IAS 2017 SP1 "Security" question. Security class methods in symbol scripts.
IAS 2017 SP1 "Security" question. Security class methods in symbol scripts.
Sorry that was backwards so how, not sure how to delete and re ask, but here is the question and details:
Hi all, looking for someone to help point me in the correct direction. IAS 2017 SP1, but have a feeling this could carry over from when archestra graphics first came to IAS.
Application has some Archestra graphics that are using classes "Security.SymbolAccessController.ControlSecurityInfo" & "Security.SymbolAccessController.Controller" and so on for roughly 20 controls that should ultimately pass back a true if enabled. I have never seen "security" done this way before, but I feel this is not a security thing that they are trying to do (but can not yet tell).
The objects have some notes on some scripts as well that parse some data from the areas, that talk about "GenericSecuritySeed symbol for use in embedded graphics - see the document 'Generic Security Model - Design Specification & Installation / Setup Guide'" I have searched high and low and can not come up with said document.
The logger is showing me the view is going out and looking at "GenericSecurityUserCache1: AppConfig File Path: C:\Security\ServerCopy\AppConfig.dat", which I copied that dat file from the production server. The file is not general text to be able to open in notepad, so it is not any help. The logger is giving a warning about the archestra graphic "unable to retrieve security information" referencing the same "GenericSecurityUserCache1"
Again just looking for some help, I don't need to modify any of this, but do need it to work in our development environment that we are trying to get going. I'm hoping someone here has delt with this before. Or if someone knows of the document the object comments reference, that would be the biggest help. I searched around in the IAS scripting guide, but cannot find where "security" is referenced as its own class. I have a feeling I'm just not looking in the right places, and greatly appreciate if anyone can help straighten me out.
Thanks!
Hi Ryan, this seems to be a challenging question.
I'm not familiar with this class and it seems to be a custom script function library, all imported script function libraries should be visible in the galaxy database.
Or if you go in the source galaxy Galaxy menu, Export, Script Library.
In the new dialog box you should be prompted with a list of all custom libraries, and you should be able to export them to a file and import in your new system/galaxy.
Don't know if its fully applicable to your scenario but at least you will identify the component.
Then you should find the dll and all its components on the gr node
C:\Program Files (x86)\ArchestrA\Framework\FileRepository\<Your Galaxy>\Vendors\xxxx (if the dll has a vendor name).
But I would start with identifying the customization and move from there.
Hi Richard and thank you for taking the time to reply. You are correct and as I come to find out, this is very much a custom security setup. The comments and graphics were commented in such a way, I was convinced this was something from Wondereware and the days gone by. However I was able to find what I needed and have all but one more item (I have to track down yet) working. Thanks again for the reply!
I'm happy that it worked out!,
And good luck with your reverse engineering!