JUN
Understanding the Basics
Posted by: Christopher Vezeau
This video describes how to connect with RiverStar’s virtual training environment on Amazon Web Services.
Continue Reading →MAY
Typically, RiverStar clients install and use Studio in a local development environment. However, RiverStar uses Amazon Web Services (AWS) to host our demo and training environments “in the cloud.”
What this means is that our demo/training environments are readily accessible to:
- Prospective customers for the evaluation of RiverStar Studio
- Existing customers for a virtual training environment for RiverStar Studio
In order to use the demo or training environments, please follow these steps:
- Please talk to your RiverStar representative to register for access.
If you don’t ...
FEB
Problem
When connecting from a local tomcat instance to one of RiverStar servers, such as when invoking a REST web service hosted on our servers, you may occasionally get this error:
Resolution
This error indicates that the version of Java that you currently have configured for Tomcat DOES NOT contain the proper root SSL certificate. To fix this issue, simply download the attached zip file and follow the directions in README.rtf.
[wpdm_file id=1 title=”true” desc=”true” ]
Continue Reading →FEB
Parsing XML Using the WWGXML Method
Posted by: Mohammed Meah
Challenge
The ability to parse XML in a generic way where you may not know tag names ahead of time.
Solution
RiverStar has a utility function, WWGXML, that provides this functionality. This utility function encapsulates the Java (or C#) method of parsing XML. The added benefit of using this function is that is simplifies the porting of code from Java to C# or vice versa.
The following description is describing things from the java side, but for ...
Continue Reading →FEB
Prior to Studio Release 12, database interface exceptions were commonly handled by:
- Including a result code field for each database interface.
- Confirming the results for each return call of a database interface to decide the action to take (i.e. throw exception).
- Executing a special exception workflow with appropriate notifications.
For example, for one RiverStar client we created custom action to execute on every database interface that called an API to check the result code field. If it was set to “1”, the API would ...
Continue Reading →FEB
Running Javascript within Tabs
Posted by: Randy Meacham
When you place a tab container on a page with studio it is sometimes desirable to run javascript on the elements contained in the tab when the tab becomes activated.
There is a new event triggered on a tab panel when it activates.
To listen for the event you can do the following:
Where selector is an element in the tab panel.
Continue Reading →FEB
In Encryption and Password Functions we described an overview of different types of encryption available in Studio, and in Password Hashing Techniques we described how to securely store passwords for account validation. That works great when you need to verify a password, but it prevents decrypting the original text, so it won’t work for things like credit card numbers that we need to be able to decrypt at a later date.
Studio supplies two types of 2-way ...
Continue Reading →JAN
Encryption and Password Functions
Posted by: John Conneely
Writing functions that utilize encryption can be challenging. The APIs that are exposed by Java or DotNet have many options, and it’s easy to make a small mistake that has the effect of negating the security you’re trying to add to your application.
We’ve developed a set of common functions that do all the hard work for you to call the lower level encryption APIs. These security functions are exposed as static methods on a new helper class, WWGCrypt. These functions ...
Continue Reading →JAN
Password Hashing Technique
Posted by: John Conneely
Overview
In a previous Knowledge Base article, “Encryption and Password Functions“, we described – at a high level – some of the helper functions we have available to simplify the use of encryption in your API interfaces. In this post, we will take a closer look at the first set of functions that are available to you: password hashing.
When to use Password Hashing
You should use password hashing when ever you want to check ...
Continue Reading →JAN