<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://docs.opendium.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Chris</id>
	<title>Opendium Documentation - User contributions [en-gb]</title>
	<link rel="self" type="application/atom+xml" href="https://docs.opendium.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Chris"/>
	<link rel="alternate" type="text/html" href="https://docs.opendium.com/wiki/Special:Contributions/Chris"/>
	<updated>2026-05-13T17:54:37Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=PSI_Secure_Browser&amp;diff=518</id>
		<title>PSI Secure Browser</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=PSI_Secure_Browser&amp;diff=518"/>
		<updated>2025-12-11T12:58:50Z</updated>

		<summary type="html">&lt;p&gt;Chris: /* Configuration */ Adding information about the PSI Secure Browser override.Chris&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Status ==&lt;br /&gt;
We cannot guarantee that PSI Secure Browser will work through an Opendium system.  When a school reports problems using this software, we are usually able to work with them to adjust their configuration to allow it to work, but in our experience it is very likely to stop working again in the future.&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
Exams this year for the Psi Browser have changed again to the following: &lt;br /&gt;
&lt;br /&gt;
psiexams.com&lt;br /&gt;
&lt;br /&gt;
ably.io&lt;br /&gt;
&lt;br /&gt;
ably-realtime.com&lt;br /&gt;
&lt;br /&gt;
main.realtime.ably.net &lt;br /&gt;
&lt;br /&gt;
We have created an override to use so you don't have to add these sites to a site wide override of Disable HTTPS Decryption.&lt;br /&gt;
&lt;br /&gt;
To apply the override, go to:&lt;br /&gt;
&lt;br /&gt;
UTM -&amp;gt; Web -&amp;gt; Overrides and Walled Garden -&amp;gt; Select the group you want to apply the override to.&lt;br /&gt;
&lt;br /&gt;
Click Add Override, and select App: Psi Secure Browser say OK. &lt;br /&gt;
&lt;br /&gt;
Then Click Save Configuration.&lt;br /&gt;
&lt;br /&gt;
You will also need to set the Twilio Video rule bundle to allow on the Egress tab under the Firewall for the users/subnets that are wanting to use the psi browser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Client configuration to consider: The user must be able to run the psi browser as administrator and be able to have access to a webcam and microphone.&lt;br /&gt;
&lt;br /&gt;
== Detail ==&lt;br /&gt;
PSI Secure Browser is a piece of software used by exam boards such as [https://abrsm.org ABRSM], to provide exams to students.  Unfortunately, schools are provided with very little information regarding firewalling and filtering changes that they need to make to allow PSI Secure Browser to work on their networks.&lt;br /&gt;
&lt;br /&gt;
Although there is a [https://helpdesk.psionline.com/hc/en-gb/articles/360055813952-RPNow-List-of-Websites-to-Whitelist-on-your-Anti-Virus-Applications whitelist available], this is not comprehensive and PSI Secure Browser appears to require access to a number of other hosts which are not listed on that website.  The whitelist also recommends whitelisting ''all'' content which is hosted through Amazon AWS.  As Amazon AWS hosts an enormous amount of content for all manner of organisations, including content which is unsafe, we believe that a school would be negligent were they to follow these recommendations.&lt;br /&gt;
&lt;br /&gt;
Whilst a network test service is available, this does not appear to comprehensively test all of the requirements for the exams, and we therefore have numerous cases of schools believing that everything is set up to work and then only discovering that it doesn't work when the exam starts.  There does not seem to be a way to comprehensively test that PSI Secure Browser will work for an exam until the exam is actually in progress.&lt;br /&gt;
&lt;br /&gt;
We have also identified bugs in PSI Secure Browser which result in it being left in a broken non-functional state if challenged for authentication by the proxy.&lt;br /&gt;
&lt;br /&gt;
Without comprehensive information regarding PSI Secure Browser's technical requirements, we have to reverse engineer it by examining its network traffic in order to create a configuration which will work.  Unfortunately, we have seen that its technical requirements frequently change, and therefore a configuration which works now will likely not work in the future.&lt;br /&gt;
&lt;br /&gt;
In order to produce a stable configuration that would allow this software to work, we would require a more comprehensive list of its technical requirements.  However, our attempts to open a dialogue with [https://www.psionline.com PSI] and to report the bugs in their software have been completely ignored.&lt;br /&gt;
&lt;br /&gt;
Whilst we recognise that schools have little choice but to use whatever software the exam boards dictate, we feel that schools should be feeding back these problems to the exam boards so that they can put pressure on the software vendors to behave responsibly.&lt;br /&gt;
&lt;br /&gt;
== Vendor Contact Log ==&lt;br /&gt;
The following log summarises discussions with PSI regarding the problems listed above.&lt;br /&gt;
&lt;br /&gt;
{{Contact Log Link|date=2022-03-24|summary=Reported to PSI}}&lt;br /&gt;
{{Contact Log Link|date=2022-05-25|summary=Reported to ABRSM}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Third Party Software Compatibility]]&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=Android_Configuration&amp;diff=517</id>
		<title>Android Configuration</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=Android_Configuration&amp;diff=517"/>
		<updated>2025-05-08T08:34:31Z</updated>

