2. Social Login User Guide

Total Page:16

File Type:pdf, Size:1020Kb

2. Social Login User Guide 2. Social Login User Guide Thank you for purchasing our extension. If you have any questions that are beyond the scope of this document, do not hesitate to leave us an email via [email protected] Created: 11/05/2016 | By: Magenest | Support Portal: http://servicedesk.izysync.com/servicedesk/customer/portal/30 Introduction Features For Admins Features For Customers System Requirements Configuration General Configuration Credentials Settings Front end Social login options Sharing on social networks Comment on product using Facebook account Social login suggestion on checkout page Update Support Introduction Magento 2 Social Login is an extension developed by Magenest to help customers login to Magento 2 stores conveniently with their social accounts. Features For Admins Set up app for each social network including: Twitter, Facebook, Google, Amazon, LinkedIn, Pinterest, Instagram, Reddit, Line Add login popup with social login options Add social login options to sign in, sign up page Set social login suggestion for customer at checkout page for customers who used to login with social account on the store Add comment section using Facebook account for customer on product detail page Add social sharing buttons on product page Features For Customers Choose to login with one of 9 social accounts: Twitter, Facebook, Google, Amazon, Linkedin, Pinterest, Instagram, Reddit, Line Share products on their social networks Use Facebook account to comment on the Magento 2 store Be suggested with social login at checkout page if they used to login with social account on the store System Requirements Your store should be running on Magento 2 Community Edition version 2.0.0, 2.1.x, 2.2.x. Configuration General Configuration First, navigate to Stores > Configuration > Magenest > Social Login, you will be able to enable: The login popup when customer clicks on Sign In button on top menu bar The social login options in Sign Up/Create an account page The social login on checkout page, including the sign in button on the top of the page, and the social login suggestion for customers who used to login with social accounts on the store The ability to comment on product page using Facebook account The ability to share the product link via social networks that are chosen in the social sharing options: Twitter, Facebook, Google+, LinkedIn, Pinterest, Reddit Credentials Settings In order to connect the social app to your Magento 2 store, you have to set up the app as follows: Google+ How to set Client ID and Client Secret of Google+ Go to the Google Developers Console – https://console.developers.google.com/ Select an existing project, or create a new project by clicking Create Project: In the Project name field, type in a name for your new project. In the Project ID field, the console has created project ID. Click on the Create button and the project to be created within some seconds. In the left sidebar, select APIs under the APIs & auth section. Find the Google+ API service and set its status to Enable. Click Create Credentials select OAuth Client ID. Create Client ID dialog box would be appearing for choosing application type. In the Application type section of the dialog, select Web application and click on the Configure consent screen button. Choose Email address, enter Product name and save the form. In the Authorized JavaScript origins field, enter your app origin. If you want to allow your app to run on different protocols, domains, or subdomains, then you can enter multiple origins. In the Authorized redirect URI field, enter the redirect URL. Click on Create. Now you can see the Client ID for web application section. Select Client ID and Client Secret then fill in Configuration of Google in Backend of Magento 2 store. In the backend of Magento 2, in the Google+ setting Enable: To enable Google login and sharing option Client ID: Google+ application ID Client Secret: Google+ application secret Redirect URI: You will use this URL in Google to connect the app Facebook How to set Client ID and Client Secret of Facebook Facebook How to set Client ID and Client Secret of Facebook Go to the https://developers.facebook.com/apps/ and login at your Facebook developer account. Click Add a New App button on the top right to create a new app ID. A popup will display as below In the Facebook for developers Settings, choose Basic, click on the Add Platform button, then enter your site URL. Click on Save changes button. You will see that there are App ID and App secret, note that you will need these to configure the module in the backend of Magento 2. Choose Facebook Login > Settings link from the left menu section at the apps page, fill in Valid OAuth Redirect URIs