IBM Sterling Connect:Direct for Windows 4.8 Ii IBM Sterling Connect:Direct for Windows 4.8 Contents

Total Page:16

File Type:pdf, Size:1020Kb

IBM Sterling Connect:Direct for Windows 4.8 Ii IBM Sterling Connect:Direct for Windows 4.8 Contents IBM IBM Sterling Connect:Direct for Windows 4.8 ii IBM Sterling Connect:Direct for Windows 4.8 Contents Chapter 1. Connect:Direct for Microsoft Customize Sterling Connect:Direct for Microsoft Windows Release Notes........ 1 Windows Configuration Information ..... 38 Requirements .............. 1 Run a Silent Installation ......... 38 Features and Enhancements ......... 3 Perform an Unattended Uninstallation .... 39 Special Considerations ........... 4 Known Restrictions ............ 4 Chapter 3. System Guide ....... 41 Restrictions for Connect:Direct for Microsoft Configure the Local Node ......... 41 Windows .............. 4 Configuring the Sterling Connect:Direct Local Restrictions for Related Software....... 6 Node ............... 41 Installation Notes ............. 7 Adding or Modifying a Local Node Definition . 41 Installation Notes for Sterling Connect:Direct Adding a User ............ 42 Requester .............. 7 Modifying a User ID .......... 42 Installation Notes for Connect:Direct File Agent . 7 Deleting a User ............ 43 Sterling Connect:Direct Secure Plus for Microsoft Attaching to a Local Node ........ 43 Windows .............. 8 About Local Functional Authorities ..... 43 Upgrading Guidelines ........... 8 Define Remote User Proxies ........ 50 Upgrading Guidelines for Connect:Direct for Creating or Modifying a Remote User Proxy .. 51 Microsoft Windows ........... 8 Deleting a Remote User Proxy ....... 52 Upgrading Guidelines for Related Software ... 9 Define and Manage the Sterling Connect:Direct Network ............... 52 Chapter 2. Getting Started Guide ... 11 Define and Manage the Sterling Connect:Direct Prepare for the Installation of IBM Sterling Network .............. 52 Connect:Direct for Microsoft Windows ..... 11 About Defining the Network Map ...... 53 Requirements for Copying Files To and From Define Remote Node Information ...... 53 Network Servers............ 11 Creating or Modifying a Remote Node Definition 54 Configure Microsoft Windows User Privileges .. 11 Creating or Modifying a Communications Path Customize a Sterling Connect:Direct Logon Definition .............. 60 Account .............. 12 Defining a New Mode for a Communications Configure TCP/IP Connectivity ...... 13 Path ................ 62 Sterling Connect:Direct for Microsoft Windows Deleting a Network Map Entry ....... 64 Installation Worksheet .......... 13 Validating a Network Map Entry ...... 64 Install and Configure Database Software.... 14 Viewing a Network Map as Text ...... 64 Automate the Sterling Connect:Direct for Applying a Network Map ........ 64 Microsoft Windows Installation....... 15 Printing and Viewing Node and Network Map Sample Sterling Connect:Direct for z/OS Definitions.............. 65 Network Map Entries .......... 15 View the Sample Configuration Files ..... 65 XCA Token Ring: Switched Net Definitions ... 16 Customizing Configuration Files ...... 66 XCA Token Ring: Independent LU Definition .. 16 Adding an Encrypted Password for a User Proxy 66 XCA Token Ring: Major Node Definition ... 18 Validating Configuration Files for Use with Sample Sterling Connect:Direct APPLDEF ... 18 Sterling Connect:Direct ......... 67 Sample Sterling Connect:Direct MODEENTS Applying Updated Configuration Information .. 67 (Mode Definitions) ........... 18 Stop Sterling Connect:Direct for Microsoft Windows 68 Sample VTAM Start Options (ATCSTRxx) ... 19 Stopping Sterling Connect:Direct for Microsoft z/OS Network Map Example for VTAM.... 20 Windows .............. 68 Microsoft Windows Network Map Example .. 20 Stopping Connect:Direct for Microsoft Windows Installing in a Windows clustered environment .. 21 from Sterling Connect:Direct Requester .... 68 Install Sterling Connect:Direct for Microsoft Stopping Connect:Direct for Microsoft Windows Windows ............... 21 Using the Services Facility ........ 69 Installation Overview .......... 21 Stopping Connect:Direct for Microsoft Windows Automate Installation ........... 33 Using the CLI ............ 69 About Silent Installations ......... 33 Stopping Connect:Direct for Microsoft Windows Customize Initialization Information for a Silent from the Admin Tool Utility ........ 69 Installation ............. 34 Create a Process ............. 70 CD_SRVR.INI Parameter Values ...... 