HostExplorer® Traditional & Browser-based Host Access to Legacy System While every attempt has been made to ensure the accuracy and completeness of the information in this document, some typographical or technical errors may exist. Hummingbird – the Open Text Connectivity Solutions Group cannot accept responsibility for customers’ losses resulting from the use of this document. The information contained in this document is subject to change without notice. This document contains proprietary information that is protected by copyright. This document, in whole or in part, may not be photocopied, reproduced, or translated into another language without prior written consent from Hummingbird . This edition published June 2007 www.hummingbird.com 2 Contents Overview Part 1: HostExplorer Overview Introduction to HostExplorer HostExplorer Overview Operating Systems Specifications Windows Vista Certification Languages Part 2: Installing, Deploying and Connecting with HostExplorer Installing and Deploying HostExplorer User Directory Support for Local Installation Cache Automatic Updates After Installation Files and Settings Transfer Wizard Media Location Manager Utility Multiple Profile Space Current Industry Practices Introducing Multiple Profile Spaces Profile Spaces Types Profile Spaces: An Example Rights Management Composite Profiles Multiple Profile Spaces Management The profile publishing wizard Conclusion Sconfig: A Deployment Customizer for HostExplorer Integrated Metering Connecting to Enterprise Hosts: A 3 step process Hummingbird Neighborhood Creating a Connection to a Host Setting up Advanced Connection Properties PART 3: Emulation with HostExplorer Core Emulation Settings TN3270 – TN3270E Emulation TN5250 – TN5250E Emulation VT Emulation Customizing the Terminal Display www.hummingbird.com 7 8 8 9 10 11 11 13 13 14 15 15 16 16 17 17 20 22 23 26 27 28 29 29 30 33 34 34 35 36 38 38 38 38 38 39 3 Colors Fonts Screen Customization Integration with Windows Explorer Customizing the Terminal Keyboard Transferring files with HostExplorer 3270 File Transfer 5250 File Transfer VT File Transfer Hummingbird FTP FTP Synchronization Printing with HostExplorer Screen Printing and Multiple Screen Printing 3287 and 3812 Printing Sessions HostExplorer Print Services VT Host Printing Part 4: Productivity Providing Additional Interaction Methods Mouse Actions Right-Click Menu HotSpots Toolbars Managing the User Environment Look & Feel Menus Manager User Settings Interface Manager Locking Down the User Desktop Sound Manager Improving Productivity Shortcuts Manager Duplicate Session Report Wizard Managing the User Workspace Helpdesk Multiple Sessions in a Single Terminal Glossary Part 5: Security Security Overview www.hummingbird.com 39 40 41 42 43 45 45 47 48 48 49 51 51 52 53 53 55 55 55 55 55 55 56 56 58 59 60 61 62 62 64 64 65 66 68 68 70 70 4 Security Risks in a World Weak Authentication Easy Protocol Decoding Data Authenticity and Integrity Tampering Solutions for Secured SSL Kerberos Secure Shell HostExplorer Security SSL/TLS Overview Support for Safenet iKey Authentication Device Support for Smartcard Authentication Kerberos Secure Shell 2 Authentication Key Exchange configuration Remote Command Execution Advanced Features SCP Command Line Monitoring Console Certificates and Keys Management HTTP Tunneling Part 6: Automation with HostExplorer Overview QuickKeys or the Ultimate Keyboard Shortcut Creator Managing Events with HostExplorer QuickScripts or Macro Made Easy Hummingbird Basic: the Ultimate HostExplorer Programming Tool Communicating with HostExplorer HLLAPI, WINHLLAPI, EHLLAPI OHIO DDE OLE COM Part 7: Web-to-Host Fundamentals Easy on Administrators www.hummingbird.com 70 70 70 70 71 71 72 73 74 76 76 77 78 78 80 81 81 82 83 84 85 86 89 91 91 92 92 93 94 95 96 96 96 96 97 98 98 98 5 Fit with any Architecture User-Friendly Always Available Even Without the Web Server Exact Same Features and Power as HostExplorer Enhanced Web-to-Host User Experience Download Mechanisms Seamless Behavior as a Thick Client Caching Mechanisms and Failover User Rights and Security Advanced Administrative Settings Creating a New Project Selecting a Host Profile Specifying Files and Browser Integration Mode Deploying 3rd Party Files and Applications with Hummingbird Deployment Wizard Locking Down the User Environment Deploying on any Web Server on any Operating System Installation on Demand Part 8: Migrating to HostExplorer Migration: a Corporate Project The Value of TCO We Manage the Risk of Conversion What are the Benefits of HostExplorer for a Migration Project? Migration at a Glance Migration Wizard Migration Facilities HLLAPI Compatibility Look and Feel www.hummingbird.com 98 98 99 99 100 100 102 102 103 104 104 105 106 108 109 110 111 113 113 113 113 114 115 116 118 118 119 6 Overview This document is divided into eight parts, each one designed to present you with a ® specific aspect of HostExplorer . All functions and benefits explained in the eight parts of this document apply to HostExplorer as a traditional desktop-based emulator and to HostExplorer as a browser-based web-to-host terminal with the exception of Part 2. Part 1: HostExplorer overview — This section gives a high-level overview of ™ HostExplorer and Hummingbird Deployment Wizard , as well as the operating systems requirements. Part 2: Installation and Deployment — This section provides information on deploying and connecting with HostExplorer traditional desktop-based software. It covers the different scenarios related to deploying HostExplorer. It provides a ® tour of the HostExplorer Windows Installer customization tool: Sconfig. This section also helps the reader establish the first connection to a host through HostExplorer. Part 3: Emulation with HostExplorer — Display, input, file transfer and printing features of HostExplorer will be covered in this section. You will learn about the numerous features and settings of the core emulation engine. By customizing the user experience with HostExplorer we will explain how HostExplorer can help you leverage and safely manage the user’s workspace. Whether you want to provide a custom working environment for your users or you want to lock down the desktops. Part 4: Productivity — HostExplorer not only provides a secure, powerful and customizable terminal emulation environment, it can also help users boost their productivity. This section will explore what are the tools integrated in HostExplorer that can help users achieve their work faster and better. Part 5: Security — This section explores various aspects of HostExplorer as it relates to Security: SSL, Kerberos, Secure Shell and HTTP/HTTPS tunneling. Part 6: Automation — This chapter will give you a tour of your options with the HostExplorer APIs, from HLLAPI to OLE or COM and from the macro recorder to the Hummingbird Basic editor. Part 7: Web-to-host — This section offers a comprehensive understanding of the fundamentals of HostExplorer as a web-to-host solution. Part 8: Migration — This part will explain the different features of HostExplorer ™ that ease the transition from other emulation software such as Attachmate ® ® ™ Extra , Netmanage Rumba , IBM Personal Communication or WRQ ® Reflection . www.hummingbird.com 7 Part 1: HostExplorer Overview Introduction to HostExplorer HostExplorer is the latest terminal emulation software available from Hummingbird . ® HostExplorer provides access to enterprise mission-critical data from a Microsoft Windows desktop or browser. HostExplorer supports multiple connections types and enable users to access information and applications on systems such as IBM Mainframe, AS/400 and UNIX Systems. Legacy systems host more than 80% of corporate information. In our business life we rely heavily on transactions being executed successfully on these systems. Providing access to this information has never been as critical as today since every organization is struggling to maximize technologies benefits while reducing costs. HostExplorer and Hummingbird Deployment Wizard provide corporations with an easy way of protecting their investment in legacy data while letting them benefit from the latest in desktop and web-based technologies. They enable organizations to lower their total cost of ownership and take advantage of a state-of-the-art web-based terminal emulator. HostExplorer and Hummingbird Deployment Wizard allow organizations to provide user access to legacy information without having to undertake costly and painful installation on each desktop. Organizations that choose HostExplorer and Hummingbird Deployment Wizard save time and money by skipping the deployment process while at the same time increasing their productivity. Amongst multiple benefits, HostExplorer can help corporations easily migrate from desktop based client technologies to web-to-host solutions. Migrating from a desktopbased product to a web-based solution can be risky especially when it affects access to legacy applications and mission-critical data. HostExplorer and Hummingbird Deployment Wizard can help corporations achieve this transition with maximum security and efficiency. HostExplorer and Hummingbird Deployment Wizard are part of a single, unified solution that can be deployed either as desktop-based software or as a web-based solution. It provides the same interface, the same features, the same power and the same administrative options, whether accessed as standard windows software or as web-to-host software and does not require you to choose between thick or thin, desktop or browser, features or power. By using HostExplorer and Hummingbird Deployment Wizard, organizations can seamlessly deploy web-based and desktop-based access to their legacy systems while ensuring maximum availability, security and features for both their power remote users. HostExplorer and Hummingbird Deployment Wizard provide administrators with the latest technologies for securing their network communications. By getting the most from a wide range of encryption and authentication protocols, the HostExplorer family of products ensures that mission-critical data is safely transmitted. HostExplorer SSL implementation relies on the OpenSSL project (www.openssl.org) and integrates www.hummingbird.com 8 seamlessly in the terminal while providing advanced administrative features such as certificate management, key management, user certificates and more. In addition to that, HostExplorer is among the first to implement the MIT Kerberos protocol and support for both Kerberos 4 and 5. Finally, Secure Shell™ brings Secure Shell 2 encryption and authentication to HostExplorer in order to encrypt VT communications through secured channels. HostExplorer and Hummingbird Deployment Wizard will not only enable corporations to reduce administrative overhead but also let them discover what the meaning of the words ―peace of mind.‖ With its built-in web capabilities, auto-upgrade features, Microsoft SMS integration, certification for Windows Vista and powerful administrative features, HostExplorer and Hummingbird Deployment Wizard introduce a new world of terminal emulation solutions. HostExplorer macro converter and advanced API support also provide large corporations with an easy migration path from their current terminal emulator. HostExplorer Overview HostExplorer links people and information through host access for TN3270E, TN5250E and Telnet (VT) applications. HostExplorer can be deployed as traditional desktop-based emulation software, or as a web-to-host solution that can be accessed through a web server and a browser. The HostExplorer interface is available in 6 different languages: English, French, German, Spanish, and Italian and it is one of the first Euro ready products. www.hummingbird.com 9 Figure 1.1 — HostExplorer offers both traditional terminal emulation capabilities as well as a web-to-host browserbased solution There is no difference between the browser based emulator and the desktop based emulator in terms of: Features and Functions Power and Speed Interface and Look & Feel Operating Systems Specifications HostExplorer runs on the following operating systems: Windows Vista Windows Server 2003 Windows XP Windows 2000 Windows XP 64-bit edition Windows Server 2003 64-bit edition Windows XP Professional x64 Edition Windows Server 2003 x64 Editions Windows 2000/2003 Server with Terminal Services www.hummingbird.com 10 Citrix® Presentation Server® for Windows Internet Explorer 5.x, 6.x and above Firefox, Opera and other Java-enabled Web browsers Windows Vista Certification Hummingbird products support Windows Vista. We have partnered with Microsoft as an early adopter of the Windows Vista certification program and received the ―Certified for Windows Vista‖ logo for our latest product offerings. Our products have been tested by a Microsoft-authorized third-party laboratory until their finalization. HostExplorer 2008 has received the "Certified for Windows Vista" logo. Languages HostExplorer is available in the following languages: German English Spanish French Italian Administrators have the ability to allow the software language to be switched dynamically. This feature allows multi-language companies to deploy the same package to all of their users regardless of the language that will be used. Users can simply switch from one language to another using the language selector. www.hummingbird.com 11 Figure 1.2 — HostExplorer offers the ability to dynamically switch the UI language www.hummingbird.com 12 Part 2: Installing, Deploying and Connecting with HostExplorer Installing and Deploying HostExplorer Terminal emulators are a mission-critical element in large organizations. They sometime are installed on tens of thousands of workstation. Administrators are often reluctant to change old emulators for a newer one since they expect the cost of the deployment and migration to be more expensive than the benefit they would get from upgrading the current software. Hummingbird has put significant efforts and resources to insure HostExplorer would be easy, painless and inexpensive to deploy, and that it would offer administrators several flexible deployment scenarios. HostExplorer is based on the Microsoft Windows Installer technology for installation, modification, upgrade, and removal of software. This technology, which was introduced by Microsoft in Windows 2000, provides a powerful installation framework across all platforms of the Microsoft operating system families. Windows Installer provides administrators with consistent and reliable methods to customize installations, update and upgrade applications, and resolve configuration problems. It can also manage shared resources, enforce consistent file version rules, and diagnose and repair applications at runtime. Out of the box, HostExplorer offers the following deployment options: Individual installation: this wizard driven installation, allows the user or the administrator to install the product on each individual workstation. Administrative installation: this installation scenario consists of creating a shared installation repository on a central location. Each user will need to perform a ―user‖ installation of the product from the repository. This ―user‖ installation will only copy the user settings to the workstation. The binary components of the product will remain on the shared installation repository. Windows Terminal Services or Citrix Presentation Server installation: this type of installation consists of setting up the software on either Windows Terminal Services (Windows NT 4.0 Terminal Server Edition or Windows 2000 Terminal Services) or on the Citrix Presentation Server platform (Citrix Presentation Server 1.8 or Citrix Presentation Server XP). Once the installation is finished, the administrator creates a specific Windows user group, which contains the list of users to whom the product will be distributed. www.hummingbird.com 13 Packaging and deployment through Microsoft SMS or any 3rd party deployment framework: this scenario (refer to ―Sconfig: a deployment customizer for HostExplorer‖ in part 2 of this document.) allows the user to customize the Microsoft Windows Installer