Homepage | About EASA | Contact
The number of individual machines in an EASA system is determined by:
EASA System Architecture outlines various use cases.
EASA Hardware Requirements provides a detailed specification for each machine role.
System Software Requirements outlines which Windows or linux versions are supported under EASA, install one of these operating systems.
EASA is written in Java which gives a high degree of cross-platform portability.
Many customers install EASA on a Microsoft Windows system simply because their IT department already supports it.
EASA should be installed after any necessary third-party software is installed.
This includes:
After step 1. and step 2. → Install the EASA System
By default an EASA Server will communicate with other machines and with a browser using HTTP.
To encrypt network traffic follow the steps in:
By default an EASA Server is accessed from a browser and requires a User, Author or Administrator manually login.
The two default login:password pairs are below:
Two additional authentication technologies are available:
There are a number of software tools as well as hardware infrastructure that preserve the data integrity of an EASA installation.
<SERVERDATA> contains all customer-related data; this data cannot be recovered if lost
<EASAROOT> is the actual EASA software and may be regenerated by a re-installation.