / ASP.NET:
Res pons e. Wr i t e( " <nomes s age/ >" )
If you put these two parts together, a simple example script is ready for use:
in PHP:
<?php
i f ( " I SL_LI GHT" == $_POST[ " MODULE" ] ) {
/ / do s omet hi ng . . . wr i t e t o y our dat abas e, t o a c er t ai n f i l e, s end
an e- mai l , . . . .
}
ec ho " <nomes s age/ >" ;
?>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
168
in ASP / ASP.NET:
<%
i f Reques t . For m( " MODULE" ) = " I SL_LI GHT" t hen
' do s omet hi ng . . . wr i t e t o y our dat abas e, t o a c er t ai n f i l e, s end an
e- mai l , . . . .
end i f
Res pons e. Wr i t e( " <nomes s age/ >" )
%>
Here is a simple PHP script that writes events to a file (/ t mp/ I SL_t es t _l og. t x t ):
<?php
$my Fi l e = " / t mp/ I SL_t es t _l og. t x t " ;
$f h = f open( $my Fi l e, ' a' ) ;
f wr i t e( $f h, " - - - BEGI N- - - \ n" ) ;
$ar r ay = $_POST;
$t hes t r i ng = " " ;
f or eac h( $ar r ay as $k ey => $v al ue) {
$t hes t r i ng . = " k ey : " . $k ey . " - v al ue: " . $v al ue. " \ n" ;
}
f wr i t e( $f h, $t hes t r i ng) ;
f wr i t e( $f h, " - - - END- - - \ n" ) ;
f c l os e( $f h) ;
ec ho " <nomes s age/ >" ;
?>
2.12.3 WebAPI2
User API communicates via HTTP protocol and provides JSON(P) api. All apis are
available /webapi2 url. The API can be tested in
http://[server_address]/users/main/test_webapi2.html
Additional info regarding available calls is also available on this page.
2.12.3.1 Communication model
User API communicates via HTTP (both POST and GET) protocol and provides many
ways of communication JSON(P) and XML. Apart from general communication fields,
that must be sent via POST/GET, all other data can be sent in any way. We strongly
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
169
encourage the use of POST over GET method for sending data (except in the case of
JSONP). All data sent via POST or GET should be URL encoded!
Available fields (CGI parameters):
method - method you wish to call. This field is mandatory!
he - defines encoding of communication. By defining this setting, you define in what
way would you like to receive response data from the API. Current version supports
JSON1, XML1, CGI1. Default value is JSON1.
ho - defines return encoding of communication. Current version supports JSON1,
XML1. Default value is same as he.
hl(or lang) - defines language. Value must be a ISO 639-1 code. Language defines
the language in which response message should be returned. If message is not yet
translated, English version will be returned.
hs(or session_id) - defines web session id. The session is associated with some
user. To get session id call webapi login. In case session id is used it must be valid or
error will be returned.
jsonp - In case JSON1 as ho field is specified the return will enveloped in function
defined by jsonp.
hedata - Input data of type he are normally sent in body of request. But in case of
using jsonp (referencing script), some data might be needed. You can specify input
data in this field.
Response objects: JSON1 and XML1
JSON1 is version 1 of JSON response defined by ISL Online API protocol. Response
object has following structure:
result: this object hold all method result values/fields
description: translated message that can be shown to user in case of error
code: predefined message codes (look below)
errors: list of fields that failed in input data that caused the webapi call to fail
hs: in case the session token has been updated
data: various data which is method specific
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
170
JSON1 structure:
j s on={
" r es ul t " : {
" des c r i pt i on" : " gener at ed des c r ei pt i on" ,
" c ode" : " r es ul t _c ode" ,
" er r or s " : [ ar r ay , of , ar gument s ] ,
" hs " : " i n c as e t he s es s i on t ok en has been updat ed"
},
" dat a" : [ ar r ay , of , dat a, f i el ds ]
}
XML1 example:
<?x ml
v er s i on=" 1. 0" enc odi ng=" ut f - 8" ?>
<webapi >
<met hod>met hod_name</ met hod>
<r es pons e>
<r es ul t >
<des c r i pt i on>gener at ed des c r i pt i on</ des c r i pt i on>
<c ode>r es ul t _c ode</ c ode>
</ r es ul t >
<dat a>ar r ay of dat a f i el ds </ dat a>
</ r es pons e>
</ webapi >
API Messages
A part of response object is result code, which holds one of the predefined values:
Method executed without any exceptions:
code: OK - all methods were executed without any problems.
User input/procedure errors (this is normal no need to fix implementation and usage of
API - developer should handle this errors and show description to user):
code: USER_ERROR
Usage errors (API developers did something wrong and should fix the error in module)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
171
code: IMPLEMENTATION_ERROR
Internal errors (something went wrong on server - core developers will fix this errors).
code: INTERNAL_ERROR
2.12.3.2 WebAPI2 Methods
In order to test the Web API calls listed here, please go to this page: https://
[server_address]/users/main/test_webapi2.html (Enter your own server address).
It is possible to enter the required parameters and submit a call so that you can view a
printed response.
Test call
echo
ISL Always On
islalwayon/computer/connect/1
islalwayon/computer/search/1
islalwayon/computer/update/1
islalwayon/user/grant/1
islalwayson/actions/authenticate/1
islalwayson/actions/available/1
islalwayson/actions/history/1
islalwayson/actions/info/1
islalwayson/actions/start/1
islalwayson/computer/connect/1
islalwayson/computer/connect/2
islalwayson/computer/delete/1
islalwayson/computer/exists/1
islalwayson/computer/history/1
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
172
islalwayson/computer/search/1
islalwayson/computer/update/1
islalwayson/file/authenticate/1
islalwayson/file/command/1
islalwayson/file/command/2
islalwayson/file/download/1
islalwayson/file/download/2
islalwayson/file/info/1
islalwayson/file/info/2
islalwayson/file/list/1
islalwayson/file/list/2
islalwayson/file/upload/1
islalwayson/file/upload/2
islalwayson/share/info/1
islalwayson/share/info/2
islalwayson/share/list/1
islalwayson/share/list/2
islalwayson/user/email/1
islalwayson/user/grant/1
islalwayson/user/options/1
islalwayson/user/tags/1
ISL Groop
islgroop/sessions/delete/single/1
islgroop/sessions/email/notify/delete/single/1
islgroop/sessions/email/notify/get/single/1
islgroop/sessions/email/notify/insert/single/1
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
173
islgroop/sessions/email/preview/1
islgroop/sessions/email/send/1
islgroop/sessions/files/delete/single/1
islgroop/sessions/files/update/single/1
islgroop/sessions/files/upload/link/get/single/1
islgroop/sessions/get/list/1
islgroop/sessions/get/single/1
islgroop/sessions/insert/single/1
islgroop/sessions/join/link/get/single/1
islgroop/sessions/join/webtoken/get/single/1
islgroop/sessions/update/single/1
islgroop/sessions/users/authenticated/delete/single/1
islgroop/sessions/users/authenticated/insert/single/1
islgroop/sessions/users/extinfo/get/single/1
islgroop/sessions/users/extinfo/update/single/1
islgroop/sessions/users/registered/insert/single/1
islgroop/sessions/users/registered/update/list/1
ISL Light
isllight/session/email/1
isllight/session/history/1
isllight/session/info/1
isllight/session/info/set/1
isllight/session/list/1
isllight/session/post/1
isllight/session/resolve/1
isllight/session/security/1
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
174
isllight/session/start/1
ISL Pronto
islpronto/chat/content/get/single/1
islpronto/chat/get/list/1
islpronto/chat/get/single/1
islpronto/client/session/get/list/1
islpronto/client/session/update/single/1
islpronto/domain/filter/get/single/1
islpronto/proactive/supporter/data/get/1
islpronto/supporter/data/get/single/1
islpronto/supporter/get/list/1
islpronto/supporter/info/get/list/1
islpronto/supporter/info/get/single/1
reports/products/usage/get/1
session/query/1
Utils
utils/api/help/1
utils/api/list/1
utils/api/throttling/1
utils/counters/query/1
utils/echo/1
utils/email/1
utils/login/1
utils/logout/1
utils/password/forgot/1
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
175
utils/password/forgot/cancel/1
utils/password/forgot/change/1
utils/password/forgot/users/list/1
utils/server/query/1
utils/signup/1
utils/usage/1
utils/usage/terminate/1
utils/users/query/1
utils/webtoken/update/1
ISL Conference Proxy
external/google/recaptcha/validate/1
2.12.4 XMLMSG
XMLMSG is a way to control ISL Conference Proxy database remotely by using XML
messages. XMLMSG is available as a simple web page entry form or direct HTTP
POST access for developers. Most XMLMSG messages will need the database secret.
Please set the database secret in ISL Conference Proxy administration (available at
Configuration - General - Database secret).
Web entry form is particularly suitable for testing or quick database updates. It is
available at http://localhost:7615/xmlmsg_form.html (open the link in the web browser on
the server). The message will be sent by pressing the Send button. Server will respond
with a message which describes the actions taken.
HTTP POST can be used to send XMLMSG messages automatically from a program.
"Content-Type" of the HTTP POST request must be set to t ex t / x ml .
Whole protocol specification is available at http://localhost:7615/xmlmsg/relaxng.xml.
This chapter includes the following sections:
User management (provides some examples for most common user management
tasks)
Customizations ()
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
176
System settings ()
Software permissions ()
Code example (provides a .NET [C#] example to get you started)
2.12.4.1 User management
Replace dbs ec r et in the examples below with the appropriate database secret.
Query user database
Messages explained here can be used to query domain and user information.
Retrieve all domains
<quer y Dat abas e s ec r et =" dbs ec r et " >
<domai n/ >
</ quer y Dat abas e>
Retrieve specific domain (example: return only domain " default" )
<quer y Dat abas e s ec r et =" dbs ec r et " >
<domai n ex ac t =" def aul t " / >
</ quer y Dat abas e>
Retrieve domains with filter (example: domains name starts with " d" )
<quer y Dat abas e s ec r et =" dbs ec r et " >
<domai n f i l t er =" d* " / >
</ quer y Dat abas e>
Retrieve all users in a domain
<quer y Dat abas e s ec r et =" dbs ec r et " >
<us er domai n=" def aul t " / >
</ quer y Dat abas e>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
177
Retrieve specific user (example: return only user " \\default\admin" )
<quer y Dat abas e s ec r et =" dbs ec r et " >
<us er ex ac t =" \ \ def aul t \ admi n" / >
</ quer y Dat abas e>
Retrieve users in a domain with filter (example: username starts with " a" )
<quer y Dat abas e s ec r et =" dbs ec r et " >
<us er domai n=" def aul t " f i l t er =" a* " / >
</ quer y Dat abas e>
Synchronize whole domain
The message explained here will update the domain with all the provided information. A
domain secret needs to set for the domain (see User management and general section
for the domain). Users who do not yet exist will be created automatically. Users who are
not specified in the list will be deleted. See Set properties for domains and users for
the description of all user properties.
<domai nSy nc hr oni z e s ec r et =" domai n_s ec r et " domai n=" abc " >
<us er s >
<us er name=" us er " >
<pas s wor d>x y z </ pas s wor d>
</ us er >
<us er name=" us er 2" >
<pas s wor d>123</ pas s wor d>
</ us er >
</ us er s >
</ domai nSy nc hr oni z e>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
178
Modify user database
Create domain
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eDomai n mode=" i ns er t " name=" abc " / >
</ mani pul at eDat abas e>
Force domain creation (no error is reported, if the domain already exists)
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eDomai n mode=" f or c e- updat e" name=" abc " / >
</ mani pul at eDat abas e>
Delete domain
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<del et eDomai n mode=" del et e" name=" abc " / >
</ mani pul at eDat abas e>
Force domain deletion (no error is reported, if the domain does not exist)
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<del et eDomai n mode=" f or c e- del et e" name=" abc " / >
</ mani pul at eDat abas e>
Rename domain
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<r enameDomai n name=" abc " newname=" bbc " / >
</ mani pul at eDat abas e>
Create user and set password
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eUs er mode=" i ns er t " domai n=" abc " name=" us er " >
<pas s wor d>x y z </ pas s wor d>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
179
</ updat eUs er >
</ mani pul at eDat abas e>
Set raw password in database (add suffix " Raw" to any password type field) ISL Conference Proxy 4.2.3+
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eUs er mode=" i ns er t " domai n=" abc " name=" us er " >
<pas s wor dRaw>x y z </ pas s wor dRaw>
</ updat eUs er >
</ mani pul at eDat abas e>
Force user creation (no error is reported, if the user already exists)
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eUs er mode=" f or c e- updat e" domai n=" abc " name=" us er " >
<pas s wor d>x y z </ pas s wor d>
</ updat eUs er >
</ mani pul at eDat abas e>
Delete user
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<del et eUs er mode=" del et e" domai n=" abc " name=" us er " / >
</ mani pul at eDat abas e>
Force user deletion (no error is reported, if the user does not exist)
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<del et eUs er mode=" f or c e- del et e" domai n=" abc " name=" us er " / >
</ mani pul at eDat abas e>
Rename user
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<r enameUs er domai n=" abc " name=" us er " newname=" us er 2" / >
</ mani pul at eDat abas e>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
180
Set properties
Change user's password
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eUs er mode=" updat e" domai n=" abc " name=" us er " >
<pas s wor d>aaaaa</ pas s wor d>
</ updat eUs er >
</ mani pul at eDat abas e>
Other properties
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eUs er mode=" updat e" domai n=" abc " name=" us er " >
<enabl ed>y es </ enabl ed> <! - - ac c ount i s enabl ed ( y es | no| no- weak ) - - >
<ex t er nal I d>87474</ ex t er nal I d> <! - - ex t er nal
>
I D, us er f ul
f or i nt egr at i on - -
<c onc ur r ent Li mi t >3</ c onc ur r ent Li mi t > <! - - c onc ur r ent c onnec t i on l i mi t - - >
<us er Vi ewDomai n>y es </ us er Vi ewDomai n> <! - - us er c an v i ew domai n s es s i ons
( y es | no| no- weak ) - - >
<us er Cont r ol Domai n>y es </ us er Cont r ol Domai n> <! - - us er c an c ont r ol
s es s i ons ( y es | no| no- weak ) - - >
domai n
<us er Vi ewSer v er >y es </ us er Vi ewSer v er > <! - - us er c an v i ew s er v er s es s i ons
( y es | no| no- weak ) - - >
<us er Cont r ol Ser v er >y es </ us er Cont r ol Ser v er > <! - - us er c an c ont r ol
s es s i ons ( y es | no| no- weak ) - - >
s er v er
<v al i dFr om>0</ v al i dFr om>
<v al i dTo>10000000</ v al i dTo> <! - - ac c ount v al i d t i me i nt er v al , UNI X epoc h
f or mat ( s ec onds af t er 1970- 1- 1 0: 0: 0 UTC) - - >
<v al i dFr omDat eTi me>2005- 01- 05T05: 04: 03Z</ v al i dFr omDat eTi me>
<v al i dToDat eTi me>2006- 01- 05T05: 04: 03Z</ v al i dToDat eTi me> <! - - ac c ount v al i d
t i me i nt er v al , XML s c hema dat e t i me f or mat - - >
</ updat eUs er >
</ mani pul at eDat abas e>
These examples cover only some of the options. For a list of all options, please refer
to the protocol specification file that is available at http://localhost:7615/xmlmsg/
relaxng.xml.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
181
2.12.4.2 Customizations
Replace dbs ec r et in the examples below with the appropriate database secret.
