Network Settings

Cedato -

Click the three dot icon in the top left corner of the page to display a menu. 

Screen_Shot_2019-03-11_at_3.33.55_PM.jpg

Select Network Settings.

Screen_Shot_2019-03-11_at_3.43.09_PM.jpg

Network ID

The unique identifier for your network is shown at the top of the window.

Pre-Bid

Turning on the Filter Traffic from Anonymous IP Addresses option specifies that every opportunity that arrives from an identified anonymous IP address will not load Cedato's Player and requests to demand items won't be sent.

 

An anonymous IP address is a masked IP address. By using anonymous IP address an end-user prevents from the website and advertisers a genuine identification of its location.

 

Network_Settings-2.png

Post-Bid

Turning on the Opt-In Post-Bid Analysis option enables you to better understand and target your traffic by enabling access to –

  • The Quality and Viewability report that shows the percentage of invalid traffic and the viewability patterns of Supply and Demand items.
  • Traffic targeting options, such as Viewability Goaland IVT Goal.

The Post-Bid option enables you to send samples of your Ad Impression events to an external analysis tool (the provider is Moat) in order to detect and analyze suspicious traffic. It also enables you to receive viewability related measurements.

Click the Opt in Post-Bid Analysis slider to turn it on.

The following displays –

In the Impressions to Sample (%) field, you can define the percentage of impression traffic sampling by adjusting the slider by jumps of 10%. The percentage to sample can be – 10%, 20%, 30%, 40%, 50%, 60%, 70%, 80%, 90% or 100%.

Callback

A Callback is triggered by the events that you define in Cedato. When a Callback is triggered, it sends an indication of the event that occurred to an associated 3rd-party system containing data that is passed through the macros that you use.

Callbacks can be set for an entire Cedato Network or for specific Supply items or Demand items. If a Callback is defined for an entire Network, (as described below), then there is no need to define is for specific Supply items or Demand items.

For example, a Callback can be triggered each time a Cedato player is loaded or a video ad starts playing.

You can see Callbacks for more information.

To define a Callback –

  1. Display the Network Settings.
  2. In the Callbacks section, click + Add Callback.

Network_Settings-5.png

  1. Enter the Callback URL.
  2. This Callback URL is comprised of parameters and macros. These macros must be replaced with Cedato macros.

To display the list of available macros, click VIEW AVAILABLE MACROS. The following displays –

Network_Settings-6.png

From this list, copy the relevant macros into the URL.

Note – The DEMAND_ID and RPM macros are not relevant for the Player Ready event.

  1. From the dropdown menu, select the event that triggers the Callback so that it sends an indication of the event to the URL defined above –
  • Player Ready
  • Ad Start – Indicates an impression
  • Ad Complete
  • Ad Click – Indicates that the viewer has clicked the ad.
  • IVT Detection – % of impressions to be sent as a sample. This option is used to sample impressions in order to analyze and track IVT. The JavaScript callback enables the third-party vendor to analyze and provide data regarding the impressions on the vendors' platform. When an impression occurs, the traffic can be sent to any analysis tools for detecting invalid traffic. In the Impressions to Sample (%) field, specify the percentage of impressions you wish to sample in order to analyze. Because this type of Callback is typically a JavaScript, its domain and the URL itself must be a Cedato approved vendor domain. This list is handled by a Cedato Customer Success representative.
  1. You can define multiple Callbacks by clicking the +Add Callback option again, each being triggered by a different event; and up to two Callbacks for each event type, as shown below –

Network_Settings-7.png

Platform API key

This option enables you to generate an API access key to be used in order to connect to the Cedato API.

Encryption Key

The Cedato macro encryption uses a symmetric key algorithm. It uses an encryption key for the encryption and decryption of the relevant values, while authenticating the received data. For this purpose, use the key generated here. The encryption mechanism uses the AES-128 cipher in CBC mode and Base64 encoding to provide delivery via URL.

For further information on the algorithms and sample code, see 
Encryption Key for callbacks mechanism.pdf.

 

Have more questions? Submit a request

0 Comments

Article is closed for comments.