If you deploy your iConsole front-end Web servers in a cluster, you need to use a common encryption key for the ViewState encryption. By default, the cluster nodes each use an auto-generated encryption key, but this can cause problems if a node switch occurs. Specifically, the iConsole browser can lose its connection to the CMS after the iConsole session times out.
To specify a common encryption key on each node in the cluster
%windir%\Microsoft.NET\Framework\v2.0.50727
\CONFIG
<machineKey validationKey="AutoGenerate... decryptionKey="AutoGenerate... validation=<encryption_algorithm>" />
Note that the validation parameter can be set to any encryption algorithm, such as SHA1 or 3-DES.
<machineKey validation=<encryption_algorithm>" validationKey=<hex_key>" />
Where hex_key is an encryption key (in hexadecimal format). You can use any length key, but be aware that there is a trade-off between security and response times. Longer keys, (say, 128‑bit) provide stronger security but also mean that data requests take longer to service. Conversely, shorter keys mean data requests are serviced more quickly but provide weaker security.
Copyright © 2014 CA.
All rights reserved.
|
|