Customization options
To get the list of all customization options:
1. create a single customization
2. retrieve all customizations (explained below)
3. see elements inside settings
4. each setting element has two important fields: id (must be used when modifying
customizations), description (text description - the text from Customization web
page)
File settings have extra fields when querying (file contents are not retrieved!):
1. fileName (name of the file)
2. fileSize (size in bytes)
3. fileMD5 (MD5 checksum of the file)
4. fileId (internal database hex id)
File settings use extra fields when modifying:
1. fileName (to specify the file name)
When uploading files, use BASE64 encoding for setting content.
Query customizations
Messages explained here can be used to query customization information.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
182
Retrieve all customizations
<quer y Dat abas e s ec r et =" dbs ec r et " >
<c us t omi z at i on/ >
</ quer y Dat abas e>
Retrieve specific customization
<quer y Dat abas e s ec r et =" dbs ec r et " >
<c us t omi z at i on name=" abc " / >
</ quer y Dat abas e>
Modify customizations
The name of the customization must be unique. ISL Conference Proxy will refuse to
create duplicate customizations.
Create empty customization
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eCus t omi z at i on mode=" i ns er t " name=" abc " / >
</ mani pul at eDat abas e >
Create customization with ISL Light Desk command line option --get-code
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eCus t omi z at i on mode=" i ns er t " name=" abc " >
<s et t i ngs >
<s et t i ng i d=" I SL+Li ght +Des k : : c us t om_c mdl i ne: : s t r i ng" >- - get - c ode</ s et t i ng>
</ s et t i ngs >
</ updat eCus t omi z at i on>
</ mani pul at eDat abas e>
Delete customization
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<del et eCus t omi z at i on mode=" del et e" name=" abc " / >
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
183
</ mani pul at eDat abas e>
Create customization with ISL Light logo (a small red dot)
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eCus t omi z at i on mode=" i ns er t " name=" abc " >
<s et t i ngs >
<s et t i ng i d=" I SL+Li ght : : l ogo_bmp: : f i l e" f i l eName=" r ed. bmp" >
Qk 06BAAAAAAAADYEAAAoAAAAAQAAAAEAAAABAAgAAAAAAAAAAADEDgAAx A4AAAABAAAAAQAAI x z
/
/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAP8AAAD/
AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAP8A
AAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAA
AP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/
AAAA
/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAP8AAAD/
AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAP8A
AAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAA
AP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/
AAAA
/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAP8AAAD/
AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAP8A
AAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAA
AP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/
AAAA
/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAP8AAAD/
AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAP8A
AAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAA
AP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/
AAAA
/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAP8AAAD/
AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/ wAAAP8AAAD/ AAAA/
wAAAAA=
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
184
</ s et t i ng>
</ s et t i ngs >
</ updat eCus t omi z at i on>
</ mani pul at eDat abas e>
These examples cover only some of the options. For a list of all options, please refer
to the protocol specification file that is available at http://localhost:7615/xmlmsg/
relaxng.xml.
2.12.4.3 System settings
Replace dbs ec r et in the examples below with the appropriate database secret.
Scope of system settings
There are two scopes for system settings:
1. global: Global settings apply to all servers connected in a GRID. If you have a single
ISL Conference Proxy installation, you can simply always use global settings.
2. local: Local settings apply only to one specific server connected in a GRID, so you
can override certain global settings for a specific server. If you have a single ISL
Conference Proxy installation, you can ignore local settings. There is only one
important setting, which is always local and it is not present in global settings - Bind
IP.
List of all settings
The list is available in the protocol specification file at http://localhost:7615/xmlmsg/
relaxng.xml. Please see the element definitions for GridConfigFields and
LocalConfigFields. The mapping from XML element to the setting in web
administration is specified in the comment, the two possible forms are:
1. Settings page :: Setting name or
2. Settings section :: Settings page :: Setting name
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
185
Query system settings
Messages explained here can be used to query ISL Conference Proxy system settings.
Retrieve all global settings
<quer y Dat abas e s ec r et =" dbs ec r et " >
<gr i dConf i gur at i on/ >
</ quer y Dat abas e>
Retrieve local settings for specific server (-1 means current server)
<quer y Dat abas e s ec r et =" dbs ec r et " >
<l oc al Conf i gur at i on s er v er I d=" - 1" / >
</ quer y Dat abas e>
Retrieve local settings for all servers
<quer y Dat abas e s ec r et =" dbs ec r et " >
<l oc al Conf i gur at i on/ >
</ quer y Dat abas e>
Modify system settings
Messages explained here can be used to modify ISL Conference Proxy system settings.
Set HTTPT ports to " 443, 7615"
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eGr i dc onf i gur at i on mode=" updat e" >
<ht t pt Por t s >
<v al ue>443</ v al ue>
<v al ue>7615</ v al ue>
</ ht t pt Por t s >
</ updat eGr i dc onf i gur at i on>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
186
</ mani pul at eDat abas e>
Set Bind IP for the current server
<mani pul at eDat abas e s ec r et =" dbs ec r et " >
<updat eLoc al c onf i gur at i on mode=" updat e" s er v er I d=" - 1" >
<bi ndI p>192. 168. 0. 77</ bi ndI p>
</ updat eLoc al c onf i gur at i on>
</ mani pul at eDat abas e>
Effect of modifications
Not all settings take effect immediately. Some settings require the ISL Conference
Proxy service to be restarted. Please check, if the server needs to be restarted, after
you modify the settings.
Check, if the server needs to be restarted
<modul e s ec r et =" dbs ec r et " >
<i s l Conf er enc ePr ox y >
<i s Ser v er Res t ar t Requi r ed/ >
</ i s l Conf er enc ePr ox y >
</ modul e>
response (yes or no):
<modul eRes pons e>
<i s l Conf er enc ePr ox y Res pons e>
<i s Ser v er Res t ar t Requi r edRes pons e>y es </ i s Ser v er Res t ar t Requi r edRes pons e>
</ i s l Conf er enc ePr ox y Res pons e>
</ modul eRes pons e>
Check, if the specific server needs to be restarted
<modul e s ec r et =" dbs ec r et " >
<i s l Conf er enc ePr ox y >
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
187
<i s Ser v er Res t ar t Requi r ed s er v er I d=" 4" / >
</ i s l Conf er enc ePr ox y >
</ modul e>
Restart current server
<modul e s ec r et =" dbs ec r et " >
<i s l Conf er enc ePr ox y >
<r es t ar t Ser v er / >
</ i s l Conf er enc ePr ox y >
</ modul e>
Restart specific server
<modul e s ec r et =" dbs ec r et " >
<i s l Conf er enc ePr ox y >
<r es t ar t Ser v er s er v er I d=" 5" / >
</ i s l Conf er enc ePr ox y >
</ modul e>
These examples cover only some of the options. For a list of all options, please refer
to the protocol specification file that is available at http://localhost:7615/xmlmsg/
relaxng.xml.
2.12.4.4 Software permissions
Software permissions settings are available in ISL Conference Proxy 3.4.3 and later.
Settings
Software permissions settings may be used in configuration scope (global and local)
and in account scope (domain and user). Each setting will override all subsettings. For
exampe, if you would like to change a single program order settings, you will need to
specify all the other order settings for all program in program sOrder element.
Allow software
<al l owedAc t i ons >
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
188
<ac t i on name=" ( ac t i on name) " >y es | no| no- weak </ ac t i on>
...
</ al l owedAc t i ons >
<al l owedPr ogr ams >
<pr ogr am name=" ( pr ogr am name) " >y es | no| no- weak </ pr ogr am>
...
</ al l owedPr ogr ams >
<al l owedPl ugi ns >
<pl ugi n modul e=" ( pl ugi n modul e) " name=" ( pl ugi n name) " >y es | no| no- weak </
pl ugi n>
...
</ al l owedPl ugi ns >
Default branches
<ac t i ons Def aul t Br anc hes >
<ac t i on name=" ( ac t i on name) " ><br anc h>bet a| dev el opment | . . . </ br anc h>. . . </
ac t i on>
...
</ ac t i ons Def aul t Br anc hes >
<pr ogr ams Def aul t Br anc hes >
<pr ogr am name=" ( pr ogr am name) " ><br anc h>bet a| dev el opment | . . . </ br anc h>. . . </
pr ogr am>
...
</ pr ogr ams Def aul t Br anc hes >
<pl ugi ns Def aul t Br anc hes >
<pl ugi n modul e=" ( pl ugi n modul e) " name=" ( pl ugi n name) " ><br anc h>bet a|
dev el opment | . . . </ br anc h>. . . </ pl ugi n>
...
</ pl ugi ns Def aul t Br anc hes >
Order
<ac t i ons Or der >
<ac t i on f i l eName=" ( ac t i on f i l e name) " >( i nt eger ) </ ac t i on>
...
</ ac t i ons Or der >
<pr ogr ams Or der >
<pr ogr am f i l eName=" ( pr ogr am f i l e name) " >( i nt eger ) </ pr ogr am>
...
</ pr ogr ams Or der >
<pl ugi ns Or der >
<pl ugi n pl ugi nName=" ( pl ugi n name) ( v er s i on) ( modul e) ( v er s i on) " >( i nt eger ) </
pl ugi n>
...
</ pl ugi ns Or der >
Plugin automatic download
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
189
<pl ugi ns Aut omat i c Downl oad>
<pl ugi n modul e=" ( pl ugi n modul e) " name=" ( pl ugi n name) " >1| 0</ pl ugi n>
...
</ pl ugi ns Aut omat i c Downl oad>
Example
<quer y Dat abas eRes pons e>
<gr i dConf i gur at i on i d=" s - 999_0_0" >
<ac t i ons Def aul t Br anc hes >
<ac t i on name=" r egedi t " ><br anc h>bet a</ br anc h><br anc h>dev el opment </ br anc h></
ac t i on>
</ ac t i ons Def aul t Br anc hes >
<ac t i
<ac t i
<ac t i
</ ac t
ons Or der >
on f i l eName=" r egedi t _1_0_0_wi n32. ac t i on" >3</ ac t i on>
on f i l eName=" r egedi t _1_0_0dev 3_dev el opment _wi n32. ac t i on" >8</ ac t i on>
i ons Or der >
<al l owedAc t i ons >
<ac t i on name=" r egedi t " >y es </ ac t i on>
</ al l owedAc t i ons >
<al l owedPl ugi ns >
<pl ugi n modul e=" I SL LI GHT" name=" des k t op" >no- weak </ pl ugi n>
</ al l owedPl ugi ns >
<al l owedPr ogr ams >
<pr ogr am name=" Connec t i on Tes t er " >y es </ pr ogr am>
</ al l owedPr ogr ams >
<pl ugi ns Aut omat i c Downl oad>
<pl ugi n modul e=" I SL LI GHT" name=" audi o" >1</ pl ugi n>
<pl ugi n modul e=" I SL LI GHT" name=" des k t op" >0</ pl ugi n>
</ pl ugi ns Aut omat i c Downl oad>
<pl ugi ns Def aul t Br anc hes >
<pl ugi n modul e=" I SL LI GHT" name=" des k t op" ><br anc h>bet a</
br anc h><br anc h>dev el opment </ br anc h></ pl ugi n>
</ pl ugi ns Def aul t Br anc hes >
<pl ugi ns Or der >
<pl ugi n pl ugi nName=" des k t op 1. 3. 4 I SL LI GHT wi n32" >5</ pl ugi n>
<pl ugi n pl ugi nName=" des k t op 1. 3. 5dev 1 I SL LI GHT wi n32" >- 2</ pl ugi n>
</ pl ugi ns Or der >
<pr ogr ams Def aul t Br anc hes >
<pr ogr am name=" Connec t i on Tes t er " ><br anc h>bet a</
br anc h><br anc h>dev el opment </ br anc h></ pr ogr am>
</ pr ogr ams Def aul t Br anc hes >
<pr ogr ams Or der >
<pr ogr am f i l eName=" c onnec t i on_t es t er _1_0_9_22212_wi n32. pr ogr am" >- 4</
pr ogr am>
<pr ogr am f i l eName=" c onnec t i on_t es t er _1_0_9dev 3_21577_l i nux . pr ogr am" >6</
pr ogr am>
</ pr ogr ams Or der >
</ gr i dConf i gur at i on>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
190
</ quer y Dat abas eRes pons e>
2.12.4.5 System status
Replace dbs ec r et in the examples below with the appropriate database secret.
