Page History
Info | ||
---|---|---|
| ||
Update for current features and configuration items required. |
Table of Contents |
---|
Scope
- The JobScheduler components are easy to install out-of-the-box. However, a number of configuration items have to be considered when operating the JobScheduler for a secure environment.
- Secure operation is applied at the following areas:
- Connection Management
- Network Connections
- Database Connections
- Access Management
- Authentication
- Authorization
- Credentials Management
- Database Credentials
- Job Credentials
- Connection Management
- Secure operation includes users configuring JobScheduler components in a compliance conformant way.
...
JobScheduler components use the following connections:
...
Network Connections
All network connections are unidirectional, as indicated by the direction of the arrows in the above diagram.
...
Overview
Content Tools