IBM Security Appscan Standard: User Guide Traffic Log

Total Page:16

File Type:pdf, Size:1020Kb

IBM Security Appscan Standard: User Guide Traffic Log IBM Security AppScan Standard Version 9.0.3.12 User Guide IBM Contents Chapter 1. Introduction ........ 1 Content-Based Results view ........ 91 Product overview............. 1 Glass Box view ............ 94 Supported technologies .......... 1 Communication and Proxy view ...... 95 What's new ............... 2 HTTP Authentication view ........ 96 Contact and support information ....... 3 Test Policy view ............ 97 Test Optimization view ......... 102 Chapter 2. Installing ......... 5 Test Options view ........... 102 Privilege Escalation view ........ 105 System requirements............ 5 Malware view ............ 106 Flash Player upgrade .......... 7 Scan Expert view ........... 106 Flash Player configuration ......... 7 Advanced Configuration view....... 108 Install................. 8 Scan file structure ............ 123 Silent install .............. 8 Scan templates ............. 123 Uninstall................ 9 Predefined templates .......... 123 License ................ 9 User-Defined Scan Templates ....... 125 Load a node-locked license ........ 10 Loading scan templates ......... 125 Load a floating or token license....... 11 Editing Scan Templates ......... 125 Updates ............... 11 Changing the configuration during a scan .... 126 Temp file location ............ 12 Chapter 3. Getting started ...... 13 Chapter 5. Manual Exploring ..... 127 Using AppScan............. 127 How an automatic scan works ........ 13 Recording a Manual Explore ....... 128 Web applications vs. web services ....... 14 Exporting Manual Explore data ...... 130 Basic workflow ............. 15 Importing Manual Explore data ...... 131 Workflow description .......... 16 Using AppScan as a proxy server...... 132 Tour of the main window ......... 17 Using AppScan as recording proxy ...... 133 View selector ............. 17 Exploring with the External Traffic Recorder .. 133 Application Tree ............ 18 External Login Recorder ......... 135 Result List .............. 20 External Traffic Recorder ........ 135 Detail Pane ............. 21 Using GSC .............. 136 Scan panels ............. 21 Exploring with GSC .......... 137 Status bar .............. 21 Scanning a site that includes a SOAP web Tutorial................ 22 service as part of the site ........ 138 Step 1: Configuring the scan........ 22 Step 2: Running the scan ......... 23 Step 3: Reviewing Scan Results ....... 24 Chapter 6. Scanning ........ 139 Step 4: Communicating results ....... 25 Starting scans ............. 139 Sample scans .............. 25 Starting scans from the Scan Configuration Wizard .............. 139 Chapter 4. Configuring ........ 27 Starting scans from the Scan menu or the toolbar .............. 139 Scan configuration wizard ......... 27 Starting scans from the Welcome dialog box .. 140 Launching the Scan Configuration Wizard ... 28 Starting scans from the New Scan dialog box 141 Wizard for exploring with AppScan ..... 29 Scan progress ............. 141 Wizard for exploring with an external device or Pausing and continuing scans ........ 142 client ............... 34 Scans stopped due to connectivity issues ... 142 Wizard for exploring with GSC ....... 38 Scans stopped due to application issues ... 142 Scan configuration dialog box ........ 40 Saving and loading scans ......... 143 URL and Servers view.......... 41 Saving scans............. 143 Login Management view ......... 45 Automatic scan save .......... 143 Environment Definition view ....... 57 Loading saved scans .......... 144 Exclude Paths and Files view ....... 58 Importing a legacy scan template...... 144 Explore Options view .......... 63 Automatic scan............. 144 Parameters and Cookies view ....... 68 Automatic multiphase scanning ...... 145 Automatic Form Fill view ........ 80 Scan Expert .............. 145 Error Pages view ........... 83 Scan Expert recommendations ....... 146 Multi-Step Operations view ........ 85 iii Glass box scanning ........... 146 Viewing and saving reports ....... 212 Overview.............. 146 Creating partial reports ......... 212 For Java platforms........... 147 Earlier versions of report templates ..... 213 For .NET platforms .......... 166 Security reports ............ 213 Partial scans .............. 171 Limiting the size of Security reports ..... 215 Scan Multi-Step Operations Only ...... 172 Industry Standard and Compliance reports ... 216 Changing the configuration during a scan ... 172 Industry Standard reports ........ 