14.11.2012 Views

Exceed onDemand A Technical Whitepaper

Exceed onDemand A Technical Whitepaper

Exceed onDemand A Technical Whitepaper

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Exceed</strong> <strong>onDemand</strong> 5 — A <strong>Technical</strong> <strong>Whitepaper</strong><br />

In order to support Secure Shell Startup mode, the Strong encryption version of <strong>Exceed</strong> <strong>onDemand</strong> is<br />

shipped with the open source OpenSSH client. All features that are normally offered by OpenSSH are<br />

supported as well. Users only need to configure the host name, username, password and the command<br />

that will launch the X application. <strong>Exceed</strong> <strong>onDemand</strong> Proxy will attempt to communicate with the<br />

host through the OpenSSH client and authenticate the user. X11 Tunneling is enabled to allow X<br />

traffic to travel securely through the established X11 Tunnel.<br />

Users can provide credentials to the host using either password authorization or certificate authorization.<br />

<strong>Exceed</strong> <strong>onDemand</strong> offers a wide range of ciphersuites. Among those is the AES algorithm which<br />

provides a higher level of encryption than the traditional DES algorithm. AES became the de facto<br />

standard for encryption in the US Government starting in October, 2003.<br />

Secure Shell startup mode can be found on <strong>Exceed</strong> <strong>onDemand</strong> Server for UNIX and Linux.<br />

X Application<br />

Secure Shell<br />

X11 over Secure Shell<br />

Port 22<br />

<strong>Exceed</strong> <strong>onDemand</strong> Server<br />

<strong>Exceed</strong> <strong>onDemand</strong><br />

Cluster Manager<br />

X Proxy Manager<br />

<strong>Exceed</strong> <strong>onDemand</strong> Proxy<br />

Cluster Manager<br />

Connection Port 5500<br />

Proxy Connection<br />

Port 5501<br />

Figure 29 — <strong>Exceed</strong> <strong>onDemand</strong> can use Secure Shell protocol to secure traffic between Proxy and X applications<br />

Desktop Sharing<br />

<strong>Exceed</strong> <strong>onDemand</strong> Client<br />

One of the many advantages of <strong>Exceed</strong> <strong>onDemand</strong>’s architecture is that the Proxy acts as a gateway<br />

between <strong>Exceed</strong> <strong>onDemand</strong> Client and X applications. It is the Proxy’s responsibility to deliver the<br />

X display to <strong>Exceed</strong> <strong>onDemand</strong> Client. The Proxy also has the ability to interact with more than one<br />

<strong>Exceed</strong> <strong>onDemand</strong> Client at the same time and to multicast the X display to multiple Clients. This<br />

forms the base of the Desktop Sharing function.<br />

X Application<br />

<strong>Exceed</strong> <strong>onDemand</strong> Server<br />

<strong>Exceed</strong> <strong>onDemand</strong><br />

Cluster Manager<br />

X Proxy Manager<br />

X Protocol TXP<br />

<strong>Exceed</strong> <strong>onDemand</strong> Proxy<br />

Figure 30 — <strong>Exceed</strong> <strong>onDemand</strong> Proxy multicasts the X display to multiple <strong>Exceed</strong> <strong>onDemand</strong> Clients<br />

<strong>Exceed</strong> <strong>onDemand</strong> Client<br />

<strong>Exceed</strong> <strong>onDemand</strong> Client<br />

<strong>Exceed</strong> <strong>onDemand</strong> Client<br />

49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!