Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info
titlearticle to be reworked

Update for current features and configuration items required.


Table of Contents

Scope

  • The JobScheduler components are easy to install out-of-the-box. However, a number of configuration items have to be considered when operating the JobScheduler for a secure environment.
  • Secure operation is applied at the following areas:
    • Connection Management
      • Network Connections
      • Database Connections
    • Access Management
      • Authentication
      • Authorization
    • Credentials Management
      • Database Credentials
      • Job Credentials
  • Secure operation includes users configuring JobScheduler components in a compliance conformant way.

...

JobScheduler components use the following connections:


...


Network Connections

All network connections are unidirectional, as indicated by the direction of the arrows in the above diagram.

...