Macromedia flash media server 2-managing flash media server ユーザーズマニュアル

ページ / 238
About privacy
231
Send sensitive data via HTTPS
  If you need to send sensitive data such as credit card 
information, you can use HTTPS to communicate simultaneously between your Flash client 
application and a separate application server that processes the data. To do this, use the 
ActionScript getURL command. (For more information, see the ActionScript 2.0 Language 
Reference
.) 
About privacy 
The technology in Flash Media Server enables the capture of client audio and video streams. 
When creating applications, it is your responsibility to comply with all applicable laws, rules, 
and regulations and to inform the user of privacy rights and your policies in situations such as 
when the application transports audio or video data across insecure channels or when audio or 
video data is being recorded for publication. 
Deploying secure applications
When you deploy a Flash Media Server application, it is important to take steps to ensure that 
your network is secure. 
In addition to the precautions taken during the application development process, you should 
deploy your media applications in a firewall-protected environment. Firewalls provide port-
based protection for your network and can be used to prevent connections to the network 
from specific IP addresses. 
You should take precautions when using log files to track server activity, since these files can 
consume large amounts of disk space over time. 
The following two sections describe these precautions in more detail.
About firewalls
firewall is a combination of hardware and software that controls the flow of information 
between networks, such as between a company intranet and the wider Internet. Firewalls 
provide port-based security, meaning they can be configured to allow certain media ports 
(1935, 80) to appear “outside” the firewall, making them accessible to external networks. 
The port that Flash Media Server uses should be behind a firewall if it’s being used only by 
users of a private network, such as a corporate intranet. The port should be accessible from 
outside the firewall if it’s meant to be accessible to outside users such as users of the Internet 
in general.