setup file (.MSI) for HostExplorer. The administrator can specify several installation options through a graphical packaging tool created specifically for Hummingbird software: Sconfig. Once the customization is finished, the software can be silently deployed on user desktops with Microsoft System Management Server or any other 3rd party remote deployment system. Deploying HostExplorer as web-to-host software: included in a separate installation, but provided with HostExplorer, is the Hummingbird Deployment Wizard. With this unique tool, administrators are able to transform the traditional desktop-based HostExplorer into a powerful browser-based web-to-host solution. Refer to part 7 ―Hummingbird Deployment Wizard‖ in this document for more information on the different features and benefits of the web-to-host solution. User Directory Hummingbird product setup simplifies the management of the user files location. User files can either be stored into each individual user directory or shared among all users of the same machine. Figure 2.1 — Selecting the User Directory www.hummingbird.com 14 Support for Local Installation Cache When introduced for the first time in Windows 2000, the Windows Installer technology gave Windows application a solid foundation to build more reliable and standard setup. In HostExplorer, Hummingbird introduces the local installation cache technology which allows administrators to copy an image of the installation files locally on the user desktop. With this technology, applying product updates or changing product setup get a dramatic boost and suppress the need for accessing the original setup media during certain Windows Installer operation. Figure 2.2 — Post-Installation Options Automatic Updates After Installation HostExplorer offers two post-installation options that will allow users to keep their product up-to-date: Run Hummingbird Update after installation will connect to the Hummingbird web site, retrieve the latest update pack and automatically apply it to the product. www.hummingbird.com 15 Visit the Hummingbird WebUpdate site will open a new browser window where users will be able to manually download and apply the latest update pack for the product. Files and Settings Transfer Wizard The Files and Settings Transfer Wizard is a utility that allows administrators to quickly import and export the user files into HostExplorer. This tool will prove to be particularly useful for organizations that want to operate quick backups of the user configuration files or in case of hardware migration when the user data need to be transferred to a new machine. Figure 2.3 — HostExplorer Migration Wizard Media Location Manager Utility The Media Location Manager is a new utility that allows administrators to specify additional installation sources for HostExplorer. Windows Installer use these sources to perform certain operations such as updating the product or modifying the installed features. www.hummingbird.com 16 In case the original product source has disappeared or needs to be relocated, administrators can choose to add new sources from a variety of different locations: local directory network directory URL Figure 2.4 — The Media Location Manager Utility Multiple Profile Space HostExplorer’s multiple profile architecture is a major innovation in the terminal emulation market space. It provides an elegant and secure framework for central administration without requiring organizations to set up costly proprietary administrative servers as it is the case with other terminal emulation solutions. Current Industry Practices Many large organizations manage their terminal emulation profiles fairly rudimentarily. With a large numbers of desktop to manage, such organizations are often left with no other choice than copying all terminal emulation profiles on every single desktop. This method is called decentralized profile management. www.hummingbird.com 17 Figure 2.5 — An example of decentralized profile management: all profiles are copied on each desktop. Such profile management practices are not without drawbacks: All-or-nothing approach: to keep the chaos at a reasonable level, there is no other choice left to the administrator than to make sure every desktop is strictly identical. This task in itself can be daunting. Every new profile or every modification to an existing profile will need to be deployed on every desktop. When confronted with such situation, many organizations will decide upon maintaining the status quo rather than implementing profile changes which would come at a significant administrative cost in time and efforts. Unnecessary data replication: similarly to the database normalization approach, there is no reason why the same profile should be replicated over and over on hundreds or thousands of desktops. Replication becomes even more meaningless if the profiles that are distributed are locked-down for modifications. No “single version of the truth:” assuming that all profiles are not locked down and despite the administrator’s best effort, it is very likely that each PC will have a slightly different version of the profile settings than his neighbor thanks to the customization skills of its user. In other instances different administrators will create different profiles for the same connection and distribute it to the users under their jurisdiction. No flexibility: copying the software and profiles to the desktop is often done through a standardized desktop image. Administrators create a deployable image of all software components required on the desktops from the operating system to the business line applications. The image gets installed either by the organization own teams or by a 3rd party system integrator. This replication process requires every image to be the same for everybody. With such constraints in mind, it becomes impossible for administrators to manage different www.hummingbird.com 18 groups of profiles, short of creating different desktop images which would obviously send the deployment costs skyrocketing. No granularity: decentralized profile management leaves little room for granularity. Managing specific requirements at the group level or at the user level is an impossible task. As impossible is the ability to fine tune user rights, giving them the ability to modify some parameters such as the terminal colors and preventing them from altering others such as the security settings. Policy-adverse: in a decentralized profile management system, it is all but possible to implement proper policies. With every machine being equal administrators are unable to manage profiles and access to these profiles in the same way they manage their group policies. Security-adverse: there’s a saying in the security that the less is known about a potential target the better it is. In a decentralized profile management scheme, host information is distributed all over the place. There’s no doubt that every host will offer the adequate level of authentication before allowing users to log in, but is it really necessary for the production folks to know the IP address, port and security methods for the accounting mainframe? User-adverse: Being a user in a decentralized profile management based organization can be somewhat confusing and frustrating. Because all desktops receive the same image, users find themselves saturated with profiles that are not relevant to their tasks. Additionally, the all-or-nothing approach leaves the administrator with few choices: either he lets users modify the profiles and incur the risk of saturating the help desk with calls from inexperienced users that have just changed their colors to black on black, or he locks down the profiles with the guarantee that power users will be frustrated and dissatisfied with the tool. All or nothing approach Unnecessary data replication No ―single version of the truth‖ No flexibility No Granularity Policy-Adverse Security-Adverse User-Adverse www.hummingbird.com 19 Figure 2.6 — Disadvantages of decentralized profile management architectures Introducing Multiple Profile Spaces ―Multiple Profile Spaces‖ is the name for Hummingbird ’s technology that allows administrators to manage and deploy profiles from central or distributed repositories. A profile space can be accessed by HostExplorer users to read or write profiles. There is no limit to the number of profile spaces that a particular user can access and there is no limit to the number of profile spaces that can be set up. www.hummingbird.com 20 Profile spaces are extremely flexible and allow administrators to adapt the repository architecture to suit their needs. For instance: Single profile space: users do not have any profile stored on their desktops. All profiles are located in a central repository making it easy for the administrator to create new profiles or modify existing ones without redeploying any of them. Multiple profile spaces: users are split in group (by business unit for instance). Each group has its own profile space and can not access other group’s spaces. This kind of architecture helps the administrator specialize profiles by publishing them only to the relevant group of users. Combined profile spaces: this architecture consists in setting up multiple profile spaces with specialized profiles in them and allowing users to access one or more of these spaces. This model presents the advantage of keeping profiles organized and secured by specialization (line of business or geography for instance), while letting users access them seamlessly. Combined and personal profile spaces: in addition to letting users access global repositories, administrators also have the ability to allocate them a personal area where they can store, retrieve and modify their own profiles and settings. This setup constitutes the ultimate profile space experience, giving users a transparent access to private and global profiles. www.hummingbird.com 21 Figure 2.7 — Examples of Profile Spaces architectures Profile Spaces Types On the contrary of other terminal emulation software, Hummingbird designed Profile Spaces to leverage existing IT infrastructures without introducing a proprietary repository. Profile Spaces can be set up on four different types of repositories: Local storage: this includes hard drives, removable drives and any other fixed or removable media that is physically connected to the user desktop. Network storage: this includes network drives, UNC paths, NFS shares and any remote location that can be accessed from the operating system. LDAP Directories: any directory service that supports the Lightweight Directory Access Protocol Active Directory: Microsoft’s directory service for use in Windows environment is tightly integrated with all Microsoft Operating Systems, Management Tools and Security Policies. www.hummingbird.com 22 Figure 2.8 — Available profile spaces types Profile Spaces: An Example The major advantage of profile spaces is their versatility and their flexibility. There is no limit to what a profile space can be used for as shown by the example below. www.hummingbird.com 23 Figure 2.9 — Profile Spaces can be organized in many logical configurations In a classic decentralized management environment, such configurations would have been hard to set up without creating a multitude of desktop images to suit each group requirements. Scenario 1: ACME Inc. is a typical multi-department company with employees working in 3 units: Finance, Sales and Production. Terminal emulation is used at different levels by all employees: All users need to access the enterprise scheduling application which resides on a Mainframe Finance users need to access applications residing on the company’s Mainframe. Sales have their CRM application on an AS/400. Production uses UNIX servers to manage the production cycle. Finally, all employees have access to specific Mainframe and UNIX applications depending on their roles and use FTP file transfer to save their personal data. www.hummingbird.com 24 Figure 2.10 — ACME Inc. Profile Spaces are organized by Business Unit Scenario 2: ACME Inc. is a global company with operations on 3 continents: North America, Europe and Asia Figure 2.11 — ACME Inc. Profile Spaces are organized by geographical locations www.hummingbird.com 25 Rights Management Profile Spaces have been designed to leverage the existing IT infrastructure and policies in place. Profile Spaces will take advantage of the native Access Control Lists (ACLs) available for each profile space type. Using the native right management system for each profile space type offers a number of advantages both for the administrator and the users. Administrator: Full administrative control over users’ rights: Profile Spaces will obey by the ACL rules giving users read or write access to profiles only when authorized by the ACLs. No paradigm shift: no proprietary (i.e. different) users and groups management system that would create administrative overhead. No need to learn new administrative tools: user rights can be managed with the same tools that are used to manage the file system rights or the directory rights. Figure 2.12 — Profile Spaces as seen from the Active Directory administrative console www.hummingbird.com 26 User: Transparency: on the contrary of proprietary profile management systems the user will see no difference between accessing profiles stored on profile spaces or traditional profiles. No unnecessary login: since Windows credentials are being used to determine Profile Spaces rights, there is no need for additional authentication before accessing the profiles. Easier access to profiles: with Multiple Profile Spaces users can only see the profiles they have access to. It reduces the risk of errors while simplifying the user interface. Composite Profiles Multiple Profile Spaces offer total control over the profiles repositories and how users access them. In addition to these benefits, Multiple Profile Spaces can also be used to offer a more granular access to the various elements of the profile. A typical profile is usually a collection of different settings such as the connection information, the keyboard map, the color scheme, the security information etc. Many administrators want to give their users the ability to modify some of these settings (keyboard and colors for instance) while locking down others (connection and security for instance). Achieving such level of granularity is usually not an easy task with traditional profile management systems but become a trivial operation with Multiple Profile Spaces. Every settings of a profile are stored in schemes. Each scheme exists as its own independent file. Every scheme can be stored in a different Profile Space and has its own ACL. The requirements described above can easily be fulfilled by storing Connection and Security schemes in a global read-only Profile Space while Keyboard and Colors can be distributed to every user in its personal read-write Profile Space. www.hummingbird.com 27 Figure 2.13 — A composite profile example Multiple Profile Spaces Management Administrators can manage Multiple Profile Spaces with easy powerful tools that come with HostExplorer. The Profile Space Editor The Profile Space Editor allows administrators to add, edit and remove Profile Spaces. Each profile Space can be assigned a name and a distinct icon that will help users identify it easily. A particular Profile Space can contain references to multiple locations. When the first location is not available, HostExplorer will automatically look for the next online location. This ability allows administrators to set up fault-tolerant Profile Space and guarantee that their users will always have access to their profiles. When choosing the location for a particular Profile Space, the administrator is also allowed to use system replacers (in the form of $KeyWord$). Those replacers will transparently be converted into real values when using the Profile Space. For instance the $USERNAME$ replacer will be converted to the Windows user name of the currently logged in user. www.hummingbird.com 28 Figure 2.14 — Creating a Profile Space with a primary and a backup location in the Profile Space Editor tool The profile publishing wizard The profile publishing wizard is an administrative tool that allows profiles stored locally on a desktop to be published to an existing Profile Space. Administrators who use that tool will be able to set up the profiles and test them locally on their desktop before making them available to their user community. This tool can also be used to publish modifications to already-published profiles in a Profile Space. Conclusion Multiple Profile Spaces offer new perspectives on organizations’ profile management practices. They offer countless benefits to users and administrators. Flexibility Profile Spaces can be organized in any physical and logical combinations. www.hummingbird.com 29 There is no limit to the number of spaces that can be created. There is no limit to the number of users that can access a particular Profile Space. Profile Spaces can be deployed on local file systems, network file systems, LDAP directories and Active Directory Security Profile Spaces leverage existing user rights and do not require administrators to create (or recreate) a particular users and groups hierarchy to suit the deployment model. User rights are managed through existing ACLs offering administrators total control over the distribution and access to the profiles. Individual settings of a particular profile (also known as schemes) can be stored on different Profile Spaces and have their own ACL, allowing for maximum granularity in the access rights. No disruption Profile Spaces do not require specialized software to be installed on servers Profile Spaces live within the existing infrastructure not requiring dedicated hardware Profile Spaces will not increase the workload of existing network and hardware infrastructures besides normal I/O operations. Sconfig: A Deployment Customizer for HostExplorer Among the different options that can be used to deploy software to a large number of desktops, one has earned the preference of many system administrators: silent installation with automatic deployment and upgrade through software distribution systems. Although the Windows Installer technology provides a powerful framework to create installation packages, its complexity can sometimes lead to spending more time trying to understand the setup components than actually doing the package customization job itself. 