Web hits
You can use the following XMLMSG to monitor web hits (like Activity monitor - Web
hits in the ISL Conference Proxy administration). Examples:
Retrieve web hits status from a server
<modul e s ec r et =" dbs ec r et " >
<i s l Conf er enc ePr ox y >
<webHi t s t y pe=" r aw" r ec or ds =" 100" / >
</ i s l Conf er enc ePr ox y >
</ modul e>
Retrieve web hits status for a certain server
<modul e s ec r et =" dbs ec r et " >
<i s l Conf er enc ePr ox y >
<webHi t s t y pe=" r aw" r ec or ds =" 100" s er v er =" 1" / >
</ i s l Conf er enc ePr ox y >
</ modul e>
It is possible to specify another type, e.g. top URLs, top referrer domains etc. You can
refer to the commented list below:
<def i ne name=" WebHi t s Ty pe" >
<c hoi c e>
<! - - I SL Pr ont o publ i c : Top c l i ent s - - >
<v al ue>i s l pr ont o: : publ i c : : t opc l </ v al ue>
<! - - I SL Pr ont o publ i c : Top c l i ent s er r or s - - >
<v al ue>i s l pr ont o: : publ i c : : t opc l er r </ v al ue>
<! - - I SL Pr ont o publ i c : Top us er domai ns - - >
<v al ue>i s l pr ont o: : publ i c : : t opdom</ v al ue>
<! - - I SL Pr ont o publ i c : Top us er domai ns er r or s - - >
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
191
<v al ue>i s l pr ont o: : publ i c : : t opdomer r </ v al ue>
<! - - I SL Pr ont o publ i c : Top r ef er r er domai ns - - >
<v al ue>i s l pr ont o: : publ i c : : t opr ef dom</ v al ue>
<! - - I SL Pr ont o publ i c : Top r ef er r er domai ns er r or s - - >
<v al ue>i s l pr ont o: : publ i c : : t opr ef domer r </ v al ue>
<! - - Raw - - >
<v al ue>r aw</ v al ue>
<! - - Top c l i ent s - - >
<v al ue>t opc l </ v al ue>
<! - - Top pat hs - - >
<v al ue>t oppat h</ v al ue>
<! - - Top r ef er r er domai ns - - >
<v al ue>t opr ef dom</ v al ue>
<! - - Top URLs - - >
<v al ue>t opur l </ v al ue>
</ c hoi c e>
</ def i ne>
These examples cover only some of the options. For a list of all options, please refer
to the protocol specification file that is available at http://localhost:7615/xmlmsg/
relaxng.xml.
2.12.4.6 Code example
This is an example in .NET (C#) and is used to show how to access the XMLMSG
interface from your program. It first prints all users and then sets the password for the
user \ \ def aul t \ us er to 123 .
Replace dbs ec r et in the example below with the appropriate database secret.
us i ng Sy s t em;
us i ng Sy s t em. Col l ec t i ons . Gener i c ;
us i ng Sy s t em. Tex t ;
us i ng Sy s t em. Net ;
us i ng Sy s t em. I O;
us i ng Sy s t em. Xml ;
names pac e XMLMSG_CShar p
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
192
{
c l as s Pr ogr am
{
s t at i c s t r i ng ur l
= " ht t p: / / s er v er / x ml ms g" ;
s t at i c s t r i ng s ec r et = " dbs ec r et " ;
s t at i c Xml Doc ument Pos t Command( Xml Doc ument doc )
{
by t e[ ] dat a;
{
Memor y St r eam s = new Memor y St r eam( ) ;
doc . Sav e( s ) ;
dat a = s . Get Buf f er ( ) ;
}
Ht t pWebReques t r eq = ( Ht t pWebReques t ) WebReques t . Cr eat e( ur l ) ;
r eq. Met hod = " POST" ;
r eq. Cont ent Ty pe = " t ex t / x ml " ;
r eq. Cont ent Lengt h = dat a. Lengt h;
{
St r eam s = r eq. Get Reques t St r eam( ) ;
s . Wr i t e( dat a, 0, dat a. Lengt h) ;
s . Fl us h( ) ;
}
Ht t pWebRes pons e r es p = ( Ht t pWebRes pons e) r eq. Get Res pons e( ) ;
i f ( r es p. St at us Code ! = Ht t pSt at us Code. OK)
t hr ow new Ex c ept i on( ) ;
doc = new Xml Doc ument ( ) ;
doc . Load( Xml Reader . Cr eat e( r es p. Get Res pons eSt r eam( ) ) ) ;
r et ur n doc ;
}
s t at i c v oi d DbSec r et ( Xml El ement node)
{
node. Set At t r i but e( " s ec r et " , s ec r et ) ;
}
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
193
s t at i c v oi d Mai n( s t r i ng[ ] ar gs )
{
{
/ / pr i nt al l
us er s
Xml Doc ument doc = new Xml Doc ument ( ) ;
Xml El ement node;
doc . AppendChi l d( node = doc . Cr eat eEl ement ( " quer y Dat abas e" ) ) ;
DbSec r et ( node) ;
node. AppendChi l d( doc . Cr eat eEl ement ( " us er " ) ) ;
Pos t Command( doc ) . Sav e( Cons ol e. Out ) ;
}
{
/ / s et pas s wor d " 123" f or \ \ def aul t \ us er
Xml Doc ument doc = new Xml Doc ument ( ) ;
Xml El ement node;
doc . AppendChi l d( node =
doc . Cr eat eEl ement ( " mani pul at eDat abas e" ) ) ;
DbSec r et ( node) ;
node. AppendChi l d( node = doc . Cr eat eEl ement ( " updat eUs er " ) ) ;
node. Set At t r i but e( " mode" , " updat e" ) ;
node. Set At t r i but e( " domai n" , " def aul t " ) ;
node. Set At t r i but e( " name" , " us er " ) ;
node. AppendChi l d( node = doc . Cr eat eEl ement ( " pas s wor d" ) ) ;
node. AppendChi l d( doc . Cr eat eTex t Node( " 123" ) ) ;
Pos t Command( doc ) . Sav e( Cons ol e. Out ) ;
}
}
}
}
2.12.4.7 XMLMSG commands on server restart
Note: This option is only available with ISL Conference proxy 4.1.5 and above
With ISL Conference Proxy 4.1.5 additional option was added to pass XML messages
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
194
to server after it restarts. In this example we will be sending the following XML request to
our server:
<quer y Dat abas e s ec r et =" dbs ec r et " >
<domai n f i l t er =" * " / >
</ quer y Dat abas e>
Which will return all domains on our server since the filter "*" matches with every string.
To pass the message to the server, paste it into a file and save the file as
cmd_xmlmsg into the ISL Conference proxy installation directory (In this example C:
\Program Files\ISL Conference Proxy)
Once the server is restarted the XML message will be executed and the file
cmd_xmlmsg will be replaced with cmd_xmlmsg_reply, which will contain the server
response on your message. In our example the server responded with the following
XML:
<?xml version="1.0" encoding="UTF-8"?>
<quer y Dat abas eRes pons e>
<domai n i d=" s - 1_0_0" name=" manual " ></ domai n>
<domai n i d=" s - 999_0_0" name=" def aul t " >
<enabl ed>y es </ enabl ed>
</ domai n>
</ quer y Dat abas eRes pons e>
showing that there are currently two domains on our server.
Only one XML message can be sent by one file, if you wish to send multiple messages,
you have to label cmd_xmlmsg files accordingly (e.g. First message ->
cmd_xmlmsg.1, second message ->cmd_xmlmsg.2 ...), and the server will also
respond with cmd_xmlmsg_reply.1, cmd_xmlmsg_reply.2 ...
You can find the list of all available XML commands in the following topic: System
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
195
Settings
2.12.5 External authentication
Available ways of using external authentication depend on the operating system used on
the server that is running ISL Conference Proxy. There are three ways of external
authentication:
FreeRADIUS
Radius
LDAP
a. direct bind approach
b. search approach
This chapter includes the following topics:
Active Directory external authentication step-by-step guide
OpenLDAP authentication step-by-step guide
One time password example
External Authentication Reference (includes additional explanation for all ways of
external authentication)
You are also welcome to check our blog post for more information and an example.
2.12.5.1 Active Directory authentication step-by-step guide
This is step-by-step guide how to use Active Directory external authentication with search approach with ISL
Conference Proxy Server. These instructions assume that you have a Windows Server machine with working
ISL Conference Proxy Server installed and Active Directory service installed and turned on.
Binding user and test user creation
Active Directory usually doesn't allow us to connect anonymously. Because of that, we have to first create an
user that will connect to server and search for other users:
1. Open as Administrator Start Menu -> Programs -> Administrative Tools -> Active Directory Users and
Computers.
2. Right click on directory named Users and click New->User:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
196
3. Type user information and remember User logon name and click Next >. In this example we will use icp for
User logon name.
4. Type password and confirm it. We will use password Xconference!
5. Uncheck User must change password at next logon. Click Next > and Finish.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
197
6. Repeat the same procedure to insert second user that will log in via Active Directory external authentication.
In this example we will use testuser logon name and Xtesting! password.
Search filter creation
Next we have to create and check our binding users credentials and create search filter:
1. Open a LDAP browser that will help us to construct login and search queries. In this example we will use
LDAPadmin.
2. Click Start -> Connect -> New Connection. Connection properties window will appear. Insert Connection
name. In this example we will use Active Directory Connection.
3. Insert Host, which can be a domain name or IP address. In this example we will use win.islkristian.local
domain name.
4. Insert Base, which represents the base where our users are in. In this example we will use
CN=Users,DC=win,DC=islkristian,DC=local.
5. Insert username of our binding user in Username field . The string must be composed out of user logon
name
and
base
where
user
is
located.
In
this
example
we
have
CN=icp,CN=Users,DC=win,DC=islkristian,DC=local. After that type also the user password in Password.
6. After all the credentials are inserted ,click on Test connection. If the response is Connection successful, our
binding user's credentials are set correctly:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
198
7. Click again Start->Connect and click on the connection that was created in previous steps. The list of base
entries will appear.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
199
8. Click on Edit->Search. A Search window will appear.
9. We will create filter for searching our testuser:
a. Insert Path, which is the base where our user is located. You can leave the preset values. In our example
they are CN=Users,DC=win,DC=islkristian,DC=local.
b. Click on Custom search filter.
c. Insert search filter. In this example we will search by sAMAccountName attribute which value should be
same as user logon name.
d. Click Search.
e. If we get results, then our search filter was correct.
10.Now we will check our binding credentials and search filter with command line program that is used by ISL
Conference Proxy:
a. Open Command Prompt (cmd.exe) or Windows Power Shell (powershell.exe).
b. Change directory (cd) to folder where ISL Conference Proxy is installed. This is "C:\Program Files\ISL
Conference Proxy" in our example.
c. Type authenticator\WinLdap.exe with following command line arguments:
i. HOST: host name from step 3. Example: HOST "win.islkristian.local".
ii. BINDDN: username from step 5. Example BINDDN "cn=icp,cn=Users,dc=win,dc=islkristian,dc=local".
iii.BINDPASSWORD: the password from step 5. Example: BINDPASSWORD "Xconference!".
iv.SEARCHBASE:
the
search
base
from
step
8.a.
Example:
SEARCHBASE
"cn=Users,dc=win,dc=islkristian,dc=local".
v. SEARCHFILTER: the search filter from step 8.d with a parameter variable. Example: SEARCHFILTER
"sAMAccountName=@USERNAME@".
vi.USERNAME: the parameter variable from previous step. Example: USERNAME "testuser".
vii.PASSWORD: the password for user in previous step. Example: PASSWORD "Xtesting!".
d. Pres Enter. If the arguments are correct, we should get OK:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
200
Configuring ISL Conference Proxy
1. Open ISL Conference Proxy Administration http://localhost:7615/conf and login as administrator.
2. In administration menu click on User management,
3. click on Domains and
4. click on Create domain or on an existing domain. We will select existing domain ldapusers:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
201
5. Click on Security,
6. Uncheck External authenticator,
7. Paste the appropriate command for external authentication like in command prompt example. Remove
double quotes and USERNAME, PASSWORD arguments and replace spaces with semicolons (;). Example:
aut hent i c at or
\ Wi nLdap. ex e; HOST; wi n. i s l k r i s t i an. l oc al ; BI NDDN; c n=i c p, c n=Us er s , dc =wi n, dc =i s
l k r i s t i an, dc =l oc al ; BI NDPASSWORD; Xc onf er enc e! ; SEARCHBASE; c n=Us er s , dc =wi n, dc =
i s l k r i s t i an, dc =l oc al ; SEARCHFI LTER; s AMAc c ount Name=@USERNAME@;
8. After that click on Save:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
202
9. We will test external authentication now. Go to http://localhost:7615/.
10.Click on Login,
11.Insert \\domain\username, where domain is the name of domain from step 4.) and insert password. In our
example the username is \\ldapusers\testuser.