with the Redirect URI obtain ed from Magento 2 configuration. Then you have to make your app public to everyone. On the top bar, click on Status, a pop up as below will be displayed. Confirm to make the app public. In Magento 2 backend, Facebook settings: Enable: choose Yes to enable Facebook social login and share Client ID: Fill in the Facebook app ID obtained from above Client Secret: Fill in the Facebook app secret from above Twitter How to set Client ID and Client Secret of Twitter Go to the Application Management page and login with your Twitter developer account. Follow this tutorial article to create a Twitter app http://docs.inboundnow.com/guide/create-twitter-application/ In Magento 2 backend, Twitter settings: Enable: Choose Yes to enable the Twitter social login and share Client ID: Twitter application ID Client Secret: Twitter application secret Pinterest How to set Client ID and Client Secret of Pinterest Go to https://developers.pinterest.com/ and login your Pinterest developer account. Choose App > Create app button to create a new application. New tab is open with App ID and App secret, you must add the site URL and Redirect Uri (obtained from the Google+ settings in Magento backend) for web in the Platforms section. Use the app ID and app secret to configure the module in the Magento 2 backend. In Magento 2 backend, Enable: To enable Pinterest login and share Client ID: Fill in the Pinterest app ID from above Client Secret: Fill in the Pinterest app secret from above Redirect URI: Use this in Pinterest to create application Instagram How to set Client ID and Client Secret of Instagram Go to https://www.instagram.com/developer/ and login at your Instagram developer account. Choose Manage Clients > Register new Client ID, In this registration form, fill in the Redirect Uri (you can get this in Magento 2 configuration) in Valid redirect URIs, and remember to unselect the Disable implicit OAuth in Security tab. After clicking on Register button, Manage Clients tab is open, you will use the Client ID and Client Secret (in Manage) to configure the module in Magento backend. In Magento 2 backend, go to Instagram configuration. Enable: To enable the Instagram login and share Client ID: Instagram application ID Client Secret: Instagram application secret Redirect URI: Use this in Instagram to create application. LinkedIn How to set Client ID and Client Secret of LinkedIn Go to https://developer.linkedin.com/ and login with your LinkedIn developer account. Choose My Apps > Create Application After filling in necessary information and submit the form, an Authentication tab will be displayed. In the Default Application Permissions, add the Redirect URI obtained from Magento 2 configuration. Then click on Update. In Magento 2 backend, go to LinkedIn configuration Enable: To enable LinkedIn login and share option Client ID: Linkedin application ID Client Secret: Linkedin application secret Redirect URI: Use this in LinkedIn to create application. Front end Social login options Show the Social Login options on Sign Up page Show popup with social login options when clicking on Sign In Show popup with social login options when clicking on Sign In Twitter login Facebook login Facebook login Google login Amazon login LinkedIn login Instagram login Pinterest login Reddit login Line login Sharing on social networks Customers can share the product link via their social network with the sharing options available for Twitter, Facebook, Google+, LinkedIn, Pinterest and Reddit. Comment on product using Facebook account Under the product descriptions, customers can leave a comment using their Facebook account. Social login suggestion on checkout page If customers used to login with social accounts on the store, on checkout page, when they fill in the email address (which is corresponding with their social account email), the suggestion to login with that social account will be displayed. Update When a new update is available, we will provide you with a new package containing our updated extension. You will have to delete the module directory and repeat the installing steps above. Flush the config cache. Your store and newly installed module should be working as expected. Support We will reply to support requests within 2 business days. We will offer lifetime free update and 6 months free support for all of our paid products. Support includes answering questions related to our products, bug/error fixing to make sure our products fit well in your site exactly like our demo. Support DOES NOT include other services such as customizing our products, installation and uninstallation service. Once again, thank you for purchasing our extension. If you have any questions relating to this extension, please do not hesitate to contact us for support..