		<summary type="html">&lt;p&gt;Chris: Added anonymous field must be blank.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Important note: compatibility with safeguarding obligations==&lt;br /&gt;
In July 2016, Google [https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html announced] that Android applications would no longer trust any certificates which are installed by the user.  This limitation cannot be overridden by the user, nor by the administrator of devices that are managed through an MDM.  This limitation does not ''currently'' affect web browsing from Android devices, but does make it impossible for most other apps to be appropriately filtered or monitored, beyond simply allowing or blocking the entire app.  This also introduces a significant administrative overhead, as it forces administrators to make a decision over which apps to allow through unfiltered, and to maintain lists of the services that must therefore not be decrypted.&lt;br /&gt;
&lt;br /&gt;
Despite numerous attempts by filtering suppliers and schools to open a dialogue with Google, Google has stated that this is the intended behaviour and that it will not be fixed.&lt;br /&gt;
&lt;br /&gt;
We firmly believe that schools cannot meet their statutory safeguarding obligations, to appropriately filter and monitor the children who are under their care, if they are not able to use HTTPS decryption technologies.  Through their hostility towards these important online safety technologies, Google are unnecessarily endangering children and creating significant liabilities for schools.  Unfortunately, we feel that '''we cannot recommend that schools purchase Android devices''', and that they should instead opt for Apple or Microsoft.&lt;br /&gt;
&lt;br /&gt;
We do acknowledge that, where Bring Your Own Device networks are concerned, schools do not have a choice over which devices are used.  We will always endeavour to provide the best possible support for all types of devices, no matter what the supplier's position is regarding online safety technologies.&lt;br /&gt;
&lt;br /&gt;
==One-to-one devices==&lt;br /&gt;
This section covers devices which are always used by the same user, such as devices deployed in a one-to-one arrangement or bring your own device.  Scroll down for information regarding [[Android Configuration#Shared devices|shared devices]].&lt;br /&gt;
&lt;br /&gt;
*If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking a network access controller to the Opendium system|send RADIUS accounting data]] to the Opendium system.  Set the [[Web: Permissions &amp;amp; Limits#User identification|User Identification]] mode to ''RADIUS''.  If 802.1x authentication cannot be used, Set the [[Web: Permissions &amp;amp; Limits#User identification|User Identification]] mode to ''Single User Devices''.&lt;br /&gt;
*If you are using 802.1x and RADIUS accounting, log the device onto the network with the user's credentials, make sure the anonymous field is blank (you may have to delete the word anonymous if it is pre-populated).&lt;br /&gt;
*If you are not using 802.1x and RADIUS accounting, the user must use the captive portal to authenticate.  Some devices can automatically log in to the captive portal using the WISPr protocol whenever the device reconnects to the network. Unfortunately WISPr has been patented by Apple and is therefore not supported by most Android devices.&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate, either through an MDM or:&lt;br /&gt;
&lt;br /&gt;
*Ensure that a lock screen PIN is configured on the Android device&lt;br /&gt;
*Launch Chrome and browse to https://''&amp;lt;your Opendium host name&amp;gt;''/opendium.crt or scan the QR code that is displayed on the [[Web]] tab.&lt;br /&gt;
*Once downloaded you will get a pop up message saying: &amp;quot;Install CA certificates in Settings - This certificate from null must be installed in Settings. Only install CA certificates from organisations that you trust&amp;quot; Select close&lt;br /&gt;
*Open Settings -&amp;gt; Security -&amp;gt; Encryption &amp;amp; Credentials -&amp;gt; Install a certificate.&lt;br /&gt;
*Select CA certificate: a message appears saying &amp;quot;Your data won't be private....snip....data is encrypted&amp;quot; select Install anyway&lt;br /&gt;
*Enter your pin or biometrics to install and locate the opendium.crt file you saved above, tap this and you should a message flash up saying &amp;quot;CA certificate installed&amp;quot;&lt;br /&gt;
*Tap back, and confirm the certificate is installed by clicking &amp;quot;Trusted credentials&amp;quot; then select User and you should see the opendium.crt there.&lt;br /&gt;
*The certificate should now be installed in the system and browsing to https pages no longer give you an insecure warning.&lt;br /&gt;
&lt;br /&gt;
Note that once the decryption certificate is installed, the device will always show a notification that states &amp;quot;Network may be monitored by an unknown third party&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==Shared devices==&lt;br /&gt;
This section covers devices which are shared between multiple users (one user logged in at a time), such as devices that are free for any student to use.&lt;br /&gt;
&lt;br /&gt;
*Configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking a network access controller to the Opendium system|send RADIUS accounting data]] to the Opendium system.&lt;br /&gt;
*Set the [[Web: Permissions &amp;amp; Limits#User identification|User Identification]] mode to ''RADIUS''.&lt;br /&gt;
*Log the device onto the network with a user name that starts with &amp;quot;op-shared-&amp;quot;.  For example, &amp;quot;op-shared-tablet&amp;quot;.  This user must exist on the Opendium system.&lt;br /&gt;
*The user must use the captive portal to authenticate.&lt;br /&gt;
*When the user has finished with the device, they must disconnect from the wifi (i.e. turn wifi off on the device, shut down the device, or place the device in a shielded box/cupboard).&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate.  This is usually done through your MDM system.&lt;br /&gt;
&lt;br /&gt;
Shared devices cannot be supported on networks which do not support 802.1x and RADIUS accounting.  If your network cannot support 802.1x, the only option is to disable [[Web: Permissions &amp;amp; Limits#User identification|User Identification]].&lt;br /&gt;
[[Category:Client Configuration]]&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=Chrome_OS_Configuration&amp;diff=515</id>
		<title>Chrome OS Configuration</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=Chrome_OS_Configuration&amp;diff=515"/>
		<updated>2024-11-07T12:42:40Z</updated>

