{"id":9,"date":"2023-08-17T12:25:12","date_gmt":"2023-08-17T10:25:12","guid":{"rendered":"https:\/\/www.infodigit.it\/spe\/?p=9"},"modified":"2023-08-17T16:32:11","modified_gmt":"2023-08-17T14:32:11","slug":"tech-notes","status":"publish","type":"post","link":"https:\/\/www.infodigit.it\/spe\/2023\/08\/17\/tech-notes\/","title":{"rendered":"Tech Notes"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">USER AUTHENTICATION<\/h2>\n\n\n\n<p>Each connection needs to authenticate by providing user name and password<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">USER RESTRICTION BY IP ADDRESS AND FOLDERS ACCESS<\/h4>\n\n\n\n<p>It is possibile to restrict users by their IP address and to limit filesystem access.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">USER SESSIONS ISOLATION<\/h4>\n\n\n\n<p>Each connection runs in a separate server-side process, this avoids that one session crash could impact the others<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">ENCRYPTED LOGIN<\/h4>\n\n\n\n<p>The login mechanism is handled by a runtime generated asymmetric key exchange.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">CONNECTION AUTO RECOVERY<\/h4>\n\n\n\n<p>The client library automatically restores the connection if it was lost or where it is unstable.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">BLACKLIST<\/h4>\n\n\n\n<p>The service automatically put in a blacklist the IP address which fail authentication or doesn&#8217;t send recognized command after 20 times.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">RAPID INSTALLATION AND CONFIGURATION<\/h4>\n\n\n\n<p>The setup quickly and simply installs all the software and write all the settings needed to taste its main features.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>USER AUTHENTICATION Each connection needs to authenticate by providing user name and password USER RESTRICTION BY IP ADDRESS AND FOLDERS ACCESS It is possibile to restrict users by their IP address and to limit filesystem access. USER SESSIONS ISOLATION Each connection runs in a separate server-side process, this avoids that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7],"tags":[],"class_list":["post-9","post","type-post","status-publish","format-standard","hentry","category-client-side","category-server-side"],"_links":{"self":[{"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/posts\/9","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/comments?post=9"}],"version-history":[{"count":1,"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/posts\/9\/revisions"}],"predecessor-version":[{"id":10,"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/posts\/9\/revisions\/10"}],"wp:attachment":[{"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/media?parent=9"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/categories?post=9"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infodigit.it\/spe\/wp-json\/wp\/v2\/tags?post=9"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}