INDEX
Documentation Library
Search for information on Hornbill Documentation.
{{docApp.searchResultFilteredItems.length}} results for "{{docApp.currentResultsSearchText}}" in {{docApp.searchFilterBySpecificBookTitle}}
-
{{resultItem.title}}
{{resultItem.url}}
Have questions about this site?
What is this site?
- This website is Hornbill's new product documentation website and is currently under development.
- It is intended that all existing and future public-facing documentation we produce will be available to search, browse and share.
- Hornbill's current documentation is available at Hornbill Wiki but over time this content will be migrated to this documentation site.
- Please feel free to have a look around at any time.
Why has Hornbill created this site?
- Hornbill's products have moved on considerably since we introduced it almost 10 years ago. At the time, the MediaWiki tool was sufficient, but we have outgrown it.
- Our customers are more enterprise focused and more self-sufficient than ever before, so for 2023 and beyond we have established a new documentation platform and team to drive our documentation initiative forwards.
- We are aiming to deprecate the use of Hornbill Wiki for most Hornbill related documentation.
- We want to enable our growing partner network with product resources and information, documentation beyond our Wiki approach is required.
- We could definitely do with some help, and may even pay for some! If you have domain knowledge and would like to help, please check out our Hornbill Docs Contributor Guide and contact the Hornbill docs team at docs@hornbill.com.
What will this site be good for?
- Community contribution will be facilitated, encouraged, and most welcome.
- High quality documentation, will be kept up to date as rapidly as our products evolve.
- Real-time content search and discovery.
- Articles organized into books, books into libraries, creating a more natural and logical structure to our documentation.
- Legacy API documentation and various other documentation sources will all be consolidated into a single unified documentation system.
- Documentation available in browser as well as printable/viewable as PDF on demand.
- Personalized documentation experience, allowing dark/light mode, article subscriptions, social media sharing and other useful features.
- Almost all publicly available documentation on docs.hornbill.com will be open-source and available to fork on GitHub, allowing customers to derive their own custom documentation around Hornbill products should they wish to.
What is the timeline for this site?
- We have taken the decision to publish and make available early, there is very little content at this time.
- As and when we have completed/usable documentation, it will be published here.
- We have a host of additional features we wish to add over time, so please watch this space.
- We expect most of our existing documentation should be reviewed/migrated to docs.hornbill.com over the coming months.
- The documentation project will be ongoing, will continue to expand, evolve and improve day-by-day.
{{docApp.libraryHomeViewProduct.title || docApp.libraryHomeViewProduct.id}}
{{docApp.libraryHomeViewProduct.description}}
{{group.title || group.id}}
{{group.description}}
Network Policy
- Article
- Mon Jul 24 2023
- 2 minutes to read
- 1 contributors
Secure log-on
The screen displays no system or application identifiers until the network login has been successfully completed.
The screen provides no help messages during the login procedure.
The system validates the logon data only upon completion of input and then, if there is an error, the system requires the user to try again.
The logon procedure limits the number of unsuccessful attempts allowed to three (and unsuccessful attempts are automatically recorded) and automatically enforces a time delay before further attempts are allowed.
Password characters are hidden by symbols.
Users are required to log out of sessions when they are finished.
Network Access Control
Authorized users with permissions for devices or services, which they are given, shall access only those devices and services.
Authorized representatives shall access network equipment only. Network devices should not be enabled by default. Remote access is provided by a secure Virtual Private Network connection to the office.
A firewall is in place and controlled by the network team who ensure that only controlled ports are in use.
The organization monitors its network to ensure that, if any unwanted service or port is identified, appropriate steps are taken to apply appropriate controls. [edit] User authentication for external connections
Remote users log onto the network using VPN and remote authentication. The remote equipment is registered by the IT department.
Remote diagnostic and configuration port protection Ports are locked down and only open only as required. Ports are protected by firewall settings.
User identification and Users have unique identifiers and passwords as defined under user registration and in line with the Access Control Policy.
Password management This is managed in accordance with the sections above.
Use of system utilities Staff are experienced and knowledgeable and do not download and install system utilities unless such a utility will benefit the company.
Session time out Sessions locked out after 10 minutes of inactivity Remote laptops using a VPN are subject to the same lockout after 10 minutes of inactivity.
- Version {{docApp.book.version}}
- Node {{docApp.node}} / {{docApp.build}}