Previous Topic: About Touchpoint SecurityNext Topic: Limit Access to Hosts with Sensitive Information


Use Cases: When Touchpoint Security is Necessary

Touchpoint security is necessary in the following cases:

Touchpoint Security is also useful for process designers. During process development, different designers install an agent on their personal hosts and create touchpoints for their agents. They typically do not want other users running operators on their local hosts. Touchpoint Security can provide this protection. When Touchpoint Security is configured to be active, authorization to run each operator on the selected target is verified at run time. Policy enforcement restricts users who run a process to running operators only on touchpoints for which they are authorized.