Corporate Info | News | Solutions | Products | Partners | Services | Events | Download | How To Buy
http://www.oracle.com/technology/documentation/index.html | Site Map | Search | PDF Files | Contact | Glossary
Tuxedo Doc Home | Getting Started | Topic List | Previous | Next | Contents
Introducing the BEA Tuxedo System
Benefits of Using the BEA Administration Console
Authentication-The BEA Administration Console forces users to identify themselves. It prompts the administrator for a user name and password. This information is communicated in an encrypted fashion between the browser and the server, where the user's identity is then verified. (Much of the server setup is done during installation, when server components of the Console are installed and made available to the Web server.) Context-sensitive help-Context-sensitive help is available for all Console screens and tools. You can request information about any field or area of a screen simply by dragging a question mark icon to that field or any area and clicking. Encryption-The data transferred between the server side and the browser is compressed (56-bit or 128-bit encryption) so that no one can read it. This makes the system resistant to anyone trying to inject false administrative protocol messages into the stream. Firewall readiness-The port on which the BEA Administration Console server listens and interacts with the browser is well defined and configurable; you can configure it to match ports that you want to allow through your firewall. This capability enables you to do Console-based administration through your firewall, if necessary. Icons- The icons used in the BEA Administration Console connote state (for example, not active) or represent particular objects in the application, for example, machines or servers. Java-capable browser-The Java browser supports the Java virtual machine that runs the applets and enables communication. No client-side installation-No installation is required on your machine. Point your browser to the URL for a machine in your domain on which the Console server components reside. Then initiate a download of Java applets. The applets implement the Console and establish communication with the server. Universal secure access- From any Java-capable browser, you can access the system from anywhere in the world with confidence that security mechanisms are already in place.
Context-sensitive help-Context-sensitive help is available for all Console screens and tools. You can request information about any field or area of a screen simply by dragging a question mark icon to that field or any area and clicking. Encryption-The data transferred between the server side and the browser is compressed (56-bit or 128-bit encryption) so that no one can read it. This makes the system resistant to anyone trying to inject false administrative protocol messages into the stream. Firewall readiness-The port on which the BEA Administration Console server listens and interacts with the browser is well defined and configurable; you can configure it to match ports that you want to allow through your firewall. This capability enables you to do Console-based administration through your firewall, if necessary. Icons- The icons used in the BEA Administration Console connote state (for example, not active) or represent particular objects in the application, for example, machines or servers. Java-capable browser-The Java browser supports the Java virtual machine that runs the applets and enables communication. No client-side installation-No installation is required on your machine. Point your browser to the URL for a machine in your domain on which the Console server components reside. Then initiate a download of Java applets. The applets implement the Console and establish communication with the server. Universal secure access- From any Java-capable browser, you can access the system from anywhere in the world with confidence that security mechanisms are already in place.
Encryption-The data transferred between the server side and the browser is compressed (56-bit or 128-bit encryption) so that no one can read it. This makes the system resistant to anyone trying to inject false administrative protocol messages into the stream. Firewall readiness-The port on which the BEA Administration Console server listens and interacts with the browser is well defined and configurable; you can configure it to match ports that you want to allow through your firewall. This capability enables you to do Console-based administration through your firewall, if necessary. Icons- The icons used in the BEA Administration Console connote state (for example, not active) or represent particular objects in the application, for example, machines or servers. Java-capable browser-The Java browser supports the Java virtual machine that runs the applets and enables communication. No client-side installation-No installation is required on your machine. Point your browser to the URL for a machine in your domain on which the Console server components reside. Then initiate a download of Java applets. The applets implement the Console and establish communication with the server. Universal secure access- From any Java-capable browser, you can access the system from anywhere in the world with confidence that security mechanisms are already in place.
Firewall readiness-The port on which the BEA Administration Console server listens and interacts with the browser is well defined and configurable; you can configure it to match ports that you want to allow through your firewall. This capability enables you to do Console-based administration through your firewall, if necessary. Icons- The icons used in the BEA Administration Console connote state (for example, not active) or represent particular objects in the application, for example, machines or servers. Java-capable browser-The Java browser supports the Java virtual machine that runs the applets and enables communication. No client-side installation-No installation is required on your machine. Point your browser to the URL for a machine in your domain on which the Console server components reside. Then initiate a download of Java applets. The applets implement the Console and establish communication with the server. Universal secure access- From any Java-capable browser, you can access the system from anywhere in the world with confidence that security mechanisms are already in place.
Icons- The icons used in the BEA Administration Console connote state (for example, not active) or represent particular objects in the application, for example, machines or servers. Java-capable browser-The Java browser supports the Java virtual machine that runs the applets and enables communication. No client-side installation-No installation is required on your machine. Point your browser to the URL for a machine in your domain on which the Console server components reside. Then initiate a download of Java applets. The applets implement the Console and establish communication with the server. Universal secure access- From any Java-capable browser, you can access the system from anywhere in the world with confidence that security mechanisms are already in place.
Java-capable browser-The Java browser supports the Java virtual machine that runs the applets and enables communication. No client-side installation-No installation is required on your machine. Point your browser to the URL for a machine in your domain on which the Console server components reside. Then initiate a download of Java applets. The applets implement the Console and establish communication with the server. Universal secure access- From any Java-capable browser, you can access the system from anywhere in the world with confidence that security mechanisms are already in place.
No client-side installation-No installation is required on your machine. Point your browser to the URL for a machine in your domain on which the Console server components reside. Then initiate a download of Java applets. The applets implement the Console and establish communication with the server. Universal secure access- From any Java-capable browser, you can access the system from anywhere in the world with confidence that security mechanisms are already in place.
Universal secure access- From any Java-capable browser, you can access the system from anywhere in the world with confidence that security mechanisms are already in place.
Copyright © 2000 BEA Systems, Inc. All rights reserved. Required browser: Netscape 4.0 or higher, or Microsoft Internet Explorer 4.0 or higher.