216 Exporting scan results .......... 172 Regulatory Compliance reports ...... 218 Generating scan result DB and XML files ... 173 User-defined reports .......... 221 Firebird database structure ........ 173 Delta Analysis reports .......... 228 Template-based reports .......... 230 Chapter 7. Results: Application Data 179 Creating a custom report template ..... 231 Application Data: Application Tree ...... 179 Importing a custom template ....... 235 Application Data: Result List ........ 179 Requests .............. 180 Chapter 11. Tools.......... 237 Parameters ............. 180 Options dialog box ........... 237 Cookies .............. 181 Scan Options tab ........... 237 Failed Requests............ 182 Preferences tab ............ 238 Filtered URLs ............ 182 Recording Proxy tab .......... 239 User Interaction Needed......... 183 General tab ............. 242 Comments ............. 184 Advanced tab ............ 242 JavaScript ............. 184 Web Services Configuration wizard ...... 243 Application Data: Detail Pane ........ 185 Description files ........... 243 Domains .............. 244 Chapter 8. Results: Security Issues 187 Login Management .......... 244 Security Issues: Application Tree ....... 187 Sequences ............. 245 Exclude URL from scan ......... 187 Parameters ............. 245 Security Issues: Result List ......... 188 Complete.............. 246 Severity levels ............ 188 Scan Scheduler ............. 246 Issue state: Open or Noise ........ 189 Schedule a new scan .......... 246 Resending tests............ 190 Edit scheduled scan configuration ..... 247 Right-click menu ........... 191 Delete a scheduled scan ......... 247 Filtering Security Issues in Result List .... 191 Schedule a Test stage only ........ 247 Sorting the Result List ......... 192 Schedule a scan in installments ...... 248 Security Issues: Detail Pane......... 192 Scheduled task command line parameters ... 249 Issue Information tab.......... 192 User-Defined Tests ........... 250 Advisory tab ............ 196 User-Defined Test wizard ........ 250 Fix Recommendations tab ........ 198 Test Type .............. 251 Request/Response tab ......... 199 Filter ............... 251 Report false positive test results ...... 201 Modification............. 252 Manual tests.............. 202 Validation ............. 253 Non-vulnerable variants .......... 205 Advisory .............. 253 Saving all non-vulnerable variants ..... 205 Completing the wizard ......... 253 Defining variants as non-vulnerable ..... 205 PowerTools .............. 253 Non-Vulnerable Variants List ....... 205 Authentication Tester .......... 253 Deleting variants ........... 206 Connection Test ........... 260 Encode/Decode ........... 262 Chapter 9. Results: Remediation Expression Test ............ 263 HTTP Request Editor.......... 264 Tasks ............... 207 Generic Service Client (GSC) ........ 268 Remediation Tasks: Application Tree...... 207 Customizing the Tools menu ........ 269 Remediation Tasks: Result List ....... 207 Adjust the order of the PowerTools ..... 269 Searching Remediation Tasks in Result List .. 208 Add programs to the Tools menu...... 269 Sorting Remediation Tasks ........ 209 Extensions .............. 270 Manipulating priority levels ....... 209 Extension Manager .......... 270 Deleting Remediation Tasks from the Result List 209 Pyscan .............. 271 Remediation Tasks: Detail Pane ....... 210 Explore Optimization module ....... 272 Logs ................ 276 Chapter 10. Reports ........ 211 Scan Log .............. 276 Report overview ............ 211 AppScan Log ............ 277 Configuring report layout ........ 211 Update Log ............. 277 iv IBM Security AppScan Standard: User Guide Traffic Log ............. 278 Request-based login troubleshooting..... 309 Searching Results ............ 278 Advanced login troubleshooting workflow .. 310 Long or never-ending Explore stage ...... 312 Chapter 12. Integrations ....... 279 Flash movie troubleshooting ........ 312 AppScan Enterprise ........... 279 Some Flash movies are not scanned ..... 313 Importing AppScan Enterprise license Restore Adobe Flash Player settings ..... 315 permissions ............. 279 Multi-step operation troubleshooting ..... 315 Publishing to AppScan Enterprise ..... 280 Replacing unsigned extensions ....... 316 Creating a job in AppScan Enterprise .... 280 Scan Log messages ........... 316 Creating a scan template in AppScan Enterprise 282 AppScan Log messages .......... 325 Automation Frameworks ......... 282 Flash Log messages ........... 331 Creating the batch command ....... 283 Glass box troubleshooting ......... 332 Application Security on Cloud ....... 284 Uploading to Application Security on Cloud 284 Chapter 15. CLI .......... 333 Command structure ........... 333 Chapter 13. Best practices and FAQ 287 Commands .............. 333 Workflow for advanced users ........ 287 Exec command ............ 333 Initial Configuration .......... 289 Report command ........... 336 Initial Automatic Explore ........ 290 Delta analysis report command ...... 338 Improve site coverage
