Page History
...
- deployment of objects, e.g. workflows and jobs, is not subject to compliance requirements such as non-repudiation.
- HTTP connections are used that expose unencrypted communication between Controller and Agent and that are secured . Authentication is performed by hashed passwords.
Users who intend to operate a compliant and secure job scheduling environment should consider the below explanations for
- deployment of objects with digital signatures that can be used to restrict and to verify who deploys a given object such as a workflow.
- HTTPS connections that encrypt communication and that include mutual authentication by certificates without use of passwords.
...
Overview
Content Tools