Transforming Information into Intelligence

Transforming Information into Intelligence™ ecords Management > E-mail Management > Gramm-Leach-Bliley Act > IMLA-FATA > OFAC > SEC Rule 17a-4 > USA ...
Author: Diana Collins
2 downloads 1 Views 3MB Size
Transforming Information into Intelligence™

ecords Management > E-mail Management > Gramm-Leach-Bliley Act > IMLA-FATA > OFAC > SEC Rule 17a-4 > USA Patriot Act > DoD 5015.2 > UK PRO

iance > Correspondence Tracking > Section 508 > HIPAA > PIPEDA > E-Sign Act > GPEA > Claims Processing > Sarbanes-Oxley > Contract Management > Correspondence

agement > Records Management > E-mail Management > Gramm-Leach-Bliley Act > IMLA-FATA > OFAC > SEC Rule 17a-4 > USA Patriot Act > DoD 5015.2 > UK PRO

iance > Correspondence Tracking > Section 508 > HIPAA > PIPEDA > E-Sign Act > GPEA > Claims Processing > Sarbanes-Oxley > Contract Management > Correspondence

> What’s New? HostExplorer 2006 ®

> What’s New? — Host Explorer 2006

While every attempt has been made to ensure the accuracy and completeness of the information in this document, some typographical or technical errors may exist. Hummingbird cannot accept responsibility for customers’ losses resulting from the use of this document. The information contained in this document is subject to change without notice. This document contains proprietary information that is protected by copyright. This document, in whole or in part, may not be photocopied, reproduced, or translated into another language without prior written consent from Hummingbird. This edition published July 2005

2

> What’s New? — Host Explorer 2006

Table of Contents >

Hummingbird Connectivity™ 2006 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

>

HostExplorer® 2006 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

>

New Features Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

>

New Features Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Multiple Profile Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Current Industry Practice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Introducing Multiple Profile Spaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Profile Spaces Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Profile Spaces: An Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Rights Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Composite Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Mutiple Profile Spaces Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Migration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Helpdesk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Pre-Run Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Macro Auto-Record and Auto-Assign . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 FTP Synchronization Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 FTP Synchronization Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 FTP File Permissions Editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 FTP File Transfer Resume. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Sessions Quick-Switch Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Profile Scheme. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 IPV6 Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Redesigning Look . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Improved Mouse Actions dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Toolbar List Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Enhanced Secure Shell Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3

> What’s New? — Host Explorer 2006

Hummingbird Connectivity™ 2006 Hummingbird Connectivity is a suite of technology solutions that help organizations meet the challenges of integrating heterogeneous systems while providing cost effectiveness. Our customers have been instrumental in our development efforts over the years, and together we have achieved success. Hummingbird Connectivity continues to deliver unparalleled product functionality and substantive return on investment.

Consolidation

Migration

Many organizations with numerous connectivity software vendors have been able to consolidate their needs into one single solution with Hummingbird Connectivity, helping them realize significant savings on their overall IT budgets.

Regardless of your current connectivity solution, Hummingbird Connectivity offers you a smooth migration path with minimal business disruption and immediate return on investment.

Security

Productivity

Hummingbird Connectivity features a robust and complete security set across all of its components, in order to help organizations meet their security and compliance objectives.

Employees are companies’ most important assets. Hummingbird Connectivity provides users with unique ways of increasing their productivity while reducing the complexity associated with implementation and delivery.

4

> What’s New? — Host Explorer 2006

HostExplorer 2006 ®

The unique features of HostExplorer 2006 have been designed and developed with the objective to improve the product’s leadership in the following area: Features of HostExplorer 2006 HostExplorer is the most complete and exhaustive terminal emulation software in its category. It benefits from advanced deployment and profiles management technologies that put it in the forefront of the industry. Companies can achieve significant cost savings by reducing the number of different solutions in use and replacing them with a single complete host access solution.

Consolidation

HostExplorer can be seamlessly deployed as traditional desktop-based host access software or as a web-based thin client solution. HostExplorer offers central profile deployment and administration without the costs associated with other proprietary solutions. It can also be used with any supported 32-bit or 64-bit Microsoft Operating System including as well as Citrix Metaframe and Windows Terminal Server.