		<summary type="html">&lt;p&gt;Chris: I have added a new page for adding the https decryption certificate to chrome OS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==One-to-one devices==&lt;br /&gt;
This section covers devices which are not managed by the school through an MDM and are standalone or BYOD devices information on shared devices will be updated at a later date in the [[Chrome OS Configuration#Shared Devices|Shared Devices]] section.&lt;br /&gt;
*If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking%20a%20network%20access%20controller%20to%20the%20Opendium%20system|send RADIUS accounting data]] to the Opendium system.  Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''RADIUS''.  If 802.1x authentication cannot be used, Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''Single User Devices''.&lt;br /&gt;
*If you are using 802.1x and RADIUS accounting, log the device onto the network with the user's credentials.&lt;br /&gt;
*If you are not using 802.1x and RADIUS accounting, the user must use the captive portal to authenticate.&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS%20decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate:&lt;br /&gt;
&lt;br /&gt;
* Open and login to the Chromebook&lt;br /&gt;
* Open chrome web browser and navigate to the certificate location &amp;lt;UTM/Webgateway&amp;gt;/opendium.crt&lt;br /&gt;
* This will download the certificate to your chromebook, click show in folder to confirm the certificate has downloaded and where it is saved. by default this will be the downloads folder:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:3 Cert in downloads folder.png|alt=Certificate in downloads folder.|border|center|Certificate in downloads folder.]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* In the URI bar go to chrome://settings or click the three dots top right and click settings:&lt;br /&gt;
&lt;br /&gt;
[[File:4 chrome settings.png|border|center]]&lt;br /&gt;
&lt;br /&gt;
* Navigate to: Privacy and Security -&amp;gt; Security -&amp;gt; Advanced -&amp;gt; Manage Certificates &lt;br /&gt;
&lt;br /&gt;
[[File:Privacy and Security.png|border|center]]&lt;br /&gt;
[[File:Manage Certificate.png|border|center]]&lt;br /&gt;
&lt;br /&gt;
* Select the Authorities tab &lt;br /&gt;
&lt;br /&gt;
[[File:Certificate Authorities.png|border|center]]&lt;br /&gt;
&lt;br /&gt;
* Click Import and select opendium.crt if it isn't visible navigate to the location you downloaded the certificate to above.&lt;br /&gt;
&lt;br /&gt;
[[File:Certificate in downloads.png|border|center]]&lt;br /&gt;
&lt;br /&gt;
* Select at least &amp;quot;Trust this certificate for identifying websites&amp;quot; and click OK &lt;br /&gt;
&lt;br /&gt;
[[File:Trust certificate.png|border|center]]&lt;br /&gt;
&lt;br /&gt;
* Check the opendium certificate is in the authorities list by scrolling down the list. &lt;br /&gt;
&lt;br /&gt;
[[File:Check cert.png|border|center]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You should now be able to browse HTTPS sites without getting a security warning.&lt;br /&gt;
&lt;br /&gt;
==Shared Devices==&lt;br /&gt;
Coming Soon.&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=File:Check_cert.png&amp;diff=514</id>
		<title>File:Check cert.png</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=File:Check_cert.png&amp;diff=514"/>
		<updated>2024-11-07T12:40:56Z</updated>

