CHAPTER 4: Connection Settings

The connection settings are performed with the input dialog “vistraxWelcome Connection Settings”. This dialog opens when vistraxWelcome is started for the first time after installation. To open the dialog again in order to change settings at a later stage, start “vistraxWelcome Connection Settings” from the Windows Start Menu.

The input dialog is divided into two sections. It allows you to save database connection data (“Microsoft SQL Server”), and to save the connection data required for LDAP / ADS authentication (“LDAP / ADS Authentication Section”).

LDAP / ADS authentication configuration is optional. Configuration is only required if you wish to make use of the possibility to authenticate during user login in vistraxWelcome.

To set up the database connections the following fields must be filled in:

  • Driver
    Here you can choose the database driver:
    • Microsoft OLE DB Provider for SQL Server (SQLOLEDB): Supports TLS v1.0 only (default).
    • Microsoft OLE DB Driver for SQL Server (MSOLEDBSQL): Supports TLS v1.0 and newer, as well as self-signed certificates.

Note

MSOLEDBSQL is only available for selection if the driver is installed on the workstation. Information about the download and installation can be found here.
  • Name
    This entry corresponds with the information entered during the installation of the database instance and/or the path to an existing instance of Microsoft SQL.

Note

If the installation information remains unchanged, the instance name comprises the computer name followed by “\VISTRAX”. For example “MyComputer\VISTRAX”.
  • Port
    Port, to connect to the Microsoft SQL instance (default: 1433).
  • Packet Size
    The network packet size in bytes which is used for the database connection. The value must be between 512 and 32767. The maximum network packet size for encrypted connections is 16383. The default network packet size is 4096.

Note

Do not change the packet size unless you are certain that it will improve performance. For most applications, the default packet size is best.
  • Datenbase

Select either “VISTRAX” if you have not yet set up a main database, or the database name of an existing vistrax main database.

  • Authentication Mode
    Select the mode to be used for login to the SQL instance:
    • Microsoft SQL servers: Authentication via a database login (default).
    • Windows integrated security: Authentication via a Windows domain user.

Note

If the installation information is unchanged select the authentication mode “Microsoft SQL Server”.
  • Login and Password

Note

If the installation information remains unchanged, the standard login is “sa” and the standard password “VxAdmin4DB!”.

Note

The database login must possess administration permissions.
  • Encrypted Database Connection
    Select the mode to be used to encrypt the database connection:
    • Disabled: An unencrypted connection is used (default).
    • Automatic (encryption preferred): If an encrypted connection can be established, it will be used. Otherwise, an unencrypted connection is used.
    • Forced: An encrypted connection is always used.
    • Forced: All server certificates are accepted for the encrypted connection (including self-signed ones; MSOLEDBSQL is required).

Note

To use an encrypted connection, the Microsoft SQL instance must be configured accordingly. See also: Enable Encrypted Connections to the Database Engine.. If a self-signed certificate will be used, this must be added on the client computer as a trusted root certificate.


In order to configure and use LDAP / ADS authentication you must fill in the following fields:

  • Path
    The LDAP path refers to the LDAP/ADS server. Example: The server IP is 192.168.1.1. In this case the LDAP path is formulated as follows:
    ldap://192.168.1.1

    (it is also possible to resolve from the DNS name rather than using the IP address)

  • Domains
    In this field you should enter the domain names of the domains to be used

Note

The connecting user requires access to the LDAP/ADS server. If the access is denied because of administrative reasons, you can specify a single LDAP/ADS object the user can access. Enter the fully qualified LDAP path to the group's distinguished name (“dn”). The free tool “LDAP Admin” (http://www.ldapadmin.org) can assist you in correctly formulating this path. Using this method you can log in to your LDAP / ADS server and search the file directory in tree view. You can then view the full distinguished name path of the object desired (right-click⇒ Edit Entry). The information can be transferred using copy and paste.