Recommended publications
  • Captive Portal Authentication Via Twitter
    Grandstream Networks, Inc. Captive Portal Authentication via Twitter Table of Content SUPPORTED DEVICES ................................................................................................. 4 INTRODUCTION ............................................................................................................. 5 CAPTIVE PORTAL SETTINGS ...................................................................................... 6 Policy Configuration Page .................................................................................................................... 6 Landing Page Redirection ............................................................................................................... 10 Pre-Authentication Rules ................................................................................................................ 10 Post-Authentication Rules ............................................................................................................... 10 Guest Page ........................................................................................................................................ 10 CONFIGURATION STEPS............................................................................................ 12 Create Twitter App .............................................................................................................................. 12 Configure Captive Portal Policy with Twitter Authentication ................................................................. 15 Assign
    [Show full text]
  • Threats and Vulnerabilities in Federation Protocols and Products
    Threats and Vulnerabilities in Federation Protocols and Products Teemu Kääriäinen, CSSLP / Nixu Corporation OWASP Helsinki Chapter Meeting #30 October 11, 2016 Contents • Federation Protocols: OpenID Connect and SAML 2.0 – Basic flows, comparison between the protocols • OAuth 2.0 and OpenID Connect Vulnerabilities and Best Practices – Background for OAuth 2.0 security criticism, vulnerabilities related discussion and publicly disclosed vulnerabilities, best practices, JWT, authorization bypass vulnerabilities, mobile application integration. • SAML 2.0 Vulnerabilities and Best Practices – Best practices, publicly disclosed vulnerabilities • OWASP Top Ten in Access management solutions – Focus on Java deserialization vulnerabilites in different commercial and open source access management products • Forgerock OpenAM, Gluu, CAS, PingFederate 7.3.0 Admin UI, Oracle ADF (Oracle Identity Manager) Federation Protocols: OpenID Connect and SAML 2.0 • OpenID Connect is an emerging technology built on OAuth 2.0 that enables relying parties to verify the identity of an end-user in an interoperable and REST-like manner. • OpenID Connect is not just about authentication. It is also about authorization, delegation and API access management. • Reasons for services to start using OpenID Connect: – Ease of integration. – Ability to integrate client applications running on different platforms: single-page app, web, backend, mobile, IoT. – Allowing 3rd party integrations in a secure, interoperable and scalable manner. • OpenID Connect is proven to be secure and mature technology: – Solves many of the security issues that have been an issue with OAuth 2.0. • OpenID Connect and OAuth 2.0 are used frequently in social login scenarios: – E.g. Google and Microsoft Account are OpenID Connect Identity Providers. Facebook is an OAuth 2.0 authorization server.
    [Show full text]
  • Software Development Methodologies on Android Application Using Example
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by VUS Repository POLYTECHNIC OF ŠIBENIK DEPARTMENT OF MANAGEMENT SPECIALIST STUDY OF MANAGEMENT Ivan Bumbak SOFTWARE DEVELOPMENT METHODOLOGIES ON ANDROID APPLICATION USING EXAMPLE Graduate thesis Šibenik, 2018. POLYTECHNIC OF ŠIBENIK DEPARTMENT OF MANAGEMENT SPECIALIST STUDY OF MANAGEMENT SOFTWARE DEVELOPMENT METHODOLOGIES ON ANDROID APPLICATION USING EXAMPLE Graduate thesis Course: Software engineering Mentor: PhD Frane Urem, college professor Student: Ivan Bumbak Student ID number: 0023096262 Šibenik, September 2018. TEMELJNA DOKUMENTACIJSKA KARTICA Veleučilište u Šibeniku Diplomski rad Odjel Menadžmenta Diplomski specijalistički stručni studij Menadžment Razvojne metode programa na Android platformi koristeći primjer Ivan Bumbak [email protected] Postoji mnogo razvojnih metoda programskih rješenja koje se mogu koristiti za razvoj istih na bilo kojoj platformi. Koja metoda će se koristiti ovisi o zahtjevnosti samog projekta, koliko ljudi radi na projektu, te u kojem vremenskom roku projekt mora biti isporučen. U svrhu ovog diplomskog rada razvijena je Android aplikacija putem tradicionalne metode, iako su danas sve više i više popularne takozvane agile metode. Agile, ili agilan, znači biti brz i sposoban reagirati na vrijeme te prilagoditi se svim promjenama u bilo kojem trenutku razvoja projekta. U radu su objašnjenje najpopularnije agile metode te su prikazane prednosti korištenja agile metoda u odnosu na tradicionalnu metodu. (37 stranica
    [Show full text]
  • A Investigating User's Perspective of Web Single Sign-On
    A Investigating User’s Perspective of Web Single Sign-On: Conceptual Gaps, Alternative Design and Acceptance Model SAN-TSAI SUN, ERIC POSPISIL, ILDAR MUSLUKHOV, NURAY DINDAR, University of British Columbia KIRSTIE HAWKEY, Dalhousie University KONSTANTIN BEZNOSOV, University of British Columbia Manuscript submitted to ACM Transactions on Internet Technology on January 9th, 2012. Received minor revision decision on October 31th, 2012. Major service providers such as Google, Yahoo, Microsoft and Facebook are competing for the online identity landscape through provisioning of web single sign-on (SSO) solutions. Those billions of SSO- enabled user accounts attract millions of supporting websites; however, average users’ perception of web SSO is still poorly understood. Through several user studies, this work evaluates users’ experience, investigates their perceptions and concerns when using web SSO for authentication, and explores possible improvements. We found several behaviors, concerns, and misconceptions that hinder our participants’ adoption intentions, from inadequate mental models of web SSO, to the reluctancy to have their personal profile information released to SSO-enabled web sites, and to the reduction of perceived web SSO value due to the employment of password management practices. Informed by our findings, we offer a web SSO technology acceptance model, and suggest design improvements. Categories and Subject Descriptors: D.4.6 [Security and Protection]: Authentication General Terms: Security, Human Factors Additional Key Words and Phrases: Web Single Sign-On; OpenID; OAuth; Usable Security; ACM Reference Format: Sun, S., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., Beznosov, K. 2012.Investigating User’s Per- spective of Web Single Sign-On: Conceptual Gaps, Alternative Design and Acceptance Model.