12.Click Login:
13.If the user credentials were correct the server will redirect us to join page:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
203
2.12.5.2 OpenLDAP authentication step-by-step guide
This is step-by-step guide how to use OpenLDAP external authentication with search approach with ISL
Conference Proxy Server. These instructions assume that you have a Ubuntu Server machine with working ISL
Conference Proxy Server installed and empty OpenLDAP installed and turned on. In this tutorial we will use
phpLDAPadmin for OpenLDAP administration.
Binding user and test user creation
OpenLDAP sometimes doesn't allow us to connect anonymously. Because of that, we have to first create an
user that will connect to server and search for other users:
1. Open phpLDAPadmin, for example http://localhost:8080/phpldapadmin/ (We use 8080 port since 80 is by
default used by ISL Conference Proxy) and login as admin.
2. Under base DN click on Create new entry and click on Generic: Organisational Unit to add an
Organisational unit. In our example we will name it Users.
3. Under newly created Organisational unit entry click on Create new entry and add new Generic: Posix Group.
We will name it icpusers.
4. Under newly created Group click Create new entry and add new Generic: User Account to add the binding
account.
a. Insert field Last name. Most of the fields will be completed automatically. In our example we will use icp
last name. Therefore cn=icp.
b. Select also the group GID Number. In our example we will use icpusers gid number.
c. Insert the password under Password field. We will use Xconference! password.
d. Click on Create object:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
204
5. Confirmation form should appear. Remember the first line of table since we will use it for BINDDN parameter
and click commit:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
205
6. Repeat the same procedure for inserting a test user. In our example its Common name (Last name) will be
testuser and password Xtesting!.
Search filter creation
Next we have to create and check our binding users credentials and create search filter:
1. Open LDAPadmin
2. Click on Search
3. Insert Base DN, which is the base where our user is located. You can leave the preset values. In our
example we have ou=Users,dc=nix,dc=islkristian,dc=local.
4. Insert Search Filter. In this example we will search by uid attribute which is in this example the same as cn or
Last Name. In our example the value is testuser.
5. Click on Search:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
206
6. If we got our user in the response list then our search filter was correct.
7. Now we will check our binding credentials and search filter with command line program that is used by ISL
Conference Proxy:
a. Open terminal and go root (sudo su)
b. Change directory to /var/confproxy/ where ISL conference proxy scripts are localted
c. Make sure we have perl-ldap and IO-Socket-SSL libraries for perl installed.
d. Type /usr/bin/perl authenticator/perl-ldap.pl with following command line arguments:
i. HOST: host name from step 3. Example: HOST 'nix.islkristian.local'.
ii. BINDDN: username from step 5. Example BINDDN 'cn=icp,ou=Users,dc=nix,dc=islkristian,dc=local'.
iii.BINDPASSWORD: the password from step 5. Example: BINDPASSWORD 'Xconference!'.
iv. SEARCHBASE:
the
search
base
from
step
8.a.
Example:
SEARCHBASE
'ou=Users,dc=win,dc=islkristian,dc=local'.
v. SEARCHFILTER: the search filter from step 8.d with a parameter variable. Example: SEARCHFILTER
'uid=@USERNAME@'.
vi. USERNAME: the parameter variable from previous step. Example: USERNAME 'testuser'.
vii.PASSWORD: the password for user in previous step. Example: PASSWORD 'Xtesting!'.
e. Pres Enter. If the arguments are correct, we should get OK:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
207
Configuring ISL Conference Proxy
1. Open ISL Conference Proxy Administration http://localhost:7615/conf and login as administrator.
2. In administration menu click on User management,
3. click on Domains and
4. click on Create domain or on an existing domain. We will select existing domain ldapusers:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
208
5. Click on Security,
6. Uncheck External authenticator,
7. Paste the appropriate command for external authentication like in command prompt example. Remove
double quotes and USERNAME, PASSWORD arguments and replace spaces with semicolons (;). Example:
/ us r / bi n/ per l ; aut hent i c at or / per l - l dap. pl ; HOST; l dap: / /
ni x . i s l k r i s t i an. l oc al ; BI NDDN; c n=i c p, ou=Us er s , dc =ni x , dc =i s l k r i s t i an, dc =l oc al
; BI NDPASSWORD; Xc onf er enc e! ; SEARCHBASE; ou=Us er s , dc =ni x , dc =i s l k r i s t i an, dc =l oc
al ; SEARCHFI LTER; ui d=@USERNAME@;
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
209
8. After that click on Save:
9. We will test external authentication now. Go to http://localhost:7615/.
10.Click on Login,
11.Insert \\domain\username, where domain is the name of domain from step 4.) and insert password. In our
example the username is \\ldapusers\testuser.
12.Click Login:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
210
13.If the user credentials were correct the server will redirect us to join page:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
211
2.12.5.3 One time password example
This topic includes a simple perl example for simulating external authentication with one
time password.
Important: This is meant as a dummy example to illustrate a point, it is not to be
used in production!
It generates a file called t es t _c hangi ng_pas s wor d. t x t which includes the current
password (think of it as a current state of the RSA SecurID token) that increases with
every successful login, for simplicity purposes it does not change through time, but it
should be enough to illustrate the point.
Save the code below as t es t _c hangi ng_pas s wor d. pl , create a s c r i pt s subdirectory
within your ISL Conference Proxy directory and place the file there. Pick the appropriate
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
212
external authenticator string for your platform and follow the steps mentioned in the
parent topic to set it for a certain domain and test it.
You can always check the t es t _c hangi ng_pas s wor d. t x t file to see the current
password.
t es t _c hangi ng_pas s wor d. pl
file:
us e s t r i c t ;
us e I O: : Fi l e;
# wi ndows ex t er nal
aut hent i c at or s et t i ng:
# per l ; s c r i pt s \ t es t _c hangi ng_pas s wor d. pl ;
#
# uni x ex t er nal
aut hent i c at or s et t i ng:
# / us r / bi n/ per l ; s c r i pt s / t es t _c hangi ng_pas s wor d. pl ;
my %par ams = ( ) ;
f or ( my $i
= 1; $i
< s c al ar ( @ARGV) ; $i
+= 2) {
$par ams { $ARGV[ $i - 1] } = $ARGV[ $i ] ;
}
i f ( $par ams { ' DOMAI N' } eq ' aut hent i c at i on' ) {
i f ( $par ams { ' USERNAME' } eq ' t es t x ' ) {
my $pwd = $par ams { ' PASSWORD' } ;
my $l as t _pwd = - e ' t es t _c hangi ng_pas s wor d. t x t ' ? j oi n( ' ' ,
I O: : Fi l e- >new( ' t es t _c hangi ng_pas s wor d. t x t ' ) - >get l i nes ( ) ) : ' 1' ;
i f ( $l as t _pwd eq $pwd) {
I O: : Fi l e- >new( ' t es t _c hangi ng_pas s wor d. t x t ' , ' w' ) >wr i t e( ' '
. ( $pwd + 1) ) ;
pr i nt " OK" ;
} el s e {
pr i nt " FAI LED - pas s wor d s houl d be ' $l as t _pwd' " ;
}
} el s e {
pr i nt " FAI LED - us er name s houl d be t es t x " ;
}
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
213
} el s e {
pr i nt " FAI LED - domai n s houl d be aut hent i c at i on" ;
}
2.12.5.4 Reference
Enter topic text here.Available
ways of using external authentication depend on the operating
system used on the server that is running ISL Conference Proxy. Please refer to the
appropriate section below.
Important: Please replace 1.2.3.4 and 1.2.3.5 with the appropriate authenticator
server address(es) for your situation.
Important: Please note that all external authentication strings must end with a
semicolon.
Linux
Please choose the appropriate section based on the external authenticator you are
using:
FreeRADIUS (requires FreeRADIUS)
/ us r / bi n/ per l ; aut hent i c at or / Fr eeRADI US. pl ; HOST; 1. 2. 3. 4, 1. 2. 3. 5; SECRET; abc ;
Radius (requires CPAN module RadiusPerl - use libauthen-radius-perl on debian)
/ us r / bi n/ per l ; aut hent i c at or / Radi us Per l . pl ; HOST; 1. 2. 3. 4, 1. 2. 3. 5; SECRET; abc ;
LDAP (requires CPAN modules perl-ldap and IO-Socket-SSL - use libnet-ldap-perl
and libio-socket-ssl-perl on debian)
1. direct bind approach (for Microsoft Active Directory) - replace MAPUSER to match
your environment:
/ us r / bi n/ per l ; aut hent i c at or / per l l dap. pl ; HOST; l dap: / / 1. 2. 3. 4, l dap: / / 1. 2. 3. 5; MAPUSER; @USERNAME@@ex ampl e. c om;
2. search approach (for Novell eDirectory and OpenLDAP) - replace SEARCHBASE and
SEARCHFI LTER to match your environment:
/ us r / bi n/ per l ; aut hent i c at or / per l l dap. pl ; HOST; l dap: / / 1. 2. 3. 4, l dap: / / 1. 2. 3. 5; SEARCHBASE; ou=Peopl e, dc =Company ;
SEARCHFI LTER; ui d=@USERNAME@;
If you use SSL, please replace l dap: / / with l daps : / /
If you require a special username and password to connect (i.e. anonymous bind not
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
214
allowed or it does not have enough privileges), then specify this username and
password using BI NDDN and BI NDPASSWORD (please note that you need to properly
escape certain special characters if you have them in the password, e.g. % to %25 , ; to %
3B etc.).
If you wish to add a group membership check, you can do it like this:
( &( ui d=@USERNAME@) ( gr oupMember s hi p=c n=s omegr oup, ou=Gr oups , dc =Company ) )
If you are using AD and wish to use subgroups (e.g. you have a top group
Top_I SL_Gr oup and its members are groups like l oc al 1_I SL_Gr oup , l oc al 2_I SL_Gr oup
etc., but you assign users to subgroups, not to the top group directly), then you would do
it like this in order to instruct AD to walk the group chain:
( &( s AMAc c ount Name=@USERNAME@)
( member Of : 1. 2. 840. 113556. 1. 4. 1941: =c n=Top_I SL_Gr oup, ou=Gr oups , dc =Company ) )
If you are using AD, please note that users on ISL Conference Proxy are casesensitive while your AD most likely is not. This means that if you login with e.g. User1,
user1 or USeR1, three users will be created on ISL Conference Proxy even though they
match the same user on AD. In order to avoid this and always create just the user using
the exact same casing from your AD, please use the REMAP parameter (important: the
string between two @ should be lowercased!), e.g. REMAP; \ \ def aul t
\ @s amac c ount name@;
Windows
You can use either perl or .NET for external authentication.
Important: If using perl, the following examples assume that it is installed in c : \ per l .
Please choose the appropriate section based on the external authenticator you are
using:
Radius (requires CPAN module RadiusPerl)
c : \ per l \ bi n\ per l . ex e; aut hent i c at or
\ Radi us Per l . pl ; HOST; 1. 2. 3. 4, 1. 2. 3. 5; SECRET; abc ;
LDAP
3. direct bind approach (for Microsoft Active Directory) - replace MAPUSER to match
your environment:
perl (requires CPAN modules perl-ldap and IO-Socket-SSL):
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
215
c : \ per l \ bi n\ per l . ex e; aut hent i c at or \ per l l dap. pl ; HOST; l dap: / / 1. 2. 3. 4, l dap: / / 1. 2. 3. 5; MAPUSER; @USERNAME@@ex ampl e. c om;
.NET (requires .NET Framework 2.0 or newer):
aut hent i c at or
\ Wi nLdap. ex e; HOST; 1. 2. 3. 4, 1. 2. 3. 5; MAPUSER; @USERNAME@@ex ampl e. c om;
4. search approach (for Novell eDirectory and OpenLDAP) - replace SEARCHBASE
and SEARCHFILTER to match your environment:
perl (requires CPAN modules perl-ldap and IO-Socket-SSL):
c : \ per l \ bi n\ per l . ex e; aut hent i c at or \ per l l dap. pl ; HOST; l dap: / / 1. 2. 3. 4, l dap: / / 1. 2. 3. 5; SEARCHBASE; ou=Peopl e, dc =Company ;
SEARCHFI LTER; ui d=@USERNAME@;
.NET (requires .NET Framework 2.0 or newer):
aut hent i c at or
\ Wi nLdap. ex e; HOST; 1. 2. 3. 4, 1. 2. 3. 5; SEARCHBASE; ou=Peopl e, dc =Company ; SEARCHFI L
TER; ui d=@USERNAME@;
If you use SSL, please replace l dap: / / with l daps : / /
If you require a special username and password to connect (i.e. anonymous bind not
allowed or it does not have enough privileges), then specify this username and
password using BI NDDN and BI NDPASSWORD (please note that you need to properly
escape certain special characters if you have them in the password, e.g. % to %25 , ; to %
3B etc.).
If you wish to add a group membership check, you can do it like this:
( &( ui d=@USERNAME@) ( gr oupMember s hi p=c n=s omegr oup, ou=Gr oups , dc =Company ) )
If you are using AD and wish to use subgroups (e.g. you have a top group
Top_I SL_Gr oup and its members are groups like l oc al 1_I SL_Gr oup , l oc al 2_I SL_Gr oup
etc., but you assign users to subgroups, not to the top group directly), then you would do
it like this in order to instruct AD to walk the group chain:
( &( s AMAc c ount Name=@USERNAME@)
( member Of : 1. 2. 840. 113556. 1. 4. 1941: =c n=Top_I SL_Gr oup, ou=Gr oups , dc =Company ) )
If you are using AD, please note that users on ISL Conference Proxy are casesensitive while your AD most likely is not. This means that if you login with e.g. User1,
user1 or USeR1, three users will be created on ISL Conference Proxy even though they
match the same user on AD. In order to avoid this and always create just the user using
the exact same casing from your AD, please use the REMAP parameter (important: the
string between two @ should be lowercased!), e.g. REMAP; \ \ def aul t
\ @s amac c ount name@;
Having chosen the desired external authentication method, you should first test it from
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
216
the command line - please check the samples below and modify accordingly.
