Changes for page eMagiz Security Guide
Last modified by Erik Bakker on 2024/08/20 08:53
From version 26.1
edited by Erik Bakker
on 2022/07/26 14:13
on 2022/07/26 14:13
Change comment:
There is no comment for this version
To version 21.1
edited by Erik Bakker
on 2022/06/13 13:37
on 2022/06/13 13:37
Change comment:
Deleted image "fundamental-emagiz-security-guide--data-orchestration.png"
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 2 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -73,7 +73,7 @@ 73 73 * Monitoring 74 74 * Notification options 75 75 76 -Making sure you are on the latest cloud template version guards yourself against vulnerabilities in older versions of Java and OS, for example. In addition, it gives the user more options for monitoring the health of the cloud environment reducing the risk of a loss of availability of data (promptly) without compromising the integrity of the data. For more information on what cloud templates are and how to control and update them, please check out this [ [microlearning>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagiz Cloud Management.novice-emagiz-cloud-management-cloud-templates-explained.WebHome||target="blank"]].76 +Making sure you are on the latest cloud template version guards yourself against vulnerabilities in older versions of Java and OS, for example. In addition, it gives the user more options for monitoring the health of the cloud environment reducing the risk of a loss of availability of data (promptly) without compromising the integrity of the data. For more information on what cloud templates are and how to control and update them, please check out this [microlearning](../microlearning/novice-emagiz-cloud-management-cloud-templates-explained.md). 77 77 78 78 ==== 3.2.5 Carwash ==== 79 79 ... ... @@ -117,7 +117,7 @@ 117 117 118 118 Support engineers can see more to analyze problems on a lower level. 119 119 120 -All other users don't have access to the cloud setup as there is no need for access because they can perform the relevant actions on the Cloud via the eMagiz portal. For more information on how please see the [ [eMagiz Cloud Management>>doc:Main.eMagiz Academy.Microlearnings.Novice.eMagizCloudManagement.WebHome||target="blank"]]course.120 +All other users don't have access to the cloud setup as there is no need for access because they can perform the relevant actions on the Cloud via the eMagiz portal. For more information on how please see the [eMagiz Cloud Management](../microlearning/novice-emagiz-cloud-management-index) course. 121 121 122 122 ===== 3.3.2.1 Rights for installing ===== 123 123 ... ... @@ -174,7 +174,7 @@ 174 174 175 175 ==== 3.5.2 API Gateway ==== 176 176 177 -A structure with roles and rights per role can be specified within the portal or via an external IDP to secure the front end of the API Gateway in eMagiz. For the backend of the API Gateway, the same logic applies as stated above for messaging, which means that eMagiz supports the industry standard. Therefore, you as a user should confer with the external party about the correct method.177 +A structure with roles and rights per role can be specified within the portal or via an external IDP to secure the front end of the API Gateway in eMagiz. 178 178 179 179 ===== 3.5.2.1 Portal ===== 180 180 ... ... @@ -182,19 +182,20 @@ 182 182 183 183 [[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--api-gateway-portal-feedback.png]] 184 184 185 -===== 3.5.2.2 (External)IDP =====185 +===== 3.5.2.2 External IDP ===== 186 186 187 -Apart from configuring the roles, users, and rights within the portal itself, it is also possible to hook the API Gateway up to an (external)IDP.187 +Apart from configuring the roles, users, and rights within the portal itself, it is also possible to hook the API Gateway up to an external IDP. 188 188 By communicating with this IDP via the OAuth2.0 protocol, a check is done every time a client calls a specific operation to see whether that client has sufficient rights to access the operation. 189 189 If the client has sufficient rights, the process continues. For example, if the client has insufficient rights, the client receives a 401 Unauthorized. 190 190 191 +For the backend of the API Gateway, the same logic applies as stated above for messaging, which means that eMagiz supports the industry standard. Therefore, you as a user should confer with the external party about the correct method. 191 191 192 - 193 193 ===== 3.5.2.3 Error handling ===== 194 194 195 195 To prevent the error message if it occurs is sent straight back to the client, you can configure the front end of the API Gateway, so that correct HTTP Status codes are given back to the client, including a descriptive message. 196 196 197 -For more information on how this precisely can be configured via the eMagiz platform, please check the following [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course API Gateway.crashcourse-api-gateway-configure-roles-and-users.WebHome||target="blank"]]. 197 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [microlearning](../microlearning/crashcourse-api-gateway-configure-roles-and-users.md) 198 + 198 198 ==== 3.5.3 Event Streaming ==== 199 199 200 200 Within the Event Streaming solution, eMagiz provides Event Streaming users, and topics can be created. ... ... @@ -206,7 +206,7 @@ 206 206 207 207 These are all security measures to prevent third parties from getting unauthorized access to the data stored on the topics. 208 208 209 -For more information on how this precisely can be configured via the eMagiz platform, please check the following [ [microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Event Streaming.crashcourse-eventstreaming-user-management.WebHome||target="blank"]].210 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [microlearning](../microlearning/crashcourse-eventstreaming-user-management.md) 210 210 211 211 === 3.6 eMagiz iPaaS Portal === 212 212 ... ... @@ -298,7 +298,7 @@ 298 298 299 299 ==== 3.8.4 Data management ==== 300 300 301 -For more information on the conceptual ideas behind data management within the eMagiz platform, you can look at this [fundamental](fundamental-traceability-in-emagiz.md). For more concrete information on how to implement it within an eMagiz flow you could check out this [ [microlearning>>doc:Main.eMagiz Academy.Microlearnings.AdvancedLevel.Data Management.advanced-data-management-data-sink.WebHome||target="blank"]]and this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.AdvancedLevel.Data Management.advanced-data-management-long-term-archiving.WebHome||target="blank"]]. All the information within the data sink and the long-term archiving solution is kept within the same VPC in the Cloud and can only be accessed by authorized parties.302 +For more information on the conceptual ideas behind data management within the eMagiz platform, you can look at this [fundamental](fundamental-traceability-in-emagiz.md). For more concrete information on how to implement it within an eMagiz flow you could check out this [microlearning](../microlearning/advanced-data-management-data-sink.md) and this [microlearning](../microlearning/advanced-data-management-long-term-archiving.md). All the information within the data sink and the long-term archiving solution is kept within the same VPC in the Cloud and can only be accessed by authorized parties. 302 302 303 303 === 3.9 Compliancy === 304 304
- fundamental-emagiz-security-guide--definition-emagiz-model.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ebakker - Size
-
... ... @@ -1,0 +1,1 @@ 1 +63.3 KB - Content
- fundamental-emagiz-security-guide--history-pages.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ebakker - Size
-
... ... @@ -1,0 +1,1 @@ 1 +22.5 KB - Content