    [Show full text]
  • Google Earth Engine Sentinel-3 OLCI Level-1 Dataset Deviates from the Original Data: Causes and Consequences
    remote sensing Technical Note Google Earth Engine Sentinel-3 OLCI Level-1 Dataset Deviates from the Original Data: Causes and Consequences Egor Prikaziuk * , Peiqi Yang and Christiaan van der Tol Faculty of Geo-Information Science and Earth Observation (ITC), University of Twente, 7500 AE Enschede, The Netherlands; [email protected] (P.Y.); [email protected] (C.v.d.T.) * Correspondence: [email protected] or [email protected]; Tel.: +31-534-897-112 Abstract: In this study, we demonstrate that the Google Earth Engine (GEE) dataset of Sentinel-3 Ocean and Land Color Instrument (OLCI) level-1 deviates from the original Copernicus Open Access Data Hub Service (DHUS) data by 10–20 W m−2 sr−1 µm−1 per pixel per band. We compared GEE and DHUS single pixel time series for the period from April 2016 to September 2020 and identified two sources of this discrepancy: the ground pixel position and reprojection. The ground pixel position of OLCI product can be determined in two ways: from geo-coordinates (DHUS) or from tie-point coordinates (GEE). We recommend using geo-coordinates for pixel extraction from the original data. When the Sentinel Application Platform (SNAP) Pixel Extraction Tool is used, an additional distance check has to be conducted to exclude pixels that lay further than 212 m from the point of interest. Even geo-coordinates-based pixel extraction requires the homogeneity of the target area at a 700 m diameter (49 ha) footprint (double of the pixel resolution). The GEE OLCI dataset can be safely used if the homogeneity assumption holds at 2700 m diameter (9-by-9 OLCI pixels) or if the uncertainty in the radiance of 10% is not critical for the application.
    [Show full text]
  • Social Login
    Social Login An easy way to register and login to your store customer ​ Extension Specification Document Magento 1 Extension URL: https://www.extensionhut.com/magento-extensions/social-login.html Support URL: https://www.extensionhut.com/support www.extensionhut.com PAGE 1 Index Overview 3 Why Social Login? 3 Features 3 Configuration 4 How it works? 6 www.extensionhut.com PAGE 2 Overview Give your customer an easy way to get register or login to your store with social login extension. Let the customer access their account with few clicks and get rid from filing registration or login forms. It provides options to login with different social accounts which includes Facebook, Google+, Twitter, Yahoo and LinkedIn. Why Social Login? ❏ Easy way to login without filling form. ❏ Get into account with single click. ❏ Many social account options to login. Features 1. Multi store configuration with single installation: Extension can be configured for each and every store created in your Magento installation. 2. Separate configuration option for each social account: Each social account option ​ has its own configuration in admin area. 3. Display social icon option: Social icons for customer to login their account can be ​ display on login page and checkout page at different positions(top, bottom, left or right). 4. Enable social icon according to requirement: Each social account can be made ​ enable or disable separately for each store. www.extensionhut.com PAGE 3 Configuration Extension configuration is required to make it ready to function and set-up according to your requirements. Here is step by step guide to configure it.
