This add-in implements Basic TLS Secure Transport Connection Profile of DICOM Standard which utilize the framework and negotiation mechanism specified by the Transport Layer Security Version 1.0 protocol. Any LEADTOOLS PACS Framework server service can be converted to use secure transport connection to provide protection against tampering, eavesdropping, masquerading by simply placing the add-in to the framework's server folder and configuring it. As for example, when router or proxy server need to accept images from remote PACS Client (resident on different geographic location) over the public internet connection, just copying the Leadtools.AddIn.Security.dll to C:\LEADTOOLS 20\Bin\Dotnet\Win32\L19_SERVER32\AddIns\ folder and configuring the certificates will add secure communication capabilities to the router server.
This add-in provides support for following areas of Basic TLS Secure Transport Connection Profile of DICOM standard:
Privacy - Triple DES EDE, CBCSecurity Icon - Double click on this icon from PACS Server Manage while L19\_SERVER32 is selected to access the following security add-in options dialog to configure.
Maximum Verification Depth: Maximum allowed depth of certificate chain from root certificate to be verified.
SSL Method Type: Select one of the SSL method type to be used for security verification from the drop down list.
Verification Flags: Select one or more the verification mode to be used from the drop down list.
Verification Options: Select one of more additional options for verification mode from the dropdown list.
The C# sample project for add-ins used in this server is located in <LEADTOOLS 20>\Examples\PACSFramework\CS\Sample AddIns\ folder
Add-in Runtime DLLs:
All runtime versions of add-ins are in <LEADTOOLS 20>\Bin\Dotnet\Win32\L19_SERVER32\AddIns\ folder.
A copy is also stored in <LEADTOOLS 20>\Bin\Dotnet\Win32\PACSAddIns\ folder.
Note: The path of the source code for this binary is <INSTALLDIR>\Examples\PACSFramework\CS\Sample AddIns
Medical Web Viewer .NET