Before You Use Webtrends Optimize

Before you can use Webtrends Optimize® for website testing, you must install the Webtrends tag (a JavaScript file) to your web server and arrange for all pages you want to control to invoke the script. You must also install the Webtrends Optimize Editor Tools browser extension to enable page loading and interactions with the content.

About the Webtrends Tag

The Webtrends Tag
The Webtrends tag is a JavaScript file that must be installed on your website’s server. The tag enables Webtrends Optimize to make the necessary changes to site elements for testing variations. Webtrends Optimize will warn you if the tag is not installed.
JavaScript link
Every page that Webtrends Optimize modifies must have an include link to the JavaScript tag file. Typically, your Account Manager has already tagged the pages before you see them. Contact your Account Manager to confirm the installation.
Credentials
Your Account Manager provides you credentials via email. If you forget or lose your credentials, contact your Account Manager.

Browser extensions

Webtrends Optimize Editing Tools browser extension is a required component that enables the visual editor to load pages and interact with content. Besides enabling basic editing capabilities, the extension also overcomes hurdles that often times prevent pages from loading in editing tools and will be used to deliver advanced capabilities that leverage browser technologies.

Browser support

Webtrends will continually evaluate the set of supported browser extensions. Currently, browser support includes:

  • Google Chrome version 23 or higher
  • Mozilla Firefox version 50 or higher (available in Feb 2017)

These extensions are made available directly through the Chrome Web Store and the Mozilla Add-ons site. (If you are unable to install extensions directly through these sites, please contact Webtrends technical support for alternate installation methods.)

Installing the extensions

Chrome makes it simple to install the Webtrends extensions.

To install the Chrome extension:

  1. Click here to view the extension on the Chrome Web Store.
  2. Click on the “+ Add to Chrome” button. (This will install and enable the extension into your Chrome browser. You should see this Webtrends icon  128x128-webtrends-avatar-2016 appear in the browser toolbar.)
  3. Choose Window>Extensions from your Chrome menu.
  4. Locate the “Webtrends Optimize Editing Tools” extension on the page.
  5. Click the checkbox next to “Allow access to file URLs.”

That’s it!

Using the extension settings

If you click on the extension icon in the toolbar, you will see two toggles as shown below:

2016-12-18_20-14-24

  • Enable editing tools simply allows you to conveniently turn the extension on/off. You may want to disable the editing tool to edit tests or targets created using the visual editor prior to the availability of the browser extensions.
  • Allow content in iframes provides enhanced support to disable JavaScript methods that would prevent content from loading in a visual editor. Visual editors commonly load content in iframes and many sites try to “bust” out of iframes to prevent other sites from appropriating their content. Only enable this option if your pages fail to load or if your web developers are employing iframe-busting on your site.

Enabling mixed content

Webtrends Optimize is loaded using an HTTPS where the connection is authenticated and encrypted with SSL to safeguard from eavesdropping and hijacking sessions.  Mixed content refers to situations where HTTPS pages include HTTP content. In these cases, the HTTP content can be read or modified by hackers. Because the visual editor uses an HTTPS connection, when you attempt to load a page using an HTTP connection within the visual editor your browser may return a mixed content warning and prevent the page from loading. In these cases, you will see the following:

2016-12-18_20-18-49

Note: Before you continue, engage your web developers to understand the nature of the mixed content warning. If the issue is caused by code that is not secure, the issue should be addressed. If the issue is simply loading HTTP content into the secure HTTPS visual editor session, you may continue building your test or target

To continue editing when you encounter mixed content warnings:

  1. Click on the shield icon shown in the address bar to display the page alert.
  2. Click “Load unsafe scripts” in the alert popup. The visual editor will reset your session so you can securely build your test or target.
  3. You should see the protocol change in address bar the next time you encounter the page with the mixed content showing this:
    2016-12-18_20-30-28

Note: Using this method, you are only overriding the warnings for the duration of the browser session. If you frequently run across mixed content warnings when testing you your site, you can create a shortcut that will launch your browser without the mixed content warnings enabled. Please check with your IT department to ensure this does not violate organizational security policies.

To create a Chrome shortcut that will prevent mixed content warnings when the browser loads:

  • For Mac:
    1. Open the Terminal application and enter
      “echo “/Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome –user-data-dir=/tmp/tempchrome –allow-running-insecure-content –incognito &” > /Applications/Insecure\ Chrome.command && chmod +x /Applications/Insecure\ Chrome.command”
    2. Within your Applications folder and double-click the shortcut to open your browser in Incognito mode.
      Note: You should only use this browser instance with the Webtrends Optimize visual editor and avoid malicious sites.
  • For Windows:
    1. Create a Chrome shortcut.
    2. Right-click on the shortcut and select “Properties” from the menu.
    3. Edit the Target field to show “chrome.exe –allow-running-insecure-content”.
    4. Click “OK”.
    5. Double-click the shortcut to open your browser in Incognito mode.
      Note: You should only use this browser instance with the Webtrends Optimize visual editor and avoid malicious sites.