Application Security
Users can learn about the application security of the eSight regarding account management, log management, encrypted transmission, and sensitive data processing.
Table 1 describes application security functions of eSight.
Security Function |
Description |
---|---|
Account Management |
eSight provides an independent user management system for carrier administrators. This system supports user account management, authentication management, access control, rights allocation, and security policy management. By default, eSight provides the following roles:
|
Log management |
Log management supports management of security logs, system logs, and operation logs. Carrier administrators can query or collect statistics on logs to track system running and operations performed by each role in the system. |
Encrypted transmission |
eSight implements end-to-end transmission encryption on various APIs. It uses HTTPS, SSH/SFTP, and SNMPv3 security communication protocols. |
Sensitive data processing |
Sensitive data of eSight includes mobile numbers, email addresses, passwords, certificates, private keys, and SNMP passwords and community names. eSight encrypts the sensitive data and enforces access permission control. |