3rd party tools enable administrators to customize the Windows Installer packages (.msi files) and provide a convenient way of changing multiple installation options. However, they remain generic tools, which do require administrators to have advanced knowledge of the msi structure and mechanisms. HostExplorer setup is fully compatible with 3rd party tools, however, Hummingbird includes its own package customizer utility in HostExplorer. This tool, named Sconfig, www.hummingbird.com 30 is dedicated to Hummingbird software installation and does not require the administrator to have any knowledge of the msi file format. When using Sconfig, system administrators can modify the parameters of Hummingbird software installation and create custom packages that will be deployed silently to the users’ workstations. Relying on the windows installer standards, this administrative tool creates windows transform files (.mst files) which remain 100% compatible with the Windows Installer technology. Once created, these packages can be deployed through Microsoft SMS or any other 3rd party deployment system. This tool is 100% graphical and does not require command line mode editing. Figure 2.15 — Sconfig process overview Sconfig enables the administrator to customize several options of the HostExplorer installation process: www.hummingbird.com 31 Directories: the location where the binary components and the user settings will be installed on the user’s machine. Features: the different components of the software. Files: any additional file that the administrator wants to deploy on the workstation at the same time. Properties: various installation properties pertaining to the software or its installation (advertised shortcuts, migration, custom registration strings …). Registry: any additional registry key that the administrator wants to setup along with HostExplorer registry entries. Shortcut: all shortcuts that will be created during the installation are listed here. The administrator can either modify or remove the existing shortcuts or add new ones which will refer to additional files that have been deployed in addition to HostExplorer. Figure 2.16 — Sconfig allows administrators to customize numerous deployment options www.hummingbird.com 32 Integrated Metering HostExplorer product includes a metering client. This optional component which can be installed during the deployment step allows each product to report itself automatically to a metering server when launched. The metering client works with all Hummingbird products. This optional component can be either installed with the following methods: By selecting it at installation time By including it into a Sconfig preconfigured install that can be pushed through SMS By being web-deployed with HostExplorer through the browser When HostExplorer is launched, the metering client sends an update to the metering server with the following information: client IP address, workstation name, user name, authentication domain, product installed and version of the product. Additionally, the metering client will send detailed information about the components name of a product and their specific patch level. Because it is deployed as an ISAPI dll for Internet Information Server, the metering server does not require administrators to dedicate a specific machine for metering purposes. It helps organizations keep track of their licenses while giving them an accurate picture of the different versions deployed. Administrators can download a spreadsheet containing all metering data and use any spreadsheet processor to analyze the information in the license report. By logging into the metering server, administrators are able to download a CSV file that contains all the metering data for the organization. This file can then be opened in Excel and worked out through a PivotTable report. Thanks to the powerful features of the Excel PivotTable, administrators can manipulate the metering data in any way they want and present it in the light that meet their information need. Administrators can use any browser to access the metering server online reports. Online reports offer to group the data on several criteria thus allowing the administrator to obtain a customized view of the license usage and repartition. www.hummingbird.com 33 Figure 2.17 — The metering server browser-based reporting interface Connecting to Enterprise Hosts: A 3 step process NOTE: this section pertains to HostExplorer when installed as a traditional desktop software. See the Hummingbird Deployment Wizard section to learn more about connections with the web-to-host version of HostExplorer. One of the first things that most users will probably do, once they have finished installing the software, is to connect to a server on the corporate network. Hummingbird Neighborhood HostExplorer provides a simple and intuitive method to establish host connection through a function called ―Hummingbird Neighborhood.‖ By clicking on this icon which is on the user desktop or in the ―My Computer‖ area, the user is offered an interface to the TN3270, TN5250, VT, 3270 printer, 5250 printer and FTP connection. NOTE: if needed, this icon can be removed from the user’s desktop. It will not affect the user’s ability to connect through TN3270, TN5250 or VT or printing sessions. However, Hummingbird FTP™ which provides a Windows Explorer integration of the FTP client will not be available and users will have to use the regular double-pane FTP which is also included with HostExplorer. www.hummingbird.com 34 Figure 2.18 — Hummingbird Neighbourhood offers a convenient single point of access to the emulation profiles and tools from within Windows Creating a Connection to a Host Creating a new profile and connecting to a host is an easy process which can be achieved in 3 easy steps. 1. In Hummingbird Neighborhood, double-click on the ―New HostExplorer Profile‖ icon. 2. Hummingbird Neighborhood prompts the user to enter connection information such as: Profile Name Profile Type: Mainframe, AS/400, VT, Mainframe printer, AS/400 printer Theme: preset user interface theme that closely match the look and feel of other terminal emulation software such as Attachmate Extra, Netmanage Rumba, IBM Personal Communications Connection type: Telnet or Microsoft SNA Server client Host Address: Name or IP address of the host www.hummingbird.com 35 Figure 2.19 — Creating a new profile is a simple 1 step process 3. Once the information has been validated, a double click on the profile icon in Hummingbird Neighborhood will open the Terminal. Within Hummingbird Neighborhood, users have the ability to right-click an existing HostExplorer profile in order to bring up the property panel of the profile where you can modify any setting of the profile from one convenient location, without the need to launch the emulator. Setting up Advanced Connection Properties One of the key elements used when connecting to a host system, is the host system address and port. Although administrators can ensure that their systems offer maximum user availability, a hardware or network failure could prevent users from connecting. In order to minimize this possibility, many system administrators use redundant systems which can offer the same services, in the event of the primary system failing. HostExplorer provides the ability to define several host addresses, ports and LUs for the same connection profile. Additional settings like connection timeout, number of retries or Delay between host retries are also available. HostExplorer is one of the few emulators on the market to support IBM Express Logon Features. www.hummingbird.com 36 Figure 2.20 — Multiple host settings allows the administrator to provision for fail-over Upon connection, HostExplorer will try to reach the first host on the list. In case of failure, HostExplorer will follow the directives of the configuration profile and try to connect to additional hosts if specified. Figure 2.21 — Connection messages allow the administrator to troubleshoot issues easily www.hummingbird.com 37 PART 3: Emulation with HostExplorer Core Emulation Settings HostExplorer supports several terminal types: TN3270 and TN3270E: 3278 and 3279 — Model 1 to 5 plus a custom terminal model which enables the definition of a specific number of rows and columns TN5250 and TN5250E: Model 2 and 5 VT: 52, 100, 101, 102, 220, 320, 420, ANSI, SCO ANSI and IBM 3151 TN3270 – TN3270E Emulation HostExplorer allows both TN3270 and TN3270E protocols to be used. It enables the administrator to set up one or several 3270 LU or Pool name for the connection. It can also automatically look for the first available LU, if the connection is made through the Microsoft SNA server client. It supports various TN3270E options like Attention key type definition. It also enables multiple settings for NVT (Network Virtual Terminal) mode, like the Enter Key interpretation mode, Backspace Key interpretation mode and the keyboard buffer mode. One crucial part of terminal emulation software is the translation of host characters into PC characters. HostExplorer offer one of the best code page translation engines on the market, with more than 83 supported code pages available for display session and more than 450 different combinations of host/PC code page translation available for file transfers. HostExplorer also supports the Euro character set. HostExplorer supports various graphic terminals like 3270 PCG, 3472G, 3129G or 3179G. The emulator supports lightpen, APL characters and program symbols as well as extended attributes. TN5250 – TN5250E Emulation In addition to the NVT settings mentioned above, HostExplorer 5250 Terminal allows the definition of the Device Name. It also enables administrators to use the AS/400 ―Auto Sign On‖ function and allows them to specify a username and a password that will be sent from the Terminal to the host. It also supports switching between green and white colors only or 5250 mapping for field colors. VT Emulation In addition to the terminal types mentioned above, HostExplorer VT Terminal allows for the customization of the Terminal ID. 7-bit and 8-bit communication modes are www.hummingbird.com 38 allowed. Among numerous settings, the terminal also supports word wrap, local echo, interpreted or displayed control codes, optimized or realistic scrolling and answerback message. Last but not least, HostExplorer offers different Linemode support, Telnet echo support and several negotiation options. Many character sets and NRC sets are available to choose from. Screen size can be either set to 80 or 132 columns. Customizing the screen width and height is also possible. Customizing the Terminal Display One of the first things that a user does when a terminal gets displayed on the screen is customize the color, fonts and display. Figure 3.1 — The HostExplorer color mapper offers a powerful yet simple interface Colors HostExplorer offer a comprehensive and easy-to-use color remapper. The use of schemes allows for the saving of several combinations of fields’ colors into files which are then easy to move from one desktop to another. Out of the box, HostExplorer comes with 35 ready to use color schemes. www.hummingbird.com 39 Advanced users also have the option to create their own custom colors from an RGB color mixer. The Click-and-Drag functionality makes it easy for assigning existing colors to different field types. Finally, HostExplorer color manager provides easy to use options such as uniform background and foreground color mapping, monochrome color and a basic mapping mode, which restricts the number of field types that appear on the screen. Fonts The next step in Terminal customization often consists in managing and setting up the different fonts that are used to display the text on the screen. Based entirely on Unicode, HostExplorer ships with two Terminal fonts: one Truetype font and one Bitmap font. While other emulators ship with tons of fonts, that seem to end up polluting the system folders, HostExplorer is capable of displaying any type of character including Cyrillic, Croatian, Czech, Danish, Dutch, Estonian, Finnish, Greek, Hungarian, Icelandic, Latvian, Lithuanian, Norwegian, Polish, Romanian, Russian, Serbian, Slovenian and many others with only two fonts. In addition to all those features, HostExplorer font manager supports variable width fonts, thus enabling the user to modify the font width for better screen adaptation. Figure 3.2 — HostExplorer offers support for variable width fonts allowing the user to enhance the screen readability www.hummingbird.com 40 Screen Customization HostExplorer offers several screen customization options. First, the cursor can be modified to appear as a block, an underscore or a Vertical bar. The cursor can also be defined to blink or not. As shown in the figure below, HostExplorer offers a crosshair cursor that eases the localization of the cursor on the screen. The session window can also be totally customized. HostExplorer allows the administrator to define the window title by putting strings and mnemonics to provide useful information for troubleshooting. The terminal area can be framed within the session workspace and organizations will be capable of using customized wallpapers on the background of the window. Terminal fonts, by default, scale when a session window is resized. HostExplorer however allows for tight control of the font and window behavior when resizing. One particularly interesting feature for VT Terminal users is the ability to handle windows resizing like the well-known X-Window XTerm software. When this particular mode is activated, HostExplorer will hook any window resizing and negotiate a new terminal size with the server. As a result, the fonts will not be scaled to match the new window size but the terminal workspace will provide additional