The article called "An Overview of System Security" contains the following diagram.
I wrote then
"It is likely that an implementation will require you to think about how users will access the system from beyond the corporate network. In these…
I have installed a CRM instance without HTTPS or proxy option selected.
The instance is installed on a server which is then linked to a DMZ.
The person that installed the DMZ has done it in order to encrypt HTTP requests because my CRM is not…