		<summary type="html">&lt;p&gt;Chris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Check the certificate i in the authorities list&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=File:Trust_certificate.png&amp;diff=513</id>
		<title>File:Trust certificate.png</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=File:Trust_certificate.png&amp;diff=513"/>
		<updated>2024-11-07T12:39:55Z</updated>

		<summary type="html">&lt;p&gt;Chris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The trust certificate&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=File:Certificate_in_downloads.png&amp;diff=512</id>
		<title>File:Certificate in downloads.png</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=File:Certificate_in_downloads.png&amp;diff=512"/>
		<updated>2024-11-07T12:38:16Z</updated>

		<summary type="html">&lt;p&gt;Chris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Locate the downloaded certificate from above.&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=File:Certificate_Authorities.png&amp;diff=511</id>
		<title>File:Certificate Authorities.png</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=File:Certificate_Authorities.png&amp;diff=511"/>
		<updated>2024-11-07T11:25:34Z</updated>

		<summary type="html">&lt;p&gt;Chris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chrome OS Certificate Authorities settings page.&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=File:Manage_Certificate.png&amp;diff=510</id>
		<title>File:Manage Certificate.png</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=File:Manage_Certificate.png&amp;diff=510"/>
		<updated>2024-11-07T11:15:37Z</updated>

		<summary type="html">&lt;p&gt;Chris: Chris uploaded a new version of File:Manage Certificate.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ChromeOS settings - Manage certificates page.&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=File:Manage_Certificate.png&amp;diff=509</id>
		<title>File:Manage Certificate.png</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=File:Manage_Certificate.png&amp;diff=509"/>
		<updated>2024-11-07T11:01:15Z</updated>

		<summary type="html">&lt;p&gt;Chris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ChromeOS settings - Manage certificates page.&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=File:Privacy_and_Security.png&amp;diff=508</id>
		<title>File:Privacy and Security.png</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=File:Privacy_and_Security.png&amp;diff=508"/>
		<updated>2024-11-07T10:59:09Z</updated>

		<summary type="html">&lt;p&gt;Chris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Privacy and Security settings screen in ChromsOs&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=PSI_Secure_Browser&amp;diff=507</id>
		<title>PSI Secure Browser</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=PSI_Secure_Browser&amp;diff=507"/>
		<updated>2024-07-29T11:08:55Z</updated>