Recommended publications
  • Threat Modeling and Circumvention of Internet Censorship
    Threat modeling and circumvention of Internet censorship David Fifield September 27, 2017 Abstract Research on Internet censorship is hampered by a lack of adequate models of censor behavior, encompassing both censors' current practice and their likely future evolution. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not only as a set of capabilities| such as the ability to monitor network traffic—but also as a set of priorities constrained by resource limitations. A circumvention system designed under inadequate assumptions runs the risk of being either easily blocked, or impractical to deploy. My thesis research will be concerned with developing empirically informed censor models and practical, effective circumvention systems to counter them. My goal is to move the field away from seeing the censorship problem as a cat-and-mouse game that affords only incre- mental and temporary advancements. We should instead state the hypotheses and assumptions under which our circumvention designs will work|with the designs being more or less practical depending on how well the hypotheses and assumptions match the behavior of real-world censors. 1 Thesis My research is about Internet censorship and how to make it ineffective. To this end, I am interested in building useful models of real-world censors as they exist today and may exist in the future, for the purpose of building circumvention systems that are not only sound in theory but also effective in practice. 1 2 Scope Internet censorship is an enormous topic. My thesis research is concerned with one important case of it: the border firewall.
    [Show full text]
  • OSS: Using Online Scanning Services for Censorship Circumvention
    OSS: Using Online Scanning Services for Censorship Circumvention David Fifield1, Gabi Nakibly2, and Dan Boneh1 1 Computer Science Department, Stanford University 2 National EW Research & Simulation Center, Rafael { Advanced Defense Systems Ltd. Abstract. We introduce the concept of a web-based online scanning service, or OSS for short, and show that these OSSes can be covertly used as proxies in a censorship circumvention system. Such proxies are suitable both for short one-time rendezvous messages and bulk bidirectional data transport. We show that OSSes are widely available on the Internet and blocking all of them can be difficult and harmful. We measure the number of round trips and the amount of data that can be pushed through various OSSes and show that we can achieve throughputs of about 100 KB/sec. To demonstrate the effectiveness of our approach we built a system for censored users to communicate with blocked Tor relays using available OSS providers. We report on its design and performance. 1 Introduction Nowadays many nations regularly filter Internet traffic by blocking news sites, social networking sites, search sites, and even public mail sites like Gmail. The OpenNet Initiative, which tracks public reports of Internet filtering, lists a large number of countries that filter Internet traffic. Over half of the 74 countries tested in 2011 imposed some degree of filtering on the Internet [1]. In response, several proxy systems have emerged to help censored users freely browse the Internet. Most notable among these is Tor [2], which, while originally designed to provide anonymity, has also seen wide use in circumvention.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • IBM Security Appscan Standard: User Guide Traffic Log
