Page History
...
- The Security Architecture includes
- Secure Communication
- Certificate Management: Create and deploy certificates for secure network communication between components.
- Life Cycle Management: Create, update and delete certificates and deploy changes to components.
- Secure Configuration
- Configurations include workflows, jobs and related objects.
- Such objects are digitally signed and deployed by a responsible person.
- Secure Operation
- Access Management: Authentication and Authorization via LDAP Directory Service.
- Credential Management: Use of a Credential Store for confidential data.
- Secure Communication
- Wording
- The term Deployment applies to a situation that a configuration is transferred from JOC Cockpit to a Controller.
- The term Roll-out applies to a situation that a configuration is transferred between environments, e.g. from dev to test and to prodnon-production to production environments. Within the respective target environment a Deployment is performed to transfer configuration objects to Controllers and Agents.
...
- Network connections between components use the HTTPS protocol.
- Such connections are secured by x509 certificates, optional using mutual client and server authentication.
- Connections are established in one direction only.
...
Overview
Content Tools