HostExplorer offers best-of-breed security features. Security conscious customers will be able to choose from a variety of supported protocols such as SSL, Kerberos or Secure Shell 2 (available with Connectivity Secure Shell 2006). Advanced security settings allow the manipulation of public/private key pairs, certificates and USB authentication tokens (Rainbow). For external access, HostExplorer also comes with an integrated HTTPs/Telnet proxy.

Security

Desktop administrators will also be able to heavily customize every aspect of the user terminal. Easy-to-use dialogs allow total control over menus, toolbars, user-editable functions and locked down functionalities.

HostExplorer offers the best migration experience and the most successful track record on the terminal emulation market: HostExplorer offers a full-fledged migration wizard that will take care of converting all settings and features from other terminal emulators (Attachmate Extra, NetManage Rumba and IBM PCom).

Migration

HostExplorer themes technology allows users to adapt to the new software at their own pace. It provides them the closest possible look & feel experience to what they were accustomed to. HostExplorer supports an extensive range of API and seamlessly integrates with existing HLLAPI, WINHLLAPI and EHLLAPI applications.

HostExplorer productivity features allow companies to increase employee’s efficiency, relieve users from repetitive tasks, diminish risks of errors and improve the use of mission-critical legacy applications. Building on the tradition of previous versions, HostExplorer 2006 introduces a number of new productivity features. Features include:

Productivity

> Glossaries: which allow users to build custom lists of mnemonic, commands and descriptions to be searched and used during data entry operations. > Helpdesk: which allows administrators to troubleshoot their installed base of users more easily. > FTP Synchronization and Scheduling: which puts mass file transfer at users’ fingertips.

5

> What’s New? — Host Explorer 2006

New Features Summary HostExplorer Features

Summary

Multiple Profile Space

Multiple Profile Space allows organizations to manage multiple locations to store profiles and connection settings. Storage locations include local drives, remote file systems or LDAP directories. User access rights are enforced through a seamless integration with MS Windows ACLs or LDAP ACLs.

Migration Wizard

The Terminal Migration Wizard: offers the easiest and most automatic method for migrating from Extra, Rumba and PCOM to HostExplorer. Migration can be fully automated or customized and can also be run from the command line.

HelpDesk

Helpdesk: provides administrators the ability to display and control a remote HostExplorer session from their desktop.

Glossary

Glossaries allow administrators or users to create lists of short codes and their significance to help them during data entry operations. Glossaries appear as a dockable list or a floating window that can be placed anywhere in the terminal window.

Pre-Run Support

HostExplorer can be instructed to execute 3rd party applications, scripts or batch files before displaying the terminal to the user. This execution can be done synchronously or asynchronously.

Macro Auto-Record and Auto-Assign

This feature which reproduces a function found on hardware terminal offers a simple way for users to record macros and to assign them to a keyboard key in one operation.

FTP Synchronization Profiles

FTP Synchronization profiles allow users to perform mass file transfer operations by defining lists of multiple files to be synchronized between their desktop and the remote hosts.

FTP Synchronization Scheduling

This feature gives users the ability to schedule the execution of Synchronization Profiles. The scheduled tasks are sent to Windows® Scheduler that is part of the Windows Operating System.

File Permissions Editing in FTP

Hummingbird FTP™ offers users the ability to edit file permissions within the limit of their own rights.

6

> What’s New? — Host Explorer 2006

HostExplorer Features

Summary

FTP File Transfer Resume

Hummingbird FTP supports the FTP REST command. It allows for interrupted transfers to be resumed from the point they broke off.

Sessions Quick-Switch Toolbar

The quick-switch toolbar is a tool for users with multiple sessions opened at once. This floating or dockable toolbar displays a list of all opened sessions, allowing users to quickly navigate from one session to another.

Profile Schemes

All elements of a HostExplorer profiles can now be stored into schemes that allow easy distribution, simple management and enhanced security of HostExplorer profiles settings.

IPV6 Support

In addition to HostExplorer the following components fully support IPV6: > Hummingbird FTP™ > Connectivity Secure Shell > Connectivity SecureTerm™ > Connectivity SSL™ > Connectivity Kerberos™

Redesigned Look

HostExplorer’s appearance has been entirely refreshed with more than 1000 brand new high color icons that give it a distinct, elegant and modern look.

Improved Mouse Actions

The HostExplorer Mouse Action dialog has been redesigned. It now fully respects HostExplorer function group architecture and offer users an easier way to customize their mouse actions.

