Secure Remote Access to your Adroit Ignite HMI on any device anywhere with Secure Mobile Gateway
* Please note: This is not a standard offering but can be made available on request
Secure Mobile Gateway
● Secure Mobile Gateway is an additional software component providing Web Access to existing Adroit mimics, giving you secure remote access on any device anywhere.
● Secure Mobile Gateway technology provides web browser (Edge, Firefox, Chrome, Opera etc.) access from any device. User interface graphic forms can be designed for display on any device that supports an HTML 5 browser.
● Secure Mobile Gateway requires no open firewall ports.
Advantages
● Runs on any device with HTML 5.0 compliant web browser, including Apple, Android, Linux, Windows.
● No initial download requirement.
● All communication is encrypted
● All the functionality of the Operator.
Considerations
● Graphics updates can be slower because it is a remote connection and runs as a remote process.
● Large amount of graphical changes will take longer to display.
Security
The Secure Mobile Gateway makes use of several mechanisms to ensure confidentiality and integrity:
● A secure channel is initiated from the client-side, preventing any direct exposure to sniffing, DDOS attacks and hacking attempts.
● Additional IT infrastructure changes or open inbound ports are not required (uses HTTPS). Direct HTML 5 representation of the Operator is provided.
● The solution is application specific and specifically designed and optimised for the Operator.
● Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
● This protocol is used widely by commercial and governmental organisations to establish a cryptographic network channel and ensure the confidentiality of the underlying communication.
● This protocol implements the RFC 4250 through 4345 Internet standards.
● The encryption protocol is used to establish an encrypted channel between the Secure Mobile Gateway Client Manager and a Cloud Delegation Server.
● The protocol implementation that forms part of the Secure Mobile Gateway will only connect to a trusted set of Cloud Delegation Servers as identified by their public/private key pairs.
● Provides optional 2FA (Two-Factor Authentication) - Can be used to provide additional security.
Explanation of Technologies
Secure Shell SSH 2.0: SSH is a cryptographic network protocol for operating network services securely over an unsecured network. This protocol is used widely by commercial and governmental organizations to establish a cryptographic network channel and ensure the confidentiality of the underlying communication.
The encryption protocol is used to establish an encrypted channel between the Secure Mobile Gateway Client Manager and a Cloud Delegation Server. The protocol implementation that forms part of the Secure Mobile Gateway will only connect to a trusted set of Cloud Delegation Servers as identified by their public/private key pairs.
HTTPS: Web-based access is provided via HTTPS only and all traffic is encrypted between the Browser and the Cloud Delegation Server.
Cloud-based process: If the “Cloud process” host mode is used, the actual Operator process does not run on the Host infrastructure, but rather in a protected sandbox environment on one of the trusted Cloud Delegation Servers.