Endpoints
Endpoints - The Views web service has several connection points depending if the client is local or remote and the type of security required. Remote listening ports have default values but can be changed to allow user defined ports.
Net.Pipe - Windows (Local Only) - Used when the connection is from a client on the local machine. Windows Authentication uses logon information of the current user.
Net.Pipe - Anonymous (Local Only) - Allows any local user access without credentials.
Net.TCP - Windows - Uses the windows credentials of the client user to make a secure connection through the default port 55234.
Net.TCP - Username - Uses username/password credentials entered by the client to make a secure connection through the default port 55234.
Net.TCP - Secure - Uses the Mirror Credentials from the destination computer to make a secure connection through the default port 55234.
Net.TCP - Anonymous - Allows any remote user access without credentials through the default port 55231.
Https - Username - Uses username/password credentials entered by a web client to make a secure connection through the default port 55232.
Http - Anonymous - Allows any remote web user access without credentials through the default port 55230.
Certificate (Secure/Username) - Information passed through a self-signed certificate for encryption purposes. This certificate is used by the Secure and Username endpoint and for most users does not require any changes.
Info... - Launches the Certificate properties dialog. Enabled when the Secure or Username endpoint is enabled.
Member name | Description |
---|---|
AddressBook | The X.509 certificate store for other users. |
AuthRoot | The X.509 certificate store for third-party certificate authorities (CAs). |
CertificateAuthority | The X.509 certificate store for intermediate certificate authorities (CAs). |
Disallowed | The X.509 certificate store for revoked certificates. |
My | The X.509 certificate store for personal certificates. |
Root | The X.509 certificate store for trusted root certificate authorities (CAs). |
TrustedPeople | The X.509 certificate store for directly trusted people and resources. |
TrustedPublisher | The X.509 certificate store for directly trusted publishers. |
Member name | Description |
---|---|
FindByApplicationPolicy | The findValue parameter for the Find method must be a string representing either the application policy friendly name or the object identifier (OID, or Oid) of the certificate. For example, "Encrypting File System" or "1.3.6.1.4.1.311.10.3.4" can be used. For an application that will be localized, the OID value must be used, because the friendly name is localized. |
FindByCertificatePolicy | The findValue parameter for the Find method must be a string representing either the friendly name or the object identifier (OID, or Oid) of the certificate policy. The best practice is to use the OID, such as "1.3.6.1.4.1.311.10.3.4". For an application that will be localized, the OID must be used, because the friendly name is localized. |
FindByExtension | The findValue parameter for the Find method must be a string describing the extension to find. The object identifier (OID) is most commonly used to direct the Find method to search for all certificates that have an extension matching that OID value. |
FindByIssuerDistinguishedName | The findValue parameter for the Find method must be a string representing the issuer distinguished name of the certificate. This is a more specific search than that provided by the FindByIssuerName enumeration value. Using the FindByIssuerDistinguishedName value, the Find method performs a case-insensitive string comparison for the entire distinguished name. Searching by issuer name is a less precise search. |
FindByIssuerName | The findValue parameter for the Find method must be a string representing the issuer name of the certificate. This is a less specific search than that provided by the FindByIssuerDistinguishedNameenumeration value. Using the FindByIssuerName value, the Find method performs a case-insensitive string comparison using the supplied value. For example, if you pass "MyCA" to the Find method, it will find all certificates with the issuer name containing that string, regardless of other issuer values. |
FindByKeyUsage | The findValue parameter for the Find method must be either a string representing the key usage or an integer representing a bit mask containing all the requested key usages. For the string value, only one key usage at a time can be specified, but the Find method can be used in a cascading sequence to get the intersection of the requested usages. For example, the findValue parameter can be set to "KeyEncipherment" or an integer (0x30 indicates "KeyEncipherment" and "DataEncipherment"). Values of the X509KeyUsageFlags enumeration can also be used. |
FindBySerialNumber | The findValue parameter for the Find method must be a string that represents the serial number of the certificate as displayed by the certificate dialog box, but without the spaces, or as returned by theGetSerialNumberString method. |
FindBySubjectDistinguishedName | The findValue parameter for the Find method must be a string representing the subject distinguished name of the certificate. This is a more specific search than that provided by the FindBySubjectNameenumeration value. Using the FindBySubjectDistinguishedName value, the Find method performs a case-insensitive string comparison for the entire distinguished name. Searching by subject name is a less precise search. |
FindBySubjectKeyIdentifier | The findValue parameter for the Find method must be a string representing the subject key identifier in hexadecimal, such as "F3E815D45E83B8477B9284113C64EF208E897112", as displayed in the UI. |
FindBySubjectName | The findValue parameter for the Find method must be a string representing the subject name of the certificate. This is a less specific search than that provided by the FindBySubjectDistinguishedNameenumeration value. Using the FindBySubjectName value, the Find method performs a case-insensitive string comparison using the supplied value. For example, if you pass "MyCert" to the Find method, it will find all certificates with the subject name containing that string, regardless of other subject values. Searching by distinguished name is a more precise search. |
FindByTemplateName | The findValue parameter for the Find method must be a string representing the template name of the certificate, such as "ClientAuth". A template name is an X509 version 3 extension that specifies the uses of the certificate. |
FindByThumbprint | The findValue parameter for the Find method must be a string representing the thumbprint of the certificate. |
FindByTimeExpired | The findValue parameter for the Find method must be a DateTime value in local time. For example, you can find all the certificates that will be valid until the end of the year by eliminating the results of a Findoperation for FindByTimeExpired of the last day of the year from the results of a Find operation forDateTime.Now. |
FindByTimeNotYetValid | The findValue parameter for the Find method must be a DateTime value in local time. The value does not have to be in the future. For example, you can use FindByTimeNotYetValid to find certificates that became valid in the current year by taking the intersection of the results of a Find operation forFindByTimeNotYetValid for the last day of last year with the results of a Find operation forFindByTimeValid of DateTime.Now. |
FindByTimeValid | The findValue parameter for the Find method must be a DateTime value in local time. You can useDateTime.Now to find all the currently valid certificates. |
Subject Name - Name of the certificate subject.
Access - Configuration to control client connections to Views.
Allow - Users or groups allowed to connect to the Views web service.
Add... - Click to add users or user groups to the Allow access.
Remove - Click to remove a user or user group from the Allow access.
Deny - Specify particular users or user groups to limit access.
Add... - Click to add users or user groups to the Allow access.
Remove - Click to remove a user or user group from the Allow access.
Allow (Secure Endpoint) - This panel displays credentials of clients granted access to connect to Views through the Secure or Username endpoint.
Deny - By selecting an existing clients credentials from the list an Administrator can deny the client connection to Views. This will move the credentials to the Deny panel where they can be removed or allowed again.
Deny (Secure Endpoint) - When a secure client connection is received it automatically goes into the Deny panel where an Administrator must allow the client access or remove it.
Allow - After selecting a credential from the Deny panel, clicking the Allow button will grant this client a secure connection.
Remove - After selecting a credential from the Deny panel clicking the Remove button will clear it from the list of clients requesting a secure connection.
Refresh - The Deny panel does not update automatically. You must click the Refresh button to see any new clients requesting a secure connection.
Historians
Historians - Historians, local and remote, the Views web service is able to provide data from.
Add... - Click to add a Historian computer name to this Views web service (does not support IP address).
Remove - After selecting a Historian name from the list the Remove button will clear it.
Comments
0 comments
Article is closed for comments.