Click the three dot icon in the top left corner of the page to display a menu.
Select Network Settings.
The unique identifier for your network is shown at the top of the window.
Turning on the Filter Traffic from Anonymous IP Addresses option specifies that every opportunity that arrives from an identified anonymous IP address will not load Cedato's Player and requests to demand items won't be sent.
An anonymous IP address is a masked IP address. By using anonymous IP address an end-user prevents from the website and advertisers a genuine identification of its location.
A Callback is triggered by the events that you define in Cedato. When a Callback is triggered, it sends an indication of the event that occurred to an associated 3rd-party system containing data that is passed through the macros that you use.
Callbacks can be set for an entire Cedato Network or for specific Supply items or Demand items. If a Callback is defined for an entire Network, (as described below), then there is no need to define is for specific Supply items or Demand items.
For example, a Callback can be triggered each time a Cedato player is loaded or a video ad starts playing.
You can see Callbacks for more information.
To define a Callback –
- Display the Network Settings.
- In the Callbacks section, click + Add Callback.
- Enter the Callback URL.
- This Callback URL is comprised of parameters and macros. These macros must be replaced with Cedato macros.
To display the list of available macros, click VIEW AVAILABLE MACROS. The following displays –
From this list, copy the relevant macros into the URL.
Note – The DEMAND_ID and RPM macros are not relevant for the Player Ready event.
- From the dropdown menu, select the event that triggers the Callback so that it sends an indication of the event to the URL defined above –
- Player Ready
- Ad Start – Indicates an impression
- Ad Complete
- Ad Click – Indicates that the viewer has clicked the ad.
- You can define multiple Callbacks by clicking the +Add Callback option again, each being triggered by a different event; and up to two Callbacks for each event type, as shown below –
Platform API key
This option enables you to generate an API access key to be used in order to connect to the Cedato API.
The Cedato macro encryption uses a symmetric key algorithm. It uses an encryption key for the encryption and decryption of the relevant values, while authenticating the received data. For this purpose, use the key generated here. The encryption mechanism uses the AES-128 cipher in CBC mode and Base64 encoding to provide delivery via URL.
For further information on the algorithms and sample code, see
Encryption Key for callbacks mechanism.pdf.
Was this article helpful?
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
We appreciate your effort and will try to fix the article