User Guide
Table Of Contents
Figures..........................................................................................................................................4
Tables........................................................................................................................................... 5
Chapter 1: PREFACE..................................................................................................................... 6
Chapter 2: Legal disclaimers..........................................................................................................7
Chapter 3: Deployment models......................................................................................................8
Chapter 4: Product and Subsystem Security ................................................................................ 9
Security controls map.........................................................................................................................................................9
Authentication...................................................................................................................................................................... 9
Rest API security................................................................................................................................................................. 9
Login security settings....................................................................................................................................................... 9
User and credential management.................................................................................................................................. 10
Role and scope-based access.........................................................................................................................................10
Data security....................................................................................................................................................................... 13
Cryptography...................................................................................................................................................................... 13
Auditing and logging.......................................................................................................................................................... 14
Alerting............................................................................................................................................................................14
Chapter 5: Contacting Dell...........................................................................................................15
Contents
Contents 3