		<summary type="html">&lt;p&gt;Chris: /* Configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Status ==&lt;br /&gt;
We cannot guarantee that PSI Secure Browser will work through an Opendium system.  When a school reports problems using this software, we are usually able to work with them to adjust their configuration to allow it to work, but in our experience it is very likely to stop working again in the future.&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
Exams this year for the Psi Browser seem to need the following uri's in the Disable HTTPS Decryption override:&lt;br /&gt;
&lt;br /&gt;
psiexams.com&lt;br /&gt;
&lt;br /&gt;
ably.io&lt;br /&gt;
&lt;br /&gt;
ably-realtime.com&lt;br /&gt;
&lt;br /&gt;
You will also need to set the Twilio Video rule bundle to allow on the Egress tab under the Firewall for the users/subnets that are wanting to use the psi browser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Client configuration to consider: The user must be able to run the psi browser as administrator and be able to have access to a webcam and microphone.&lt;br /&gt;
&lt;br /&gt;
== Detail ==&lt;br /&gt;
PSI Secure Browser is a piece of software used by exam boards such as [https://abrsm.org ABRSM], to provide exams to students.  Unfortunately, schools are provided with very little information regarding firewalling and filtering changes that they need to make to allow PSI Secure Browser to work on their networks.&lt;br /&gt;
&lt;br /&gt;
Although there is a [https://helpdesk.psionline.com/hc/en-gb/articles/360055813952-RPNow-List-of-Websites-to-Whitelist-on-your-Anti-Virus-Applications whitelist available], this is not comprehensive and PSI Secure Browser appears to require access to a number of other hosts which are not listed on that website.  The whitelist also recommends whitelisting ''all'' content which is hosted through Amazon AWS.  As Amazon AWS hosts an enormous amount of content for all manner of organisations, including content which is unsafe, we believe that a school would be negligent were they to follow these recommendations.&lt;br /&gt;
&lt;br /&gt;
Whilst a network test service is available, this does not appear to comprehensively test all of the requirements for the exams, and we therefore have numerous cases of schools believing that everything is set up to work and then only discovering that it doesn't work when the exam starts.  There does not seem to be a way to comprehensively test that PSI Secure Browser will work for an exam until the exam is actually in progress.&lt;br /&gt;
&lt;br /&gt;
We have also identified bugs in PSI Secure Browser which result in it being left in a broken non-functional state if challenged for authentication by the proxy.&lt;br /&gt;
&lt;br /&gt;
Without comprehensive information regarding PSI Secure Browser's technical requirements, we have to reverse engineer it by examining its network traffic in order to create a configuration which will work.  Unfortunately, we have seen that its technical requirements frequently change, and therefore a configuration which works now will likely not work in the future.&lt;br /&gt;
&lt;br /&gt;
In order to produce a stable configuration that would allow this software to work, we would require a more comprehensive list of its technical requirements.  However, our attempts to open a dialogue with [https://www.psionline.com PSI] and to report the bugs in their software have been completely ignored.&lt;br /&gt;
&lt;br /&gt;
Whilst we recognise that schools have little choice but to use whatever software the exam boards dictate, we feel that schools should be feeding back these problems to the exam boards so that they can put pressure on the software vendors to behave responsibly.&lt;br /&gt;
&lt;br /&gt;
== Vendor Contact Log ==&lt;br /&gt;
The following log summarises discussions with PSI regarding the problems listed above.&lt;br /&gt;
&lt;br /&gt;
{{Contact Log Link|date=2022-03-24|summary=Reported to PSI}}&lt;br /&gt;
{{Contact Log Link|date=2022-05-25|summary=Reported to ABRSM}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Third Party Software Compatibility]]&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=File:4_chrome_settings.png&amp;diff=506</id>
		<title>File:4 chrome settings.png</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=File:4_chrome_settings.png&amp;diff=506"/>
		<updated>2024-07-18T11:15:15Z</updated>

		<summary type="html">&lt;p&gt;Chris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Navigate to chrome settings&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=File:3_Cert_in_downloads_folder.png&amp;diff=505</id>
		<title>File:3 Cert in downloads folder.png</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=File:3_Cert_in_downloads_folder.png&amp;diff=505"/>
		<updated>2024-07-18T11:09:44Z</updated>

		<summary type="html">&lt;p&gt;Chris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;default certificate location.&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=Apple_iOS_Configuration&amp;diff=503</id>
		<title>Apple iOS Configuration</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=Apple_iOS_Configuration&amp;diff=503"/>
		<updated>2024-04-02T13:50:53Z</updated>