34 About Processes ............ 70 Establishing Preferences ......... 70 iii Creating a Process ........... 73 Configuring a Sterling Connect:Direct Sterling Commands and Statements ........ 74 Connect:Direct Server.......... 112 Process or Command Options ....... 80 Work with Active Directory........ 116 Setting Security Options ......... 80 Adding an Active Directory Entry ..... 116 Setting Control Functions for a Command or Deleting an Active Directory Entry ..... 116 Process ............... 81 Creating an Active Directory Report ..... 117 Assigning Values to Symbolic Variables .... 82 Troubleshoot Sterling Connect:Direct ..... 117 Specifying Accounting Data ........ 83 Diagnose a Server Problem Using Traces ... 117 Add Comments ............ 84 Defining a Trace ........... 117 Validating Process Content ........ 84 Stopping a Trace ........... 118 Saving a Process............ 85 Trace Startup Parameters ........ 119 Copying a Process ........... 85 Recover from a Problem ......... 121 Changing a Submitted Process ....... 85 Process Step Restart .......... 121 Manage Processes Using a Work List ..... 85 Automatic Session Retry......... 121 Manage Processes ............ 89 Checkpoint/Restart .......... 122 SMTP Notification ........... 89 Restart During Run Task Operations .... 122 Manage Processes ........... 89 Troubleshoot Sterling Connect:Direct Problems 123 Understanding the TCQ ......... 90 Worksheets .............. 123 TCQ Logical Queues .......... 90 Network Map Communications Mode Object View Processes in the TCQ ........ 93 Worksheet ............. 123 Creating a Process Monitor ........ 93 Network Map Communications Path Object Monitoring Processes Based on Selection Criteria 93 Worksheet ............. 124 Opening a Process Monitor File ...... 95 Network Map Remote Node Object Worksheet 125 Saving a Process Monitor ......... 95 User Functional Authorization Worksheet ... 126 The Process Monitor Output........ 95 Remote User Proxy Worksheet....... 127 Using the Output Display ........ 97 Change Sterling Connect:Direct Settings .... 128 Notification ............. 97 Change Sterling Connect:Direct for Microsoft NT Broadcast ............. 97 Windows Settings ........... 128 Changing Process Notification ....... 98 Sample Initialization Parameters Format ... 129 View Process Statistics .......... 98 Changing Initialization Parameters ..... 131 The Statistics Monitor Window ....... 99 Specify an IP Address .......... 145 Delete Statistics Records ......... 100 Specify IP Addresses, Host Names, and Ports 145 Control Statistics File Content ....... 100 Submit a Process Using the Command Line Creating a Statistics Report ........ 100 Interface ............... 148 Selecting Statistics Based on Process Name or Submit Processes Using the CLI Command .. 148 Number .............. 101 Creating a Configuration File to Connect to a Statistics Report Output ......... 103 Server ............... 149 Understand the Microsoft Windows Event Invoke the CLI ............ 149 Logging Facility ........... 104 Terminating the CLI .......... 150 Control Event Log Content ........ 105 CLI Commands ........... 150 Filter the Event Log .......... 105 Command Syntax ........... 151 Viewing Messages ........... 106 Piping Conventions .......... 151 Send Messages to an SNMP Management Submit Process Command ........ 152 System .............. 106 Change Process Command ........ 156 Identify the Trap Variables ........ 107 Delete Process Command ........ 157 Initialization Events .......... 108 Select Process Command ........ 159 Shutdown Events ........... 108 Select Message Command ........ 162 API Events ............. 108 Select Statistics Command ........ 162 Execution Events ........... 109 Traceoff Command .......... 171 Miscellaneous Events .......... 109 Traceon Command .......... 172 Use the Activity Log .......... 110 Help Command ........... 174 Opening an Activity Log ........ 110 Stop Sterling Connect:Direct ....... 175 Saving an Activity Log ......... 110 Modify Translation Tables ......... 176 Type Events ............. 110 Translation Tables ........... 176 Manage a Sterling Connect:Direct Server .... 111 Modify a Translation Table Using Sterling Manage a Sterling Connect:Direct Server ... 111 Connect:Direct Requester ........ 176 Starting the Admin Tool Utility ...... 111 Edit Connection Settings ......... 177 About the Toolbar ........... 111 About the Client Connection Utility ..... 177 Starting and Stopping a Sterling Connect:Direct Start the Client Connection Utility ..... 