Toolbar List Widget

HostExplorer supports list of macros, QuickScripts and QuickKeys to be added to the toolbar.

Enhanced Secure Shell Support (available through separate Connectivity Secure Shell 2006 add-on)

> Support for Diffie-Hellman Group Exchange > Support for Draft 8 of the GSSAPI Authentication and Key Exchange for the Secure Shell Protocol (draft-ietf-secsh-gsskeyex-08): > GSSAPI Authenticated Diffie-Hellman Key Exchange > GSSAPI group exchange > gssapi-with-mic user authentication > gssapi-keyex user authentication > Passphrase support in SCP2 > Kerberos Authentication in SCP2 > Configurable Key Exchange > Remote command execution

7

> What’s New? — Host Explorer 2006

New Features Details Multiple Profile Space HostExplorer’s multiple profile architecture is a major innovation in the terminal emulation market space. It provides an elegant and secure framework for central administration without requiring organizations to set up costly proprietary administrative servers as it is the case with other terminal emulation solutions.

Current Industry Practices Many large organizations manage their terminal emulation profiles fairly rudimentarily. With a large number of desktops to manage, such organizations are often left with no other choice than copying all terminal emulation profiles on every single desktop. This method is called decentralized profile management.

Sales Department

Production Department

{ { {

Finance Department

{

Figure 1 — An example of decentralized profile management: all profiles are copied on each desktop.

8

Enterprise Profiles Finance Profiles Sales Profiles Production Profiles Personal Profiles

> What’s New? — Host Explorer 2006

Such profile management practices are not without drawbacks: > All-or-nothing approach: to keep the chaos at a reasonable level, there is no other choice left to the administrator than to make sure every desktop is strictly identical. This task in itself can be daunting. Every new profile or every modification to an existing profile will need to be deployed on every desktop. When confronted with such situation, many organizations will decide upon maintaining the status quo rather than implementing profile changes which would come at a significant administrative cost in time and efforts. > Unnecessary data replication: similarly to the database normalization approach, there is no reason why the same profile should be replicated over and over on hundreds or thousands of desktops. Replication becomes even more meaningless if the profiles that are distributed are locked-down for modifications. > No “single version of the truth”: assuming that all profiles are not locked down and despite the administrator’s best effort, it is very likely that each PC will have a slightly different version of the profile settings than his neighbor thanks to the customization skills of its user. In other instances different administrators will create different profiles for the same connection and distribute it to the users under their jurisdiction. > No flexibility: copying the software and profiles to the desktop is often done through a standardized desktop image. Administrators create a deployable image of all software components required on the desktops from the operating system to the business line applications. The image gets installed either by the organization own teams or by a 3rd party system integrator. This replication process requires every image to be the same for everybody. With such constraints in mind, it becomes impossible for administrators to manage different groups of profiles, short of creating different desktop images which would obviously send the deployment costs skyrocketing. > No granularity: decentralized profile management leaves little room for granularity. Managing specific requirements at the group level or at the user level is an impossible task. As impossible is the ability to fine tune user rights, giving them the ability to modify some parameters such as the terminal colors and preventing them from altering others such as the security settings. > Policy-adverse: in a decentralized profile management system, it is all but possible to implement proper policies. With every machine being equal administrators are unable to manage profiles and access to these profiles in the same way they manage their group policies. > Security-adverse: there’s a saying in the security world “that the less is known about a potential target the better it is.” In a decentralized profile management scheme, host information is distributed all over the place. There’s no doubt that every host will offer the adequate level of authentication before allowing users to log in, but is it really necessary for the production folks to know the IP address, port and security methods for the accounting mainframe? > User-adverse: Being a user in a decentralized profile management based organization can be somewhat confusing and frustrating. Because all desktops receive the same image, users find themselves saturated with profiles that are not relevant to their tasks.

9

> What’s New? — Host Explorer 2006

Additionally, the all-or-nothing approach leaves the administrator with few choices: either he lets users modify the profiles and incur the risk of saturating the help desk with calls from inexperienced users that have just changed their colors to black on black, or he locks down the profiles with the guarantee that power users will be frustrated and dissatisfied with the tool.

