Remote Imports

Remote Imports is a new feature and free online service in Fenix 3. In simple terms, it's an advanced downloader/installer capable of securely retrieving prepared remote web content for use on the desktop.

There is a simple 3-step process for using remote content:

  1. Click the "Import to Fenix" Badge (See Fenix Badges to create a badge).
  2. Approve the Import.
  3. Start Coding!

1. Import to Fenix

For example, the following Github repository contains a web template using the Chassis layout engine. To use this, one would click on the "Import to Fenix" button.

2. Approve

Clicking the badge redirects to, the official import screen.

On-screen instructions highlight multiple ways to approve an import.

Windows and macOS both have options to approve or reject an import from their respective menus and a visual prompt is displayed in the Fenix interface, as shown below.

Once approved, the importer will prompt for preferences and any additional security requirements (see preferences for advanced security details).

3. Start Coding!

Once the import is complete, it's time to start coding. The new web server will be available immediately. You can even right/context-click on the web root to launch the editor of your choice.

Security & Usability

By default, Fenix Remote Imports requires user approval (as illustrated in the sections above). When approving an import, it is important users trust the source of the remote import since it will download content to the desktop. To prevent misuse, Fenix utilizes a robust OAuth-like security system, issuing extremely short lived access tokens with a complex nonce upon approval. These tokens can and often do change during the download process, making it difficult to intercept and act on a compromised connection. Fenix also does checksum matching to assure content arrives as intended. The final check is you. Users ultimately have the final decision when determining what will be downloaded to their desktop.

For those who prefer, remote imports can be disabled entirely.

While tight security measures are always recommended, there are situations where it may be counter-productive, such as a within a trusted corporate network or a personal home network. These options can be set in the preferences (shown below).

results matching ""

    No results matching ""