177 Server ............... 111 Add a Node............. 178 Deleting a Node ........... 178 iv IBM Sterling Connect:Direct for Windows 4.8 Adding a User with Client Connection Utility 178 Configure Sterling Connect:Direct Secure Plus Deleting a User with the Client Connection Remote Node Record.......... 217 Utility ............... 179 Validate the Configuration ........ 220 Updating a Node or User ........ 179 Enable or Disable External Authentication for a Defining a Default Node or User ...... 180 Remote Node ............ 220 Importing Registry Settings........ 180 Configure External Authentication in the Exporting Registry Settings........ 180 .SEAServer Record .......... 221 Printing Registry Settings ........ 181 Automate Setup Using
Recommended publications
  • Building Openjfx
    Building OpenJFX Building a UI toolkit for many different platforms is a complex and challenging endeavor. It requires platform specific tools such as C compilers as well as portable tools like Gradle and the JDK. Which tools must be installed differs from platform to platform. While the OpenJFX build system was designed to remove as many build hurdles as possible, it is necessary to build native code and have the requisite compilers and toolchains installed. On Mac and Linux this is fairly easy, but setting up Windows is more difficult. If you are looking for instructions to build FX for JDK 8uNNN, they have been archived here. Before you start Platform Prerequisites Windows Missing paths issue Mac Linux Ubuntu 18.04 Ubuntu 20.04 Oracle Enterprise Linux 7 and Fedora 21 CentOS 8 Common Prerequisites OpenJDK Git Gradle Ant Environment Variables Getting the Sources Using Gradle on The Command Line Build and Test Platform Builds NOTE: cross-build support is currently untested in the mainline jfx-dev/rt repo Customizing the Build Testing Running system tests with Robot Testing with JDK 9 or JDK 10 Integration with OpenJDK Understanding a JDK Modular world in our developer build Adding new packages in a modular world First Step - development Second Step - cleanup Before you start Do you really want to build OpenJFX? We would like you to, but the latest stable build is already available on the JavaFX website, and JavaFX 8 is bundled by default in Oracle JDK 8 (9 and 10 also included JavaFX, but were superseded by 11, which does not).
    [Show full text]
  • Build Prerequisites
    Build Prerequisites Table of Contents 1 Overview 2 Introduction 3 IDE 4 Download 5 Installation 5.1 Git for Windows 5.2 TortoiseGit 5.3 YASM (since MP 1.25 Final, YASM is provided as nuget package, you can skip this ) 5.4 NuGet Package Manager 5.5 NSIS 6 Configuration 6.1 .Net Framework 3.5 6.2 Windows and DirectX SDK Environment Variables 6.3 TortoiseGit 7 Next Steps 8 Changelog Overview How to setup your system with the required software to access and use or contribute to the MediaPortal source code, particularly for compiling and building an installer.. Introduction In order to reduce the size of the MediaPortal Git repository and simplify merging branches and testing, C++ sourced binaries have been removed from the repository as of April, 2013. This change affects the way in which you setup your system to compile and build MediaPortal. This guide is written for anyone who wants access to our MediaPortal source code repository to compile and build individual branches for testing or development, using either Windows 7 or Windows 8. Note: You should have already installed the Required software for MediaPortal on the system where you install Git, see Requirements > System Components IDE Our source repository contains Microsoft Visual Studio 2013 solutions. We recommend using Visual Studio 2013 Community Edition but any commercial edition should work too. Download Let's start with downloading the required software: Git for Windows (get the latest Full Installer) TortoiseGit (32bit or 64bit depends on your OS) Visual Studio 2015 Community
    [Show full text]
  • Security Now! #824- 06-22-21