    [Show full text]
  • A Google Earth Engine Wetland Extent Mapping Tool Using Open Source Optical and Radar Satellite Sensors
    1/16/2020 AGU - iPosterSessions.com A Google Earth Engine Wetland Extent Mapping Tool using Open Source Optical and Radar Satellite Sensors Melissa Ferriter, Erica O'Connor, Alice Lin, Christopher Notto, Benjamin Holt, Bruce Chapman NASA Jet Propulsion Laboratory, NASA DEVELOP National Program PRESENTED AT: https://agu2019fallmeeting-agu.ipostersessions.com/Default.aspx?s=02-1E-D1-3C-F1-F0-4D-AE-39-1A-14-5D-1A-41-19-95&pdfprint=true&guestview=true 1/13 1/16/2020 AGU - iPosterSessions.com BACKGROUND Google Earth Engine, a cloud based geospatial processing platform that hosts a multi-petabyte catalog of satellite imagery, allows for large scale processing and analysis It is challenging to map wetlands at a large scale due to their spatial heterogeneity, dynamic nature, and spectral similarity to other landcover types Due to the pivotal role of wetlands in our environmental law and their vulnerability to the changing climate, there is a need for fully automated, standardized, on-demand wetland mapping on national and global scales Our objective was to create an automated, multi-sensor, and seasonal approach for wetland mapping to aid end users in assessing wetland gain and loss across the state of Minnesota https://agu2019fallmeeting-agu.ipostersessions.com/Default.aspx?s=02-1E-D1-3C-F1-F0-4D-AE-39-1A-14-5D-1A-41-19-95&pdfprint=true&guestview=true 2/13 1/16/2020 AGU - iPosterSessions.com METHODS We used an object based random forest approach to classify three landcover types: wetland, upland, and open water The results of the random forest
    [Show full text]
  • EL PASSO: Efficient and Lightweight Privacy-Preserving Single Sign On
    Proceedings on Privacy Enhancing Technologies ; 2021 (2):70–87 Zhiyi Zhang, Michał Król, Alberto Sonnino, Lixia Zhang, and Etienne Rivière EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On Abstract: Anonymous credentials are a solid founda- 1 Introduction tion for privacy-preserving Single Sign-On (SSO). They enable unlinkable authentication across domains and al- Single Sign-On (SSO) is an answer to the complexity low users to prove their identity without revealing more and fragility of using individual passwords on the web, than necessary. Unfortunately, anonymous credentials i.e., leading to reuse and leaks [1]. SSO enables the use schemes remain difficult to use and complex to deploy. of a unique identity provided by an Identity Provider They require installation and use of complex software at (IdP). Users authenticate themselves to services (called the user side, suffer from poor performance, and do not Relying Parties–RP) with tokens provided by their IdP. support security features that are now common, such SSO improves overall web security [2] and enables the as two-factor authentication, secret recovery, or sup- generalization of good security practices such as the use port for multiple devices. In contrast, Open ID Con- of 2-factor authentication (2FA) [3]. nect (OIDC), the de facto standard for SSO is widely deployed and used despite its lack of concern for users’ Limitations of OpenID Connect. OpenID Connect privacy. We present EL PASSO, a privacy-preserving (OIDC) is a dominant SSO solution used by over a mil- SSO system based on anonymous credentials that does lion websites in 2020 [4].
    [Show full text]
  • Progressive Web Applications
    Bachelor’s thesis Degree programme in Information and Communications Technology 2019 Archana Karki PROGRESSIVE WEB APPLICATIONS - Powerful websites, functional as native mobile apps BACHELOR’S THESIS | ABSTRACT TURKU UNIVERSITY OF APPLIED SCIENCES Degree programme in Information and Communication Technology 2019| 60 pages Archana Karki PROGRESSIVE WEB APPS • Powerful websites, usable as native mobile apps Current web platform and browsers are adequately powerful to support mobile and desktop applications. Application Program Interfaces (APIs) that supports the integration of mobile device and web browsers can execute features such as notifications, push messages, home screen icon, device camera and so on. The concept of progressive web apps is to make regular websites functional as mobile and desktop app, without compromising the user experience of traditionally used native apps. In order to understand the concept of Progressive Web Apps (PWAs), a functional app was created using HTML, CSS, JavaScript, along with the manifest file, service workers, and web APIs. The primary objective of the thesis was to understand and implement the technologies of Progressive Web Applications (PWAs). Hence, a detailed study of the topic and development of a PWA was also carried out. The study showed that one PWA could serve the function of a website, mobile app and a desktop app efficiently. On one hand, the technology used for making a PWA is not too complicated for web developers using HTML, CSS, and JavaScript, and on the other hand, simple files can turn an existing HTTPS website into a fully functional app, saving the cost of developing a new native app. KEYWORDS: Web apps, web, native apps, hybrid app, service workers, app shell, cache API, device integration and notification API.
