1.4 Determining Customization Requirements

There are a number of ways to customize the Reflection sessions, settings, and installation:

  • Create and Customize Reflection Sessions that include settings required to connect to specific hosts. You can set up traditional telnet connections or secure connections for SSL/TLS, SSH, Kerberos, SOCKS or HTTP proxy servers. You can also configure Reflection Sessions to use custom settings such as custom keyboard and mouse maps.

  • Customize the Reflection Workspace to change it’s appearance and functionality or to lock down access to settings and controls.

  • Customize to Protect Data and Information Privacy to define locations from which you can safely open (and store) documents, mask sensitive data (such as credit card numbers), or control access to the Reflection API.

  • Customize the Installation to create transforms (.mst files) that customize how Reflection is installed on user workstations.

NOTE:Reflection saves settings in custom configuration files. After you create the custom settings, you will need to package and deploy the configuration files you create as shown in Package Sessions and Custom Settings Files.

If you create a transform to customize the installation, you’ll need to deploy the transform with the base installation.