...
- Compliance:
- All sensitive configuration information is encrypted.
- Access to the Credential Store can be securely protected by password, key file or password and key file - .
"passwordPassword-free" authentication is possible. - Connection Authentication files such as public key files are used without being written to the file system.
- Management
- Configuration information can be centrally managed outside of a file transfer environment.
- Deployment
- The same file transfer configuration file can be used for development and production environments - only the Credential Store needs to be changed during deployment.
- Scope
- The Credential Store can be used for the following configuration information:
- file transfer source, target, proxy and jump host / DMZ,
- pre- and post-processing operations.
- The Credential Store can be used for file transfers carried out with both the YADE Client and the JobScheduler JADEJob and JADE4DMZJob JITL jobs.
- The Credential Store can be used for the following configuration information:
...