Add/Modify iNode Client Shortcut Configuration
This function helps you add or modify a iNode client shortcut configuration.
Configuration Procedure
- Click the User tab on the top navigation bar, and then select User Access Policy > Service Parameters > Unified Authentication from the left navigation tree.
- Click the configuration icon of the iNode Client Shortcut Configuration item.
- Click Add, or click the edit icon
of a configuration in the iNode client shortcut configuration list.
- Configure the parameters and click OK.
Parameters
Basic Configuration
- Configuration Name: The name of configuration.
- Enable: Enables the iNode client shortcut configuration. All configuration items are grayed before this parameter is selected.
- Shared Key: Ensures communication security between the iNode client and the web application system. A shared key must be an eight-character string, which can contain only letters, numbers, and the following characters: ~ ` ! @ # $ % ^ & * ( ) _ - + { [ } ] | : " ; ' < , > . /
Web Application Systems
- Name: Specifies the web application system name to be displayed at the left navigation tree of the iNode client.
- URL: Specifies the URL of the web application system, in standard URL format http://xxx(The URL for registering user information is http://ip:port/selfservice/preregister/registerPage.jsp).
- Check Mode: Select a check mode to enable validity check when the web application system URL is automatically opened after the iNode client passes security check. Options include password check and timestamp check. Password check is the default.
- Running Mode: The system provides the shortcut of a web application system on the left navigation tree of the iNode client. Besides, it can also automatically open the web application system during the iNode client authentication process. When to open the web application system is determined by the Running Mode parameter. Options include Do not run, Run after identity authentication, Run after security check, Run after security check is passed, and Run after security check is failed. The last three options are available only when EAD is deployed. If you select Do not run, a user needs to click the shortcut to enter the web application system. If you select Run after identity authentication, a user enters the web application system immediately after the user passes identity authentication. If you select Run after security check, a user enters the web application system after the user performs security check, no matter the user passes the security check or not. If you select Run after security check is passed, a user enters the web application system only after the user passes security check. If you select Run after security check is failed, a user enters the web application system only after the user fails security check.
Executable Programs
- Name: Specifies the executable program name to be displayed at the left navigation tree of the iNode client.
- Executable Commands: Specifies the commands used to execute the executable programs.
- Running Mode: The system provided the shortcut of an executable program on the left navigation tree of the iNode client. Besides, it can also automatically execute the program during the iNode client authentication process. When to execute the executable program is determined by the Running Mode parameter. Options include Do not run, Run after identity authentication, and Run after security check. The last option is available only when the EAD is deployed. If you select Do not run, a user needs to click the shortcut to execute the program. If you select Run after identity authentication, the program is executed immediately after a user passes identity authentication. If you select Run after security check, the program is executed only after a user performs security check by using a security policy, no matter the user passes the security check or not.
User Selection Mode
- You can configure by access user or user group or all users
Precautions
- You can add up to 32 web application systems and 32 executable programs.
- Configuration by access user or user group is mutually exclusive with configuration by all users.