		<summary type="html">&lt;p&gt;Chris: I have the instructions for installing the decryption certificate on the latest apple Ios.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== One-to-one devices ==&lt;br /&gt;
This section covers devices which are always used by the same user, such as devices deployed in a one-to-one arrangement or bring your own device.  Scroll down for information regarding [[Apple iOS Configuration#Shared devices|shared devices]].&lt;br /&gt;
&lt;br /&gt;
* If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking%20a%20network%20access%20controller%20to%20the%20Opendium%20system|send RADIUS accounting data]] to the Opendium system.  Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''RADIUS''.  If 802.1x authentication cannot be used, Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''Single User Devices''.&lt;br /&gt;
* If you are using 802.1x and RADIUS accounting, log the device onto the network with the user's credentials.&lt;br /&gt;
* If you are not using 802.1x and RADIUS accounting, the user must use the captive portal to authenticate.  iOS devices can automatically log in to the captive portal using the WISPr protocol whenever the device reconnects to the network.&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS%20decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate, either through an MDM or:&lt;br /&gt;
&lt;br /&gt;
* Launch Safari and browse to https://''&amp;lt;your Opendium host name&amp;gt;''/opendium.crt or scan the QR code that is displayed on the [[Web]] tab.&lt;br /&gt;
* A message pops up and asks if you want to allow the profile, click Allow.&lt;br /&gt;
* A message comes up that says you will need to install this profile through settings''.''&lt;br /&gt;
* Navigate to settings and there should be a Profile Downloaded section click this, this will disappear after 8 minutes and be deleted if not used, only 1 profile can be accessed in this way at a time(it will always be the most recent profile downloaded).&lt;br /&gt;
* Click the install option in the top right corner of the profile and follow the install wizard for the profile.&lt;br /&gt;
* On iOS 10.3 and above, go to Settings &amp;gt; General &amp;gt; About &amp;gt; Certificate Trust Settings and enable full trust for the Opendium certificate. This step is not required for earlier versions of iOS.&lt;br /&gt;
&lt;br /&gt;
== Shared Devices ==&lt;br /&gt;
This section covers devices which are shared between multiple users (one user logged in at a time), such as devices that are free for any student to use.&lt;br /&gt;
&lt;br /&gt;
* Configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking%20a%20network%20access%20controller%20to%20the%20Opendium%20system|send RADIUS accounting data]] to the Opendium system.&lt;br /&gt;
* Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''RADIUS''.&lt;br /&gt;
* Log the device onto the network with a user name that starts with &amp;quot;op-shared-&amp;quot;.  For example, &amp;quot;op-shared-tablet&amp;quot;.  This user must exist on the Opendium system.&lt;br /&gt;
* The user must use the captive portal to authenticate.&lt;br /&gt;
* When the user has finished with the device, they must disconnect from the wifi (i.e. turn wifi off on the device, shut down the device, or place the device in a shielded box/cupboard).&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS%20decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate.  This is usually done through your MDM system.&lt;br /&gt;
&lt;br /&gt;
Shared devices cannot be supported on networks which do not support 802.1x and RADIUS accounting.  If your network cannot support 802.1x, the only option is to disable [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]].&lt;br /&gt;
[[Category:Client Configuration]]&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=Android_Configuration&amp;diff=499</id>
		<title>Android Configuration</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=Android_Configuration&amp;diff=499"/>
		<updated>2024-02-27T16:09:36Z</updated>