    IBM Security AppScan Standard Version 9.0.3.11 User Guide IBM Contents Chapter 1. Introduction ........ 1 Content-Based Results view ........ 90 Product overview............. 1 Glass Box view ............ 92 Supported technologies .......... 1 Communication and Proxy view ...... 93 What's new ............... 2 HTTP Authentication view ........ 94 Contact and support information ....... 3 Test Policy view ............ 95 Test Optimization view ......... 100 Chapter 2. Installing ......... 5 Test Options view ........... 100 Privilege Escalation view ........ 103 System requirements............ 5 Malware view ............ 104 Flash Player upgrade .......... 7 Scan Expert view ........... 104 Flash Player configuration ......... 7 Advanced Configuration view....... 106 Install................. 8 Scan file structure ............ 121 Silent install .............. 8 Scan templates ............. 121 Uninstall................ 9 Predefined templates .......... 121 License ................ 9 User-Defined Scan Templates ....... 123 Load a node-locked license ........ 10 Loading scan templates ......... 123 Load a floating or token license....... 11 Editing Scan Templates ......... 123 Updates ............... 11 Changing the configuration during a scan .... 124 Temp file location ............ 12 Chapter 3. Getting started ...... 13 Chapter 5. Manual Exploring ..... 125 Using AppScan............. 125 How an automatic scan works ........ 13 Recording a Manual Explore ....... 126 Web applications vs. web services ....... 14 Exporting Manual Explore data
    [Show full text]
  • Blocking-Resistant Communication Through Domain Fronting
    Proceedings on Privacy Enhancing Technologies 2015; 2015 (2):46–64 David Fifield*, Chang Lan, Rod Hynes, Percy Wegmann, and Vern Paxson Blocking-resistant communication through domain fronting Abstract: We describe “domain fronting,” a versatile 1 Introduction censorship circumvention technique that hides the re- mote endpoint of a communication. Domain fronting Censorship is a daily reality for many Internet users. works at the application layer, using HTTPS, to com- Workplaces, schools, and governments use technical and municate with a forbidden host while appearing to com- social means to prevent access to information by the net- municate with some other host, permitted by the cen- work users under their control. In response, those users sor. The key idea is the use of different domain names at employ technical and social means to gain access to the different layers of communication. One domain appears forbidden information. We have seen an ongoing conflict on the “outside” of an HTTPS request—in the DNS re- between censor and censored, with advances on both quest and TLS Server Name Indication—while another sides, more subtle evasion countered by more powerful domain appears on the “inside”—in the HTTP Host detection. header, invisible to the censor under HTTPS encryp- Circumventors, at a natural disadvantage because tion. A censor, unable to distinguish fronted and non- the censor controls the network, have a point working fronted traffic to a domain, must choose between allow- in their favor: the censor’s distaste for “collateral dam- ing circumvention traffic and blocking the domain en- age,” incidental overblocking committed in the course of tirely, which results in expensive collateral damage.
    [Show full text]
  • JTS Users Guide, Ver 2.0 Copyright 2013 Page 2 of 265
    Table of Contents 1 ABOUT THIS GUIDE .................................................................................................................... 13 1.1 WHO SHOULD USE IT ............................................................................................................... 14 1.2 TYPOGRAPHICAL CONVENTIONS ............................................................................................... 14 2 INTRODUCTION ........................................................................................................................... 16 2.1 OVERVIEW ............................................................................................................................... 16 2.2 PURPOSE ................................................................................................................................ 17 2.3 SCOPE .................................................................................................................................... 17 2.4 REFERENCES .......................................................................................................................... 18 2.5 GLOSSARY AND TERMINOLOGY ................................................................................................. 18 3 JTS SYSTEM DESCRIPTION ...................................................................................................... 21 3.1 KEY FEATURES ........................................................................................................................ 21 3.2 ENVIRONMENT ........................................................................................................................