Linux
In the ISL Conference Proxy's authenticator subdirectory, use the per l - l dap. pl like this
(use ' for escaping):
per l per l - l dap. pl HOST l dap: / / 1. 2. 3. 4 SEARCHBASE
' ou=Peopl e, dc =Company , dc =l oc al ' SEARCHFI LTER ' ui d=@USERNAME@' USERNAME
' t es t us er ' PASSWORD * * *
With the appropriate username and password combination you will get the OK reply,
otherwise you will get an error message informing you that the supplied credential is
invalid.
Windows
In the ISL Conference Proxy's authenticator subdirectory, use the Wi nLdap. ex e like this
(please note that on Windows you need to use " for escaping instead of ' and if the
username contains a space, put " around it):
Wi nLdap. ex e HOST 1. 2. 3. 4 SEARCHBASE " ou=Peopl e, dc =Company , dc =l oc al "
SEARCHFI LTER " ui d=@USERNAME@" USERNAME " t es t us er " PASSWORD * * *
With the appropriate username and password combination you will get the OK reply,
otherwise you will get an error message informing you that the supplied credential is
invalid.
Now that you know that those settings work fine, please follow these steps to set the
external authenticator in ISL Conference Proxy:
1. Login to your ISL Conference Proxy administration (http://localhost:7615/conf).
2. Go to User management, click on the Domains tab.
3. Select the desired domain that will use external authentication (e.g. l dapus er s ).
4. Click on the Security tab.
5. Uncheck the External authenticator option and paste the appropriate modified line
from the top part of this topic (with ; as the delimiter - e.g. .NET LDAP direct bind
approach example with modified HOST address(es) and MAPUSER).
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
217
6. Click Save.
This concludes the external authentication configuration. Time to test it - you can go to
http://localhost:7615/ and click Product Login in the top right corner. Use the
appropriate domain prefix (in the example above it would be \ \ l dapus er s \ t es t us er ),
add the LDAP username and password and you should be able to login.
If you have a private cloud with a mix of platforms (windows and linux servers) or
would simply like to create a combined external authentication string which covers both
platforms, please use the following syntax:
{ pl at f or m=wi ndows } c : \ per l \ bi n\ per l . ex e; . . . ;
{ pl at f or m=l i nux } / us r / bi n/ per l ; . . . ;
You can check our one time password example for a simple test illustration of external
authentication.
You are also welcome to check our blog post for more information and an example.
2.12.6 DNS Load Balancer set Client Public IP
DNS request groop-myipAABBCCDDRRRR.islonline.net will evaluate best server
based on IP encoded in AABBCCDD. A, B, C, D are bytes of IP. How it is done in C
implementation below. R is a random number - just to force request to pop up to ISL
servers.
s t d: : s t r i ng hef a: : ex pand_s t ar ( s t d: : s t r i ng name, s t d: : s t r i ng or i g_t ar get )
{
s t d: : s t r i ng r et ;
f or ( s t d: : s t r i ng XSTD_EACH( c h, name) ) {
i f ( * c h == ' * ' ) {
i nt r nd = 7;
i f ( ! or i g_t ar get . empt y ( ) ) {
try {
s t d: : s t r i ng my i p = my _s av ed_i p( or i g_t ar get ) ;
i f ( hef a: : i s _i p( my i p) ) {
r et += " my i p" ;
{
t I Addr addr = hef a: : get _i addr ( my i p) ;
c har buf [ 8] ;
f or ( c har * pt r = buf +s i z eof ( buf ) - 1; pt r >= buf ;
- - pt r ) {
* pt r = c har ( ' a'
addr >>= 4;
+ ( addr & 0x f ) ) ;
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
218
}
r et . append( buf , s i z eof ( buf ) ) ;
}
r nd = 4;
}
} c at c h( . . . ) { }
}
f or ( i nt i =0; i <r nd; ++i )
r et += c har ( ' a' + ( hef a: : r and( ) % ( ' z ' - ' a' +1) ) ) ;
} el s e {
r et += * c h;
}
}
r et ur n r et ;
}
s t d: : s t r i ng hef a: : my _s av ed_i p( s t d: : s t r i ng or i g_t ar get )
{
r et ur n x s t d: : get _c onf i g_s t r i ng_ex ( x s t d: : Us er , " Aut oTr ans por t / Las t
publ i c I P/ " + boos t _t r ans por t _t gt ( or i g_t ar get ) ) ;
}
2.13
Setting up ISL GRID
This chapter describes the procedure of setting up your own ISL GRID.
It involves the following steps:
1. Define servers (define at least two servers that will connect to ISL GRID)
2. Assign licenses (assign licenses to at lest two defined servers)
3. Create packets (create ISL Conference Proxy 3.3 packets for at least two servers)
4. Installation to the servers (install ISL Conference Proxy 3.3 to at least two servers)
5. Firewall configuration (firewall configuration that is required for ISL Conference Proxy
GRID)
6. GRID configuration (create your ISL GRID and connect your servers to it)
7. Configuring DNS settings (configure all required DNS settings)
You need two or more Corporate Server Licenses to setup your own ISL GRID.
Please contact us (sales@islonline.com) for more information on purchasing
appropriate licenses.
Please continue to the Introduction to learn some basics about ISL GRID before
proceeding with the setup procedure.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
219
2.13.1 Introduction
ISL Conference Proxy GRID is a technology which enables you to install more than one
ISL Conference Proxy for added reliability and performance. All instances of ISL
Conference Proxy are automatically synchronized at all times - each has a complete
copy of user database and other control data, e.g. session information. In case of a
failure of one or more servers, other servers are not affected and can continue their
operation without interruptions. In such cases, ISL Online products will detect that the
connection to the current server was broken and will automatically reconnect to another
available server.
If it is possible, ISL Conference Proxies should be installed in geographically separated
locations, so that a failure of one Internet Service Provider’s network connection will not
severely affect the normal operation of your ISL GRID. As an added benefit, the users of
ISL GRID will be redirected to the closest proxy to obtain faster network connections.
Benefits
Higher reliability, failure of a single server does not affect other servers
Better performance, the load on a single server is lessened
Geographically separated installations of proxies provide:
o Resistance to ISP and internet backbone failures
o Better performance, clients are redirected to the closest server
Technical details
Each ISL Conference Proxy server consists of two applications – ISL Conference Proxy
itself and a custom DNS server. Load balancing policy is implemented on DNS level,
even before the client connects to ISL Conference Proxy. DNS server and ISL
Conference Proxy must be running on the same physical machine and are connected
through a channel which informs DNS server about current status of the GRID.
Database replication is performed over connections between proxies. Each proxy
makes connections to all the other proxies in the GRID, resulting in maximum replication
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
220
speed. Replication algorithm also includes automatic conflict resolution - if a server has
been disconnected from the GRID for a longer period of time, the algorithm will
automatically update that server’s database from other servers in the GRID. Even in the
worst case, where several servers were not interconnected due to network failures and
were operating independently, databases will still be correctly synchronized when the
servers restore connections.
Connection procedure
1. Client requests resolution of GRID DNS name, client’s DNS server connects to
one of ISL Conference Proxy DNS servers:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
221
Client
Client's ISP's DNS server
DNS server
DNS server
ISL Conference Proxy
ISL Conference Proxy
Proxy server 1
Proxy server 2
2. Client is redirected to the most appropriate server based on load balancing
policy:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
222
Client
Client's ISP's DNS server
DNS server
DNS server
ISL Conference Proxy
ISL Conference Proxy
Proxy server 1
Proxy server 2
3. When a server failure occurs (e.g. network failure, hardware problem etc.), the
client automatically connects to the other server:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
223
Client
Client's ISP's DNS server
DNS server
DNS server
ISL Conference Proxy
ISL Conference Proxy
Proxy server 1
Proxy server 2
4. ISL Online products' sessions are always hosted on a single server to minimize
network delays. If a server failure occurs, all clients from the server migrate to the
other server (picture below represents an example for ISL Light).
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
ISL Light Desk
ISL Light Client
ISL Light Desk
224
ISL Light Client
DNS server
DNS server
ISL Conference Proxy
ISL Conference Proxy
Proxy server 1
Proxy server 2
Please continue to the first step: Define servers.
2.13.2 Define servers
Please login to your ISL Online account.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
225
Using the My Account menu on the left, please select Server License - info and then
click define new server on the right. Please enter your outer IP address or DNS name
and your inner IP address and click Define Server. This will add it to your server list.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
226
You should repeat this procedure for all the servers that you wish to connect to your ISL
GRID - at least two servers need to be defined to set up ISL GRID.
All servers defined for this purpose should have the same outer address, e.g.
* . c p. domai n. c om and leave the inner IP blank.
Now that you have defined your servers, please continue to the next step - Assign
licenses.
2.13.3 Assign licenses
Assigning a license means linking a license to the specified server.
You need to assign at least one license to two or more previously defined servers in
order to use ISL GRID.
Once you assign a license, you are allowed to change the assignment twice. You
can change the license assignment by selecting the assign licenses link again.
Using the My Account menu on the left, please select Server License - info and then
click assign licenses on the right. Select the desired server from the list that is left to
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
227
the license type you wish to assign and click Change at the bottom.
Having assigned the desired licenses, please continue to the next step: Create packets.
2.13.4 Create packets
In this step, a new packet will be created, based on your defined servers and licenses
assigned.
Repeat the procedure below for each of the servers that will be used in your ISL GRID.
You need to create at least two packets.
Please follow these steps:
1. Using the My Account menu on the left, please select Server License - packets
and then click create new packet on the right.
2. Select the desired server from the list.
3. Select the desired release from the list - in this case, ISL Conference Proxy 3.5.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
228
4. Click Next to continue.
5. If you want, you can enter a comment in the space provided.
6. Click Create packet and wait a moment.
7. You will be presented with a list of packets and your newly created packet will be on
top.
8. You can find some information about the created packet, such as address, license
expire, active connections and ESS expire. Below you will see two files:
Readme.html and confproxy-3-5.license. Please download those two files to your
computer. Readme.html file contains installation instructions and confproxy-35.license is your license file.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
229
Now that you have created at least two packets, please continue to the next chapter Installation to the servers.
2.13.5 Firewall configuration
ISL Conference Proxy requires several TCP ports to operate properly - please refer to
the following chapter for information on setting standard ISL Conference Proxy ports (80,
443 and 7615): Configuring the firewall.
Some additional ports need to be configured in order to use ISL GRID:
UDP port 53 (used for the DNS server)
TCP port 7616 (used for communication between servers - ISL GRID members
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
230
should be able to connect to each other using this port, e.g.:
s er v er 1 TCP/ any
s er v er 2 TCP/ 7616
s er v er 2 TCP/ any
s er v er 1 TCP/ 7616 )
For information on testing your basic firewall configuration (ports 80, 443, 7615), please
refer to the following chapter: Testing the installation.
Having configured your firewall, please continue to the next step: GRID configuration.
2.13.5.1 Installation to the servers
In the previous step, where you created a new packet, you were instructed to save the
following two files for each server to your computer for future use: Readme.html and
confproxy-3-5.license. Please open the Readme.html file - it includes installation
instructions for two types of situations - first installation or upgrade from previous ISL
Conference Proxy versions. This chapter is focused on the first time installation, so
please follow the appropriate instructions, depending on your server's operating system.
Instructions for first installation are included below for convenience.
Please use the installation instructions below on each of the servers that will be part of
your ISL GRID.
Windows
1. Run ISL_Conference_Proxy_3_5_0_win32.exe and follow the installation wizard.
2. Web administration will appear (also available from Start menu or address http://
localhost:7615/conf).
3. Login as user admi n , password as d .
4. Select Basic configuration and enter all necessary fields.
We advise you to fill in the E-mail setup section so that ISL Conference Proxy will be
able to send status information to your e-mail and inform you about critical events,
session invitations etc.
5. Select Licenses and upload the appropriate license file for this server (confproxy3-5.license).
6. Select Online update and download all necessary software components (ISL
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
231
Light, ...).
You may need to perform the Online update a few times, until all Conference Proxy
components are updated. Please repeat the step 6 until there are no more updates
available.
Linux
If your server does not have a graphical user interface, follow steps 1 and 2 and then
run the command c onf pr ox y c t l headl es s where you will be able to change the ISL
Conference Proxy admin password (default is as d ) and to specify trusted networks for
web administration. After that, please perform the remaining steps (starting with step 3)
from a computer with a graphical user interface that is within the specified trusted
network. Replace l oc al hos t in the address with the appropriate server address for your
situation. An alternative is to create an ssh tunnel to your server's local port 7615 and
access the web administration through the created tunnel.
1. Download ISL_Conference_Proxy_3_5_0_linux.bin.
2. Login
as
root
and
install
ISL
Conference
Proxy:
sh
I SL_Conf er enc e_Pr ox y _3_5_0_l i nux . bi n
3. Open web administration, which is available at address http://localhost:7615/conf.
4. Login as user admi n , password as d .
5. Select Basic configuration and enter all necessary fields.
We advise you to fill in the E-mail setup section so that ISL Conference Proxy will be
able to send status information to your e-mail and inform you about critical events,
session invitations etc.
6. Select Licenses and upload the appropriate license file for this server (confproxy3-5.license).
7. Select Online update and download all necessary software components (ISL
Light, ...).