rows and columns as shown in the Fig. below. Figure 3.3 — Cross-Hair Cursor allows user to easily locate the cursor on the terminal www.hummingbird.com 41 Figure 3.4 — HostExplorer allows VT terminal screen size to be dynamically negotiated with the host Integration with Windows Explorer A first in the industry, HostExplorer terminals can be displayed and used directly from within the Windows Explorer interface. On the contrary of other products, HostExplorer does not require anymore the user to launch a separate application to work on his legacy system applications (although this option is still available). Instead, users can simply browse the Hummingbird Neighborhood extension from within Windows Explorer and click on the connection profiles to launch a terminal window in the right-hand pane of the Explorer window. This ground-breaking feature push the ease-of-use and productivity of the users one step further while making the most of the latest Windows XP desktop technologies. www.hummingbird.com 42 Figure 3.5 — HostExplorer Terminals seamlessly integrate with Windows Explorer Customizing the Terminal Keyboard A key element of terminal emulation is the interaction between the user and the host through the keyboard. Host systems allow for multiple functions to be mapped to various keys on the user terminal. Therefore, an effective keyboard mapper is a key component of emulation software. www.hummingbird.com 43 Figure 3.6 — HostExplorer offers multiple preset keyboard schemes as well as various keyboard settings HostExplorer keyboard mapper offers several useful functions to simplify the work of the administrators and allow them to provide effective key functions to users. The keyboard mapper relies on keymap files, which contain all the information related to a specific keyboard mapping. Those files can be easily transferred from one desktop to another. HostExplorer supports several keyboard layouts as well as general keyboard settings such as numlock state management, diacritic composition, type ahead or mapping of the numlock keys. When accessing the keyboard mapping table, the user is presented with an intuitive drag and drop interface. Functions that can be mapped are logically organized into different groups such as system commands, editing keys, action keys, characters and more. Custom automation commands such as Macro commands, Quickkeys and QuickScripts can also be mapped to the keyboard. Mapping a function to a key simply consists of dragging this function from the list and dropping it on the desired key. As an additional convenience, administrators can also print an existing keyboard mapping in order to keep track of it. www.hummingbird.com 44 Figure 3.7 — The HostExplorer keyboard mapper offers a powerful drag-and-drop user interface Transferring files with HostExplorer As with most terminal emulation software, HostExplorer not only provides the user the ability to display information on the screen, but it also allows for the transfer of files between the client and the server in multiple ways. 3270 File Transfer HostExplorer supports IND$FILE file transfer methods for CMS, TSO/MUSIC and CICS. File transfer settings include block size definition, initial download action, file format, record format and miscellaneous general options. One of the most advantageous aspects of HostExplorer 3270 file transfer is its ability to automatically correlate the PC code page with the host code page defined in the terminal settings. HostExplorer contains a table of more than 450 code page combinations that come directly from IBM 3270 specifications. It offers more code pages than any other non-IBM software. www.hummingbird.com 45 HostExplorer allows TN3270 users to easily create a list of files to be uploaded or downloaded through IND$FILE. Such list can be build automatically while users are adding file to be transferred or can be saved and kept on the user desktop for later reuse. A monitoring window constantly informs the user of the status of each transfer operation. Figure 3.8 — 3270 File Transfer lists allow users to transfer a batch of files quickly www.hummingbird.com 46 Figure 3.9 — The 5250 data transfer wizard simplifies AS/400 file transfer 5250 File Transfer The 5250 file transfer mechanism relies on the 5250 file transfer wizard which provides an easy graphical user interface for creating SQL queries that upload or download files from the AS/400 file system. Similarly to ftp hosts in Hummingbird FTP, AS/400 file systems can be browsed directly from within Windows Explorer. Windows users will find themselves in a known environment, thus increasing their productivity while reducing the learning curve for doing AS/400 file transfers. Making the most of the Windows Explorer drag and drop paradigm, this new feature further strengthen the integration between HostExplorer and the Windows operating system. www.hummingbird.com 47 Figure 3.10 — AS/400 file transfer integrates with Windows Explorer VT File Transfer HostExplorer offers the following file transfer methods for exchanging files with Unix systems: XModem, YModem, Kermit and ZModem. Hummingbird FTP In addition to the file transfer methods listed above, HostExplorer comes with two FTP clients that enable users to exchange files with FTP servers on a variety of hosts including Mainframe, UNIX, and AS/400. By default, Hummingbird FTP is the FTP client installed with HostExplorer. The other FTP client that can be installed through the ―custom‖ or ―complete‖ installation offers a standard two-pane view of the local and remote file system. Hummingbird FTP provides the user with a revolutionary interface. After a FTP profile has been set up from the Hummingbird Neighborhood, the host system can be browsed via the Microsoft Windows Explorer interface. Not only does this component provide the user with an experience similar to browsing a local file system, it also provides a unique way of interacting with the remote server through double-click and drag-and-drop. Among its multiple options, Hummingbird FTP offers the ability to create local shortcuts to files located on remote systems. When double-clicked, the shortcuts will automatically connect to the FTP server where the file resides, copy the file into a www.hummingbird.com 48 temporary directory and open the file locally following the rules implemented through file extension associations in Windows. If the file is modified, Hummingbird FTP will detect it and ask the user to upload the file back to the server. It also allows automatic file synchronization as well as the creation of automation tasks through the generation of QuickScripts (see Part 4: Automation with HostExplorer) Various settings are available for a FTP connection, including: firewall definition, automatic file type detection, automatic server type recognition, advanced directory caching, time and date synchronization. Additionally, the FTP connection can be secured through HostExplorer GSS API implementation which enables the use of the Kerberos protocol for FTP. Hummingbird FTP can also perform Secure Shell connections to UNIX hosts if Secure Shell is installed. Figure 3.11 — Hummingbird FTP smoothly integrates with the Windows Operating System FTP Synchronization FTP, is not only used to perform ad-hoc file transfer operations anymore. A growing number of users and administrators now use FTP to perform mass file transfers, copying entire directories at once and synchronizing them between their desktops and FTP servers. Hummingbird FTP offers a convenient solution for those users through synchronization profiles. A synchronization profile is a list of files or directories that will be copied between the server and the desktop. Hummingbird FTP can either www.hummingbird.com 49 copy the files in one direction (from or to the desktop) or synchronize the files between the FTP server and the desktop by looking at date of modification. Users can decide to organize their mass transfers in any logical way they want. As an example, a user could decide to group all of the files and directories to transfer into a separate synchronization profile for each host. However, there’s no limitation in the number of hosts that can be use within the same synchronization task and it is entirely possible for a user to synchronize all of his hosts with the same profile. Hummingbird FTP offers users the ability to schedule the execution of Synchronization Profiles. The scheduled tasks are sent to Windows Scheduler that is part of the Windows Operating System. Schedule options include: Execution options: task definition, additional parameters, account setup for execution. Timing options: date and time, recurrence, multiple schedules. Additional options: run conditions, idle conditions, power management. Integration with Microsoft Windows Scheduler allows administrators to control the scheduled tasks through the standard Windows administration tools. Figure 3.12 — Scheduling a synchronization task in Hummingbird FTP www.hummingbird.com 50 Printing with HostExplorer HostExplorer offers several printing capabilities depending on the type of host the terminal is connected to. The following printing methods are supported: Screen Printing: TN3270, TN5250 and VT 7171 Passthru printing: TN3270 3287 Printing sessions: TN3270E 3812 Printing sessions: TN5250E Host Printing: VT Figure 3.13 — Multiple screen printing allows users to capture several screens and print them later in a single operation Screen Printing and Multiple Screen Printing Screen Printing is one of the most often used printing features. HostExplorer enables the user to define various layout options such as document name, header, footer, color or black and white printing, location on the page, number of screens per page and more. One of the most interesting features of HostExplorer screen printing is its ability to print multiple screens at once. This option can be activated through the File menu, and enables the user to display a capture palette. The palette allows the user to capture screens while navigating within the host. Once the required screens have been captured, the user can preview his print jobs and send them to the printer in a batch print job, saving time and increasing efficiency. www.hummingbird.com 51 3287 and 3812 Printing Sessions Included in the terminal settings is the ability to create and associate printer sessions to a specific HostExplorer profile. A printing session will connect to the host and forward any print jobs it receives to the designated local or network printer. The ability to create independent or attached printer sessions gives administrators a lot of flexibility when setting up the users’ environment. 3287 and 3812 printing sessions support multiple settings such as the ability to precisely define page margins, orientation and format. Sessions support the use of various code pages. A crucial feature of the 3287 printing session is the ability to execute IBM PDF (Printer Definition Files) commands. Figure 3.14 — Printer sessions can be created, set up and launched within the terminal during a session www.hummingbird.com 52 HostExplorer Print Services HostExplorer Print Services allow Mainframe and AS/400 administrators to consolidate their print queues on a single Windows server instead of managing thousands of individual desktop print queues. HostExplorer Print Services can handle several thousands of print queues on a single machine and can be remotely managed. HostExplorer Print Services offers highly scalable, powerful, and centralized 3270 and 5250 printing capabilities for an entire enterprise with large volume requirements and advanced management. HostExplorer Print Services centralizes print processing and routes host print jobs directly from the host to any supported print queue. HostExplorer Print Services operates in a powerful 32-bit environment, running as a service on a Windows NT Server or Windows 2000 Server, providing improved performance and reliability. VT Host Printing In addition to offering standard VT Host Printing settings, HostExplorer also enables the print job to be redirected to a file instead of the printer. When printing to a file, HostExplorer can either append or overwrite the data to the print file, or create multiple files with incremental suffixes to store each print job. www.hummingbird.com 53 Figure 3.15 — HostExplorer Print Services architecture diagram www.hummingbird.com 54 Part 4: Productivity Providing Additional Interaction Methods Keyboard is not the only way to interact with the host. HostExplorer allows for a variety of other input methods that can be used to leverage the user experience and increase productivity. Mouse Actions HostExplorer allows keyboard mappings to be applied to different mouse actions. The administrator can define combinations of keyboard and mouse actions that allow the user to perform specific functions. In addition, HostExplorer offers users the ability to cut and paste text on the screen by selecting and moving the text with the mouse, in similar fashion to Microsoft Word. Right-Click Menu The right-click menu or ―track menu‖ is a user definable menu that contains often used functions. Thanks to this menu, administrators can offer their users a contextual menu tailored to their needs with functions such as cut, copy and paste for instance. HotSpots HotSpots consist in definable text string that the administrator will associate with specific actions. When detecting a HotSpot string on the screen, HostExplorer will automatically transform this text into a clickable are. These are can either be invisible or look like a button surrounding the HotSpot text. By clicking or double-clicking on the HotSpot, the user will trigger the action which has been previously associated in the profile settings. Toolbars One of the most practical ways of customizing a working environment is offered through the use of toolbars. Toolbars have become graphical user interface standards since their introduction in the first WYSIWYG desktop productivity software. HostExplorer floating toolbars are fully customizable by the user or the administrator. Each toolbar function can display a specific tooltip. Toolbar icons can be customized with personal images and have a specific text label associated with them. www.hummingbird.com 55 Figure 4.1 — HostExplorer toolbars are highly customizable and mimic the behaviour of Microsoft Office toolbars Managing the User Environment Look & Feel HostExplorer powerful themes engine allows administrators to store the configuration of several groups of settings into a single entity called a theme. Themes are extremely useful to provide users with a seamless and consistent setup of the software. Administrators can choose to configure one or multiple themes to distribute to their users. When creating a new session, users will be offered to launch the connection with any of the available theme depending on the administrator restrictions. HostExplorer comes pre-packaged with themes that can help organizations made an easier transition with other terminal emulation software such as Attachmate Extra, NetManage Rumba,® WRQ Reflection or IBM Personal Communication. This function coupled with the existing migration facilities such as macro conversion and HLLAPI compatibility provide organizations with an easy migration path to HostExplorer. www.hummingbird.com 56 Figure 4.2 — New profile Theme selection www.hummingbird.com 57 Figure 4.3 — HostExplorer Theme Manager displaying the Rumba theme Menus Manager HostExplorer gives users a lot of flexibility to customize their work environment. The Menu Customization facility allows users to design their own menu layout, or to choose from an existing of preset layouts. Administrators that are looking for complete control over the user desktop will be able to selectively disable menu items, thus improving the overall user experience while reducing the risk of mistakes. Menus are comprised of all HostExplorer system commands, as well as host functions, editing keys, macro commands and QuickScripts. www.hummingbird.com 58 Figure 4.4 — HostExplorer Menu Manager User Settings Interface Manager The user