Access to the license server

The server is accessable through the following URLs:

SSL

Note: SSL is mandatory for Frontline

The use of SSL encrypted web traffic (HTTPS) is a requirement for Frontline.

For cloud installations, the required trust is established through the use of certificates issued by a trusted root CA.

For an on-premises installation, this trust must be established by the local infrastructure, e.g. the local server requires a certificate that is trusted by all local users. The local IT needs to issue a certificate for the server that can be used by the Frontline Command Center. We need a standard X509 certificate as used in other web services. There are two common scenarios for obtaining this:

  • Customer supplied keystore: In this scenario, the customer provides a private key and certificate for the server in the form of a password-protected PKCS12 (PFX) keystore. The password (for the keystore and private key) is either given to TeamViewer during setup or configured by the local IT department in the configured server.
  • Customer signed certificate: In this scenario, TeamViewer will provide a standard X509 Certificate Signing Request (CSR) using the provided hostname for the server. The local IT will sign this request and provide TeamViewer with the resulting certificate in either DER or PEM format. TeamViewer will then configure the server to use this certificate.

In both cases, it is the customer's responsibility to configure the user machines to trust the resulting certificate in the browser.

Our software requires the following communication ports. Alternative ports can be configured if required:

Purpose
Direction
Protocol
Port
Required

HTTPS/WWS

Inbound

TCP + Websocket

443 (can be configured)

Yes

Wi-Fi connectivity

Note: DHCP required. Android does not officially support static IP addresses. Please obtain IP addresses via DHCP.

Supported Wi-Fi features

Topic
Choice
Remarks

Network Type

  • 2.4GHz
  • 5Ghz

Security

  • Open
  • WEP
  • WPA/WPA 2
  • WPA-EAP
  • IEEE802.1X

Networks that rely on a portal page to get access (e.g. entering credentials on a web form) are not supported. 

EAP/IEEE802.1X Security

EAP Method 

  • PEAP
  • Password
  • TLS
  • TTLS

EAP Phase Method 2

  • GTC
  • MSCHAP
  • MSCHAPV2
  • PAP

Certificate Requirements 

  • Client Certificate 
  • Server Certificate 
  • <= 2048 Bit
  • <= 3072 Bit 
  • <= 4096 Bit 
  • >4096 Bit 

Some devices do not support client certificates above 3072 Bit strength.

Identity Settings 

  • User Identity
  • User Password
  • Anonymous Identity