You may need to perform the Online update a few times, until all Conference Proxy
components are updated. Please repeat the step 7 until there are no more updates
available.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
232
After completing the above steps for all the servers that will be part of your ISL GRID,
you might be getting errors about binding ports like the example below, depending on
your current network and server settings:
Ser v er ( - 1) r epor t s er r or s : - Cannot bi nd TCP por t 80
All these errors regarding binding ports (if any) should be resolved after configuring your
firewall - please continue to the next step: Firewall configuration.
2.13.6 GRID Configuration
1. Open ISL Conference Proxy administration on your first server and go to
Configuration - GRID - Create.
Please note: If you do not have the GRID submenu, then you have not yet uploaded
the appropriate licence file to this server. GRID-related options in ISL Conference Proxy
administration are shown only when a GRID licence file is used. Please make sure you
complete all the required steps in this topic: Installation to the servers
2. Set Unique server ID to 1.
3. Enter server's public IP address.
4. Click Create GRID.
To add servers to your GRID, perform these steps for each of the remaining servers
(total number of servers - 1):
1. Set New server ID to 2 (then 3, 4 and so on, up to n where n is total number of
servers).
2. Enter that server's public IP address into the New server public address field.
3. Set New server license file to that server's license file.
4. Click Create GRID connection file.
5. Click the link Download GRID connection file and download the file.
6. Open ISL Conference Proxy administration on that server and go to Configuration GRID - Connect.
7. Choose the GRID connection file that you created and saved in the step 5 and click
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
233
Connect to GRID.
8. Restart ISL Conference Proxy on that server.
If you go to Activity monitor - Servers, you will see Yes in the column Connected for
servers that are successfully connected.
Having connected your servers to GRID, please continue to the next step: Configuring
DNS settings.
2.13.7 Configuring DNS Settngs
First we need to create a new DNS zone - please follow these steps:
1. Open ISL Conference Proxy administration and go to DNS server - Zones.
2. Click Create new zone.
3. Set Enable zone to Yes.
4. Enter c p. domai n. c om under Domains.
5. Click Save.
6. Enter the following under Zone (this is an example for two servers - please note the
leading space in the first two lines):
NS ns 1
NS ns 2
ns 1 A { s er v er _addr es s | 1}
ns 2 A { s er v er _addr es s | 2}
7. Click Save.
8. Check the following entries:
Enable load balancing support
Primary zone for load balancing
Enable GRID server names
Primary zone for GRID server names
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
234
9. Click Save. This zone's status will be displayed below.
You also need to configure your corporate DNS server - glue subdomain records should
be added on the DNS servers for domai n. c om. It should look like this (BIND zone file
format):
c p. domai n. c om IN NS
ns1.c p. domai n. c om
c p. domai n. c om IN NS
ns2.c p. domai n. c om
ns1.c p. domai n. c om IN A XXX
ns2.c p. domai n. c om IN A ZZZ
Replace XXX and ZZZ with the IP addresses of your ISL Conference Proxy servers
2.14
Uninstalling
This chapter includes instructions for uninstalling ISL Conference Proxy. Please follow
the appropriate section, depending on your server's operating system.
Windows
Go to Start - Control Panel - Add or Remove Programs, then uninstall the entry
called ISL Conference Proxy x.y.z (where x.y.z is the version number).
If the uninstall procedure fails (e.g. you get an error "Failed to uninstall service"),
please refer to the Manual uninstall section below.
If you want to delete all ISL Conference Proxy data files from your hard disk, please
remove the installation folder:
. . \ Pr ogr am Fi l es \ I SL Conf er enc e Pr ox y
Replace I SL Conf er enc e Pr ox y above with XLAB I SL Conf er enc e Pr ox y for older
versions of ISL Conference Proxy.
You can also clear the following registry entries:
HKEY_LOCAL_MACHI NE / SOFTWARE / I SL Onl i ne / I SL Conf er enc e Pr ox y
HKEY_CURRENT_USER / SOFTWARE / I SL Onl i ne / I SL Conf er enc e Pr ox y
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
235
Replace I SL Onl i ne above with XLAB for older versions of ISL Conference Proxy.
Manual uninstall
First try rerunning the uninstall, in some cases it might work. If not, please follow these
steps to manually uninstall the program:
1. Stop the (XLAB) ISL Conference Proxy service.
2. Delete the service by deleting the registry entry:
HKEY_LOCAL_MACHI NE / SYSTEM / Cur r ent Cont r ol Set / Ser v i c es / c onf pr ox y
3. Reboot the computer.
4. Delete registry entries:
HKEY_LOCAL_MACHI NE / SOFTWARE / I SL Onl i ne / I SL Conf er enc e Pr ox y
Replace I SL Onl i ne above with XLAB for older versions of ISL Conference Proxy.
5. Remove the installation folder:
. . \ Pr ogr am Fi l es \ I SL Conf er enc e Pr ox y
Replace I SL Conf er enc e Pr ox y above with XLAB I SL Conf er enc e Pr ox y for older
versions of ISL Conference Proxy.
Linux
Login as root and execute the following command: c onf pr ox y c t l uni ns t al l
If you want to delete all ISL Conference Proxy data files from your hard disk, please
remove the installation folder:
/ v ar / c onf pr ox y
2.15
Report module
Under the reports tab there are two reports to choose from:
1. ISL Light Report
2. ISL Pronto Report
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
236
Filtering
Customize report to show only sessions which match selected filters. Available filters:
User (filters sessions by user who started the session)
Domain (filters sessions by domain in which session was done)
Filter (filters sessions by selected filter - ISL Pronto only)
Time range (only show sessions made in selected time range).
If a domain filter is set, only users and filters from that domain are available. In ISL
Pronto report, filter and user settings cannot be active at the same time. When one of
those is set, the other one is disabled. To enable it, the set filter needs to be unset.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
237
Anchor link
Whenever a report is customized, the changes are saved in report link as an anchor.
You can copy the link shown below and send it to another user. The same report will be
shown. For the link to work, a user needs to be logged in before hand.
Refreshing the report will also keep all previous user settings.
Cookies
Every change made to the report (filtering) is also saved in a cookie. When a user visits
the report next time, the same filters will be set.
Filters saved in cookies are:
User
Domain
Filter (ISL Pronto only)
Report type (ISL Pronto only)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
238
Exporting
By clicking the "export" button in the bottom right hand corner, you can export all
sessions from the current report (selected filters are included) in CSV (CommaSeparated Values) or Excel format.
You can choose from three different file formats:
CSV (";") - csv file delimited by semicolon
CSV (",") - csv file delimited by comma
Excel - xls file delimited by space
2.15.1 ISL Light
Report displays daily ISL Light (remote support) sessions made.
Report consists of five parts::
Filters [1] - Allow filtering which sessions are displayed.
Session Chart [2] - Displays a chart of daily sessions. On point hover, more
information about sessions that day are shown. If a time range of one day is selected,
it displays hours instead of days [5].
Session Statistics [3] - Contains aggregated data about all listed sessions.
Session List [4] - Lists all sessions that match selected filters. On the bottom left-hand
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
239
side, you can select number of sessions listed per page and switch between pages.
On the bottom right-hand side, you can export the sessions.
Select which session fields should be displayed for each session. Here you can also
enable the custom fields to be visible if there are any present [5].
Session fields:
Username - supporter's username
Start - date and time of when the session started
Stop - date and time of when the session ended
Duration - how long the session lasted
Type - session type (light or always on)
Session name
Client email
Code (session code used for the session)
Bytes (transferred bytes during session)
Client address
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
240
Desk address
Client Platform
Desk Platform
Client Version
Desk Version
Wait Time
Chat
Notes
Platform
Program version
IP Address
Language
Country code
Country
City
Network interfaces
Capabilities
OS version
OS architecture
Agent
2.15.2 ISL Pronto
Report displays daily ISL Pronto (live chat) sessions made.
Report consists of six parts:
Filters [1] - Allows filtering which sessions are displayed.
Report Type [2] - Select a report type. Available types are:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
241
a. Overview - Default report type, lists all sessions.
b. Hours of day - Shows session information for each hour of day ( 00:00 - 01:00,
01:00 - 02:00, ... ).
c. Days of week - Shows session information for each day of week ( monday,
tuesday, ... ).
d. Missed chats - Shows all missed (unanswered) chats.
Session Chart [3] - Displays a chart of daily sessions. To get more info about
sessions for a particular day/hour (depends on the report type selected) hover your
mouse cursor over a point on a graph. If a time range of one day is selected, it
displays hours instead of days.
Session Statistics [4] - Contains aggregated data about all listed sessions.
Session List [5] - Lists all sessions that match selected filters. On the bottom left-hand
sides, you can select number of sessions listed per page and switch between pages.
On the bottom right-hand side, you can export the sessions in the desired format.
Press the
button to select which session fields should be displayed for each
session. Here you can also enable the custom fields to be visible if there are any
present [6].
Graphical representation of answered and missed chats [7].
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
242
Session fields:
start - date and time of when the session started
client name - client's name
client email - client's email
username - supporter's username
filter - filter that supporter belongs to
wait time - time it took for a supporter to answer the chat
duration - how long the session lasted
chat - link to chat transcript
Custom fields
2.16
User web pages customization
Starting with ISL Conference Proxy 4.3.0 we have introduced an improved templating
system, allowing you to make branding changes quickly and easily, without having to
create page overrides.
This new templating system is currently the only recommended and supported way of
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
243
user web pages customization, please proceed to the following topic to learn more
about it and see:
Templating
This topic includes the following subtopics:
Templating (simple and effective way of adjusting the look of user web pages)
Export web pages (advanced users only, make sure you read the important note on
top)
Classical overrides (advanced users only, make sure you read the important note on
top)
Old templating (deprecated, included for reference only, do not use)
2.16.1 Templating
Default ISL Conference Proxy user web pages look like this:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
244
ISL Conference Proxy 4.3.0 has introduced an improved templating system, allowing
you to make branding changes quickly and easily, without having to create page
overrides.
This topic will show you how simple it is to replace the company logo image, change
primary button and link colors, as well as remove the "Administration" link in the bottom
right corner.
Before proceeding you need to decide on a few parameters, basically desired colors
and the logo image. You can check the list below, along with placeholder names and
values for this example:
Company logo image (maximum width X, maximum height 40 pixels - we will use
webs pac e__my c ompany _l ogo. png shown below)
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
245
Primary button background color (BUTTONBACKGROUNDCOLOR, we will use #f f 0000 )
Primary button border color (BUTTONBORDERCOLOR, we will use #f f 0000 )
Primary button text color (BUTTONTEXTCOLOR, we will use #f f f f f f )
Primary button hover background color (BUTTONHOVERBACKGROUNDCOLOR, we will use
#c c 0000 )
Primary button hover border color (BUTTONHOVERBORDERCOLOR, we will use #c c 0000 )
Primary button hover text color (BUTTONHOVERTEXTCOLOR, we will use #f f f f f f )
Text link color (TEXTLI NKCOLOR, we will use #f f 0000 )
Text link hover color (TEXTLI NKHOVERCOLOR, we will use #c c 0000 )
This new templating method uses the hooks approach to allow you to change exactly the
desired part without touching the rest of the page. There are a lot of hookable points in
the template, some are really basic while the other are for advanced users only. You are
welcome to check the default template in order to see all available hooks, it is located at
the following link: http://localhost:7615/default_templates/Base/web_template.html
Let us start with a few simple examples to illustrate this:
If you wish to change the logo image, simply set the logo image source hook to the
desired value:
{ { hook | l ogo: s r c | / webs pac e/ my c ompany _l ogo. png} }
If you wish to remove the links to configuration and the manual, simply set the
appropriate hooks to empty:
{ { hook | f oot er . c onf | } }
{ { hook | f oot er . hel p| } }
If you wish to add custom CSS, just add the appropriate head css hook:
{ { hook | head#c s s |
<s t y l e>
/ * y our c us t om s t y l es her e * /
</ s t y l e>
}}
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
246
You should get the general idea, now let us proceed to a working example based on the
parameters set above (company logo and colors).
Please follow these steps:
1. Save web_template_hooks.html to your machine.
2. Go to Configuration - Advanced - Web server, change the setting Use custom
web template to Yes and click Save at the bottom.
3. Go to Configuration - Advanced - File storage - Private, upload two prepared
files:
Company logo (prepared as webs pac e__my c ompany _l ogo. png)
Custom template (prepared as web_t empl at e_hook s . ht ml )
If you now proceed to check your ICP join page, it will look like this:
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
247
This was just a simple example to get the general idea and help you get started. You can
open web_template_hooks.html in a text editor and you will see how we applied the
parameters from the top to the actual template.
