Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Tokens are used to til designation of where the data can be put to or downloaded from.

Issuing of token are alsways done by client in client/pillar communications.

Certifications

Encryption rules and credentials must be specified in special unit in organisation. This is partly treated in configuration of SLA data.