Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Tokens are used to til designation of where the data can be put to or downloaded from.

Certifications

Encryption rules and credentials must be specified in special unit in organisation. This is partly treated in configuration of SLA data.