Internet

Intranet

Finance Department

Sales Department

Production Department

Figure 2 — Disadvantages of decentralized profile management architectures

> All-or-nothing approach > Unnecessary data replication > No “Single version of the truth” > No Flexibility > No Granularity > Policy-Adverse > Security-Adverse > User-Adverse

10

> What’s New? — Host Explorer 2006

Introducing Multiple Profile Spaces “Multiple Profile Spaces” is the name for the Hummingbird technology that allows administrators to manage and deploy profiles from central or distributed repositories. A profile space can be accessed by HostExplorer users to read or write profiles. There is no limit to the number of profile spaces that a particular user can access and there is no limit to the number of profile spaces that can be set up. Profile spaces are extremely flexible and allow administrators to adapt the repository architecture to suit their needs. For instance: > Single profile space: users do not have any profile stored on their desktops. All profiles are located in a central repository making it easy for the administrator to create new profiles or modify existing ones without redeploying any of them. > Multiple profile spaces: users are split in group (by business unit for instance). Each group has its own profile space and can not access other group’s spaces. This kind of architecture helps the administrator specialize profiles by publishing them only to the relevant group of users. > Combined profile spaces: this architecture consists in setting up multiple profile spaces with specialized profiles in them and allowing users to access one or more of these spaces. This model presents the advantage of keeping profiles organized and secured by specialization (line of business or geography for instance), while letting users access them seamlessly. > Combined and personal profile spaces: in addition to letting users access global repositories, administrators also have the ability to allocate them a personal area where they can store, retrieve and modify their own profiles and settings. This setup constitutes the ultimate profile space experience, giving users transparent access to private and global profiles.

Single Profile Space

Multiple Profile Spaces

Combined Profile Space

Multiple Combined & Personal Profile Spaces

Figure 3 — Examples of Profile Spaces architectures 11

> What’s New? — Host Explorer 2006

Profile Spaces Types On the contrary of other terminal emulation software, Hummingbird HostExplorer designed Profile Spaces to leverage existing IT infrastructures without introducing a proprietary repository. Profile Spaces can be set up on four different types of repositories: > Local storage: this includes hard drives, removable drives and any other fixed or removable media that is physically connected to the user desktop. > Network storage: this includes network drives, UNC paths, NFS shares and any remote location that can be accessed from the operating system. > LDAP Directories: any directory service that supports the Lightweight Directory Access Protocol > Active Directory: Microsoft’s directory service for use in Windows environment is tightly integrated with all Microsoft Operating Systems, Management Tools and Security Policies.

Local Drive

Active Directory

Network

LDAP

Figure 4 (above) — Available profile spaces types

Figure 5 (below) — Profile Spaces can be organized in many logical configurations

Profile Spaces: An Example The major advantage of profile spaces is their versatility and their flexibility. There is no limit to what a profile space can be used for as shown by the example below.

Peronal Profiles

Public Profiles

Departmental Profiles

12

Enterprise Profiles

> What’s New? — Host Explorer 2006

In a classic decentralized management environment, such configurations would have been hard to set up without creating a multitude of desktop images to suit each group requirements. Multiple Profile Spaces however allow administrators to centrally and logically organize the profiles in multiple repositories as shown in the two scenarios below. Scenario 1: ACME Inc. is a typical multi-department company with employees working in 3 areas: > Finance > Sales > Production Terminal emulation is used at different levels by all employees: > All users, regardless of the division they work in, need to access the enterprise scheduling application which resides on a Mainframe. This is where they enter their schedules and work hours that are used for rebilling purposes. > Finance users need to access accounting and human resources applications residing on the company’s Mainframe. > Sales have their CRM application on an AS/400. > Production uses UNIX servers to manage the production cycle. > Finally, all employees have access to specific Mainframe and UNIX applications depending on their roles and use FTP file transfer to save their personal data.