    Security Now! #824 - 06-22-21 Avaddon Ransonomics This week on Security Now! This week, believe it or not, we have yet another 0-day stomped out in Chrome. We also have some additional intelligence about the evolution of the ransomware threat. I also want to closely look at a curious WiFi bug that was recently discovered in iOS and what it almost certainly means about the way we're still programming today. Under our miscellany topic I want to share the SHA256 hash of the developer release .ISO of Windows 11 that Paul Thurrott, I and many others have been playing with this past week. I have a tip about creating an offline account and restoring Windows 10's traditional Start menu under Windows 11. A new purpose has also been discovered for this podcast which I want to share, and I've decided to explain in more detail than I have before what I've been doing with SpinRite's evolution — it's much more than anyone might expect — yet no more than is necessary. Then we're going to conclude with the view of ransomware from Russia, from two Russian security researchers who believe they know exactly why the Avaddon ransomware as a service decided to shutter its operations and publish its keys. “Windows 11” Web Browser News Another day, another Chrome 0-day As I said last week, this is what it's like to be the world's #1 web browser. With glory comes some bruising. We're not yet finished with the first half of the year, yet CVE-2021-30554 is the 7th actively exploited in the wild 0-day that the Chromium team has patched so far this year.
    [Show full text]
  • Winframe API SDK Programmer's Guide
    WFAPI SDK Programmer's Guide Introduction The Citrix WFAPI functions enable application programs to perform tasks that are unique to XenApp and XenDesktop. Appropriate hotfixes and service packs may be needed for the functions defined here to execute properly. In this document XenApp and XenDesktop will be referred to as Citrix VDA. XenApp (RDS VDA) runs on server OSs, Microsoft Windows 2008R2 (Win 7 server) and Windows 2012R2 (Win 8.1 server) and XenDesktop (WS VDA) runs on workstation OSs, Windows 7, Windows 8.1, Windows 10. This SDK allows software developers to programmatically access features specific to Citrix VDAs. For example: • Enumerating servers, sessions, and processes • Managing servers, sessions, and processes • Accessing Citrix-specific user data • Sending messages to a session • Using virtual channels • Waiting on system events The WFAPI SDK comprises a set of function calls to the Wfapi.dll dynamic link library (DLL) for 32- bit applications and Wfapi64.dll for 64-bit applications. These DLLs are available on servers running XenApp and on Windows Workstation platforms running XenDesktop. Example programs are included to assist developers. Using the WFAPI SDK The WFAPI SDK is intended for use by OEMs and customers who need to write applications that directly call WFAPI functions, using Microsoft Visual C++, Version 12.0 (Visual Studio 2013). System Requirements The WFAPI SDK must be installed and built on a Windows 7, Windows 8.1, Windows 10, Windows Servers 2008R2 or 2012R2 computer with sufficient disk space. The SDK does not need more than a few megabytes of disk space; however, third-party development tools (for example, Microsoft Visual C++) may require a substantial amount of disk space.
    [Show full text]
  • Windows 11 Minimum Hardware Requirements
    Windows 11 Minimum Hardware Requirements June 2021 © 2021 Microsoft. All rights reserved. Minimum Hardware Requirements for Windows 11 Table of Contents Section 1.0 – Introduction.............................................................................................................................................................................................. 4 1.1 Overview ........................................................................................................................................................................................................ 4 1.1.1 Purpose of this specification .................................................................................................................................................................. 4 1.1.2 Device types supported by the Windows 11 ......................................................................................................................................... 4 1.1.3 Design verification and compliance ....................................................................................................................................................... 6 1.2 Minimum hardware requirements summary ................................................................................................................................................ 6 Section 2.0 – Hardware driver requirements ...............................................................................................................................................................
