Client and Server Security Options
  • 28 Mar 2024
  • 1 Minute to read
  • Contributors
  • Dark
    Light
  • PDF

Client and Server Security Options

  • Dark
    Light
  • PDF

Article summary

Syniti Replicate can be used in several different configurations, and each configuration has different data security needs. In the descriptions below, Syniti Replicate client can be either an installation of the Management Center or an application using the Syniti Replicate API to control the Replication Agent.

Syniti Replicate Client and Server Agent on a Single System

Security threats are typically not present, so Anonymous Authentication is appropriate, unless you want to define user IDs control access to Syniti Replicate tools. In this case, Windows authentication may be appropriate because it does not require the installation of an X.509 certificate. Syniti Replicate uses TCP/IP as a protocol for both Anonymous Authentication and Windows Authentication.

Syniti Replicate Client and Server Agent in an Intranet Trusted Environment

This type of environment would include the situation where an additional Management Center is installed on a second system within a secure intranet for monitoring or use by a second user. Security threats are typically not present, so Anonymous Authentication is appropriate, unless you want to define user IDs control access to Syniti Replicate tools. In this case, Windows authentication may be appropriate because it does not require the installation of an X.509 certificate. Syniti Replicate uses TCP/IP as a protocol for both Anonymous Authentication and Windows Authentication.

It is also possible to establish UserName Authentication, setting up user IDs and passwords specific to Syniti Replicate. However, UserName authentication also requires the installation of a X.509 security certificate on the system where the Server Agent is installed. Choose TCP/IP as the protocol in this scenario.

Syniti Replicate Client and Server Agent in an Internet Environment

The Server Agent and the Syniti Replicate client application, a custom application using the Syniti Replicate API, for example, run on different servers over the internet. In this case, communication occurs over a firewall and messages may be redirected over channels which are not securable. The recommended authentication modes are UserName or Certificate Authentication, using the HTTP protocol to cross the firewall.

Userr Name authentication requires the installation of a X.509 security certificate in the server environment.

Certificate Authentication requires the installation of a X.509 security certificate in the client and server environments.

Related Topics

Installing a Certificate

User Settings Dialog


Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence