Navigation:  WebOffice Application Configuration > Common >

Security

Previous pageReturn to chapter overviewNext page

Using the node security it is possible to define parameters for the inspection of IP addresses so unwanted transmissions of URLs can be reconstructed. Use this properties when working in WebOffice 10 R3 projects with WebOffice usermanagement. In the case of hijacking, an entry gets written into the log file.

 

Configuration - security

Configuration - security

 

Property

Description

Check Hijacking?

Switch to check Client IP addresses ("Yes") or to ignore them ("No").

Hijacking Exceptions

List of IP Addresses to be excluded from checking. Addresses are separated by semicolon ( ; ) , wildcards can be used (i.e. 255.255.1.*).

Configuration - security