Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

...

Introduction

  • The Security Architecture includes
    • Secure Communication
      • Certificate Management: Create and deploy certificates for secure network communication between components.
      • Life Cycle Management: Create, update and delete certificates and deploy changes to components.
    • Secure Configuration
      • Configurations include workflows, jobs and related objects.
      • Such objects are digitally signed and deployed by a responsible person.
    • Secure Operation
      • Access Management: Authentication and Authorization via LDAP Directory Service.
      • Credential Management: Use of a Credential Store for confidential data.
  • Wording
    • The term Deployment applies to a situation that when a configuration is transferred from JOC Cockpit to a Controller.
    • The term Roll-out applies to a situation that when a configuration is transferred between environments, e.g. from non-production to production environments. Within the respective target environment a Deployment is performed to transfer configuration objects to Controllers and Agents.

...