This document does NOT contain
requirements for TestNav online test delivery
. For TestNav hardware and software requirements
The minimum requirements for all workstations accessing PearsonAccessnext are listed below.
Windows: 7 (with Service Pack 1)
|OS X/macOS: 10.9, 10.10, 10.11, 10.12|
OS X/macOS : 10.9, 10.10, 10.11, 10.12
OS X/macOS: 10.9, 10.10, 10.11, 10.12
The current release version for both Firefox and Chrome at the time of our software's release are tested and supported. Newer release versions of Firefox and Chrome
may work; however,
Pearson does not recommend software or technology changes during an online test administration.
If you are precaching content, do not use Chrome. Starting with Chrome 45, support for the Java Plugin has been discontinued. Chrome on OS X is only supported for Intel hardware.
Intermediate Network Devices
contains guidelines for schools using firewalls and proxy servers
while accessing only the PearsonAccessnext domain
Customers using a firewall
to limit Internet access must allow the following destination/protocol/port combinations
Many school districts use proxy servers in their network environments. Proxy servers are placed between client nodes and the Internet and are used to forward requests from internal nodes to the Internet. Proxy servers may perform some or all of the following functions:
- Protocol Filtering to control which protocols are forwarded to the Internet
- User Authentication to control who can access the Internet
- Machine Authentication to control which workstations can access the Internet
- Content Filtering to control which Internet content users can access
- Content Caching to speed up access for frequently visited sites
In order for an application to access the Internet in a proxy server environment, the application must know the hostname and port number of the proxy server. Once the application is made aware of the proxy server, it sends all requests for network services to the proxy server for processing. The proxy server receives the incoming requests and must determine what to do with them. If all of the functions listed above have been implemented, the proxy server will:
- Verify that the protocol of the request is serviceable (for example ICMP, UDP, may be blocked by the proxy server).
- Ask user to authenticate that the proxy server does not already recognize the user as being logged in.
- Verify that the source address of the request is on the list of allowed workstations.
- Verify that the requested network object is not blocked by an Internet content filter. (Most Internet content filter vendors provide lists of sites organized by category that administrators can decide to block or allow.)
- Check the proxy server’s local disk to see whether the requested object exists in cache. (If the object is in cache, the proxy server will send it directly to the requestor without having to access it from the Internet.)
Assuming that the request passes all of the above steps, the proxy server then stores a record of the request in memory and issues its own request for the same object out to the Internet. When the reply returns to the proxy server, the server matches the reply to the original request stored in memory and forwards the reply to the original requestor.