Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • To deploy configuration objects to a Controller in a given environment includes transfering transferring objects such as workflows and jobs.
  • This step can be simplified for, for example, development environments, when frequent changes occur to configuration objects and deployments are performed with a single mouse click.
  • This step can be more complex if sharing of responsibilities is included, for example, when rolling-out configuration objects from a development environment to a test or production environment. This situation is called a roll-out and is explained in the subsequent chapter.
  • A secure deployment matches the security requirements in a given environment. Therefore the JOC Cockpit can be operated with different Security Levels.
    • Security Levels "low" and "medium" allow simplified deployment and are suitable for environments with modest security requirements.
    • Security Level "high" takes more effort and is targeted towards organisations organizations with more elaborate security requirements.
  • Security Levels are put in place during the installation of the JOC Cockpit. Each instance of the JOC Cockpit can be only operated at a single Security Level. There is no fallback from a Security Level "high" to a "medium" or "low" security level. Changing the Security Level requires reinstalling JOC Cockpit.

...