{

{ { {

Enterprise Profiles

Finance Profiles

Finance Department

Sales Profiles

Sales Department

Production Profiles

Production Department

Personal Profiles

Figure 6 — ACME Inc Profile Spaces are organized by Business Unit

13

> What’s New? — Host Explorer 2006

Scenario 2: ACME Inc. is a global company with operations on 3 continents: > North America > Europe > Asia

US Operations

Europe Operations

Asia Operations

Global Operations

Figure 7 — ACME Inc Profile Spaces are organized by geographical locations

Rights Management Profile Spaces have been designed to leverage the existing IT infrastructure and policies in place. Profile Spaces will take advantage of the native Access Control Lists (ACLs) available for each profile space type: > Local Storage: local or domain Windows ACLs > Network Storage: local or domain Windows ACLs > LDAP Directory: LDAP ACLs > Active Directory: AD ACLs Using the native right management system for each profile space type offers a number of advantages both for the administrator and the users. Administrator: > Full administrative control over users’ rights: Profile Spaces will obey by the ACL rules giving users read or write access to profiles only when authorized by the ACLs. > No paradigm shift: no proprietary (i.e. different) users and groups management system that would create administrative overhead. > No need to learn new administrative tools: user rights can be managed with the same tools that are used to manage the file system rights or the directory rights.

14

> What’s New? — Host Explorer 2006

Figure 8 — Profile Spaces as seen from the Active Directory administrative console

User: > Transparency: on the contrary of proprietary profile management systems the user will see no difference between accessing profiles stored on profile spaces or traditional profiles. > No unnecessary login: since Windows credentials are being used to determine Profile Spaces rights, there is no need for additional authentication before accessing the profiles. > Easier access to profiles: with Multiple Profile Spaces users can only see the profiles they have access to. It reduces the risk of errors while simplifying the user interface.

15

> What’s New? — Host Explorer 2006

Composite Profiles Multiple Profile Spaces offer total control over the profiles repositories and how users access them. In addition to these benefits, Multiple Profile Spaces can also be used to offer a more granular access to the various elements of the profile. A typical profile is usually a collection of different settings such as the connection information, the keyboard map, the color scheme, the security information etc. Many administrators want to give their users the ability to modify some of these settings (keyboard and colors for instance) while locking down others (connection and security for instance). Achieving such level of granularity is usually not an easy task with traditional profile management systems but become a trivial operation with Multiple Profile Spaces. Every settings of a profile are stored in schemes. Each scheme exists as its own independent file. Every scheme can be stored in a different Profile Space and has its own ACL. The requirements described above can easily be fulfilled by storing Connection and Security schemes in a global read-only Profile Space while Keyboard and Colors can be distributed to every user in its personal read-write Profile Space.

Read

Write

Personal Profiles

Departmental Profiles

Read

Figure 9 — A composite profile example

16

Write

> What’s New? — Host Explorer 2006

Multiple Profile Spaces Management Administrators can manage Multiple Profile Spaces with easy powerful tools that come with HostExplorer. The Profile Space Editor The Profile Space Editor allows administrators to add, edit and remove Profile Spaces. Each profile Space can be assigned a name and a distinct icon that will help users identify it easily. A particular Profile Space can contain references to multiple locations. When the first location is not available, HostExplorer will automatically look for the next online location. This ability allows administrators to set up fault-tolerant Profile Space and guarantee that their users will always have access to their profiles. When choosing the location for a particular Profile Space, the administrator is also allowed to use system replacers (in the form of $KeyWord$). Those replacers will transparently be converted into real values when using the Profile Space. For instance the $USERNAME$ replacer will be converted to the Windows user name of the currently logged in user.

Figure 10 — Creating a Profile Space with a primary and a backup location in the Profile Space Editor tool

17

> What’s New? — Host Explorer 2006

The profile publishing wizard The profile publishing wizard is an administrative tool that allows profiles stored locally on a desktop to be published to an existing Profile Space. Administrators who use that tool will be able to set up the profiles and test them locally on their desktop before making them available to their user community. This tool can also be used to publish modifications to already-published profiles in a Profile Space.

Conclusion Multiple Profile Spaces offer new perspectives on organizations’ profile management practices. They offer countless benefits to users and administrators. Flexibility > Profile Spaces can be organized in any physical and logical combinations. > There is no limit to the number of spaces that can be created. > There is no limit to the number of users that can access a particular Profile Space. > Profile Spaces can be deployed on local file systems, network file systems, LDAP directories and Active Directory. Security > Profile Spaces leverage existing user rights and do not require administrators to create (or recreate) a particular users and groups hierarchy to suit the deployment model. > User rights are managed through existing ACLs offering administrators total control over the distribution and access to the profiles. > Individual settings of a particular profile (also known as schemes) can be stored on different Profile Spaces and have their own ACL, allowing for maximum granularity in the access rights. No disruption > Profile Spaces do not require specialized software to be installed on servers. > Profile Spaces live within the existing infrastructure not requiring dedicated hardware. > Profile Spaces will not increase the workload of existing network and hardware infrastructures besides normal I/O operations.

