Protocol | Access via web.direct |
---|---|
HTTP | |
HTTPS | |
WebSocket (WS) | 1 |
WebSocket Secure (WSS) | 1 |
Real Time Streaming Protocol (RTSP) | |
FTP | |
SSH | |
SMTP | |
Other protocols |
function | web.direct | web.direct 2.0 |
---|---|---|
Direct links: | ||
login links: | ||
URL Paramater: | 1 | |
WebSocket (WS): | ||
WebSocket Secure (WSS): | ||
Link per Device: | 2 | |
Two-factor authentication: | ||
Optional SSL certificates: (For terminal devices) |
||
Optional URL path can be set: | 3 | |
Temporary links: | 4 |
Parameter | Description |
---|---|
Activated | The template is activated or deactivated. |
Create links | If activated, these web.direct links are automatically created for new Devices. |
Inherit | Provision (inheritance) of this template for sub-mandates (partners). Special function for authorised users only! |
Priority | Priority of the web.direct link for the position in the portal view. Input 0 (top position) to 99 (bottom position) |
Created on | Date of creation of this template. |
Updated on | Date on which this template was last updated. |
Parameter | Description | |
---|---|---|
Name | The desired name of the web.direct link must be entered here. This is a required entry which, like the icon, is used for display in the portal. | |
URL alias | The URL alias is part of the web.direct URL. This must be a unique name for alias-based web.direct formats. Changes to the alias lead to short timeouts of max. 5 minutes for technical reasons. |
|
Link display | The format for displaying the web.direct URL can be defined here. | |
Default | The web.direct URL is displayed in the default format: URL format: [access][-URLAlias][-access hash1][-hash2] |
|
VPN-based | The web.direct URL is displayed as a combination of "VPN name" and "link alias". URL format: [VPNName][-URLAlias][-AccessHash1][-Hash2] |
|
Alias-Based | The web.direct URL is generated as a combination of access or access alias, followed by the link alias, access hash and link hash. URL format: [AccessAlias or Name][-URLAlias][-AccessHash1][Hash2] |
|
Alias only | The web.direct URL is displayed as a link alias, device alias or device name (if no alias is configured), URL format: [URLAlias or Alias or Name] |
|
Without AccessHash1 | The web.direct URL is displayed without a hash. (A possibly generated hash is not taken into account). URL format: [Device][-URLAlias][-Hash2] |
|
Icon | Icon, size and colour of the web.direct link for display in the portal. |
Connection settings | |||
Parameter | Description | ||
---|---|---|---|
Port / Protocol | Required input for how the data is transferred from the browser to the mdex gateway. As a rule, an encrypted HTTPS connection is recommended here, i.e. 443 /HTTPS. (This setting should not be confused with the required port/protocol setting for remote access to the terminal device, which is made under mdex Gateway Terminal device) The lock symbol in the diagram also indicates whether an unencrypted (insecure) HTTP connection or encrypted (secure) HTTPS connection has been set between the browser and mdex Gateway. The realm is usually "mdex". Only if the user uses an 'Mdex Private Network' (MPN) for projects, the ports/protocols of the desired realm must be selected. The respective realm is also displayed in the portal for the respective Device under "Details". Changes to the port/protocol lead to short downtimes of max. 5 minutes for technical reasons. |
||
443 /HTTPS | Recommended for most applications: Encrypted connection between browser and mdex gateway via HTTPS port 443. | ||
80 /HTTP | Unencrypted connection between browser and mdex Gateway via HTTP port 80. This setting should only be used if, for example, there are problems with remote access with the encrypted connection. |
||
Caching | Specifies whether and how the browser should cache the content of web pages (adverts, images, etc.) in order to avoid unnecessary data transfers and reduce access times. Since it must also be ensured that the transferred content is not outdated, it is necessary to precisely control caching. | ||
No caching | No website content is cached, but constantly updated. Regular updates result in higher data consumption. | ||
Default | The browser's cache settings are used. | ||
HTML only | Only HTML content is updated, but no scripts or images. | ||
Path (URL) | This path is appended to the URL of the web.direct link, e.g. to access certain pages in the terminal device. The path must begin with a slash /, e.g. /motor. The page .../motor is now accessed directly in the terminal device. | ||
Session timeout (minutes) | Maximum validity of a web.direct link in minutes. The session is disconnected after the set time has elapsed. This can prevent unwanted data consumption, e.g. if a browser is forgotten to close when accessing live images/videos from a webcam. | ||
Security settings | |||
Parameter | Description | ||
Authentication | Setting the desired authentication when calling the web.direct link. Changes to the authentication settings lead to short timeouts of max. 5 minutes for technical reasons. |
||
None (direct link) | The web.direct link can be accessed without the user having to authenticate themselves. As the web server of the terminal device can be accessed directly without authentication, the terminal device should be protected with a secure login password and the link should contain a Hash. |
||
Global password | When accessing the web.direct link, the user must authenticate with the specified global password. The global password is set when the link is added. Please note that if the global password in the link is changed, all other links with the "Global password" authentication must also use the new password. | ||
Link password | When calling up the web.direct link, the user must authenticate themselves with the defined link password. The link password is set for the added link and is only valid for this link. Changes to the password therefore do not affect other links. • No password generation: A password must be set manually. • Password generation (12 characters): A 12-character password is generated automatically. • From Device: The default web.direct password is used. |
||
Portal account (OTP required) | When accessing the web.direct link, the user must authenticate themselves with their mCOP portal access data (user name & password) and also the one-time password for two-factor authentication (OTP). The link usage (authentication) is logged for the respective web.direct link in the "History" window. If the two-factor authentication has not yet been set up in the portal, the links cannot be used! |
||
Portal Account | When accessing the web.direct link, the user must authenticate themselves with their mCOP portal access data (user name & password). The link usage (authentication) is logged for the respective web.direct link in the "History" window. |
||
Visibility / Access |
Required entry: Either the visibility in the portal or the use (access) of the web.direct links is set here. This depends on the Authentication set above: Authentication: • None (direct link) • Global password • Link password Visibility (With which role is this link displayed in the portal for users. ) Authentication: • Portal account (OTP required) • Portal account Access (With which role can the link be used. The link usage (authentication) is logged for the respective web.direct link in the "History" window.) Permissions: |
||
Role: | Authorisation: | ||
WebDirect | Use of the web.direct links. | ||
WebDirectAdmin | Administration (edit) web.direct links. | ||
WebDirectTemplateAdmin | Administration access for web.direct templates. | ||
WebPortalAccess | Use of the portal (mCOP). | ||
WebServiceAccess | Use of the web.direct links. | ||
WebDirectAccessAdmin | Use of the web.direct links for users as "Administrator". | ||
WebDirectAccessDealer | Use of the web.direct links for users as "Seller". | ||
WebdirectAccessDistributor | Use of the web.direct links for users as "Distributor". | ||
WebDirectAccessLevel1-3 | Use of the web.direct links for users as "Level 1, 2 or 3". | ||
WebdirectAccessManufacturer | Use of the web.direct links for users as "Manufacturer". | ||
WebDirectAccessService | Use of the web.direct links for users as "Service". | ||
WebDirectAccessUser | Enables simple users to use web.direct links | ||
Hash (Predefined) | A hash is used to cryptically obfuscate data so that it is no longer displayed in plain text. A predefined hash can be set here, which is applied to every newly created web.direct link. For security reasons, this is particularly recommended if "None (direct link)" has been set under Authentication. |
||
Hash generation | The method for hash generation can be defined here so that a hash is automatically generated from the optional Hash (Predefined) and this method for each newly created web.direct link. | ||
No hash | Only the optional Hash (Predefined) is used. | ||
Hashes per link | The hash is generated based on the web.direct link. (Each web.direct link has an individual hash.) |
||
Hashes per Device | The hash is generated based on the Device. (All web.direct links of a Device have the same hash). |
||
|
This method is obsolete and should no longer be used! | ||
Hashes per template | The hash is generated based on the web.direct template. (All web.direct links created per template have the same hash.) |
||
Hashes per VHOST | The hash is generated based on the mdex realm. (All web.direct links of a realm have the same hash). The realm is usually "mdex". Only if the user uses an 'Mdex Private Network' (MPN) for projects, the ports/protocols of the desired realm must be selected. The respective realm is also displayed in the portal for the respective Device under "Details". |
||
Link timeout (minutes) | Optional: The validity of a web.direct link after creation can be specified here in minutes. This timeout enables the creation of temporary links that can only be used for x minutes after creation and are automatically deactivated after the time has expired. A stopwatch is then also displayed as a symbol in the diagram to indicate this. |
Connection settings | ||
Parameter | Description | |
---|---|---|
Port | Port and protocol (HTTP / HTTPS) for remote access to the terminal device. This port must have been set up as an accessible port in the cellular router or terminal device, e.g. via port forwarding. For security reasons, we recommend setting up remote access in the router or terminal device for an encrypted HTTPS port (e.g. HTTPS port 443). The lock symbol in the diagram also shows whether an unencrypted (insecure) HTTP connection or encrypted (secure) HTTPS connection has been set. | |
Advanced connection settings | ||
Parameter | Description | |
SSL certificate (PK) | Optional: Enter a private client certificate key that the mdex Gateway should use for a secure SSL connection. | |
SSL certificate | Optional: Enter an SSL client certificate that the mdex Gateway should use for a secure SSL connection to the terminal device. |