To Do This:
The ENTIRE document tells us something about what browsers the web site will support and how they will support those browsers. The key parts are described as follows.
The overall Score is near the top and may have a message or two. This looks like the image below.
Review the protocols supported. This will change from time to time and only get stronger. As of Sept 2016, the PCI council and the browser makers (Google, Safari, Firefox, etc) are all pushing TLS. The minimum current safe browsing standards are TLS 1.1 or TLS 1.2. Anything lower means your web site is vulnerable to some web attack. TM Server is designed to only allow TLS 1.2 at this time - because of PCI.
Please ensure that only TLS 1.2 is enabled.
A little further down the report is a complete list of many different browsers. The list includes many older ones and all the current versions and tells you:
In general, IE 11 cannot distinguish the various security methods automatically like other browsers and need to be told to ignore SSL 2.0: |
If your customers ask, this may be their problem.
If a person cannot create an account with a specific email address within Theatre Manager web sales, it is for one of 3 reasons:
Unless you have changed messages in tmError.txt to the contrary, use the above checklist to check email address rejection.
The forgot my password web page shows this generic message. |
Can Theatre Manager actually distinguish amongst the types of errors above? yes it can - there are actually separate error messages in the tmError.txt for all these situations. However, they just happen to say the same thing 'Email address can't be used'
Why is that? The PCI council (Visa and Mastercard) make all the rules as to what kinds of applications are compliant. Theatre Manager is audited and approved by the PCI council to make sure we follow the rules of safe storage of their credit card data and safe online web sales following their prescribed audit cycles.
One of the rules concerns privacy. A web site should NOT give back any information about accounts and login credentials. The thinking is that if there is an easy way for a bad buy to find out which email addresses are in a system, they are half way there to logging in. Thats because people tend to use the same id's and passwords at many sites. So, if they've cracked another site, then its easier to infiltrate venues that give out this kind of knowledge.