18

> What’s New? — Host Explorer 2006

Migration Wizard The number of legacy systems still in operation today is huge, and even bigger is the number of desktops equipped with terminal emulation software. From an organization point of view, terminal emulation is a commodity, a necessary tool for all employees to accomplish their job. Changing terminal emulation software is an opportunity to reduce costs, tighten security and improve productivity. Many organizations are reluctant to pursue such opportunities for fear that even if it was given to them the new software would require significant migration efforts and investments. HostExplorer Migration Wizard has been created to alleviate this fear and reduce the migration overhead. HostExplorer Migration Wizard is a user-friendly powerful utility that automatically (or selectively) migrate users settings and macros from other terminal emulation software to HostExplorer.

Figure 11 — HostExplorer Migration Wizard is locating the files to be migrated

19

> What’s New? — Host Explorer 2006

HostExplorer Migration Wizard can be used the following way: > Automatic: HostExplorer Migration Wizard will automatically scan the user’s “My Documents” folder, locate the profiles to migrate, check their dependencies on additional files and convert all files to HostExplorer into the default Profile Space. > Custom: this mode allows users to specify which types of profiles and additional files will be migrated and which Profile Space will these files be migrated to. In custom mode, the Migration Wizard will also stop at every step of the process to allow users to modify their choices. HostExplorer Migration Wizard can also be used as a command-line tool. The command line mode offers a very effective method for administrators to perform migration tasks through scripts at the end of the software installation for instance. HostExplorer Migration Wizard can convert the following files and settings:

Attachmate Extra!

IBM Personal Communication

NetManage Rumba

HotSpot Schemes

.ehs

HotSpot Files

.hsp

Profiles

.WS

Toolbar Files

.etb

Keyboard Map Files

.map

Macro Files

.mac

Keyboard Map

.ekm

Macro Files

.rmc

Keyboard Files

.kmp

3270 Color Schemes

.e3c

3270 Profiles

.wdm

Toolbar Files

.bar

5250 Color Schemes

.e5c

3270 Printer Profiles

.wpm

VT Color Schemes

.edc

5250 Profiles

.wda

Macro Script Files

.EBM

5250 Printer Profiles

.wpa

Extra Session Files

.edp

VT Profiles

.wdu

Printer Session Doc Files

.epp

FTP Transfer Lists

.etl

IND$File Transfer Schemes

.eis

IND$File Transfer Lists

.eil

20

> What’s New? — Host Explorer 2006

Helpdesk Terminal emulators are such widespread software that they inevitably require assistance to be provided to users. Companies’ helpdesk infrastructures usually fall into three categories: > The “walking administrator” category which could be described as the best way to keep administrators healthy by having them walk kilometers of corridor to help users in distress. > The “answering machine” category which is nothing else but a great metaphor for administrators being swamped and users feeling abandoned. > The “one size fit them all” category which advocates for big centralized helpdesk offices which often lack true product specialists. HostExplorer offers a valuable compromise for administrators that need to efficiently support their users without huge investments, cumbersome logistic or degradation of quality of service. Users looking for help simply need to click on the HostExplorer Helpdesk toolbar button. This action will trigger a request for help that will be sent to a predefined administrator desktop. The administrator has the ability to take control of the terminal session and troubleshoot it as if he was physically in front of the user’s desktop.

Figure 12 — An administrator remotely controls a user session to troubleshoot a problem

21

> What’s New? — Host Explorer 2006

Glossary The main reason why so many legacy applications are still around is because they are critical to many businesses. The reason why they are so unpopular with users is because they lack graphical appeal and often require users to learn their manuals by heart before using them. One example of that would be the various applications that require users to type in screen codes in order to navigate from one function to another. Another example would be applications that require users to manually browse huge code indexes in order to perform data entry operations. HostExplorer glossaries provide an easy way to alleviate the pain from the users and improve the user friendliness of legacy applications. Glossaries allow users to create lists of short codes and of their significance to help them when using legacy systems. Glossaries appear as a dockable list or a floating window that can be placed anywhere in the terminal window. Clicking on an entry will automatically insert it at the terminal cursor location without further necessary effort. Glossaries are also fully searchable to allow users to find information quickly.