    [Show full text]
  • Tapdance: End-To-Middle Anticensorship Without Flow Blocking
    This paper appeared in Proceedings of the 23rd USENIX Security Symposium, August 2014. TapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow Colleen M. Swanson J. Alex Halderman University of Michigan University of Michigan University of Michigan [email protected] [email protected] [email protected] Abstract tools, researchers have recently introduced a new ap- In response to increasingly sophisticated state-sponsored proach called end-to-middle (E2M) proxying [21, 26, 49]. Internet censorship, recent work has proposed a new ap- In an E2M system, friendly network operators agree to proach to censorship resistance: end-to-middle proxying. help users in other, censored countries access blocked This concept, developed in systems such as Telex, Decoy information. These censored users direct traffic toward Routing, and Cirripede, moves anticensorship technology uncensored “decoy” sites, but include with such traffic a into the core of the network, at large ISPs outside the special signal (undetectable by censors) through which censoring country. In this paper, we focus on two techni- they request access to different, censored destinations. cal obstacles to the deployment of certain end-to-middle Participating friendly networks, upon detecting this signal, schemes: the need to selectively block flows and the need redirect the user’s traffic to the censored destination. From to observe both directions of a connection. We propose a the perspective of the censor—or anyone else positioned new construction, TapDance, that removes these require- between the censored user and the friendly network—the ments. TapDance employs a novel TCP-level technique user appears to be in contact only with the decoy site.
    [Show full text]
  • Tapdance: End-To-Middle Anticensorship Without Flow Blocking Eric Wustrow, Colleen M
    TapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow, Colleen M. Swanson, and J. Alex Halderman, University of Michigan https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/wustrow This paper is included in the Proceedings of the 23rd USENIX Security Symposium. August 20–22, 2014 • San Diego, CA ISBN 978-1-931971-15-7 Open access to the Proceedings of the 23rd USENIX Security Symposium is sponsored by USENIX TapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow Colleen M. Swanson J. Alex Halderman University of Michigan University of Michigan University of Michigan [email protected] [email protected] [email protected] Abstract tools, researchers have recently introduced a new ap- In response to increasingly sophisticated state-sponsored proach called end-to-middle (E2M) proxying [21, 26,49]. Internet censorship, recent work has proposed a new ap- In an E2M system, friendly network operators agree to proach to censorship resistance: end-to-middle proxying. help users in other, censored countries access blocked This concept, developed in systems such as Telex, Decoy information. These censored users direct traffic toward Routing, and Cirripede, moves anticensorship technology uncensored “decoy” sites, but include with such traffic a into the core of the network, at large ISPs outside the special signal (undetectable by censors) through which censoring country. In this paper, we focus on two techni- they request access to different, censored destinations. cal obstacles to the deployment of certain end-to-middle Participating friendly networks, upon detecting this signal, schemes: the need to selectively block flows and the need redirect the user’s traffic to the censored destination.
    [Show full text]
  • Computational Resource Abuse in Web Applications
    Computational Resource Abuse in Web Applications Juan David Parra Rodriguez Dissertation eingereicht an der Fakult¨atf¨ur Informatik und Mathematik der Universit¨at Passau zur Erlangung des Grades eines Doktors der Naturwissenschaften A dissertation submitted to the faculty of computer science and mathematics in partial fulfillment of the requirements for the degree of doctor of natural sciences Betreuer: Prof. Dr. rer. nat. Joachim Posegga Passau, Germany, April 2019 Abstract Internet browsers include Application Programming Interfaces (APIs) to support Web applications that require complex functionality, e.g., to let end users watch videos, make phone calls, and play video games. Meanwhile, many Web applications employ the browser APIs to rely on the user's hardware to execute intensive computation, access the Graphics Processing Unit (GPU), use persistent storage, and establish network connections. However, providing access to the system's computational resources, i.e., processing, storage, and networking, through the browser creates an opportunity for attackers to abuse resources. Principally, the problem occurs when an attacker compromises a Web site and includes malicious code to abuse its visitor's computational resources. For example, an attacker can abuse the user's system networking capabilities to perform a Denial of Service (DoS) attack against third parties. What is more, computational resource abuse has not received widespread attention from the Web security community because most of the current specifications are focused on content and session properties such as isolation, confidentiality, and integrity. Our primary goal is to study computational resource abuse and to advance the state of the art by providing a general attacker model, multiple case studies, a thorough anal- ysis of available security mechanisms, and a new detection mechanism.
