You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
« Previous
Version 2
Next »
Introduction
Scope & Objectives
The purpose of this document is to describe the architecture of Icertis Contract Intelligence application and the systems it will be integrating with.
Key Decisions and Requirements
| Description | Rationale |
|---|
| Single Sign-On (SSO) | As part of SyWay project, a common authentication mechanism (e.g., SAML) is adopted for ease of access and unified user experience. |
| Users must access Icertis using HTTPS. | As part of SyWay standards, all data in transit must be encrypted. |
| Data stored in Icertis must be encrypted. | As part of SyWay standards, all data at rest to be encrypted. |
| Icertis must have appropriate data protection. | Icertis performs data backups regularly so that point in time recovery can perform to recover data. Additional, backups must be replicated to another site to protect against a site disaster. |
|
|
|
|
Terminology
Application Architecture
Overview
Application Architecture Components
SAP Web Dispatcher
SAP Cloud Connector
Data Provisioning Agent
SAP Analytics Cloud (SAC) Agent
OpenText Connector
System Landscape
| Application | Region | SBX | DEV | INT | UAT | PAR | TRG | PROD |
|---|
ICertis
| EU | - | DEV | Test | DEV | PRD |
| US | - | - | Test | PRD |
Application Security
Authentication
Authorisation
Communication Security
Data Security
Other Controls
Operation Architecture
Change and Configuration Management
Monitoring
Sizing
High Availability & Disaster Recovery
Backup/Restore
Maintenance Plan
See also
No files shared here yet.