skip to main content
What's New in Corticon : What's new and changed in Corticon 5.6 : Deployment security: Authentication and encryption

Try Corticon Now

Deployment security: Authentication and encryption

When planning how you will deploy and manage Corticon Decision Services, you need to consider how to secure the deployments. When deploying Corticon, you can use the basic authentication and encrypted communication on your host application server to secure your deployment.
*Authentication requires anyone accessing a server to authenticate by supplying their username and password credentials. Implementing authentication lets you control which users can access a server and what actions they can perform. For example, a user might be able call a Decision Service but not to deploy one.
*Encryption enables confidential communication between a server and a client. Enabling HTTPS requires that you add your signed CA certificate to each server, and a CA client certificate on each of the clients that will access it.
Note: For detailed information on configuration and use of Corticon security features, see the topics under Secure servers with authentication and encryption
* Secure deployment of Decision Services
* Encrypt communication between Corticon components