Skip to main content
Solved

Aurena Agent White paper installation

  • May 16, 2024
  • 1 reply
  • 102 views

LindaK
Sidekick (Employee)
Forum|alt.badge.img+6
  • Sidekick (Employee)
  • 22 replies

Hi

Do we have a White paper on the Aurena Agent that we can send to the customer for a security assessment of the installation?

Questions come from the customer, and I don't know much about this.
Not sure if this is the right place to ask either ðŸ˜Š

Br

Linda

Best answer by Mathias Dahl

There is no such white paper. What I can say is that we have made extensive penetration (security) tests of the Aurena Agent, and it's deemed to be secure.

IFS can never promise that it's 100% safe to use or that it does not have any bugs, we can just say that we have tested it extensively. It's the customer that has the responsibility to decide if they want to use it or not though.

The main security mechanism is that the Aurena Agent will only "obey" commands from certain hosts (which you define when you run the installer). This is to make sure that an attacker doesn't use it to execute actions on a user's PC when they are surfing the web. As for what it can do, it's an inherently powerful part of our software as it can do things on/with the user's PC that's normally not possible with current web technology.

View original
Did this topic help you find an answer to your question?

1 reply

Mathias Dahl
Superhero (Employee)
Forum|alt.badge.img+32
  • Superhero (Employee)
  • 2891 replies
  • Answer
  • May 17, 2024

There is no such white paper. What I can say is that we have made extensive penetration (security) tests of the Aurena Agent, and it's deemed to be secure.

IFS can never promise that it's 100% safe to use or that it does not have any bugs, we can just say that we have tested it extensively. It's the customer that has the responsibility to decide if they want to use it or not though.

The main security mechanism is that the Aurena Agent will only "obey" commands from certain hosts (which you define when you run the installer). This is to make sure that an attacker doesn't use it to execute actions on a user's PC when they are surfing the web. As for what it can do, it's an inherently powerful part of our software as it can do things on/with the user's PC that's normally not possible with current web technology.


Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings