Newbies jbh_ Posted December 12, 2012 Newbies Posted December 12, 2012 Because the security capabilities of SC alone are far under what my application requires by law, I need something that will allow me to completely block access to all SC folders/URLs, no matter what, unless users login to each folder (URL) individually, preferably synced w/ LDAP, or at least blocked based on access to each database. I do plan on using UUIDs, but that doesn't prevent access via URL in general. I don't wan't people uploading various junk files simply because they understand how SC works. I have read that running Tomcat as the primary web server can do this, but I also see in the SC documentation the following: "Option 3: Installing SuperContainer with Tomcat This approach is recommended for advanced users if you are running Linux, Solaris, or any other computer not running FileMaker Server Advanced." We're running Windows Server 2008 R2 w/ IIS, and we're running FMS Advanced 12. Am I able to run a copy of Tomcat simultaneously w/ IIS just for using with SC, or am I completely out of luck? Thanks!
Newbies jbh_ Posted December 20, 2012 Author Newbies Posted December 20, 2012 I found out that I can run Tomcat and IIS at the same time on the same Windows server. However, is this an option for me at all, given that I am using FMS Advanced?
SCninja Posted January 7, 2013 Posted January 7, 2013 Yes, The folks at 360Works provided three different deployment options for this very reason. So, in your case you can simply deploy SuperContainer server on your Windows machine using a custom install of Tomcat. By default you will be using port 8080 to access SuperContainer (i.e 127.0.0.1:8080/SuperContainer), but that can be changed with proper knowledge of Tomcat configurations. In fact, 360Works provides some pretty good documentation on their product wiki page that explains how to configure different ports when using SC with Tomcat. Signed,
Newbies jbh_ Posted January 14, 2013 Author Newbies Posted January 14, 2013 Awesome! Thanks! Now all I have to figure out is how to configure security-constraints for different user groups. Seems easy enough, so far. The hardest part will be convincing Network to hand over the LDAP configs.
Recommended Posts
This topic is 4583 days old. Please don't post here. Open a new topic instead.
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now