Automation 360 クラウド for secure access and connectivity
- 最終更新日2024/10/21
Automation 360 クラウド for secure access and connectivity
You can develop and run Bots securely using the Automation 360 クラウド access security.
High-level architecture of クラウド deployment
The following architecture diagram provides a high-level workflow of the Automation 360 クラウド deployment:
- Using a browser, you log into the Control Room and create users and roles. You perform this process on the Automation 360 クラウド.
- You install the ボット エージェント on your Windows device to run Bots locally. You perform this process on your infrastructure.
- Data flow between the Automation 360 クラウド and the ボット エージェント on your Windows device on your infrastructure is encrypted using TLS (outbound port 443 only).
Identity and Access Management (IAM) security for user system
- When an admin user logs into the Automation 360 Control Room for the first time, the admin can configure SAML 2.0 to connect the Automation 360 クラウド Control Room to their own Identity Provider (IdP) so that their users can log in to the Control Room using MFA (multi-factor authentication).
- The admin can then create the required users and roles or permissions to perform certain activities (such as developing and running Bots) in the Control Room.
- The Automation 360 Control Room users can then log in through MFA and start creating and running Bots.
- Additionally, the admin can configure an allowed IP address range to manage user logins through the Administrator settings in the Control Room.
To learn more about Automation 360 クラウド, see Automation 360 クラウドの使用を開始.
Secure connectivity to run Bots
You run Bots locally on a Windows machine on which the ボット エージェント is deployed. You can download and install the ボット エージェント on your devices or deploy to a pool of virtual machines.
- The integrity of the device on which the ボット エージェント is installed is not compromised.
- The user organization has instituted security safeguards and controls to prevent ボット エージェント takeover and system-level user breaches.
- The user environment is safe from network-based attacks such as Domain Name System (DNS) cache poisoning, Address Resolution Protocol (ARP) spoofing, and so on.
- ボット エージェント installation and registration
- When you register your device, the ボット エージェント device is provided a JSON Web Token (JWT) to start the registration process with the Control Room. If the token provided by the ボット エージェント device does not match the token provided by the Control Room, the registration process will fail. This authenticates the client ボット エージェント device to the Control Room.
- Communication between ボット エージェント and Control Room
- The ボット エージェント device establishes a websocket connection to the Control Room using HTTPS (outbound port 443) and no inbound connection is required.
- Schedule Bots to run
- Control Room users can schedule Bots to run. Compiled Bots are downloaded to run on the ボット エージェント devices and operational logs are sent from the ボット エージェント devices to the Control Room.
- Secure credentials for Bots
- Bot that run on the ボット エージェント devices need to log in to the device using credentials. You can store credentials securely in the Automation 360 クラウド Control Room credential vault. Alternatively, you can store credentials in a customer-hosted key management system (for example, CyberArk). When you store credentials in the customer-hosted key management system, you must have connectivity between the Control Room and the customer's key management system. To provide connectivity and allow access, you must configure the Automation 360 クラウド IP addresses for the specific Automation 360 クラウド region that is hosting the Control Room in their firewall. For more information, see 外部統合の Control Room IP アドレス.
Secure operations in Automation 360 クラウド
Automation 360 クラウド is run securely and meets compliance standards for: SOC 1, SOC 2, ISO 27001, and HITRUST.
-
For information about Automation 360 クラウド deployment and operational models, see Automation 360 Cloud Security and Data Privacy.
-
For Automation 360 クラウド compliance reports, see Compliance Portal.