Security Configuration for AVEVA Mobile Operator
- Last UpdatedJul 08, 2024
- 1 minute read
The table below lists the security areas that you need to configure for AVEVA Mobile Operator and the details of the section(s) in this guide that provide the corresponding instructions.
|
Security Area(s) |
Topic(s) in this guide |
Summary |
|
Securing Communication between the Client and Server |
User need to use the security certificates for the communication. |
|
|
Securing Communication between the Client and Server |
Security Requirements in the Chapter: Hardware & Software Requirements of the AVEVA Mobile Operator System Requirements Guide. |
User must configure TLS 1.2 in their system to secure the communication between the Client and Server. |
|
Securing Systems through Authentication and Authorization |
Authentication and Authorization Based Security in the Chapter: Hardware & Software Requirements of the AVEVA Mobile Operator System Requirements Guide. |
User need to authenticate and authorize. |
|
General Considerations for Security |
Security Requirements in the Chapter: Hardware & Software Requirements of the AVEVA Mobile Operator System Requirements Guide. |
User must understand the various security recommendations for this product. |