Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • The Security Architecture includes
    • Secure Communication
      • Certificate Management: Create and deploy certificates for secure network communication between components.
      • Life Cycle Management: Create, update and delete certificates and deploy changes to components.
    • Secure Configuration
      • Configurations include workflows, jobs and related objects.
      • Such objects are digitally signed and deployed by a responsible person.
    • Secure Operation
      • Access Management: Authentication and Authorization via LDAP Directory Service.
      • Credential Management: Use of a Credential Store for confidential data.
  • Wording
    • The term Deployment applies to a situation that a configuration is transferred from JOC Cockpit to a Controller.
    • The term Roll-out applies to a situation that a configuration is transferred between environments, e.g. from dev to test and to prodnon-production to production environments. Within the respective target environment a Deployment is performed to transfer configuration objects to Controllers and Agents.

...

  • Network connections between components use the HTTPS protocol.
  • Such connections are secured by x509 certificates, optional using mutual client and server authentication.
  • Connections are established in one direction only.

...