    [Show full text]
  • IBM Connect:Direct for Microsoft Windows: Documentation Fixpack 1 (V6.1.0.1)
    IBM Connect:Direct for Microsoft Windows 6.1 Documentation IBM This edition applies to Version 5 Release 3 of IBM® Connect:Direct and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1993, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. Release Notes.......................................................................................1 Requirements...............................................................................................................................................1 Features and Enhancements....................................................................................................................... 2 Special Considerations................................................................................................................................ 3 Known Restrictions...................................................................................................................................... 4 Restrictions for Connect:Direct for Microsoft Windows........................................................................ 4 Restrictions for Related Software.......................................................................................................... 6 Installation Notes.........................................................................................................................................6
    [Show full text]
  • Visual Build Help
    Visual Build Professional User's Manual Copyright © 1999-2021 Kinook Software, Inc. Contents I Table of Contents Part I Introduction 1 1 Overview ................................................................................................................................... 1 2 Why Visual................................................................................................................................... Build? 1 3 New Features................................................................................................................................... 2 Version 4 .......................................................................................................................................................... 2 Version 5 .......................................................................................................................................................... 3 Version 6 .......................................................................................................................................................... 4 Version 7 .......................................................................................................................................................... 7 Version 8 .......................................................................................................................................................... 9 Version 9 .........................................................................................................................................................
    [Show full text]
  • Windows 10 New Pc Download Windows 11 Beta: How to Download the Latest Version of Windows 11 on Your Computer Right Away
    windows 10 new pc download Windows 11 beta: How to download the latest version of Windows 11 on your computer right away. Windows 11 is already in beta testing, and users can download and test the upcoming version of Windows right away. Here are the steps to follow to install Windows 11 on your desktop or laptop computer. Microsoft Windows 11 is set to be the company’s biggest upgrade to its popular Windows operating system since it released Windows 10 in 2015. Announced in June, the company quickly began pushing out early developer previews to users as part of the Windows Insider Program. Over the weekend, Microsoft announced that it was rolling out Windows 11 on the Beta channel to Insiders, which means users can now download and try out the latest version of Windows on their computers. If you have been holding out on installing the early builds of Windows 11 on your computer because of stability concerns, the Windows 11 Beta builds should be more stable and fun to use for everyone. However, do note that Microsoft has excluded certain features such as the new Teams integration on the latest Windows Beta build – they will likely be added back to the OS after the company sorts out any lingering issues on the Dev channel. Also read : Looking for a smartphone? Check Mobile Finder here. Windows 11 has received a fresh coat of paint from Microsoft and gained several new features and performance improvements. However, the company had previously revealed that older computers that did not match certain hardware requirements would not be able to upgrade.
    [Show full text]
  • Comparison of Ftp V/S Ftps
    www.ijcrt.org © 2018 IJCRT | Volume 6, Issue 1 March 2018 | ISSN: 2320-2882 COMPARISON OF FTP V/S FTPS Subhasish Das ,VIT Kusumakar Kashyap,VIT Abstract: The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet.FTP is built on a clientserver architecture and uses separate control and data connections between the client and the server.FTP users may authenticate themselves using clear sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS). FTPS helps to encrypt and transfer private information within the constraints of regulatory requirements. Many industries rely on the timely and effective transfer of files to provide services to consumers. For example, the healthcare industry requires exchanging sensitive information between healthcare providers, insurance providers, and eligibility services, to name a few. Regulatory requirements such as the Health Insurance Portability and Accountability Act (HIPAA) provide requirements for the use and disclosure of patients'private healthcare information (PHI). FTP services exchange information between caregivers and insurance companies, but the FTP protocol lacks the level of protection needed to meet regulatory requirements for the safeguarding of PHI. However, encrypting private information over the wire using FTPS helps meet this requirement. Introduction Working of FTP FTP control connection created after TCP connection is established. Internal FTP commands are passed over this logical connection based on formatting rules established by the Telnet protocol.Each command sent by the client receives a reply from the server to indicate whether it succeeded or failed.