{ { hook | l ogo: s r c | / webs pac e/ my c ompany _l ogo. png} }
{ { hook | l ogo: al t | My Company } }
{ { hook | head. t i t l e| <t i t l e>My Company Suppor t - { { ht ml _x pp| t i t l e} } </ t i t l e>} }
{ { hook | nav bar - br and: hr ef | ht t p: / / www. ex ampl e. c om/ } }
{ { hook | f oot er . c onf | } }
{ { hook | f oot er . hel p| } }
{ { hook | head#c s s |
<s t y l e>
a { c ol or : / * TEXTLI NKCOLOR* / #f f 0000; }
a: f oc us , a: hov er { c ol or : / * TEXTLI NKHOVERCOLOR* / #c c 0000; }
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
248
. but t on. s c t a, . bt n- c t a, . ui - di al og . ui - di al og- but t ons et but t on: f i r s t - c hi l d
{ c ol or : / * BUTTONTEXTCOLOR* / #f f f f f f ; bac k gr ound- c ol or : /
* BUTTONBACKGROUNDCOLOR* / #f f 0000; bor der - c ol or : / * BUTTONBORDERCOLOR* / #f f 0000; }
. but t on. s c t a: hov er , . bt n- c t a: hov er , . bt n- c t a. hov er , . ui - di al og . ui - di al ogbut t ons et but t on: f i r s t - c hi l d: hov er { c ol or : / * BUTTONHOVERTEXTCOLOR* /
#f f f f f f ; bac k gr ound- c ol or : / * BUTTONHOVERBACKGROUNDCOLOR* / #c c 0000; bor der c ol or : / * BUTTONHOVERBORDERCOLOR* / #c c 0000; }
@medi a ( mi n- wi dt h: 768px ) {
. nav bar - nav > l i > a: hov er , . nav bar - nav > l i > a: f oc us , . nav . open>a,
. nav . open>a: f oc us , . nav . open>a: hov er { bor der - bot t om: 2px s ol i d /
* TEXTLI NKCOLOR* / #f f 0000; }
. nav . open>a, . nav . open>a: f oc us , . nav . open>a: hov er { bor der - c ol or : /
* TEXTLI NKCOLOR* / #f f 0000; }
}
i nput [ t y pe=" t ex t " ] : f oc us , i nput [ t y pe=" pas s wor d" ] : f oc us ,
t ex t ar ea: f oc us , . s ear c h- bar : f oc us , . f oc us ed- i nput , . f or m- c ont r ol : f oc us
{ bor der : 1px s ol i d / * BUTTONBORDERCOLOR* / #f f 0000; box - s hadow: 0 0 5px /
* BUTTONBORDERCOLOR* / #f f 0000; out l i ne: 0; }
#j oi n- c ont ent > di v . f or m- gr oup. r ow. f or m- i nput - wr apper . nomar gi n. f l oat - l abel
> l abel { c ol or : / * TEXTLI NKCOLOR* / #f f 0000; }
#pr oduc t - nav i gat i on- menu > l i > a. ac t i v e, #pr oduc t - nav i gat i on- menu > l i >
a: hov er , #pr oduc t - nav i gat i on- menu > l i > a: ac t i v e, #pr oduc t - nav i gat i on- menu
> l i > a: f oc us , #pr oduc t - nav i gat i on- menu > nos c r i pt > l i > a. ac t i v e,
#pr oduc t - nav i gat i on- menu > nos c r i pt > l i > a: hov er , #pr oduc t - nav i gat i onmenu > nos c r i pt > l i > a: ac t i v e, #pr oduc t - nav i gat i on- menu > nos c r i pt > l i >
a: f oc us { c ol or : / * TEXTLI NKCOLOR* / #f f 0000; }
</ s t y l e>
}}
2.16.2 Export web pages
Important: This topic is for advanced users with very specific needs that should be
handled in coordination with the ISL Online support team to avoid issues - if you only
want to replace company logo, adjust colors and the general look of pages, please
proceed to the following topic: Templating
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
249
If you would like to change more than just a couple of web pages and if you want full
control over ICP's displayed web pages, you can use export web pages approach. This
is simply done by creating develop_web_content folder inside ICP's installation folder
and restart ICP. The result will be that every page displayed or loaded will be exported
to this folder and ICP will also load the content of these files when pages are visited in
case the export folder exists.
This approach allows the creation of new web content hosted by ICP. All rules, file
naming and supported versions are the same as explained in Classical overrides
section.
Warning
When ICP or modules get upgraded, all unchanged files in develop_web_folder will
update with newer files. The ones that have been changed will remain intact and you
are required to do manual upgrade/merge with new files if required.
If you are using ICP grid this approach will not work, because the files in
develop_web_folder do not get synchronized between ICPs.
Example
Please follow example in Classical overrides section, but instead of uploading file in
private storage of your ICP, replace the file in develop_web_folder with new version and
join page should get updated.
2.16.3 Classical overrides
Important: This topic is for advanced users with very specific needs that should be
handled in coordination with the ISL Online support team to avoid issues - if you simply
want to replace company logo, adjust colors and the general look of pages, please
proceed to the following topic: Templating
Override pages are used when there is need for editing, changing or customizing a
specific web page. This approach is not recommended for development of new web
content or changing all user web pages.
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
250
If you would like to change whole outlook of ICP's pages please read Templating
section first and then Export web pages section.
Warning
Please note, that ICP will use overrides even when/if you upgrade ICP or any of the
modules. So in case you prepared override for ISL Light module page(s), be sure to
remove or rename them after you upgrade the module or your overrides will be
displayed.
Example
The best way to explain how overrides work is if take a look at an example.
Default session join page on ICP looks like this:
Let's say we do not want to allow users to join via the join page, so we will create
override page for /users/main/join.html.
Let's create new HTML file with new join page content. For test purposes we will just add
notification, that joining via join page is not allowed.
<di v c l as s =" c ont ent " >
<h3>You ar e not al l owed t o j oi n s es s i ons v i a t hi s page</ h3>
<p>Pl eas e c ont ac t our s uppor t t eam at : s uppor t @ex ampl e. c om</ p>
</ di v >
As you can see, this is HTML file is not in the usual HTML format, it does not have any of
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
251
the main html tags like: <html>, <head> and <body>. That is because the page is
wrapped inside the default ICP template, which adds these sections to HTML web
page. For more information on customizing the template, see Templating section.
Now rename this file to: web_content___users__main__join__1.html and upload it
to your private storage on ICP. Your private storage should look similar to this:
Now if you visit the link: http://localhost/users/main/join.html, the page should look like
this:
File naming
To make it active you need to name it in the correct fashion:
web_content___<folder1>__<folder2>__<folder3>...<filename>__<web_ui_version>.<fi
le_type>
Explanation; take any URL on ICP (/users/main/join.html):
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
252
- w eb _co n ten t is required prefix followed by 3 underscores,
- any / in url must be replaced with 2 underscores,
- version of basic ICP pages is 1, so we add 2 underscores and number 1,
- now we add .html suffix.
So for our URL, file gets the name: web_content___users__main__join__1.html. We
can do the same for any page on ICP.
With this method you can change any existing web page or even add new content to
ICP. For more changing or editing of ICP pages, please look at the Export web pages
section.
Escape commands
You can use server side escape commands in any override files. For more information
about escape commands, please check Templating section.
Supported version
Overrides are supported in these versions:
- ICP version 3.5.6+
- ISL AlwaysOn 4.1+
- ISL Light
- ISL Groop
- ISL Pronto
If you want to create overrides in older versions, only module overrides are/were
supported. In that case file naming is changed:
ISL LIGHT: light_<filename>.<filetype>
ISL ALWAYSON: islaon_<filename>.<filetype>
ISL PRONTO: islpronto_<filename>.<filetype>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
253
ISL GROOP: islgroop_<filename>.<filetype>
If you are using older version of modules, you cannot create new content using
overrides. Only existing files from module(s) can be overridden.
2.16.4 Old templating
Important: This topic is included for reference/historical reasons. This old templating
approach has been deprecated with ISL Conference Proxy 4.3.0 and should not be
used for user web pages customization. Please proceed to the following topic:
Templating
Default ISL Conference Proxy user web pages look like this:
They can be customized to suit your needs. The customization template file is called
modul e_t empl at e_page. ht ml (see below for the default template) and needs to be
uploaded through the ISL Conference Proxy administration - login and go to
Configuration - Advanced - File Storage - Private. Once the template file has been
uploaded, a file will be created: $CPDI R/ obj ec t s / modul e_t empl at e_page. ht ml , where
$CPDI R is ISL Conference Proxy installation directory (C: \ Pr ogr am Fi l es \ XLAB I SL
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
254
on Windows or / v ar / c onf pr ox y on Linux). Having uploaded the file,
it can now be edited directly.
Conf er enc e Pr ox y
You can start with a simple template, like this:
<ht ml ><body >{ { ht ml _x pp| c ont ent } } </ body ></ ht ml >
The only requirement is to have { { ht ml _x pp| c ont ent } } somewhere in the template.
To upload additional files, please follow this procedure - we shall assume that you want
to upload an image called pi c . j pg :
1. Rename the image file to c us t om_c ont ent _pi c . j pg .
2. Go to the ISL Conference Proxy administration, then select Configuration Advanced - File storage - Private (you should see modul e_t empl at e_page. ht ml in
the file list).
3. Upload c us t om_c ont ent _pi c . j pg .
Now you have uploaded the image and it is available at the following address (replace
l oc al hos t with your server address): h ttp://lo clah o s t/u s ers /cu s to m /pic.jpg
You can download two simple examples here:
template_example_1.zip (includes many comments in the html file, read them for more
information on what each section does)
template_example_2.zip (this is a slightly modified default template that can be used
when you wish to allow your customers only to change the language and enter a session
code, but not login or access module pages directly - in this case, your staff can login at
http://localhost:7615/users/main/login.html and when logged in, all options will be visible)
Important: Please note that you cannot change texts that are generated by ISL
Conference Proxy (the { { ht ml _x pp| c ont ent } } part) - you can only use CSS to style
elements of that content.
You can refer to these two samples, just to see what is possible through user web pages
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
255
customization:
customization for our ISL Online Network - complete customization, modules are
implemented as horizontal tabs, added ISL Pronto powered live chat button, extra
texts etc.
customization for Government of the Republic of Slovenia - Ministry of Public
Administration - default module menu ({ { def aul t _modul e_menu} } ) was used in this
one, since their main page also uses vertical menu on the left side
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
256
The default template which is present in ISL Conference Proxy
N ote: T he tem plate below is just an exam ple to illustrate the custom ization from an
old version of IS L C onference P roxy. T o get the latest tem plate, please open http://
localhost:7615/default_tem plates/B ase/m odule_tem plate_page.htm l
{ { doc t y pe_ht ml 4} }
<ht ml >
<head>
<s t y l e t y pe=" t ex t / c s s " >
body {
bac k gr ound: #ddd;
f ont - f ami l y : v er dana, s ans - s er i f ;
s pac i ng: 0;
mar gi n: 0;
f ont - s i z e: 10pt ;
}
t abl e {
f ont - s i z e: 10pt ;
}
. t op {
wi dt h: 100%;
t ex t - al i gn: c ent er ;
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
257
c ol or : #f f f ;
bac k gr ound: #666;
mar gi n: 0;
l i ne- hei ght : 36pt ;
f ont - s i z e: 20pt ;
f ont - wei ght : bol d;
}
. s er v i c ebar {
mar gi n: 0 15% 0 15%;
bac k gr ound: #000;
paddi ng: 3pt ;
}
. s er v i c ename {
c ol or : #f f f ;
f ont - wei ght : bol d;
paddi ng- l ef t : 13pt ;
}
. l ogi n {
c ol or : #f f f ;
paddi ng- r i ght : 5pt ;
t ex t - al i gn: r i ght ;
}
. l ogi n a {
c ol or : #f f f ;
}
. c ont ent {
bac k gr ound: #f f f ;
mar gi n: 0 15% 0 15%;
paddi ng: 16pt ;
}
</ s t y l e>
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
258
</ head>
<body >
<di v c l as s =" t op" >I SL Conf er enc e Pr ox y @ { { es c ape| { { s er v i c e_addr es s |
{ { ht ml _x pp| l oad_bal anc i ng_s er v i c e} } } } } } </ di v >
<di v c l as s =" s er v i c ebar " >
<t abl e s t y l e=" bor der : 0; wi dt h: 100%" c el l s pac i ng=" 0" c el l paddi ng=" 0" >
<t r >
{ { i f | { { neq| I SL CONFERENCE PROXY| { { ht ml _x pp| modul e} } } } | <t d
c l as s =" s er v i c ename" >{ { es c ape| { { ht ml _x pp| modul e_ni c e} } } } </ t d>} }
<t d c l as s =" l ogi n" >{ { i f el s e| { { l ogged_i n} } | { { l ogged_i n_us er } } : <a
hr ef =" { { es c ape| { { us er s _webpat h_l i nk | mai n/ ac c ount . ht ml } } } } " >Ac c ount </ a>
&#x 7c ; <a hr ef =" { { es c ape| { { l ogout _l i nk } } } } " >Logout </ a>| <a hr ef =" { { es c ape|
{ { l ogi n_l i nk } } } } " >Logi n</ a>} } </ t d>
</ t r >
</ t abl e>
</ di v >
<di v c l as s =" c ont ent " >
<t abl e s t y l e=" bor der : 0; " c el l s pac i ng=" 0" c el l paddi ng=" 0" >
<t r >
<t d s t y l e=" v er t i c al - al i gn: t op; paddi ng- r i ght :
48pt ; " >{ { def aul t _modul e_menu} } </ t d>
<t d s t y l e=" v er t i c al - al i gn: t op; " >{ { ht ml _x pp| c ont ent } } </ t d>
</ t r >
</ t abl e>
</ di v >
</ body >
</ ht ml >
Explanation of escape commands:
{ { doc t y pe_ht ml 4} }
{ { es c ape| x } }
- specifies HTML 4 document type
- does proper HTML escaping for x
{ { s er v i c e_addr es s | a} }
{ { ht ml _x pp| modul e} }
- get server name for service a (like ISL Light)
- license name of current module
© 2016 ISL Online
ISL Conference Proxy Manual
Manual
{ { ht ml _x pp| modul e_ni c e} }
- visible name of current module
{ { ht ml _x pp| l oad_bal anc i ng_s er v i c e} }
{ { us er s _webpat h_l i nk | x } }
{ { l ogged_i n} }
- produces a link to /users/x
- currently logged in username
- show a if e is a non-empty string
{ { i f el s e| e| a| b} }
{ { eq| a| b} }
- current service (like ISL Light)
- returns 1 if user is logged in
{ { l ogged_i n_us er } }
{ { i f | e| a} }
259
- show a if e is a non-empty string, otherwise b
- returns 1 if a and b are equal
{ { neq| a| b} }
- returns 1 if a and b are NOT equal
{ { l ogi n_l i nk } }
- link to login page
{ { l ogout _l i nk } }
- link to logout page
{ { def aul t _modul e_menu} }
- creates a menu with module pages
{ { c hange_l anguage_l i nk } }
{ { onl ang| x | y } }
- show y if language is set to x
{ { not onl ang| x | y } }
- show y if language is not set to x
{ { ur l _pat h| { { or i gi n} } } }
{ { l ang_c ode} }
- produces a link to change the language
- produces the origin link
- shows current language code
{ { l ang_v ar i ant } }
- shows current language variant
{ { s es s i on_ex pi r ed} }
{ { s er v er _addr es s } }
- set to 1 if session expired or user is not logged in
- shows server address
© 2016 ISL Online
ISL Conference Proxy Manual
3
FAQ
260
FAQ
Please refer to the Frequently answered questions manual.