Figure 13 — Glossaries in action

22

> What’s New? — Host Explorer 2006

Pre-Run Support HostExplorer can be instructed to execute 3rd party applications, scripts or batch files before displaying the terminal to the user. This execution can be done synchronously or asynchronously.

Macro Auto-Record and Auto-Assign This feature reproduces a function that is found on some hardware terminals. Its main advantage is to offer a more simple way for users to record macros and assign them to a keyboard key in one operation. This feature can be called from a menu, a toolbar button, a keyboard key, a mouse action etc… Once the feature has been called, HostExplorer automatically switches to the macro recording mode. At this point HostExplorer will record every single action done by the user and transform it into a Hummingbird Basic macro. When he’s finished recording the macro the user calls the function one more time. He’s presented with a dialog that allows him to save the macro and assign it to a key on the keyboard.

23

> What’s New? — Host Explorer 2006

FTP Synchronization Profiles Many organizations use the File Transfer Protocol (FTP) to perform file transfer operations between various heterogeneous systems. FTP is incredibly popular among users and administrators because it is simple to use and available on virtually any computer system. FTP, however, is not only used to perform ad-hoc file transfer operations anymore. A growing number of users and administrators now use FTP to perform mass file transfers, copying entire directories at once and synchronizing them between their desktops and FTP servers. Hummingbird FTP offers a convenient solution for those users through synchronization profiles. A synchronization profile is a list of files or directories that will be copied between the server and the desktop. Hummingbird FTP can either copy the files in one direction (from or to the desktop) or synchronize the files between the FTP server and the desktop by looking at date of modification. Users can decide to organize their mass transfers in any logical way they want. As an example, a user could decide to group all of the files and directories to transfer into a separate synchronization profile for each host. However, there’s no limitation in the number of hosts that can be used within the same synchronization task and it is entirely possible for a user to synchronize all of his hosts with the same profile.

Figure 14 — Synchronization tasks made easy with Hummingbird FTP

24

> What’s New? — Host Explorer 2006

FTP Synchronization Scheduling Hummingbird FTP offers users the ability to schedule the execution of Synchronization Profiles. The scheduled tasks are sent to Windows Scheduler that is part of the Windows Operating System.

Schedule Options Include: > Execution options: task definition, additional parameters, account setup for execution. > Timing options: date and time, recurrence, multiple schedules. > Additional options: run conditions, idle conditions, power management

By putting mass file transfer synchronization at the user’s fingertips Hummingbird FTP offers a powerful and simple alternative to more complex, programming –based systems. Integration with Microsoft Windows Scheduler allows administrators to control the scheduled tasks through the standard Windows administration tools.

Figure 15 — Scheduling a synchronization task in Hummingbird FTP

25

> What’s New? — Host Explorer 2006

FTP File Permissions Editing Hummingbird FTP offers users the ability to edit file permissions within the limit of their own rights. Permissions can be set by right-clicking on the desired file and editing its permissions in a similar fashion to the Microsoft Windows operation. Users can also choose to edit the file properties by changing the numeric value of the file or the directory mask.

Figure 16 — The File Permission Editing dialog.

FTP File Transfer Resume When a file download operation is interrupted, traditional FTP clients lose previously downloaded pieces of that file and require the user to start their download operation from scratch. Hummingbird FTP supports the FTP REST command. It allows for interrupted transfers to be resumed from the point they broke off. Only data that has not been previously received will be downloaded. Users who perform large file transfers will benefit from the significant potential time savings of this feature.

Figure 17 — Setting the File Transfer Resume option in a FTP profile.

26

> What’s New? — Host Explorer 2006

Sessions Quick-Switch Toolbar The quick-switch toolbar is a tool for users with multiple sessions opened at once. This floating or dockable toolbar displays a list of all opened sessions, allowing users to quickly navigate from one session to another.

Figure 18 — Navigating between opened sessions with the quick-switch toolbar

Profile Schemes All the elements of HostExplorer profiles can now be stored into schemes. Schemes are independent files that contain a group of HostExplorer settings. Each profile setting in HostExplorer is a member of a scheme. Schemes offer the following advantage: > Because they are stored in independent files, they can be easily distributed from one user to another. > They can be reused across multiple profiles. It allows reducing information duplication and easy modifications of several profiles at once. > They can be used in conjunction with Profile Spaces to lock down certain settings of the profile (all security related settings for instance) while allowing the modification of others (such as customizing the keyboard).