settings interface manager provides users with the ability to create and use a custom interface to the session settings. Administrators are able to provide only a selected list of modifiable settings to their user, thus eliminating the risks associated with the free modification of sensible parameters. Additionally, organizations that migrate from previous terminal emulation software will reduce the learning curve by presenting groups of settings that are more familiar to their users. www.hummingbird.com 59 Figure 4.5 — HostExplorer Session Settings Manager Locking Down the User Desktop Most system administrators do not allow their users to modify many settings on their desktop, for fear they might disrupt the software. With HostExplorer, administrators have the ability to lockdown certain features of the software. Regardless of the feature accessibility through menus, dialogs, shortcuts or toolbars, the locked-down features will be totally inaccessible to the user, thus preventing involuntary mistakes and saving considerable time for helpdesk. www.hummingbird.com 60 Figure 4.6 — Locking down terminal functions Sound Manager In addition to visual alerts and color customization, users are able to attach specific sounds to emulation events. As an example, a sound can be chosen to notify users as soon as a connection has been successfully accomplished, while another one can be used when a disconnection happens. This capability of HostExplorer is particularly interesting in working environments for people with disabilities. It also further extends HostExplorer compliance with the US Government Section 508 requirements. www.hummingbird.com 61 Figure 4.7 — Associating Sounds and Events Improving Productivity Shortcuts Manager A lot of character-based applications whether on Mainframe, AS/400 or UNIX hosts are primarily used for data input. Some of the information on the screen are often repeated. As a result data operators need to type them several times a day, losing a few seconds and increasing the risk of mistakes with each occurrence. With the shortcut manager, users have the ability to define a list of acronyms that will be substituted to longer words or even sentences during the input stage. HostExplorer will browse for a specific shortcut in the list that’s been created and replace the shortcut on the fly with its complete form. The shortcut manager can also be used as an ―auto-correct‖ option. For instance, every occurrence of the typo error ―ablity‖ could be automatically replaced by the correct ―ability.‖ While this function reduces the risk of errors it also speeds up data entry operation, allowing organizations to increase their productivity and ultimately, their bottom line. www.hummingbird.com 62 Figure 4.8 — Shortcut Activation Modes Figure 4.9 — Shortcut Manager www.hummingbird.com 63 Duplicate Session Duplicate Session is a HostExplorer function that allows users to open new sessions by cloning existing ones. When invoked, this command will create a new terminal with the exact same characteristics as the one it was created from. Keyboard, colors, macros and all other settings will be strictly identical to the original. This is extremely useful to users working in environments requiring a number of opened connections to the same host. Report Wizard The report wizard is a powerful new tool that will dramatically improve the productivity of users that need to print a multiple screen pages on a regular basis. For many users, printing a list of customer or a list of references out of their mainframe application often consists in frantically calling the ―Print Screen‖ function while pressing the ―Page Next‖ button on their keyboard. When these lists are made of tenths of screens, this operation becomes a considerable loss of time and a game of patience. With the HostExplorer Report Wizard, users will be able to define the navigation rules and print areas for those lists that require a lot of user interaction. Once the user has specified the beginning and end of list application identifiers as well as the keyboard navigation rules, HostExplorer will then be able to automate the tedious task of list printing. HostExplorer will automatically browse through the screens and capture the required information. It will then offer the user to print the data, send them to the clipboard, write them into a text file or open them in Microsoft Word or Microsoft Excel. www.hummingbird.com 64 Figure 4.10 — Selecting output format in the Wizard Managing the User Workspace HostExplorer allows users to control their workspace through a powerful tool: the layout. Layouts consist of a set of several session names, positions and sizings that are saved in Hummingbird Neighborhood. Power users often use several sessions at once, some connect to the same host, some to different ones. In order to optimize the workspace, the dimensions and positions of the session terminals are laid out by the user, in a way that allows him to work on multiple terminals at once. With the layout function of HostExplorer, the user can now save those terminals, their sizing and their position and restore the working environment through one single entry: the layout icon located in Hummingbird Neighborhood. www.hummingbird.com 65 Figure 4.11 — Layouts allow users to save their working environment for later reuse in one single file Helpdesk HostExplorer offers a valuable compromise for administrators that need to efficiently support their users without huge investments, cumbersome logistic or degradation of quality of service. Users looking for help simply need to click on the HostExplorer Helpdesk toolbar button. This action will trigger a request for help that will be sent to a predefined administrator desktop. The administrator has the ability to take control of the terminal session and troubleshoot it as if he was physically in front of the user’s desktop. www.hummingbird.com 66 Figure 4.12 — An administrator remotely controls a user session to troubleshoot a problem www.hummingbird.com 67 Figure 4.13 — Example of several sessions within the same terminal Multiple Sessions in a Single Terminal Users who connect to many hosts at the same time may quickly end up with an incredibly crowded desktop. This situation can also end up causing errors if the user mixes one terminal for another. With HostExplorer, users have the ability to start their sessions within the same terminal. Once this option has been enabled, HostExplorer will host every session into the same frame. Users will be able to switch from one session to the other by using the ―Window‖ menu, by using the ―CTRL+TAB‖ keyboard shortcut or by clicking on buttons on the toolbar. This powerful new feature will reduce the risks of mistakes, while offering an effective answer to over-crowded desktops taskbar. Glossary The main reason why so many legacy applications are still around is because they are critical to many businesses. The reason why they are so unpopular with users is because they are lack graphical appeal and often require users to learn their manuals by heart before using them. One example of that would be these applications that require users to type in screen codes in order to navigate from one function to another. Another example would be applications that require users to manually browse huge code indexes in order to perform data entry operations. www.hummingbird.com 68 HostExplorer glossaries provide an easy way to alleviate the pain from the users and improve the user friendliness of legacy applications. Glossaries allow users to create lists of short codes and of their significance to help them when using legacy systems. Glossaries appear as a dockable list or a floating window that can be placed anywhere in the terminal window. Clicking on an entry will automatically insert it at the terminal cursor location without further necessary effort. Glossaries are also fully searchable to allow users to find information quickly. Figure 4.14 — Glossaries in action www.hummingbird.com 69 Part 5: Security Security Overview Security Risks in a World Although some protocols have been in use for more than a quarter century, very few of them come with a strong security model. Inherent security flaws exist in almost every protocol and many organizations do not realize how vulnerable they are to these security issues. Weak Authentication As surprising as it may seem, many protocols such as Telnet and FTP send their messages in clear text over the network. Such messages include username and passwords, as well as all other information displayed to the user during the session. Widely available network sniffing tools allow any attacker to easily capture that information and use it for their own profit. Easy Protocol Decoding Although X-Window does not transmit user’s input as a string of text to the X application, the protocol remains relatively easy to decode to obtain the desired information. Keyboard inputs are transmitted in clear-text as numbers which can be easily obtained and interpreted to rebuild the original text that was entered by the user. Access to password protected X applications can be compromised by anybody with a network sniffing tool and a little bit of patience. Data Authenticity and Integrity Tampering The Man in the middle attack or TCP hijacking is a well known attack where an attacker sniffs packets from network, modifies them and inserts them back into the network. Sensitive information can be intercepted and altered without a chance for the victim to know that their data has been tampered with. Although this attack requires a superior level of skills than those required for simply sniffing a network, some program/code sources are available on the Internet for the enterprising hijacker. www.hummingbird.com 70 Because of their widespread usage throughout organizations, software is a target of choice. Their popularity does not allow companies to simply remove and replace them with more secure technologies without significant investments. The solution to this problem consists in applying robust security techniques to existing protocols. Solutions for Secured Assuming that protocols are still going to be around for a significant number of years, it becomes mandatory for organizations to implement complementary security solutions that can be built on top of their existing infrastructure. Some of those solutions consist of building encryption and authentication within the network hardware. Although it sounds like an interesting way of increasing the security level of the network, such a solution is very expensive and involves significant disruption of the business operations. Another solution consists in building a security layer within the existing protocols. High effectiveness, minimal business disruption and relatively low investments are some of the characteristics that have led many organizations to choose that path. SSL SSL is short for Secure Sockets Layer, a protocol which allows for the encryption of data transmitted between two computers. It was developed in the mid-90s by Netscape to facilitate the transmission of sensitive information via the Internet. Since then, it has been built into all major browsers and web servers and is the industry standard for protecting information sent over the Internet. SSL uses public and private keys. There are two strengths of SSL, 40-bit and 128-bit. The bits indicate the length of the session key — the longer the session key, the harder it is to crack the code. When a client wants to connect to a server using SSL, the client and the server go through a series of requests and acknowledgements (―the SSL handshake‖). Briefly, the following occurs: The client sends a request for a secure session to the server. The server returns its digital certificate in response to the request. The certificate contains the server’s public key. The client checks the certificate to make sure it is valid and the server is authenticated. The client creates a session key which is encrypted with the server’s public key and sends it to the server. The server decrypts the session key information by using its private key. Both the client and server are now using the same session. www.hummingbird.com 71 All further information that is transmitted between the client and server will be encrypted automatically and safe from third-party prying. SSL offers both encryption and authentication. Encryption is accomplished using various algorithms such as 3DES, AES or RC4 for instance. In contrast to sever authentication, client authentication is not mandatory but can be accomplished by using client certificates. SSL is used to secure a wide variety of protocols and has been adopted by a large number of organizations. As an example, SSL has become the de facto security standard for Mainframe and AS/400 through the TN3270 and TN5250 protocol. It’s also widely used to secure HTTP connections and many 3rd party protocols. Kerberos Kerberos is a trusted third-party authentication. It is trusted in the sense that each of its clients believes Kerberos’ judgment as to the identity of each of its other clients to be accurate. Kerberos keeps a database of its clients and their private keys. The private key is a large number known only to Kerberos and the client it belongs to. In the case that the client is a user, it is an encrypted password. Network services requiring authentication register with Kerberos, as do clients wishing to use those services. The private keys are negotiated at registration. Because Kerberos knows these private keys, it can create messages which convince one client that another is really who it claims to be. Kerberos also generates temporary private keys, called session keys, which are given to two clients and no one else. A session key can be used to encrypt messages between two parties. Kerberos provides three distinct levels of protection. The application programmer determines which is appropriate, according to the requirements of the application. For example, some applications require only that authenticity be established at the initiation of a network connection, and can assume that further messages from a given network address originate from the authenticated party. Other applications require authentication of each message, but do not care whether the content of the message is disclosed or not. For these, Kerberos provides safe messages. Yet a higher level of security is provided by private messages, where each message is not only authenticated, but also encrypted. Private messages are used, for example, by the Kerberos server itself for sending passwords over the network. Kerberos is generally used in UNIX environment to provide authentication services. Kerberos is also available on the Mainframe and on AS/400. Microsoft introduced operating system level support for Kerberos in Windows 2000. Although interoperability between a ―classic‖ Kerberos environment and its Microsoft www.hummingbird.com 72 counterpart was somehow challenging at the beginning the two environments can now work seamlessly together. Many companies are considering using Kerberos as their primary authentication mechanism now that it can be used from the Windows environment. A Microsoft Windows server can easily become a Kerberos domain controller and thus serve as an authentication trusted tiers for all third party authentication needs. Another factor that speaks in Kerberos favor is its ability to be used as part of a much wider security implementation. The Secure Shell protocol for instance, which provides authentication and encryption services, can use Kerberos as one of its authentication method. Secure Shell The Secure Shell protocol was created in 1995 by a young Finnish student named Tatu Ylonen after he was victim of a password-sniffing attack. The protocol was released to the public as free software with its source code. By the end of 1995 the software was used by more than 20 000 users in 50 countries and the amount of requests asking for technical support was close to 150 requests per day. In 1996, SSH Communications Security Ltd. introduced the 2nd version of the Secure Shell protocol in order to overcome certain