Skip to main content
Skip to search
Library
Using This Site
Using this site
Search tips and operators
My Topics
Following topics
Save PDF options
Feedback
Register
Login
Italiano/Italian
English
Deutsch/German
Español (LatAm)/Spanish
Français/French
日本語/Japanese
한국어/Korean
Português (Brasil)/Portuguese
Italiano/Italian
Pусский/Russian
简体中文/S. Chinese
繁體中文/T. Chinese
More Sites
A-People
Pathfinder Community
Corporate
Training
Partner Portal
Bot Store
Automation 360
Contents
Expand
Collapse
Explore
About Automation 360
Control Room overview
Distributed architecture
Distributed architecture with HA/DR support
Security architecture
Security architecture model
Cloud operational responsibilities
Securing the RPA environment with external controls
Independent categories for Bot Creators and Bot Runners
RBAC in Control Room
RBAC on bots
RBAC on Bot Runners
RBAC for Credential Vault credentials management
Role-based processing domains
RBAC on Audit Log
RBAC on viewing bot activity
RBAC on User Management
RBAC on roles and permissions management
RBAC on bot schedules
RBAC on license management
Bot execution access by dynamic access token
Secure credential store through Credential Vault
Credential Vault encryption
Credential storage
Credential provisioning to bots
Cryptographic providers
Secure recording
Authentication with Control Room
Supported authentication methods for Automation 360 On-Premises
Support for secure protocols
Network security overview