Which of the following should be taken into account, when designing the security model for a Blue Prism environment? (Select 5)
Integration with Active Directory
The location of the credential store keys
Integration with an external LDAP service
The encryption method for the credential store
The encryption method for the operational communications between database server and runtimes
The separation of duties between roles and environments
Remote access to the Blue Prism components
Submit