weaknesses of the initial version. The draft for SSH-2 was submitted to the IETF in 1997. In 1999, OpenBSD shipped with OpenSSH, a derivative of the original free SSH 1.2.12 which also supports the Secure Shell 2 protocol. The Secure Shell protocol offers numerous answers to security issues among which: It offers strong security against cryptanalysis and protocol attacks It provides support for key and certificate management infrastructures It can work in conjunction with existing certificate infrastructure if available It is relatively easy to deploy and can be made easy-to-use It does not require in-depth security knowledge from the user and can work transparently behind-the-covers. www.hummingbird.com 73 Secure Shell offers a very flexible infrastructure allowing the protocol to evolve as new authentication methods are invented. Current supported authentication methods include: Password Keyboard Interactive which is a method to use with authentication devices for instance Public / Private Keys Certificates (not standardized yet) Kerberos HostExplorer Security HostExplorer is one of the rare terminal emulation software that offers a complete security package. Other terminal emulators usually do not offer more than the basics of security and they often lack granularity. HostExplorer goes beyond this checkbox type approach and truly offers the administrator an exhaustive and robust security proposal. HostExplorer supports the following protocols: SSL Kerberos Secure Shell 2 www.hummingbird.com 74 Characteristics Secure Shell Add-on Product • Primary Function Secure Shell 2, SFTP, SSL v2/v3 & TLS, Kerberos v4/v5 Applicable Protocol FTP SSL /Kerberos /SSH-2 VT SSL /Kerberos /SSH-2 TN3270 SSL /Kerberos TN5250 SSL /Kerberos In addition, HostExplorer comes with HTTP / HTTPS Tunneling capabilities. Administrators can setup a web server to act as a HTTP / HTTPS proxy between HostExplorer and the hosts, allowing for secure non-disruptive communications over the Internet for instance. Below is a table which highlights the different security options available for HostExplorer (note: HTTP/HTTPS Proxy comes with the HostExplorer Setup). www.hummingbird.com 75 SSL/TLS Overview Most terminal emulation software offers some type of built in SSL encryption. Few of them however do offer the same extensive SSL implementation as HostExplorer. Figure 5.1 — HostExplorer offers advanced SSL settings such as certificates and cipher suites management HostExplorer offers several major advantages over its competition, starting with advanced SSL options: Multiple SSL general options: which allows the administrator to precisely define the behavior that HostExplorer will adopt during the SSL negotiation with the host. www.hummingbird.com 76 Figure 5.2 — Certificates are automatically retrieved from USB keys Selectable cipher suites: with this option, the administrator is able to restrict the list of cipher suites that will be used when negotiating with the host. Support for X509 user digital certificates: although server certificate download and verification is a mandatory part of the SSL negotiation, user certificate is an optional component of this process. This type of certificate, however, is getting a wider acceptance in today’s authentication technologies. By specifying a user certificate in a HostExplorer profile, the administrator allows the server to determine the identity of the user. HostExplorer is also one of the few terminal emulation software that support ELF: Express Logon Features. ELF lets a user running a 3270 client session log on to a host system using a digital certificate instead of a User ID and Password. Mode details about HostExplorer Certificate and Key Management utility are available later in this section. Support for SafeNet iKey Authentication Device Customers using SSL connections with Terminal or FTP sessions will be able to seamlessly experience the SafeNet iKey 2000 authentication experience with SSL. The SafeNet iKey 2000 USB-based two-factor authentication token provides costeffective and easy-to-use control for multiple applications and network services. When the key is plugged into the user’s machine, the Hummingbird Certificate and Key Manager automatically reads the certificates and displays them for users to choose. The SSL authentication process transparently passes the user certificate information from the key to the host. www.hummingbird.com 77 Support for Smartcard Authentication HostExplorer seamlessly integrate smartcards into the SSL terminal or file transfer sessions. After having selected the correct service provider in the corresponding dialog, users will be prompted to insert their smartcard into the smartcard reader. HostExplorer will read the list of certificates from the smartcard. During the SSL authentication stage, HostExplorer will use the user certificate from the smartcard to establish the secure connection. Figure 5.3 — The smart card authentication dialogue prompts user for the card Kerberos HostExplorer supports Kerberos. It provides Kerberos v4 and v5 support to HostExplorer as well as Microsoft Kerberos integration capabilities. Kerberos is built on the Massachusetts Institute of Technology Kerberos client. It supports both Kerberos v4 and v5 and includes the latest changes that have been integrated by MIT into their client. Kerberos fully supports the Microsoft Windows Kerberos Ticket cache. Organizations who have standardized on Active Directory and Kerberos will transparently integrate HostExplorer with their existing IT infrastructure. www.hummingbird.com 78 Figure 5.4 — Host Explorer Kerberos Settings Dialogue Figure 5.5 — Kerberos supports version 4 and 5 of the Kerberos protocol www.hummingbird.com 79 Secure Shell 2 HostExplorer supports the Secure Shell 2 protocol through the Secure Shell add-on. This add-on offers support for the Secure Shell 2 protocol as well as advanced capabilities for port-forwarding, tunnel monitoring and multiple authentication modes. It is fully and transparently integrated with HostExplorer. Figure 5.6 — Secure Shell settings are accessible directly within HostExplorer The key features of Secure Shell include: Secure Terminal Secure File Transfer Secure X11 port forwarding Secure generic port forwarding CSS supports X11 port forwarding. Users of Exceed or any 3rd party X-Window server can use CSS to provide robust security through the entire X-Window connection. Generic port forwarding is a powerful feature which allows any 3rd party application working on TCP/IP to be secured through Secure Shell without modifying the original application. Data sent by the application are intercepted by the Secure Shell Client and are transmitted to the destination host through the Secure Shell tunnel. www.hummingbird.com 80 Authentication The following authentication methods are supported: Password Keyboard Interactive Public/Private Keys Kerberos tickets Figure 5.7 — Secure Shell advanced settings can be easily configured Key Exchange configuration The Key Exchange configuration dialog allows users to select one or multiple key exchange mechanism and their priority order to be used during the initialization of the secured connection. www.hummingbird.com 81 Figure 5.8 — Key Exchange Dialogue Remote Command Execution Users have the ability to configure remote tasks to be executed immediately after the secured connection has been established with the host. These tasks will be sent through the Secure Shell remote command facility or after requesting a pseudoterminal. www.hummingbird.com 82 Figure 5.9 — Remote Task Configuration Advanced Features Additional features of Secure Shell include: Ability to extensively configure the protocol settings Support of multiple authentication methods for the same connection Support for Diffie-Hellman Group Exchange Support for Draft 8 of the GSSAPI Authentication and Key Exchange for the Secure Shell Protocol (draft-ietf-secsh-gsskeyex-08): GSSAPI Authenticated Diffie-Hellman Key Exchange GSSAPI group exchange gssapi-with-mic user authentication gssapi-keyex user authentication Support for Protocol compression Support for keep-alive Single sign-on ability through Kerberos authentication www.hummingbird.com 83 Passphrase and key caching in order to minimize user prompts for passwords Multiple trace levels Choice among several strong encryption algorithms including AES Choice of MAC algorithm Support for Agent forwarding Ability to automatically or manually select the X11 port settings Choice of the Secure FTP listening interface Support for many encryption methods: AES, BlowFish, 3DES, Cast, Arcfour Agent forwarding is a very convenient feature to secure authentication to multiple hosts without requiring the user to enter a password each time he connects to a new host. Agent forwarding allows an authentication request to be forwarded across a separate previously established Secure Shell session. SCP Command Line Secure Shell includes a file transfer command line utility called scp. Scp copies files between hosts on a network. It uses the secure shell 2 protocol for data transfer. Scp will ask for passwords or passphrase if they are needed for authentication. Any file name may contain a host and user specification to indicate that the file is to be copied to/from that host. Copies between two remote hosts are permitted. The Hummingbird scp command line utility offers its own set of command line parameters. In order to facilitate migration from another secure shell software, it also offers a compatibility mode with some of the most popular secure shell clients on the market. When activated, this compatibility mode changes the command line parameter to mimic the functions of the chosen secure shell implementation. Available compatibility modes are: SSH Tectia Client from SSH Communications Security F-Secure SSH from F-Secure Putty OpenSSH www.hummingbird.com 84 Figure 5.10 — SCP command line utility provide administrators with powerful options Monitoring Console The Hummingbird management and monitoring console is a convenient administration tool which offers a central place to manage all Secure Shell tunnels. It allows administrators to create, edit, delete, launch and close tunnels on-the-fly. It also offers a high level of tracing either at the tunnel level or at the channel level. www.hummingbird.com 85 Figure 5.11 — Real-time monitoring of the secure shell connections Certificates and Keys Management The Certificate and Key Manager (CKAM) allows users to organize, manage, create, import and export their public/private key pairs and their X509 certificates. The Certificate and Key Manager is fully integrated with the Windows Certificate data store. All Windows certificates are automatically imported into the Certificate and Key Manager repository the first time it is used. www.hummingbird.com 86 Figure 5.12 — The Certificate and Key Manager offers complete X509 certificate management Users are capable of viewing certificates details in order to know information such as the issuer, the validity, the version number, etc. The certificate and key manager also provides an easy-to-use wizard for users to create their own public/private key pairs. Another wizard allows users to create their own certificate requests or their own selfsigned certificates. Figure 5.13 — Certificates can be easily created and managed The Certificate and Key Manager supports imports and exports in the following format: Import: Hummingbird HCS Files (.hcs) PKCS#12 (.p12 and .pfx) www.hummingbird.com 87 X509 certificates (.cer, .crt, .der and .pem) Export: Hummingbird HCS Files (.hcs) Base-64 encoded X.509 (.cer) DER encoded binary X.509 (.cer) Public and private key pairs can also be easily managed with the certificate and key manager. Users are able to create their own public/private key pair through the key wizard. Figure 5.14 — The creation of Public and Private key pairs is done through a wizard The Key Upload Wizard is a facility which helps users uploading a newly created public key to a host. This operation used to require administrators to create the key, export it into a file, launch a file transfer utility and manually copy the file into the server. With the Key Upload Wizard, administrators can create the key and upload it automatically to the host. Once the new key is created within the Hummingbird Security Console, right-clicking on the key name offers the upload option. Keys are uploaded to the server using the SFTP protocol. Administrators need to specify the host name, their credentials, the secure shell server type and the directory in which the key needs to be uploaded. With the Key Upload Wizard, administrators can create keys and safely transfer them to the host from a single administrative point with minimum efforts. www.hummingbird.com 88 Figure 5.15 — The Key Upload Wizard securely transfer public keys to the server HTTP Tunneling HostExplorer comes with an integrated HTTP/HTTPS proxy in order to easily secure external connections without setting up more complex and costly solutions. Once installed on a server, the HTTP/HTTPS proxy acts as an HTTP gateway between HostExplorer and the Host. External traffic is transmitted via HTTP or HTTPS (like any web page traffic) while internal traffic will be transmitted through the regular network protocol (TN3270, TN5250 or Telnet). www.hummingbird.com 89 Figure 5.16 — HTTP/HTTPS tunneling offers additional security for external HostExplorer users The HTTP / HTTPS Proxy bring numerous benefits: Administrators are always reluctant to open port 23 to their hosts for external users. By using HTTP / HTTPS Proxy, administrators simply need to ensure their HTTP / HTTP port is opened which is already done in most cases to serve regular web pages. No more complex firewall rules. External users who need to access a host from the Extranet do not require administrators to implement additional security or a complex and costly VPN. Support of the HTTPS protocol ensures that all data transmitted from the outside of the network to the HTTP/HTTPS proxy are encrypted. Integrating HTTP/HTTPS proxy in HostExplorer simply requires the administrator to edit the destination host address and add the URL of the proxy server HTTP/HTTPS proxy is the easiest and simplest secure solution to provide access to your host for users connecting from the outside of the network without compromising your security policies. www.hummingbird.com 90 Part 6: Automation with HostExplorer Overview Characteristics Overview QuickKey Key Sequence Events Quick Scripts Hummingbird Basic APIs Action Macro commands Macro language in a full fledge Basic DDE, HLLAPI, in a graphical environment EHLLAPI, Triggers user-friendly WINHLLAPI, editor OLE, COM, OHIO Recording/Playback GUI Editor • • • • N/A • • N/A • • VBA Compatible Target Audience Beginner • • • recording/playba ck recording/playback Intermediate • • • • Advanced • • • • • Keyboard • N/A • • N/A Toolbar • N/A • • N/A Mouse • N/A • • N/A Main Menu • N/A • • N/A Right-Click Menu • N/A • • N/A Events • N/A • • N/A Can Be Mapped To www.hummingbird.com 91 QuickKeys or the Ultimate Keyboard Shortcut Creator QuickKeys are the easiest and quickest ways of creating simple automation tasks. QuickKeys do not require users to have any programming knowledge. A QuickKey is a logical name that designates a series of terminal functions to execute. In the QuickKey editor, the user picks the function he wants to use and append them one after another. Functions are grouped in libraries to facilitate the user’s tasks. Once the functions have been assigned to the QuickKey, the user simply needs to give it a name and decide where he’s going to call the QuickKey from. QuickKeys can be called from Keyboard Shortcuts, Toolbar Icons, Menus, Mouse actions or through the event manager (see next section). Managing Events with HostExplorer Administrators can automate tasks such as the execution of command sequences and scripts using Quick-Keys, Macros, and QuickScripts. To leverage this task automation, HostExplorer lets the administrator assign actions to certain systeminitiated or host-initiated events using the Event Manager. As an example, HostExplorer