Page History
...
- To deploy configuration objects to a Controller in a given environment includes transfering transferring objects such as workflows and jobs.
- This step can be simplified for, for example, development environments, when frequent changes occur to configuration objects and deployments are performed with a single mouse click.
- This step can be more complex if sharing of responsibilities is included, for example, when rolling-out configuration objects from a development environment to a test or production environment. This situation is called a roll-out and is explained in the subsequent chapter.
- A secure deployment matches the security requirements in a given environment. Therefore the JOC Cockpit can be operated with different Security Levels.
- Security Levels "low" and "medium" allow simplified deployment and are suitable for environments with modest security requirements.
- Security Level "high" takes more effort and is targeted towards organisations organizations with more elaborate security requirements.
- Security Levels are put in place during the installation of the JOC Cockpit. Each instance of the JOC Cockpit can be only operated at a single Security Level. There is no fallback from a Security Level "high" to a "medium" or "low" security level. Changing the Security Level requires reinstalling JOC Cockpit.
...
Overview
Content Tools