    [Show full text]
  • Information to Users
    INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. ProQuest Information and Learning 300 North Zeeb Road, Ann Arbor, Ml 48106-1346 USA 800-521-0600 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. PRESERVICE TEACHERS’ VIEWS OF CONTENT AND PEDAGOGICAL KNOWLEDGE PRESENTED IN THE ELEMENTARY COMPONENT OF A PHYSICAL EDUCATION TEACHER EDUCATION PROGRAM DISSERTATION Presented in Partial Fulfillment of the Requirements for The Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Christine E. Whipple, B.S., M.S. **** The Ohio State University 2002 Dissertation Committee: Approved by Dr. Sandra A. Stroot, Advisor visor Dr. Samuel R. Hodge, Advisor 0 l4, Advisor Dr.
    [Show full text]
  • Practical Countermeasures Against Network Censorship
    Practical Countermeasures against Network Censorship by Sergey Frolov B.S.I.T., Lobachevsky State University, 2015 M.S.C.S., University of Colorado, 2017 A thesis submitted to the Faculty of the Graduate School of the University of Colorado in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Computer Science 2020 Committee Members: Eric Wustrow, Chair Prof. Sangtae Ha Prof. Nolen Scaife Prof. John Black Prof. Eric Keller Dr. David Fifield ii Frolov, Sergey (Ph.D., Computer Science) Practical Countermeasures against Network Censorship Thesis directed by Prof. Eric Wustrow Governments around the world threaten free communication on the Internet by building increasingly complex systems to carry out Network Censorship. Network Censorship undermines citizens’ ability to access websites and services of their preference, damages freedom of the press and self-expression, and threatens public safety, motivating the development of censorship circumvention tools. Inevitably, censors respond by detecting and blocking those tools, using a wide range of techniques including Enumeration Attacks, Deep Packet Inspection, Traffic Fingerprinting, and Active Probing. In this dissertation, I study some of the most common attacks, actually adopted by censors in practice, and propose novel attacks to assist in the development of defenses against them. I describe practical countermeasures against those attacks, which often rely on empiric measurements of real-world data to maximize their efficiency. This dissertation also reports how this work has been successfully deployed to several popular censorship circumvention tools to help censored Internet users break free of the repressive information control. iii Acknowledgements I am thankful to many engineers and researchers from various organizations I had a pleasure to work with, including Google, Tor Project, Psiphon, Lantern, and several universities.
    [Show full text]
  • IBM Worklight V5.0.6
    documentation is". user "as documentation. user offline provided IBM Worklight V5.0.6 is online Worklight the to IBM documentrefer This issues, of Experimental case In documentation is". user "as documentation. user offline provided is online Worklight the to IBM documentrefer This issues, of Experimental case In ii IBM Worklight V5.0.6 Contents Chapter 1. Starting with IBM Worklight . 1 Setting the size of the login screen for web Introducing IBM Worklight .........1 widgets...............80 System requirements for using IBM Worklight . 4 Deploying applications on iGoogle .....80 What's new ...............4 Deploying applications on Facebook .....81 What's new in IBM Worklight V5.0.6.2 .....4 Signing Adobe AIR applications ......82 What's new in IBM Worklight V5.0.6.1 .....5 Signing Windows 8 apps .........82 What's new in IBM Worklight V5.0.6 .....5 Signing Windows 7 and Vista gadgets ....83 Known limitations ............12 Embedding widgets in predefined web pages . 84 Setting up IBM Worklight Studio .......13 Development guidelines for using native API . 84 Installing IBM Worklight Studio ......14 Application Descriptor of Native API Troubleshooting IBM Worklight Studio applications for iOS ..........86 installation .............17 Client property file for iOS ........88 Upgrading IBM Worklight Studio in Eclipse . 18 Copying files of Native API applications for iOS 88 Starting IBM Worklight Studio installed with IBM Application Descriptordocumentation of Native API application Installation Manager ..........19 for Android .............89is". Starting IBM Worklight Studio installed with P2 Client property file for Android ......91 Eclipse update ............19 Copying files of Native API applications for Installing mobile specific tools .......19 Androiduser..............92 "as documentation.
    [Show full text]