Version 2 (modified by pjkersha, 14 years ago) (diff) |
---|
Data Provider Deployment
This page explores how a Data Provider deploys and configures NDG Security. A Use Case?] looks at the steps in this process.
Deployment Diagram
This illustrates a possible configuration for deployment of the required components and services
Assumptions
- Data Provider serves user roles via tables in a user database
- The Credential Repository is implemented as a database
- User database and Credential Repository reside on the same server
- Security Web Services reside on the same host