    [Show full text]
  • Exploring the Prevalence and Evolution of Android Concerns: a Community Viewpoint
    Journal of Software Exploring the Prevalence and Evolution of Android Concerns: A Community Viewpoint Sherlock A. Licorish* Department of Information Science, University of Otago, PO Box 56, Dunedin 9054, New Zealand. Manuscript submitted May 3, 2016; accepted August 12, 2016. * Corresponding author. Tel.: 64 3 479 8319; email: [email protected] doi: 10.17706/jsw.11.9.848-869 Abstract: In line with growing awareness of the need for systems to adapt quickly to change, there has been increasing interest in the evolution of software systems. Research has particularly considered developer-led activities change over time. Comparatively less consideration has been given to the study of software evolution as driven by the wider community of stakeholders. Although, a project’s wider community is central to the feedback system and project success. We have contributed to such efforts and studied the evolution of architecture issues and non-functional requirements in the Android project, as identified by the wider Android community1. We mined the Android issues tracker, employing n-gram analysis in our examination of 21,547 issues. We observe that most architecture-related issues were located in Android application layer, and these issues increased with time. Additionally, usability-related concerns were reported most when they were held to be given greatest attention. Outcomes suggests that Android’s open model and shared ownership have positively impacted Google’s success, which could provide a useful lesson for other similar projects. Key words: Android, android architecture, android non-functional requirements, software evolution, data mining and N-gram analysis. 1. Introduction A large body of research has been directed to understanding various aspects of the software development process (as performed by humans), and particularly, how systems evolve.
    [Show full text]
  • Google Directions Api Ios
    Google Directions Api Ios Aloetic Wendall always enumerated his catching if Lucas is collectible or stickings incapably. How well-warranted is Wilton when bullate and appropriated Gordan outmode some sister-in-law? Pneumatic and edificatory Freemon always rubric alternatively and enticed his puttiers. Swift programming language is calculated by google directions api credentials will be billed differently than ever since most Google Maps Draw was Between Markers Elena Plebani. Google also started to memory all API calls to pile a valid API key which has shall be. Both businesses and customers mutually benefit from acid free directions API and county paid APIs. So open now available for mobile app launches cloud project, redo and start by. You can attach a google directions api ios apps radio buttons, ios for this. While using an api pricing model by it can use this means that location on google directions api ios for ios apps. Creating google directions api makes it was determined to offsite meeting directions service that location plots in this. To draw geometric shape on google directions api ios swift github, ios apps with a better than ever having read about trying pesticide after that can spot a separate word and. Callback when guidance was successfully sent too many addresses with google directions api ios and other answers from encoded strings. You ever see a list as available APIs and SDKs. Any further explanation on party to proceed before we are freelancers would want great. Rebuild project focused on the travel time i want to achieve the route, could help enhance the address guide on a pair, api google directions.
    [Show full text]
  • Captive Portal Authentication Via Facebook
    Grandstream Networks, Inc. Captive Portal Authentication via Facebook Table of Content SUPPORTED DEVICES ................................................................................................ 4 INTRODUCTION ............................................................................................................ 5 CAPTIVE PORTAL SETTINGS ..................................................................................... 6 Policy Configuration Page ................................................................................................................7 Landing Page Redirection ....................................................................................................... 10 Pre-Authentication Rules ........................................................................................................ 10 Post-Authentication Rules ....................................................................................................... 10 Guest Page ................................................................................................................................... 11 CONFIGURATION STEPS........................................................................................... 12 Create Facebook App .................................................................................................................... 12 Configure Captive Portal Policy with Facebook Authentication ....................................................... 17 Using GWN Master GUI (Standalone mode) ..........................................................................
    [Show full text]