© 2016 ISL Online
ISL Conference Proxy Manual
FAQ
261
© 2016 ISL Online
ISL Conference Proxy Manual
4
Step By Step Guides
262
Step By Step Guides
In this section you will find step by step guides on how to use/configure/setup conference
proxy and related software.
ISL Conference Proxy initial checklist
ISL Conference Proxy configuration best practices
ISL Groop Customizations
4.1
ISL Conference Proxy initial checklist
This topic includes the initial checklist when planning to setup your server and useful
links to help you get started with most common tasks.
User management
Will you manually create users on ICP or do you plan to integrate with an external
authenticator?
You need to decide who will need to have access to the system, either to all four
products or just a subset of products.
Will you group users into domains on ICP, allowing easier administration compared to
a flat list of users, all in a single domain?
Will you need to limit the number of active sessions per user/per domain?
Will there be different customizations per user/per domain?
Remote support (ISL Light)
Use cases
How will you mainly use ISL Light? You can use one or more of the following methods:
access point (a customer visits your ICP web page and enters the provided session
code - you can check this manual topic for more info about customizing that page:
User web pages customization)
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
263
directly (a customer downloads ISL Light Client and enters the session code
afterwards - you can check Starting products for direct ISL Light links)
integrate a connection box to your website (a customer enters a session code into the
form on your website and runs the offered excutable - you can check this link for an
example)
starting it from ISL Pronto (a supporter uses the remote desktop button in the ISL
Pronto client toolbar to start ISL Light Desk, automatically generate a session code
and push a connection link to the customer)
Customizations
add a company logo to ISL Light
add command line arguments to ISL Light by default so that you start viewing and
controlling customer's desktop as soon as you connect
customize the ISL Light executable name
customize the ISL Light program icon
customize the ISL Light window title
record ISL Light sessions automatically (e.g. on a network share which is mapped to a
drive on your supporters' machines)
different permissions for different supporters, e.g. view only, no file transfer
Please check the ISL Light manual for further details.
Remote Access (ISL AlwaysOn)
Use cases
How will you mainly use ISL AlwaysOn? You can use one or more of the following
methods:
add the desired computers you control to your list (you login to your account, click add
this computer and follow the installation wizard)
have other people add their computers to your list (you send a grant link to the
customer by logging in to your account and clicking add remote computer)
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
264
deploy the ISL AlwaysOn installer to a number of machines in order to add them all to
your list (you can check this link for more information)
prepare a master computer so that after cloning it the cloned computers will appear in
your list (you need to follow a special procedure, check this link)
Customizations
set connection passwords or one-time passwords (check this link for more
information)
enable automatic session recording
enable email notifications
Please check the ISL AlwaysOn manual for further details.
Live chat (ISL Pronto)
Use cases
How will you mainly use ISL Pronto? You can use one or more of the following methods:
support tool for your customers (customer to supporter chats)
enterprise instant messenger (supporter to supporter chats)
Customizations
customize the live chat layout
customize the messages shown in the live chat
enable/disable the preview mode for customer to supporter chats
enable/disable the preview mode for supporter to supporter chats
Please check the ISL Pronto manual for further details.
Web conference (ISL Groop)
General
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
265
How will you mainly use ISL Groop? There are different use cases and you should be
aware of potential problems.
bandwidth requirements (check this link for some examples)
different roles and their specifics (a skilled meeting host who controls everything is
very important in order to have a successful meeting - please check this link for more
information)
Customization
customize the default layout (show or hide certain elements, change the window title
etc.)
enable audio and/or video as soon as you join a meeting
set the default role for a meeting, specify who can start a meeting
Please check the ISL Groop manual for further details.
4.2
ISL Conference Proxy configuration best practices
This topic includes suggestions and best practices regarding ISL Conference Proxy
configuration and security.
Whenever you deploy ISL Conference Proxy to a server, no matter if it is a Linux or
Windows machine, you should make sure it is as secure as possible.
Some of these steps are quite general (not ICP-specific, not OS-specific), but we will list
them anyway for reference:
1. Reduce the possible attack surface, i.e. disable (or even better, uninstall if possible)
everything you do not need on the server (ICP does not have any external
dependencies such as web server, database etc., so you do not need those roles).
2. Keep the server (OS and installed programs) up to date.
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
266
3. Allow access only to ports you need for ICP (check this manual topic for more
information) and your access (SSH, RDP), drop/block the rest.
4. Use strong passwords for both the machine itself and for ICP administration.
5. Make sure you have configured the mail server and related settings so that you will
receive error reports and notification emails from ICP:
Conf i gur at i on - > Gener al
- > Out goi ng mai l
Conf i gur at i on - > Gener al
- > SMTP por t
Conf i gur at i on - > Gener al
- > Def aul t e- mai l
Conf i gur at i on - > Gener al
- > Sy s t em e- mai l
s er v er ( SMTP)
f r om addr es s
goes t o
6. Enable SSL for ICP web pages - check this manual topic for more information.
7. Check the SSL protocols and cipher suite settings (sample values included below)
and make sure they match your security and compatibility requirements. Default
protocol and cipher suite settings should be a good starting point and in case you
have no specific requirements you should leave them at their default values.
Conf i gur at i on - > Gener al
- > HTTPT SSL pr ot oc ol : ALL - SSLv 2 - SSLv 3
Conf i gur at i on - > Gener al - > HTTPT SSL c i pher s ui t e:
HI GH: MEDI UM: ! aNULL: ! eNULL: ! SSLv 2: ! RC4: ! MD5: @STRENGTH
Important: Before making any permanent changes to protocol or cipher suite
settings we strongly suggest testing all your main use cases to make sure these
changes will not break backward compatibility where this is not acceptable. Suggested
further reading:
https://en.wikipedia.org/wiki/Transport_Layer_Security#Applications_and_adoption
[wikipedia.org]
https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations
[mozilla.org]
8. By default ICP administration is only possible from localhost - if plan to access the
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
267
ICP administration machine via RDP or through an SSH tunnel, you can keep this
default setting. If you would like direct access to ICP administration from another
machine, make sure you have an SSL certificate on your ICP and you force SSL for
administration:
Conf i gur at i on - > Sec ur i t y - > Mus t us e SSL f or admi ni s t r at i on: Yes
Then you can set the trusted network address(es) and/or subnets that should have
access to the ICP administration:
Conf i gur at i on - > Sec ur i t y - > Al l owed I P addr es s es f or admi ni s t r at i on
9. Force SSL for all ICP user web pages, websockets and webapi:
Conf i gur at i on - > Sec ur i t y - > For c e SSL f or al l
us er web pages : Yes
Conf i gur at i on - > Sec ur i t y - > For c e SSL f or WebSoc k et s : Yes
Conf i gur at i on - > Sec ur i t y - > For c e SSL f or WEBAPI : Yes
Conf i gur at i on - > Sec ur i t y - > For c e SSL f or WEBAPI 2: Yes
10.You might want to generate custom crypto keys (software signatures, client to server,
client to client), you can do it here:
Conf i gur at i on - > Adv anc ed - > Sec ur i t y
Important: Make sure you read the note on top. All old (already downloaded)
programs will fail to connect if you generate new keys! In other words, if you want to do it,
do it immediately, before putting the server into production. If you have existing
machines with old keys, you will need to remove them from registry - remove the
appropriate entry for your server from HKEY_LOCAL_MACHI NE\ SOFTWARE\ WOW6432Node\ I SL
Onl i ne\ Gr i d and/or HKEY_CURRENT_USER\ SOFTWARE\ I SL Onl i ne\ Gr i d , then download a
new program and run it.
11.Last but not least, make regular backups.
4.3
ISL Conference Proxy Storage Module - Session Recordings
Please note: Server side session recording requires ISL Conference Proxy 4.2 or higher.
ISL Light module now supports server side session recording.
Server side session recording is supported on ISL Light 4.0.2 or higher, any lower versions than this will show
an error.
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
268
How to set up server side session recording
1. Navigate to your ISL Conference Proxy configuration page
2. Select "Storage" -> "Areas"
3. Create a new storage area
4. Define the name of the area, and the path to the location where you want the
recordings to be saved. (Please ensure that ISL Conference Proxy has write
permissions for that folder.)
5. Save the storage area
6. Select "Configuration" -> "ISL Light" (You can choose to select a specific user for the
session recording by going to "User Management" -> User -> "ISL Light")
7. Uncheck the setting "Recording session template"
8. Define the template as how you would like your recordings to be named. (e.g.
storage://light/ISLLight-{{timestamp}}.isr)
9. Click "Save" in the bottom right hand corner.
Server side session recording is now set up!
Open up ISL Light (4.0.2 or higher) and start a session. Once the session has ended,
you will find the recording in the path defined within the storage area.
4.4
ISL Groop Customizations
Server license users have the ability to set up their own ISL Groop customizations. They
are created in a .ini file format. Please follow the guide below to generate your own
customizations.
1. Open up a notepad on your computer.
2. Copy and Paste the example code below into the notepad document.
Save the notepad document in a .ini file format so you have a copy of the file locally on
your machine for reference (example below).
exam ple of the default code that is used for running IS L Groop.
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
269
[ Gener al ]
wi ndow_t i t l e= Tes t Ti t l e f or Gr oop - { s es s i on_des c } ( { s es s i on_c ode} )
audi o=of f
v i deo=of f
[ Pr es ent at i on Lay out ]
r i bbon_v i s i bl e=y es
r i bbon_f ol ded=no
t ool s _v i s i bl e=y es
t ool s _f ol ded=no
t ool s _podi um_v i deo_v i s i bl e=y es
t ool s _podi um_v i deo_f ol ded=no
t ool s _par t i c i pant s _f ol ded=no
t ool s _mes s ages _f ol ded=no
v i deos _v i s i bl e=y es
v i deos _f ol ded=no
s l i des _v i s i bl e=y es
s l i des _t humbs =y es
s l i des _z oomed=y es
[ Conf er enc e Lay out ]
r i bbon_v i s i bl e=y es
r i bbon_f ol ded=no
t ool s _v i s i bl e=y es
t ool s _f ol ded=no
t ool s _podi um_v i deo_v i s i bl e=no
t ool s _par t i c i pant s _f ol ded=no
t ool s _mes s ages _f ol ded=no
v i deos _v i s i bl e=y es
v i deos _f ol ded=no
s l i des _v i s i bl e=no
3. Save the notepad document in a .ini file format so you have a copy of the file locally on
your machine for reference (example below).
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
270
4. Now you need to edit the customization to the way you want ISL Groop to look.
Here is a reference to what you can edit in the customization .ini file.
General
Window title - Type in what you wish to call your meeting (d o not edit session desc and
code).
Audio and Video - change to "on" or "off".
Presentation Layout
You may use the options "yes" or "no".
Conference Layout
You may use the options "yes" or "no".
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
271
Here is an example of a customization of the ISL Groop layout in Presentation
Mode.
Audio and Video has been automatically enabled on startup.
Ribbon has been hidden.
Participants list and messages has been folded.
Here is a screenshot to show what happens after the layout changes.
Another example of a customization of the ISL Groop layout in Conference
Mode.
Tools have been hidden.
Participants List folded.
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
272
Message box folded.
Here is a screenshot to show what happens after the layout changes.
4.5
Resetting web access filters
Note: Following options are only available in ISL Conference proxy 4.1.5 and above
With ISL Conference proxy 4.1.5, a new option was added to enable you to quickly clear
all the defined web access filters.
Windows
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
273
W eb access filters are defined in IS L C onference proxy under C onfiguration>S ecurity->F ilters that define access to web pages, if set they allow/block users or IP 's
from accessing IS L C onference proxy web pages.
To quickly reset the defined web filters without logging into your ISL Conference proxy
account, navigate to installation folder of ISL Conference proxy. In my example it was
installed in the default location: C:\Program Files\ISL Conference Proxy. If you have
ISL Conference proxy version 4.1.5 or above then the following executable file will be
present: cmd_reset_web_access_filter.bat
Run the file mentioned above, command window will pop up, notifying you to press any
key to complete the process. You will see if the process was successful if another file
was created with the same name and no extension. This is an empty file and acts as a
flag, signaling ISL Conference proxy to reset the web access filters.
Filters will now be reset once the ISL Conference Proxy server is restarted and the
empty file created earlier will be automatically removed.
© 2016 ISL Online
ISL Conference Proxy Manual
Step By Step Guides
274
Linux
With ISL Conference proxy 4.1.5 you also have new options on how to reset the defined
web access filters. You can directly reset them with the following command in terminal:
c onf pr ox y c t l
r e s e t we b a c c e s s f i l t e r
or similarly to ISL Conference proxy on Windows, you can create a file with the following name and place it into
installation directory: cmd_reset_w eb_access_filter, once you create the file you should also restart the
server for changes to take place.
© 2016 ISL Online