HP Device Manager 4.5 - Security Mechanism
Technical white paper
HP Device Manager
Security Mechanism
Table of contents
Executive summary ...................................................................................................................................................................... 2
Database confidential .................................................................................................................................................................. 2
File repository confidential .......................................................................................................................................................... 2
HPDM logon confidential ............................................................................................................................................................. 2
Confidential data in log files ........................................................................................................................................................ 2
User management ........................................................................................................................................................................ 2
Authentication management ...................................................................................................................................................... 3
Key management ...................................................................................................................................................................... 3
Master Repository Controller access control ...................................................................................................................... 3
Gateway access control ........................................................................................................................................................... 3
Network communication ............................................................................................................................................................. 3
Secure file server ........................................................................................................................................................................... 4
Task verification ............................................................................................................................................................................. 4
For more information ................................................................................................................................................................... 5