		<summary type="html">&lt;p&gt;Chris: I have amended how to install a CA certificate for a stand alone android device.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Important note: compatibility with safeguarding obligations==&lt;br /&gt;
In July 2016, Google [https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html announced] that Android applications would no longer trust any certificates which are installed by the user.  This limitation cannot be overridden by the user, nor by the administrator of devices that are managed through an MDM.  This limitation does not ''currently'' affect web browsing from Android devices, but does make it impossible for most other apps to be appropriately filtered or monitored, beyond simply allowing or blocking the entire app.  This also introduces a significant administrative overhead, as it forces administrators to make a decision over which apps to allow through unfiltered, and to maintain lists of the services that must therefore not be decrypted.&lt;br /&gt;
&lt;br /&gt;
Despite numerous attempts by filtering suppliers and schools to open a dialogue with Google, Google has stated that this is the intended behaviour and that it will not be fixed.&lt;br /&gt;
&lt;br /&gt;
We firmly believe that schools cannot meet their statutory safeguarding obligations, to appropriately filter and monitor the children who are under their care, if they are not able to use HTTPS decryption technologies.  Through their hostility towards these important online safety technologies, Google are unnecessarily endangering children and creating significant liabilities for schools.  Unfortunately, we feel that '''we cannot recommend that schools purchase Android devices''', and that they should instead opt for Apple or Microsoft.&lt;br /&gt;
&lt;br /&gt;
We do acknowledge that, where Bring Your Own Device networks are concerned, schools do not have a choice over which devices are used.  We will always endeavour to provide the best possible support for all types of devices, no matter what the supplier's position is regarding online safety technologies.&lt;br /&gt;
&lt;br /&gt;
==One-to-one devices==&lt;br /&gt;
This section covers devices which are always used by the same user, such as devices deployed in a one-to-one arrangement or bring your own device.  Scroll down for information regarding [[Android Configuration#Shared devices|shared devices]].&lt;br /&gt;
&lt;br /&gt;
*If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking a network access controller to the Opendium system|send RADIUS accounting data]] to the Opendium system.  Set the [[Web: Permissions &amp;amp; Limits#User identification|User Identification]] mode to ''RADIUS''.  If 802.1x authentication cannot be used, Set the [[Web: Permissions &amp;amp; Limits#User identification|User Identification]] mode to ''Single User Devices''.&lt;br /&gt;
*If you are using 802.1x and RADIUS accounting, log the device onto the network with the user's credentials.&lt;br /&gt;
*If you are not using 802.1x and RADIUS accounting, the user must use the captive portal to authenticate.  Some devices can automatically log in to the captive portal using the WISPr protocol whenever the device reconnects to the network. Unfortunately WISPr has been patented by Apple and is therefore not supported by most Android devices.&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate, either through an MDM or:&lt;br /&gt;
&lt;br /&gt;
*Ensure that a lock screen PIN is configured on the Android device&lt;br /&gt;
*Launch Chrome and browse to https://''&amp;lt;your Opendium host name&amp;gt;''/opendium.crt or scan the QR code that is displayed on the [[Web]] tab.&lt;br /&gt;
*Once downloaded you will get a pop up message saying: &amp;quot;Install CA certificates in Settings - This certificate from null must be installed in Settings. Only install CA certificates from organisations that you trust&amp;quot; Select close&lt;br /&gt;
*Open Settings -&amp;gt; Security -&amp;gt; Encryption &amp;amp; Credentials -&amp;gt; Install a certificate.&lt;br /&gt;
*Select CA certificate: a message appears saying &amp;quot;Your data won't be private....snip....data is encrypted&amp;quot; select Install anyway&lt;br /&gt;
*Enter your pin or biometrics to install and locate the opendium.crt file you saved above, tap this and you should a message flash up saying &amp;quot;CA certificate installed&amp;quot;&lt;br /&gt;
*Tap back, and confirm the certificate is installed by clicking &amp;quot;Trusted credentials&amp;quot; then select User and you should see the opendium.crt there.&lt;br /&gt;
*The certificate should now be installed in the system and browsing to https pages no longer give you an insecure warning.&lt;br /&gt;
&lt;br /&gt;
Note that once the decryption certificate is installed, the device will always show a notification that states &amp;quot;Network may be monitored by an unknown third party&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==Shared devices==&lt;br /&gt;
This section covers devices which are shared between multiple users (one user logged in at a time), such as devices that are free for any student to use.&lt;br /&gt;
&lt;br /&gt;
*Configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking a network access controller to the Opendium system|send RADIUS accounting data]] to the Opendium system.&lt;br /&gt;
*Set the [[Web: Permissions &amp;amp; Limits#User identification|User Identification]] mode to ''RADIUS''.&lt;br /&gt;
*Log the device onto the network with a user name that starts with &amp;quot;op-shared-&amp;quot;.  For example, &amp;quot;op-shared-tablet&amp;quot;.  This user must exist on the Opendium system.&lt;br /&gt;
*The user must use the captive portal to authenticate.&lt;br /&gt;
*When the user has finished with the device, they must disconnect from the wifi (i.e. turn wifi off on the device, shut down the device, or place the device in a shielded box/cupboard).&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate.  This is usually done through your MDM system.&lt;br /&gt;
&lt;br /&gt;
Shared devices cannot be supported on networks which do not support 802.1x and RADIUS accounting.  If your network cannot support 802.1x, the only option is to disable [[Web: Permissions &amp;amp; Limits#User identification|User Identification]].&lt;br /&gt;
[[Category:Client Configuration]]&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=Apple_iOS_Configuration&amp;diff=498</id>
		<title>Apple iOS Configuration</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=Apple_iOS_Configuration&amp;diff=498"/>
		<updated>2024-02-26T11:21:10Z</updated>