can be configured so that: When a session connects to the host, a Quick Script executes and performs a sequence of actions on the host. At noon each day, a windows command shell is executed. HostExplorer handles the following events: When a connection is made When a time period elapses When a connection is terminated After a period of inactivity When the cursor enters a field (3270 and 5250 only) At a specific time of day When the cursor leaves a field (3270 and 5250 only) When the host updates the screen When the cursor enters a position When the host unlocks the keyboard When the cursor leaves a position www.hummingbird.com 92 When a file transfer has finished (3270 only) When a string is received from the host (3270 and 5250 only) Figure 6.2 — HostExplorer events manager allows administrators to setup conditional actions that will execute automatically QuickScripts or Macro Made Easy QuickScripts are designed to be used by people who have no programming knowledge. QuickScripts can be created in two ways: either by recording and playing back the QuickScript or by editing a QuickScript in the QuickScript editor. The QuickScript editor offers a graphical user interface to facilitate the macro creation process. Functions such as ―Connect,‖ ―Wait for string‖ or ―Send key‖ are available on a toolbar located at the top of the QuickScript editor. When selected, the functions prompt the user for parameters that might be required to perform the desired action. Programming structures such as ―If‖ statements or sub-procedures are also available in the QuickScript editor. www.hummingbird.com 93 Figure 6.3 — QuickScripts offer a powerful macro environment for nonprogramming users QuickScripts are available for both HostExplorer sessions and Hummingbird FTP. They can be stored in the Hummingbird Neighborhood in order to be easily launched by the user. Hummingbird Basic: the Ultimate HostExplorer Programming Tool Hummingbird Basic is the Basic editor that comes with HostExplorer. It allows users to create advanced macros through a VBA compatible programming language. www.hummingbird.com 94 Figure 6.4 — Hummingbird Basic is a powerful programming environment for creating advanced OLE and COM macros with HostExplorer Users have the choice to both record and playback a new Hummingbird Basic macro, or to create a new one in the Hummingbird Basic Editor. Macros can be compiled and debugged. The Hummingbird Basic language contains all the standard Basic commands as well as OLE automation capabilities or ODBC functions. Once a script has been recorded, Hummingbird Basic automatically generates the source code which can be used in other basic-like programming studios like Microsoft Visual Basic. Communicating with HostExplorer HostExplorer offers several APIs (Application Programming Interface) that enable programmers to interface their code with HostExplorer functions. HostExplorer offers the ability to use the following APIs or communication models: HLLAPI, WINHLLAPI, EHLLAPI OHIO DDE OLE COM www.hummingbird.com 95 HLLAPI, WINHLLAPI, EHLLAPI HostExplorer supports the multiple HLLAPI (High Level Language Application Programming Interface) dynamic-link libraries (DLLs) for complete compatibility with existing HLLAPI based applications. These interfaces allow other Windows programs to communicate and control the 3270 and 5250 emulators and partially control the Telnet emulator. HostExplorer offers full compatibility with Attachmate, IBM, WRQ and NetManage HLLAPI, thus eliminating the need for programmers to change a single line of code in their HLLAPI application when migrating to HostExplorer. OHIO OHIO (Open Host Interface Objects) is a standardized programming interface to the host data. OHIO provides a common access method to data when it arrives at the client and divides the data into logical objects. The HostExplorer object Ohio is a base interface for eight Ohio interfaces, which use a specific inheritance hierarchy. Ohio is used to create a screen that lets you communicate with, and connect to or disconnect from, the host. Sample files of Ohio are available in the HostExplorer SDK. DDE Although DDE is not an API per se, it does provide a way for Windows applications to interact with HostExplorer. Dynamic Data Exchange (DDE) allows information to be shared or communicated between programs. DDE is inter-process communication (IPC) that uses shared memory as a common exchange area and provides applications with a protocol or set of commands and message formats. DDE uses a client/server model in which the application requesting data is considered the client and the application providing data is considered the server. OLE Abbreviation of Object Linking and Embedding, OLE is a compound document standard developed by Microsoft. It enables programmers to create objects with one application and then link or embed them in a second application. Embedded objects retain their original format and links to the application that created them. The OLE Automation library of HostExplorer enables programmers to use their own development studio and language and create HostExplorer instances, provided that the language they use supports OLE automation. OLE automation is the de facto object call method used within Hummingbird Basic Scripts. www.hummingbird.com 96 COM Component Object Model (COM) is Microsoft’s framework for developing and supporting program component objects. It is aimed at providing a framework for the interoperation of distributed objects. Whereas Microsoft’s Object Linking and Embedding provides services for the compound document, COM provides the underlying services of interface negotiation, life cycle management (determining when an object can be removed from a system), licensing, and event services (putting one object into service as the result of an event that has happened to another object). COM includes COM+, Distributed Component Object Model (DCOM), and ActiveX interfaces and programming tools. HostExplorer is 100% based on the Microsoft COM architecture. In order to enable programmers to create powerful windows application that integrates Host data with other types of information. HostExplorer ships with a detailed programming guide as well as a SDK (Software Development Kit) which contains samples of COM applications with their source code. Below is a sample application created with HostExplorer SDK and Microsoft Visual Basic. This application enables the user to run a search for the name of a person. When pressing the Run Script button, the application uses HostExplorer COM interface to connect to a Mainframe, navigate among the different screens and return the searched information in the Visual Basic interface. Figure 6.5 — A Visual Basic .Net application that uses HostExplorer COM objects www.hummingbird.com 97 Part 7: Web-to-Host Fundamentals Hummingbird Deployment Wizard is a web deployment tool included within HostExplorer. Hummingbird Deployment Wizard enables HostExplorer to be deployed as a full-featured browser-based web-to-host ActiveX solution. Hummingbird Deployment Wizard offers reduced cost of ownership, centralized deployment and management, and exceptional ease of access to enterprise hosts, including IBM mainframe, AS/400, Linux, and UNIX systems. Hummingbird Deployment administrators in two ways: Wizard is an administrative tool that benefits Deploying and maintaining different versions of software increases administrative overhead. With HDW, only the web server needs to be updated, ensuring users automatically get the latest version of the software with zero-effort. Many corporations are looking to acquire thin products (intranet integrated, browser based, no deployment...) but the actual thin product offering cannot fulfill their technological need. HDW enables people to benefit from using a FAT product in a THIN environment. That means that people get the advantages of both a FAT solution and a THIN solution. Easy on Administrators By using Hummingbird Deployment Wizard, an administrator can package each HostExplorer component and user profile. Once the administrator has finished running the wizard, a set of files are ready to be installed on a web server. Fit with any Architecture Hummingbird Deployment Wizard files can be used on any web server including Mainframe, AS/400, UNIX, Macintosh and Windows Web Server. User-Friendly Users only need to browse to the web server. At that point, Internet Explorer or Netscape downloads all the necessary components and profiles and install them on the user’s PC. The user is connected in seconds. www.hummingbird.com 98 Always Available Even Without the Web Server Hummingbird Deployment Wizard web profiles can be saved as local shortcuts on the desktop or in the Start Menu. If the web server becomes unavailable, then the web-deployed profile will be launched locally, fully utilizing the components that were downloaded during a previous connection. Exact Same Features and Power as HostExplorer Every feature of HostExplorer can be deployed through Hummingbird Deployment Wizard including macros, printing, AS/400 data transfer, Security (SSL, Kerberos and Secure Shell) and APIs. Similarly to HostExplorer, Hummingbird FTP can also be deployed to a browser from a web server thanks to the Hummingbird Deployment Wizard. This leading-edge technology provides a central place and method for deployment and administration. Hummingbird Deployment Wizard saves hours to administrators and allows them to provide faster deployment turnaround than traditional methods. www.hummingbird.com 99 Figure 7.1 — Hummingbird Deployment Wizard working principles Enhanced Web-to-Host User Experience Download Mechanisms Connecting to a host simply requires the user to click on the URL the administrator provides. On the first connection to the web server, the user is prompted to accept the Hummingbird certificate, which assesses the integrity of the components that will www.hummingbird.com 100 be downloaded to the browser. This certificate prompt will only appear on the first connection to the web server. After the certificate has been accepted, Hummingbird Deployment Wizard will download the first set of components to the browser. This initial download usually takes less than 5 seconds on a regular 10 Mb Ethernet network. The size of the initial download depends on the type of host the administrator has published on the web server (Mainframe, AS/400 or VT). This download will usually be no more than 2 Mb. In order to prevent huge simultaneous downloads, Hummingbird Deployment Wizard uses a technology called ―Feature-on-Demand.‖ With ―Feature-on-Demand‖ enabled, Hummingbird Deployment Wizard will only download the minimum set of components required to establish a connection to the host. All other features of the solution are packaged separately in small files that are only downloaded when the user invokes a specific function for the first time. For instance, the help files will never be downloaded on the user’s PC unless the user goes into the Help menu. Due to the small size of each file (between 50k and 300 k each) the download happens in a matter of seconds. Figure 7.2 — Deployment of HostExplorer through Internet Explorer 6 www.hummingbird.com 101 Seamless Behavior as a Thick Client One of the biggest advantages of Hummingbird Deployment Wizard is that the user will not perceive any difference between a standard desktop-based emulator and the web-to-host terminal deployed through Hummingbird Deployment Wizard. As a matter of fact, all the features in the traditional desktop-based emulator are available in the web-to-host ActiveX client: the multiple automation tools (QuickKeys, QuickScripts, Hummingbird Basic, and HLLAPI), file transfer, printing, keyboard mapper, profile definition, color mapper, layouts, Track Menu, HotSpots, Event Manager, Toolbar, Mouse actions and more. Figure 7.3 — There is no difference in features or power between a regular HostExplorer installation or a browser-based web-deployed HostExplorer Caching Mechanisms and Failover In order to minimize network load and improve the client startup time, Hummingbird Deployment Wizard will automatically cache any downloaded component locally on the PC. Caching occurs systematically for binaries (programs) and settings (user preferences). By default, binaries are stored into ―Program Files‖ and settings in the users Windows Profile. When creating the deployment project, the administrator has the ability to specify different paths for both binary and profile caching. With most web-to-host software, a critical failure on the web server often results in the software being inaccessible to thousands of users. Hummingbird Deployment www.hummingbird.com 102 Wizard offers protection against this scenario by providing the ability to create ―intelligent‖ shortcuts to the URL on the Web server. When launched, the shortcuts first detect if the web server is available. If it available the launching and connection procedures take place as usual, with the download engine checking to see if there is a new version available on the web server, downloading it if there is. However, if the web server is not available when the user tries to launch a connection, Hummingbird Deployment Wizard will utilize all the components that were downloaded during previous sessions and will still connect the user to the host. Figure 7.4 — Web-Deployed session can be launched from the browser but opened in their own stand-alone window frame User Rights and Security In order to work in web-to-host mode through a browser HostExplorer does not require the user to have any particular access rights on the machine. On Windows NT, both Users and Administrators can install and use COM controls through their browser. On Windows 2000 and XP, Microsoft has introduced an additional user group in between users and administrators: the power user group. Administrators and Power Users are capable of using and installing COM control, with their standard rights. Hummingbird Deployment Wizard includes a mechanism to allow users with low privileges to perform the deployment without having to change their rights. Switching to this mechanism is performed automatically if the limited privilege mode is detected. This mechanism fully respects the Microsoft Windows security mode. www.hummingbird.com 103 When it comes to COM security, collective mind share tends to perceive COM as a huge security breach in their user desktop environment. A signed COM applet has no more potential for data destruction than a signed Java applet that has been granted the rights to read and write on the disk (which is the case of most java web-to-host applets out there). COM components and Java components tend to provide the same level of security when deployed into a carefully controlled corporate environment. None of them provide security grade security but they can be controlled in such a way that potential disasters are averted. In the last years, Microsoft and 3rd party browser developers have put the emphasis on providing tools to help administrator control their browser environment. These tools such as the Internet Explorer ―Security Zones,‖ trusted sites, code digital certificates… are all compatible with HostExplorer. Advanced Administrative Settings As the name suggests, Hummingbird Deployment Wizard consists of a wizard that helps administrators choose the different options available for the deployment of the web-to-host solution. Creating a New Project The first Wizard screen enables the administrator to create a new project or edit an existing one. A project consists within a set of parameters that define how HostExplorer is going to be deployed on the user’s browser through the web server. Figure 7.5 — Creating a new deployment project with Hummingbird Deployment Wizard www.hummingbird.com 104 When a project is completed, Hummingbird Deployment Wizard generates a set of HTML files that can later be uploaded on a web server. The project file typically corresponds to a host profile that the administrator wants to publish on the web server. The project types are comprised of: Deployment Wizard: this project type is typically chosen to deploy