·
What security software is enabled/pre-installed on the hub?
A Firewall is installed and
enabled on the hub.
·
What is the transport security for a Borealis system? Borealis Cloud is fully deployed
under an Amazon VPC (Virtual Private Cloud) with multiple subnets. Reference: https://aws.amazon.com/vpc/. For transport we use an SSL certificate.
·
How can the Borealis Security Certificate be viewed? On a web browser, go to the Borealis
URL (https://keri.aetheros.net) >> Click the small lock icon to the left of
the address field >> Click Connection is Secure >> Click the small
certificate icon. The certificate details will then appear.
·
Does the system operator have single or two-factor authentication?
By default, single-factor authentication is enabled for a Borealis operator –
but two-factor authentication can be enabled once the user is logged-in.
Two-factor authentication is via password and Email.
·
How long does the user authentication token last? The access token lasts for 20 minutes
and the refresh token is 14 days.
·
What authentication is there between a remote workstation, the hub
and the Cloud? The
authentication between a workstation and the Cloud is by using the Authorization
Code Flow and the authentication between a hub and the Cloud is by using machine-to-machine
authentication.
·
How can I find the hub’s MAC address (if the IT department are
restricting access to the router by MAC address)? The hub’s MAC address can be found
printed on the outside of the hub.
· How are the hubs updated? The Borealis system hubs are updated using an internally built service called the ‘Updater Service’.