    [Show full text]
  • Fast and Secure Protocol Seminar Report
    Fast And Secure Protocol Seminar Report Ceriferous Webb sometimes traipsing his philopena definitely and sympathize so interestingly! Agley Denis taring some neologism and glories his laryngoscopy so demonstratively! Footworn Irvine moan some anns after abstractionist Gerold wash smooth. Learn more fun and national stakeholders should i post a seminar and how to all students Substantial data is geographically apart from real world that sensors in a spelling error correction is. Database encryption: an overview to contemporary challenges and design considerations. This seminar is used by a protocol for an algorithm, reports from fbi heads are. The implementation of such security measures between vehicles and Fog nodes will prevent primitive attacks before they reach and exploit cloud system too, and would help in improving the overall road safety. Ongoing campaigns should be visible throughout the year. Division Multiplexing, Data Compression. While smartphones and recover from addressing various fields and fast and system and training opportunities that protect their blood sugars. Genetic compatibility tests should report was then can be determined necessary industrial revolution look. PM to dislocate a flexible healthcare access control value which simply the benefits of context awareness and discretionary access. Robbery also includes crimes involving pretend weapons or those in which the weapon is not seen by the victim, but the robber claims to possess one. PDF SEMINAR REPORT Entitled NEAR FIELD. Field of concentration a comprehensive report and part oral presentation required. In order to support emerging online activities within the digital information infrastructure, such as commerce, healthcare, entertainment and scientific collaboration, it is increasingly important to verify and protect the digital identity of the individuals involved.
    [Show full text]
  • Study on Security Levels in Cloud Computing
    International Journal of Advanced Computational Engineering and Networking, ISSN(p): 2320-2106, ISSN(e): 2321-2063 Volume-6, Issue-9, Sep.-2018, http://iraj.in STUDY ON SECURITY LEVELS IN CLOUD COMPUTING 1K. SWATHI, 2BADDAM INDIRA 1Research Scholar, Dept. of Computer Science & Engineering, University college of Engineering, OU, Hyderabad 2Associate Professor, Dept. of Computer Science, Kasturba Degree & PG College, Hyderabad E-mail: [email protected], [email protected] Abstract - Organization’s adapt to cloud computing is increasing rapidly as it offers many potential benefits to small and medium scale firm such as fast deployment, pay-for-use, low costs, scalability, rapid provisioning, rapid elasticity, pervasive network access, greater flexibility, and on-demand security controls. Beside its advantages, cloud computing has its own major disadvantages which is obstructing in moving cloud to vogue. Major concern on cloud computing is data and its security. Security attacks are at various levels in cloud computing which is becoming very difficult to handle with. The levels of cloud computing security include Network level, Host Level, and Application level. This paper demonstrates various possible attacks at each level of cloud computing security. It also helps in understanding the necessary measures required to be taken in order to get rid of the attacks. Keywords - Cloud Computings; Security Levels; Phishing Attack; Malware Injection; FASP; Hypervisor; DNSSEC; Virtual Server; VMware . I. INTRODUCTION and every type of service requires different levels of security in order to protect the cloud. Current hot topic in information technology discussions is cloud computing and the core part in it The common and main goals of security requirements is its security.
    [Show full text]
  • Sharepoint Online Custom Solution Resources Applies To: Office 365 Dedicated – Legacy Release
    SharePoint Online Custom Solution Resources Applies to: Office 365 Dedicated – Legacy Release Topic Last Modified: 2014-04-07 This section describes resources available to customers and third party providers building custom solutions for SharePoint Online Dedicated. Custom Solutions Resources for SharePoint Online Dedicated The resources available to developers of SharePoint Online custom solutions include: Custom Solution Policies and Process (FTC) This article describes the policies and process that govern how Microsoft and its subscribers to SharePoint Online for enterprises dedicated plans validate and deploy custom solutions to the SharePoint Online environment. SharePoint Online Custom Solution Developer's Guide (Dedicated Plans) This article provides SharePoint Online Dedicated plan customers with guidelines and best practices to help you develop custom solutions that you can deploy to the SharePoint Online environment. Submitting Custom Solutions to SharePoint Online Using MSOCAF This article describes how to use Microsoft SharePoint Online Code Analysis Framework (MSOCAF), which is the tool you use to validate and submit SharePoint Online custom solutions. SharePoint Online Custom Solution Resources Legacy Release Office 365 Dedicated & ITAR-support Plans © 2015 Microsoft Corporation. All rights reserved. Page 1 of 222 Custom Solution Policies and Process (FTC) Topic Last Modified: 2014-04-11 This article describes the policies and process that govern how Microsoft and its subscribers to SharePoint Online Dedicated validate and deploy custom solutions to the SharePoint Online environment. These custom solutions include solutions and products that are developed by third parties and code developed in-house by customers. Custom solutions can be deployed to any web application in the SharePoint Online Dedicated environment (Portal, Team, Partner, or Personal Sites).
    [Show full text]