Milestone Y5XPEXPLUSDL 5 Years Care Plus for XProtect Express+ Device License

Milestone Systems XProtect VMS User Manual - Page 133

For Y5XPEXPLUSDL.

PDF File Manual, 566 pages, Read Online | Download pdf file

Y5XPEXPLUSDL photo
Loading ...
Loading ...
Loading ...
For very large systems or systems with many transactions to and from the SQL databases, Milestone
recommends that you use a Microsoft® SQL Server® Standard or Microsoft® SQL Server® Enterprise edition
of the SQL Server on a dedicated computer on the network and on a dedicated hard disk drive that is not used
for other purposes. Installing the SQL Server on its own drive improves the entire system performance.
Select service account
As part of the installation, you are asked to specify an account to run the Milestone services on this computer.
The services always run on this account no matter which user is logged in. Make sure that the account has all
necessary user permissions, for example, the proper permissions to perform tasks, proper network and file
access, and access to network shared folders.
You can select either a predefined account, or a user account. Base your decision on the environment that you
want to install your system in:
Domain environment
In a domain environment:
l
Milestone recommends that you use the built-in Network Service account
It is easier to use even if you need to expand the system to multiple computers.
l
You can also use domain user accounts, but they are potentially more difficult to configure
Workgroup environment
In a workgroup environment, Milestone recommends that you use a local user account that has all necessary
permissions. This is often the administrator account.
If you have installed your system components on multiple computers, the selected user
account must be configured on all computers in your installations with identical user
name, password, and access permissions.
Kerberos authentication (explained)
Kerberos is a ticket-based network authentication protocol. It is designed to provide strong authentication for
client/server or server/server applications.
Use Kerberos authentication as an alternative to the older Microsoft NT LAN (NTLM) authentication protocol.
Kerberos authentication requires mutual authentication, where the client authenticates to the service and the
service authenticates to the client. This way you can authenticate more securely from XProtect clients to
XProtect servers without exposing your password.
Administrator manual | XProtect® VMS 2023 R1
133 | Requirements and considerations
Loading ...
Loading ...
Loading ...