a terminal, FTP client or a printer session. Index Page Wizard: this project type will allow the administrator to specify several existing deployment projects. It automatically generates an HTML index page out of all these projects. Projects Update Wizard: this project type allow administrators to quickly rebuild multiple projects at once. This feature is particularly useful in the case the administrator has change a file linked to several projects or in the case he has applied a patch to his administrative installation. Selecting a Host Profile Once a project name is defined, Hummingbird Deployment Wizard asks the administrator to select the host profile that will be deployed through the web. The wizard offers the ability to web-deploy the following types of profiles: 3270 Terminal 3287 Printer 5250 Terminal 3812 Printer VT Terminal 5250 Data Explorer Secure Shell Terminal FTP Client www.hummingbird.com 105 Figure 7.6 — Profile and language chooser The Deployment Wizard also allows administrators to choose the language in which the web-to-host terminal will be available. Administrators can select one or several languages among those available, specify a default language and even allow users to change the language through a shortcut on the desktop. Specifying Files and Browser Integration Mode The next step in Hummingbird Deployment Wizard consists in selecting additional HostExplorer files to deploy and specifying the browser integration mode. Once the administrator has selected a profile, Hummingbird Deployment Wizard automatically www.hummingbird.com 106 reads that profile and selects the keyboard, color map and translation table specified in the profile. Figure 7.7 — Selecting additional files to be deployed Hummingbird Deployment Wizard lets the administrator specify additional files such as colors schemes, file transfer schemes, file transfer templates, hotspots schemes, keyboard mappings, toolbars, language files, macro command or Security… All these files will deploy with HostExplorer. Hummingbird Deployment Wizard offers 3 modes of browser integration: Active Document: the terminal runs within the browser window and occupies the entire area. Menus and toolbars are added to the browser environment. ActiveX Control: the terminal runs within the browser windows in an area defined by the administrator. HostExplorer Window: after the components have been downloaded the browser window is automatically closed and the terminal runs inside its own window. www.hummingbird.com 107 Deploying 3rd Party Files and Applications with Hummingbird Deployment Wizard In addition to Hummingbird Deployment Wizard being capable of deploying a fullfeatured web-to-host terminal via a web server, it is also able to package and distribute additional files. For instance, administrators could choose to: To deploy additional programs to the user desktop such as a HLLAPI application To deploy additional files such as documentation about the host and the legacy applications it contains To deploy custom command files that will perform different administrative tasks required to execute before the Hummingbird Deployment Wizard. These tasks include: Uninstalling an existing software Backup of the user’s data Security policy enforcement Apply a patch to a 3rd party program Figure 7.8 — Administrators can package 3rd party files to be deployed with HostExplorer www.hummingbird.com 108 Figure 7.9 — Administrators have full control over the 3rd party packages deployment Locking Down the User Environment One of the most important features for system administrators is the ability to precisely control the features and settings that are exposed to their users in order to prevent unnecessary manipulation that could lead to problems. Almost all system administrators have been faced with a user calling for help because his terminal does not display anything, only to figure out that the Background and Foreground color were the same! www.hummingbird.com 109 Figure 7.10 — Deployment Wizard allows the administrator to restrict the access to menus or settings In order to limit the number of user issues, Hummingbird Deployment Wizard provides total administrative control over features and settings available to the user. Administrators can choose to gray out or totally disable any menu that appears in the user interface, thus preventing users from accessing unnecessary dialogs. Furthermore, each setting of the session profile can be disabled. If a setting is disabled, it will not even appear in the session options dialog and the user will not get an opportunity to modify these parameters. Deploying on any Web Server on any Operating System One of the major advantages of Hummingbird Deployment Wizard is the ability to port the generated HTML and package files to any operating system and any server. Web components generated with Hummingbird Deployment Wizard can be hosted on any type of web server regardless of the operating system. For instance, administrators can upload the Hummingbird Deployment Wizard components to the web server on their Mainframe or AS/400 and give their users a URL that points to the web server. www.hummingbird.com 110 The flexibility of Hummingbird Deployment Wizard and its non invasive approach to Web server management also allows administrators to benefit from the intrinsic features of each web server, such as user authentication or load balancing. Figure 7.11 — Hummingbird Deployment Wizard creates web files that can be used on any web server on any operating system Installation on Demand The last step in the creation of a Hummingbird Deployment Wizard profile consists in choosing the different modes of download and installation on the end-user workstation and browser. HostExplorer offers a download mode called ―Install on Demand.‖ This mode allows the wizard to download the minimal set of components needed to open a connection to the host. Any additional components that might be required by the user (help, Hummingbird basic, file transfer, QuickScripts…) will only be downloaded when the client invokes this component for the first time. This mechanism allows the reduction of network traffic and speeds up the client startup time. Hummingbird Deployment Wizard automatically copies the binaries and user settings to a location on the hard drive in order to reuse the components on the next client startup. By default, Hummingbird Deployment Wizard stores the binaries into ―Program Files‖ and the user settings under his user profiles. However, the www.hummingbird.com 111 administrator is given the ability to customize those two paths in order to avoid access rights problems. Finally, the administrator can also choose to automatically create a shortcut on the desktop, in the Start Menu or in any other location. Figure 7.12 — Install-ondemand technology guarantees the optimum deployment of the software components www.hummingbird.com 112 Part 8: Migrating to HostExplorer Migration: a Corporate Project The software maintenance process has never been more complex and difficult than it is today. Organizations face intense pressure to rapidly develop new processes and integrate new technologies and platforms — without sacrificing productivity or compromising availability. The Internet is responsible for much of the current heightened state of software maintenance. An organization’s web-based customer-facing applications are typically its most important and most complex assets, and subject to the highest elements of risk such as fraud or failure. Consequently, today’s virtual business environment demands applications that are rapidly developed, easily integrated and highly scalable. This demand for faster and more flexible application development and integration can best be met through the adoption of enterprise standards and the agility of change. The Value of TCO In uncertain times, organizations focus on operating more efficiently by cutting costs, deferring new investments, and challenging sponsors of new initiatives to show definitive return on investment. In this environment, the value and importance of Total Cost of Ownership (TCO) has never been more acute. The financial value of today’s complex, cross-platform, external-facing applications is compelling indeed. Organizations have come to realize that TCO elements have a direct impact on their financial well-being, particularly process efficiencies and the value of system availability. TCO should be the metric of the entire migration process — from initial design through distribution — for greater efficiency and control. We Manage the Risk of Conversion Our conversion approach takes the risk out of your hands and puts it into ours where it belongs. We strive to deliver a solution that will be fine-tuned, maximizing your existing system investment and ensuring you get the most out of future expenditures. The project isn’t considered complete until the new solution is running your personnel are trained, and you have begun to experience significant ROI. Unlike many vendors, Hummingbird has a commitment to Maximize ROI for enterprise IT automation. As a result, we make the most feature rich, streamlined, flexible and powerful software in the industry. Our products provide leading www.hummingbird.com 113 enterprises with a total business solution that is easy-to-use and delivers maximum efficiency and return on investment. Our customers report amazing returns on investment from Hummingbird technology… usually within weeks! We hear time after time about measurable results, with minimal conversion risk and hassle. Customers tell us that they have improved reliability, eliminated errors, and taken manual intervention right out of the picture. All of these means reduced costs, better productivity and hugely improved service levels, which is all good for the bottom line. That’s what ROI is all about! What are the Benefits of HostExplorer for a Migration Project? Every migration project goes through a number of steps that begin with listing the project requirements and that end with maintaining the newly deployed solution. HostExplorer has been conceived from the ground up as an alternative to existing emulation software. It has benefited from many years of experience in replacing other terminal emulators and offers significant benefits for organizations undertaking similar projects. Step 1. Listing Requirement HostExplorer Benefit Support for a wide range of standards Unbeatable financial approach Unmatched features 2. Evaluating Access to Hummingbird resources: professional services, technical support and R&D Fast turn-around on requests 3. Recreating Environment Ability to mimic other emulation look & feel: toolbars, menus, colors, keyboards Ease of use Rational User Interface 4. Switching Automatic Macro Conversion API level compatibility Profile, Keyboards and Settings Migration 5. Securing Support for SSL, Kerberos and Secure Shell Ability to lock-down every feature or menu 6. Deploying Windows Installer Support Integrated Packaging Tool www.hummingbird.com 114 Web Deployment Citrix/TSE/SMS support 7. Maintaining 24/7 Technical Support Quick Patch turn-around Easy migration to new versions 8. Minimizing Disruption Proven track record Low risk deployment Non-invasive migration Migration at a Glance Compatibility Features Attachmate Extra Attachmate Reflection NetManage Rumba IBM PCom Colors • • • • Fonts • • • • Keyboard • • • • HotSpots • • • • N/A • N/A N/A Toollbar • • • • Menu • • • • Mouse Actions • • • • N/A • N/A N/A Right-Click Menu • • • • Session Properties • • • • • • • • • (same) • (same) • (same) File Transfer Events Macro Automatic Conversion Similar Language/Paradigm www.hummingbird.com 115 Compatibility Features Attachmate Extra Similar Macro Editor • (same) Similar OLE Library • (same) Attachmate Reflection NetManage Rumba IBM PCom • (same) HLLAPI 32-bit HLLAPI • • • 16-bit HLLAPI • • • Migration Wizard HostExplorer Migration Wizard has been created to reduce the migration overhead. HostExplorer Migration Wizard is a user-friendly powerful utility that automatically (or selectively) migrate users settings and macros from other terminal emulation software to HostExplorer. HostExplorer Migration Wizard can be used the following way: Automatic: HostExplorer Migration Wizard will automatically scan the user’s ―My Documents‖ folder, locate the profiles to migrate, check their dependencies on additional files and convert all files to HostExplorer into the default Profile Space. Custom: this mode allows users to specify which types of profiles and additional files will be migrated and which Profile Space will these files be migrated to. In custom mode, the Migration Wizard will also stop at every step of the process to allow users to modify their choices. Command-Line: HostExplorer Migration Wizard can also be used as a command-line tool. The command line mode offers a very effective method for administrators to perform migration tasks through scripts at the end of the software installation for instance. Attachmate Extra! NetManage Rumba IBM PCom HotSpot Schemes .ehs HotSpot Files .hsp Toolbar Files .etb Keyboard Map Files .map Profiles .ws Macro Files .mac www.hummingbird.com 116 Attachmate Extra! NetManage Rumba Keyboard Map .ekm Macro Files .rmc 3270 Color Schemes .e3c 5250 Color Schemes .e5c VT Color Schemes .edc Macro Script Files .EBM IBM PCom Keyboard Files .kmp 3270 Profiles .wdm Toolbar Files .bar 5250 Profiles .wda 5250 Printer Profiles .wpa VT Profiles .wdu Extra Session Files .edp Printer Session Doc Files .epp FTP Transfer Lists .etl IND$File Transfer .eis Schemes & Lists .eil Figure 8.1 — HostExplorer Migration Wizard is locating the files to be migrated www.hummingbird.com 117 Migration Facilities The HostExplorer macro conversion tool allows users to convert single macrocommand files or entire directories automatically. In addition to macro, this tool is capable of converting settings from other software. With each new version, HostExplorer gains additional conversion capabilities such as keyboards and profiles from other emulator. Figure 8.2 — The HostExplorer macro and profile converter HLLAPI Compatibility Although HLLAPI was originally designed to provide a common standard for 3rd party applications to communicate with any terminal emulation software, subtle differences exist in each implementation. HostExplorer guarantees maximum compatibility with your existing HLLAPI application even if it’s been customized for a particular emulator. HostExplorer offers HLLAPI compatibility layers with the most current emulation software. www.hummingbird.com 118 Figure 8.3 — HostExplorer allows the administrator to select a specific HLLAPI compatibility layer Look and Feel HostExplorer includes a powerful theme engine which allows administrators to quickly switch the emulator look and feel to mimic the user interface of another terminal emulation software. Themes affect a number of the user interface function such as menus, colors, keyboards, fonts or toolbars… HostExplorer comes with pre-packaged themes for Attachmate, NetManage, IBM and WRQ. Administrators can easily modify existing themes or create new ones and distribute them to their user base. www.hummingbird.com 119 Figure 8.4 — HostExplorer Theme Manager www.hummingbird.com 120 Sales & Support www.hummingbird.com Canada 38 Leek Crescent, Richmond Hill, L4B 4N8 Phone: 905-762-6400 Fax: 905-762-6407 Toll Free: 1-877-359-4866 Corporate Head Office www.opentext.com sales@opentext.com getinfo@hummingbird.com support@hummingbird.com North America Support North America Sales 1 800-486-0095 1-800-499-6544 International Sales Worldwide Support +800-4996-5440 1-905-762-6400 If you are a Hummingbird partner or customer, visit www.hummingbird.com or online.opentext.com for more information about this and other Open Text solutions. Open Text is a publicly traded company on the NASDAQ (OTEX) and the TSX (OTC). Copyright © 2008 Hummingbird Ltd. All other trademarks or registered trademarks are the property of their respective owners. All rights reserved. Hummingbird, the Open Text Connectivity Solutions Group. Printed in Canada. WP-03-00-EN-146.02/08 www.hummingbird.com 121