JITC
JOINT INTEROPERABILITY TEST COMMAND
HOME
Notice and Consent
Legal and Regulatory
ABOUT JITC
About JITC
Our Leaders
Our History
Organization
SERVICES CATALOG
RESOURCES
Registers
IBS
IBSL Register
GEOINT
Conformance
Extensions
DES
TRE
Field Value
PKE
Application Status
ECA Status
OCSP Testing Status
External PKI Testing Status
CCEB Partner PKI Testing Status
RMA
Product Register
UHF SATCOM
IBS CIB Register
IW Register
Legacy UHF SATCOM Register
Resources
IOP Steering Group (ISG) Resource Site
Labs
Projects
Tools
Rates
REFERENCES
Policies and Governance
JITC Publications
VISITOR SUPPORT
General Information
Fort Huachuca Information
Fort Meade Information
CONTACT US
JITC
JITC Webmaster
JITC PUBLIC KEY INFRASTRUCTURE (PKI)
Home
Labs
CAC
GDS
PKE
Application Testing
External Certification Authority Testing
Online Certificate Status Protocol Responder Testing
DoD PKI Interagency/Partner Interoperability Testing
DoD PKI CCEB/Partner Interoperability Testing
PKI
Obtaining Test Certificates
Obtaining Test Common Access Cards
PKI Lab Environment
Resources
Acronyms
Frequently Asked Questions
Online Resources
Terms and Definitions
Contact Us
Points of Contact
Request for Information
PUBLIC KEY ENABLED (PKE) - APPLICATION STATUS
Updated: 7/19/2021 10:10:15 AM
Attachmate Corporation, Reflection for the Web, version 9.6.044
Web Site
Attachmate Corporation
Status
NOT TESTED - Vendor released a new version.
Date Certified
N/A
Type/Supported Functions
Encrypted SSH.
Operating Systems Supported
Windows 2000 Advanced Server, Windows 2000 Professional, and Windows XP Professional.
Associated Software
Internet Explorer
Common Access Card Information
N/A
Application Description
Reflection for the Web is terminal emulation software that securely connects browser users to applications on IBM, HP, UNIX, OpenVMS, and Unisys hosts. With its strong authentication and encryption capabilities, you can safely deliver fully functioning host applications across the public Internet. More specifically, with Reflection’s secure token authorization feature, you can add an extra layer of protection to your host applications and integrate them into your modern security infrastructure. .
This description was provided by the vendor.
Back to Application Status Page
Top of Page