How is data in motion encrypted between Spotfire Server and Analyst client / the iPad client / a web browser, backend nodes, JDBC data source?

How is data in motion encrypted between Spotfire Server and Analyst client / the iPad client / a web browser, backend nodes, JDBC data source?

book

Article ID: KB0083763

calendar_today

Updated On:

Products Versions
Spotfire Server All supported versions

Description

Data which is flowing between TIBCO Spotfire Server and multiple other components (i.e., Analyst client / the iPad client / a web browser, backend nodes, JDBC data source) can be protected by the methods outlined in this article.

Issue/Introduction

How is data in motion encrypted between Spotfire Server and Analyst client / the iPad client / a web browser, backend nodes, JDBC data source?

Environment

All supported environments.

Resolution

1). Data flowing between the Spotfire Server and the Spotfire Analyst client, the iPad client, or a web browser may be protected using HTTPS as described in the documentation at the following link:

     https://docs.tibco.com/pub/spotfire_server/7.9.0/doc/html/TIB_sfire_server_tsas_admin_help/GUID-2186516B-021E-434B-A5CE-565E4BD44EBD.html

2). Data flowing between the Spotfire Server and backend nodes (the Node Manager or the Web Player or Automation Services services) is always protected using HTTPS (TLSv1.2 or TLSv1.1 using AES in CBC mode - with SHA or SHA-256, depending on what is supported by the machine running the backend services).

3). Data flowing between a JDBC data source and the Spotfire Server (when using Information Services) can usually be encrypted, but exactly how to do this depends on the database and the database driver. The following online references provide examples on how to configure this for the Oracle driver and a DataDirect driver:

     http://docs.oracle.com/cd/E11882_01/java.112/e16548/clntsec.htm#JJDBC28318

     http://media.datadirect.com/download/docs/jdbc/alljdbc/help.html?_ga=1.239665411.1605012767.1448478052#page/jdbcconnect%2Fdata-encryption-and-data-integrity.html%23