pdf_icon Download contentACCESS Manual as PDF

  1. Introduction to contentACCESS
    1. Services provided by contentACCESS
    2. Software requirements
  2. Installation of contentACCESS
  3. contentACCESS Tools
    1. Installing Virtual drive
    2. Installing the Proxy server (contentACCESSWS)
    3. Installing the Proxy web services
    4. Installing Outlook forms
    5. Legacy email archive connectors
    6. Legacy archive connector for Metalogix Archive Manager Exchange Edition (MAM EE)
    7. Legacy archive connector for Email Lifecycle Manager (ELM)
    8. Installing TECH-ARROW’s WinShortcutter
  4. contentACCESS Central Administration
    1. Central administration login
    2. contentACCESS Central Administration user interface
  5. Tenants in contentACCESS
    1. How to create a new tenant
    2. Tenant limitations
    3. How to provide access to a tenant (adding new tenant administrators)
    4. Tenant administrator invitation types
  6. General system configurations
    1. Connection
    2. User interface
    3. Users — role types, creating new users, adding user logins
    4. How to activate your license key
    5. How to create user logins to an already existing user?
    6. System administrators
    7. Login providers
    8. System
    9. Licensing
    10. Notifications
    11. Monitoring — how to find out possible misconfigurations / reasons of potential system/job failures
    12. Distributed environment in contentACCESS — Clusters
    13. Statistics
    14. How to create/configure databases — All databases
  7. Common features
    1. Databases
    2. Schedules
    3. Retentions
    4. Storages
    5. Exchange connections
    6. Importing contentACCESS configurations from files
  8. Creating new jobs in contentACCESS
  9. Jobs’ page, jobs’ context menu
  10. File Archive
    1. Introduction to File system archive
    2. File Archive settings
    3. File archive Databases
    4. File archive System settings
    5. File archive Retentions
    6. File archive Storages
    7. Root folders
    8. Aliases
    9. File archive Schedules
    10. Provisioning settings and managing access to contentWEB
    11. Configuring aliases
    12. Configuration of jobs available in contentACCESS File Archive
    13. Configuration of File system archive job
    14. Configuration of a File system restore job
    15. Configuration of File system recovery job
    16. Configuration of Remote shortcutting job
    17. Active/inactive documents in File system archive
  11. Email Archive
    1. Important settings before creating an Email Archive job
    2. Database settings
    3. Email archive System settings
    4. Provisioning settings
    5. Retention settings
    6. Shortcuts in email archiving
    7. Storing of archived emails
    8. Creating email archive schedulers
    9. User experience
    10. Exchange 2013: Mail app in OWA 2013 or on MS Outlook 2013 desktop version
    11. Exchange 2010: OWA 2010 integration
    12. Address book objects
    13. Granting access rights for mailbox users and explicit users to view the mailbox archive?
    14. Creating contentWEB users (option 1)
    15. Manage access to a mailbox archive (option 2)
    16. How the end user should log in to contentWEB (archive) over Internet?
    17. Database and store assignment in email archiving
    18. How to assign database and storage to an Exchange group?
    19. How to assign database and storage to a mailbox?
    20. How to move data from source database/storage into a second (target) database/storage?
    21. Creating Email archive jobs: archive, restore, recovery, mailbox move
    22. Email archive job
    23. Email restore job
    24. Email recovery job
    25. Mailbox move job
  12. Custom plugins
  13. Email management job configuration
  14. SharePoint archive plugin
  15. Storage replication plugin
  16. Sharing plugin
  17. Datengut plugin
  18. Email synchronizer plugin
  19. contentWEB
  20. officeGATE
  21. accessGATE Mobile
  22. Virtual drive
  23. Terms of use
  24. FAQ

3.2.Installing the Proxy server (contentACCESSWS)

Most of the companies understood, that sensitive information/data should be transmitted using a secure connection. TECH-ARROW also reacted on this demand and offers a secure connection, i.e. HTTPS connection to enable communication between the user and the contentACCESS server. To enable to use HTTPS security, it is required to install a proxy server, which will enable for the user to communicate with the contentACCESS server.

Proxy server is a must-have tool for customers who have contentACCESS Email Archive (or any email based plugins) and would like to use the shortcutting feature or use accessGATE mobile.

Note: Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data are sent between client (as in our case the Outlook form) and the contentACCESS server that you are connected to. The “S” at the end of HTTPS stands for “Secure”. It means all communications between the client and the server are encrypted. HTTPS is often used to protect highly confidential online transactions. HTTPS pages use one of two secure protocols to encrypt communications – SSL (Secure Socket Layer) or TSL (Transport Layer Security)(proxy that we will install uses SSL). Both of these protocols use what is known as asymmetric Public Key infrastucture (PKI) system. This PKI system uses two “keys” to encrypt communications, a “public key”, and a “private key”. Anything encrypted by the public key can only be decrypted by the private key and vica-versa.


In the contentACCESS installation wizard, navigate to Tools ⇒ click on Proxy web services option. The installation wizard will open and will guide you through the installation process.

cACCESS 2.9 doc 11

In the contentAccessWS – InstallShield Wizard window click on Next:


In the next step accept the Software license agreement, and click on Next:


Change the destination where you want to install contentACCESSWS. By default it installs to C:\Program files\TECH-ARROW\contentACCESSWS. Then click on Next:


In the next step select the contentACCESS server, and with the Test Server button test if the connection with this server was successfully established. With clicking on Advanced button you can also set the port where the proxy server should be installed. With checking the Use secure connection textbox the user will be enabled to access data only with using a secure connection [HTTPS].
Then click on Next.

Documentation33 Documentation34

In the next window, click Install to finish the installation process. In the last step click on Finish.

Documentation35 Documentation36

Yes No Suggest edit
Help Guide Powered by Documentor
Suggest Edit