27

> What’s New? — Host Explorer 2006

HostExplorer supports the following schemes: HostExplorer supports the following schemes: >

> Connection

> Identity

> Security

> Terminal

> Display

> Color

> Font

> Keyboard

> HotSpot

> Edition

> Print

> File Transfer

> Session Window

> Toolbar

> Menu

> Mouse

> Sound

> Event

> Shortcut

> Track Menu

> Capture

> Session Properties

IPV6 Support In addition to HostExplorer the following components fully support IPV6: > Hummingbird FTP > Connectivity Secure Shell > Connectivity SecureTerm > Connectivity SSL > Connectivity Kerberos

Redesigned Look HostExplorer’s appearance has been entirely refreshed with more than 1000 brand new high color icons that give it a distinct, elegant and modern look.

28

> What’s New? — Host Explorer 2006

Improved Mouse Actions dialog The HostExplorer Mouse Action dialog has been redesigned. It now fully respects HostExplorer function group architecture and offer users an easier way to customize their mouse actions.

Figure 19 — HostExplorer Mouse Action setting dialog

Toolbar List Widget HostExplorer supports list of macros, QuickScripts and QuickKeys to be added to the toolbar.

Figure 20 — Example of the macro list widget

29

> What’s New? — Host Explorer 2006

Enhanced Secure Shell Support Secure Shell functionalities are available through a separate add-on: Connectivity Secure Shell 2006. Numerous Secure Shell features have been added: > Support for Diffie-Hellman Group Exchange > Support for Draft 8 of the GSSAPI Authentication and Key Exchange for the Secure Shell Protocol (draft-ietf-secsh-gsskeyex-08): > GSSAPI Authenticated Diffie-Hellman Key Exchange > GSSAPI group exchange > gssapi-with-mic user authentication > gssapi-keyex user authentication > Passphrase support in SCP2 > Kerberos Authentication in SCP2 > Configurable Key Exchange: The Key Exchange configuration dialog allows users to select one or multiple key exchange mechanism and their priority order to be used during the initialization of the secured connection.

Figure 21 — Key Exchange configuration dialog

30

> What’s New? — Host Explorer 2006

> Remote command execution: Users have the ability to configure remote tasks to be executed immediately after the secured connection has been established with the host. These tasks will be sent through the Secure Shell remote command facility or after requesting a pseudo-terminal.

Figure 22 — The remote task configuration dialog

31

ice Authorizations > Spatial Data Management > Integrated Practice Support > Matter-Centric Portal > Case Management > Critical Dates Management > Re

O 15489 > EFOIA Deal Management > Risk Management > Basel Capital Accord (Basel II) > M&A Pitch Books Management > Virtual Deal Rooms > Corporate Compli

nflict Management > Invoice Authorizations > Spatial Data Management > Integrated Practice Support > Matter-Centric Portal > Case Management > Critical Dates Mana

O 15489 > EFOIA Deal Management > Risk Management > Basel Capital Accord (Basel II) > M&A Pitch Books Management > Virtual Deal Rooms > Corporate Compli

Transforming Information into Intelligence™ Corporate Headquarters 1 Sparks Avenue, Toronto, Ontario M2H 2W1 Canada Toll Free Canada/USA: 1 877 FLY HUMM (359 4866) Tel:

+1 416 496 2200

Fax:

+1 416 496 2207

E-mail:

[email protected]

For more information, visit http://connectivity.hummingbird.com North American Sales Offices Boston • Chicago • Dallas • Los Angeles • Mountain View • New York Ottawa • Raleigh • Toronto • Washington DC International Sales Offices Amsterdam • Brussels • Frankfurt • Geneva • London • Milan Munich • Paris • Rome • Seoul • Singapore • Stockholm • Sydney Tokyo • Wokingham • Zurich WP-01-00-EN-0038.07/05 Copyright © 2005, Hummingbird Ltd. All rights reserved. ® ™ — Trademarks and logos are the intellectual property of Hummingbird Ltd. All other company and product names are trademarks of their respective owners.

Suggest Documents