System requirements for idgard® | idgard®

System requirements for idgard®

System requirements for idgard®

To use idgard®, you do not need to install additional software on your computer. You only need a browser. Check the following points to ensure that your computer is optimally configured for the use of idgard®:
  • To make working with idgard® easier, we recommend that you store the login mask as bookmarks/favorites in your browser.
  • We recommend using the following browsers: Mozilla Firefox, Google Chrome
  • JavaScript:  Must be enabled in the browser.
  • For a flawless data exchange with idgard®, you have to authorize the ports 80 (http) and 443 (https). If the connection to https pages is prohibited, you cannot use idgard®

The data stream into the Internet could be filtered within a company network in addition to a firewall by upstream proxy servers. Therefore, we recommend that you add https://my.idgard.de/ to the so-called white list of your systems. In this way, all information from and to idgard® will be transmitted unhindered.

This article did not answer your question?

We are happy to help you! Just send us a message with your questions and we will get back to you as soon as possible. 

   Create ticket


Disclaimer
The content of this online help is intended solely for information and documentation purposes for our product idgard® and can be changed at any time without prior notice. We assume no responsibility or liability for errors or inaccuracies. Due to technical developments, uniscon GmbH reserves the right to change the functional scope of the product at any time.

(C) uniscon GmbH






    • Recent Articles

    • Delete multiple users at the same time

      In the user administration, you can delete multiple user accounts at the same time using batch actions. Which users you can delete depends on your own permissions and on the permissions of the users whose user accounts you would like to delete. To ...
    • Change the user status for multiple users at the same time

      In the user administration, you can deactivate multiple activated user accounts or reactivate multiple deactivated user accounts at the same time. Regardless of which users you select, the batch options are only performed for those users for whom ...
    • Manage permissions for multiple users at the same time

      In the user administration, you can change permissions for multiple users at the same time. Which permissions you can grant or modify depends on your own permissions and on the permissions of the users whose user accounts you would like to edit. To ...
    • Modify user groups and notifications

      You can assign multiple users to the same user groups in the user administration. You can also edit the notification settings for multiple users at the same time. To assign multiple users to the same user groups at the same time, proceed as follows: ...
    • Batch actions

      You can perform actions for multiple users at the same time in the user administration. When you select one or multiple users in the user overview, the available batch options are displayed in the top bar. The user overview, filter, and search field ...
    • Related Articles

    • Requirements for executing a meeting pack

      Requirements for executing a meeting pack The " Meeting pack" feature is only available in the Enterprise package. Meeting packs are used for modern session management and digital collaboration. All documents required for the session are combined in ...
    • idgard® and cyber-attacks

      idgard® and cyber-attacks State-of-the-art technologies and procedures protect the idgard® system against external attacks. If hackers were able to break through this protection and gain access to the database, this would be totally useless, since ...
    • Performance, Scaling and Availability of idgard®

      Performance, Scaling and Availability of idgard® idgard® is created in such a way that all sessions are completely independent of each other. This allows them to be distributed freely among numerous servers, i.e. system scalability is largely linear ...
    • How to back up your data with idgard®.

      How to back up your data with idgard® idgard® customers are responsible for backing up their own data, since idgard® is primarily a communication system and not a data backup system. However, one can act on the assumption of continuous data ...
    • Buying idgard®

      Purchase via the test version/direct purchase The following instructions apply only to the Essential, Growth, and Enterprise license packages. If you have booked any other package, contact support. Write to support@idgard.com You have two different ...
    • Popular Articles

    • Uploading files

      Uploading files You can upload one or more files up to a size of 5 GB. For a fee, we can increase the size limit of 5 GB for you. You can only upload files with the "Write" permission. There are two methods with which you can upload files to a box. ...
    • Folder upload - behaviors and limitations

      Unsupported characters in file names will be replaced by an underscore during the upload process, this applies to these characters: *, /, \, ?, :, <, >, ^, ", &, | Example: M&A_Overview.xlsx will be renamed to: M_A_Overview.xlsx File names that ...
    • View box activities in the journal

      In data rooms and depending on the setting, certain activities can be registered in a journal. You can view the data room journal if you have the permission to do so. To view box activities in the journal: 1. Open the data room the journal of which ...
    • Welcome to the idgard® online help

      Welcome to the idgard® online help This online help is the main source of information for learning and working with idgard®. Click on one of the following links to obtain further information about idgard®. To use the online help: Search article Enter ...
    • Isn't encryption on the device the best bet for a safe cloud?

      Isn't encryption on the device the best bet for a safe cloud? The term „cloud computing“ encompasses two aspects: Data storage in a cloud for one’s self, excluding multiple or third-party access. Data processing or storage of information in a cloud, ...