		<summary type="html">&lt;p&gt;Chris: Removed &amp;quot;Ensure that a lock screen PIN is configured on the Android device&amp;quot; from Apple iOS Configuration page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== One-to-one devices ==&lt;br /&gt;
This section covers devices which are always used by the same user, such as devices deployed in a one-to-one arrangement or bring your own device.  Scroll down for information regarding [[Apple iOS Configuration#Shared devices|shared devices]].&lt;br /&gt;
&lt;br /&gt;
* If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking%20a%20network%20access%20controller%20to%20the%20Opendium%20system|send RADIUS accounting data]] to the Opendium system.  Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''RADIUS''.  If 802.1x authentication cannot be used, Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''Single User Devices''.&lt;br /&gt;
* If you are using 802.1x and RADIUS accounting, log the device onto the network with the user's credentials.&lt;br /&gt;
* If you are not using 802.1x and RADIUS accounting, the user must use the captive portal to authenticate.  iOS devices can automatically log in to the captive portal using the WISPr protocol whenever the device reconnects to the network.&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS%20decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate, either through an MDM or:&lt;br /&gt;
&lt;br /&gt;
* Launch Safari and browse to https://''&amp;lt;your Opendium host name&amp;gt;''/opendium.crt or scan the QR code that is displayed on the [[Web]] tab.&lt;br /&gt;
* Tap ''Install'' and enter the device's passcode.&lt;br /&gt;
* A warning will be shown that the certificate will be added to the list of trusted certificates. Tap ''Install.''&lt;br /&gt;
* A confirmation will be shown indicating that the certificate was installed. Tap ''Done.''&lt;br /&gt;
* On iOS 10.3 and above, go to Settings &amp;gt; General &amp;gt; About &amp;gt; Certificate Trust Settings and enable full trust for the Opendium certificate. This step is not required for earlier versions of iOS.&lt;br /&gt;
&lt;br /&gt;
== Shared Devices ==&lt;br /&gt;
This section covers devices which are shared between multiple users (one user logged in at a time), such as devices that are free for any student to use.&lt;br /&gt;
&lt;br /&gt;
* Configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking%20a%20network%20access%20controller%20to%20the%20Opendium%20system|send RADIUS accounting data]] to the Opendium system.&lt;br /&gt;
* Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''RADIUS''.&lt;br /&gt;
* Log the device onto the network with a user name that starts with &amp;quot;op-shared-&amp;quot;.  For example, &amp;quot;op-shared-tablet&amp;quot;.  This user must exist on the Opendium system.&lt;br /&gt;
* The user must use the captive portal to authenticate.&lt;br /&gt;
* When the user has finished with the device, they must disconnect from the wifi (i.e. turn wifi off on the device, shut down the device, or place the device in a shielded box/cupboard).&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS%20decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate.  This is usually done through your MDM system.&lt;br /&gt;
&lt;br /&gt;
Shared devices cannot be supported on networks which do not support 802.1x and RADIUS accounting.  If your network cannot support 802.1x, the only option is to disable [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]].&lt;br /&gt;
[[Category:Client Configuration]]&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=GoToAssist&amp;diff=489</id>
		<title>GoToAssist</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=GoToAssist&amp;diff=489"/>
		<updated>2023-05-26T13:59:19Z</updated>

		<summary type="html">&lt;p&gt;Chris: Created page with &amp;quot;== Status == GoTo Assist Remote access and screen Share(logmeinrescue): Fully working. Goto Webinar: Fully Working. GoTo Meeting: Fully working with additional configuration.  == Configuration == * Enable STUN on Egress to Everywhere, but this should be done on a subgroup of users/IPs not the whole site. * Ensure that the Disable HTTPS Decryption Override is enabled(required for all GoTo products listed above). Note: we recommend that this override is always enabled (thi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Status ==&lt;br /&gt;
GoTo Assist Remote access and screen Share(logmeinrescue): Fully working.&lt;br /&gt;
Goto Webinar: Fully Working.&lt;br /&gt;
GoTo Meeting: Fully working with additional configuration.&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
* Enable STUN on Egress to Everywhere, but this should be done on a subgroup of users/IPs not the whole site.&lt;br /&gt;
* Ensure that the Disable HTTPS Decryption Override is enabled(required for all GoTo products listed above). Note: we recommend that this override is always enabled (this is the default).&lt;br /&gt;
== Detail ==&lt;br /&gt;
Goto Meeting uses STUN on a peer to peer basis and so to get this working you need to allow STUN out to everywhere, this is more appropriate for specific subgroups as this protocol can be abused by VPN software.&lt;br /&gt;
&lt;br /&gt;
==Vendor Contact Log==&lt;br /&gt;
* 2023-04-18 Testing Carried out with GoTo customer support, all products tested and findings as above.&lt;br /&gt;
&lt;br /&gt;
[[Category:Third Party Software Compatibility]]&lt;/div&gt;</summary>
		<author><name>Chris</name></author>
	</entry>
</feed>