-
## Release Info
Please provide information on what you want to be included in the Eclipse Tractus-X release.
If you are not owner of this issue, please provide the information as comment to the is…
-
## Release Info
Please provide information on what you want to be included in the Eclipse Tractus-X release.
If you are not owner of this issue, please provide the information as comment to the is…
-
## Release Info
Please provide information on what you want to be included in the Eclipse Tractus-X release.
If you are not owner of this issue, please provide the information as comment to the is…
-
## What is missing or needs to be updated?
Confusing structure, potentially superfluous content, lack of detail on other topics.
## How should this be resolved?
Even as one who is familia…
-
A reverse proxy is a service whose purpose is to provide an accessible endpoint for a 'back-end' service. Instead of accessing the back-end service directly, clients connect to the proxy which forward…
-
As discussed in #67, where threats to data flows are caused by issues in Client Channels (client-service relationships) there is a case for restricting the threat so they are only caused by Client Cha…
-
If a Client accesses a back-end Service via a transparent Proxy, and access to the Proxy is also controlled by an OAuth-style service, it must be because the OAuth-style service is also accessed via t…
-
In debugging issues with data flow threats, it became apparent that some are missed or found inappropriately because controls are missing. In many cases this is due to a bug in the CASetting, which sp…
-
**Description**
The Infrastructure Operators are essential components in the [new reconciler architecture](https://github.com/kyma-project/kyma/issues/13759). They are following the [K8s operator p…
-
At present, the domain model supports a model whereby a service can delegate access control to another service. This is specified in a system model by asserting that the second service 'controls' the …