Version 2 (modified by pjkersha, 14 years ago) (diff)


Data Provider Deployment

This page explores how a Data Provider deploys and configures NDG Security. A Use Case?] looks at the steps in this process.

Deployment Diagram

This illustrates a possible configuration for deployment of the required components and services



  • Data Provider serves user roles via tables in a user database
  • The Credential Repository is implemented as a database
  • User database and Credential Repository reside on the same server
  • Security Web Services reside on the same host