Frequently Asked Questions (FAQs)
Most modern web browsers like: Chrome, Firefox, Safari, and IE9+. For optimal performance, the product team recommends using the application in the most up to date versions of these.
Yes, the application requests/transactions can be encrypted by running over HTTPS (SSL).
App Manager can be “replicated” to multiple application servers and function in a load balanced environment. See Scalability and Performance for more details.
Yes, every service endpoint and functionality in all our applications have an assigned privilege. Roles can be created dynamically and privileges can be assigned to, or removed from, any role. See the Roles, Role Privileges, and User Roles sections for information on configuring authenticated user roles.
Yes, the Google tracking code can be entered into App Manager. See the Installed Applications topic under "Tracking ID" for instructions on how to configure this feature.
Yes, please see the Configuration Store topic for more information as well as step-by-step migration instructions.
All of Transcend's products provide safeguards to help prevent SQL injection attacks by making use of paramaterized SQL queries within the .NET framework. While there are safeguards in place to prevent SQL injection attacks, within Transcend's products, the recommended data access architecture is intended to provide the greatest defense mechanism. Securing data access via connection account privileges and application user/role/privilege assignment is critical to mitigating the risk of unintended server and database access. This is particularly important due to the fact that some functionality in Transcend's products do require some level of dynamic SQL input. It is critical that only authenticated and trusted users have access to this functionality. All database connections to the transactional data should be configured to use a read-only connection. See "Data Flow and Connections" for more details.