Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Minor correction to text

...

  • Compliance:
    • All sensitive configuration information is encrypted.
    • Access to the Credential Store can be securely protected by password, key file or password and key file - .
      "passwordPassword-free" authentication is possible.
    • Connection Authentication files such as public key files are used without being written to the file system.
  • Management
    • Configuration information can be centrally managed outside of a file transfer environment.
  • Deployment
    • The same file transfer configuration file can be used for development and production environments - only the Credential Store needs to be changed during deployment.
  • Scope
    • The Credential Store can be used for the following configuration information:
      • file transfer source, target, proxy and  jump host / DMZ,
      • pre- and post-processing operations.
    • The Credential Store can be used for file transfers carried out with both the YADE Client and the JobScheduler JADEJob and JADE4DMZJob JITL jobs.

...