Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

For more information on SkySync and security please see the SkySync Security document.


image010.png


Info

Recommendations:

• Determine up front as part of your security design how SkySync will access the content you will ask it to transfer. Consider SkySync another “power user” in your organization manipulating content.
• Integrated Authentication scenarios can be tricky to configure due to Windows Service Identity and other (ultimately) permissions based issues.
• Avoid creating lots of connections by correctly defining security permissions, groups, and proxy users. SkySync works best with platforms that have rich API support for concepts such as On Behalf Of, setting time stamps, and methods of ownership preservation.

Summary

The purpose of this document was to provide SkySync customers with the background information and prescriptive guidance necessary to maximize transfer throughput while also minimizing the overhead of managing the SkySync solution.  The information in this document will be instrumental for organizations that are able to manage their own transfer jobs.  

...