Verasys Enterprise security overview - Verasys - LIT-12013026 - LC-ENT100-01 - LC-SBH200-0 - Building automation software - Verasys Enterprise

Verasys Enterprise Security and IT Guide

Product name
Verasys Enterprise
Document type
Administration Guide
Technical Bulletin
Document number
Revision date
Product status

The Verasys Enterprise is hosted on Microsoft Azure. Azure uses industry-standard security methods to keep customer data safe and separate from other customers' data.

The IMS uses OAuth2 to authenticate Verasys Enterprise users, the SBHs, and all requests to the APIs in the data platform. The SBH communicates with the data platform in OData JSON. All communication is encrypted. Each SBH contains the unique secret and credentials that are required for the IMS API to generate the access token. When a Verasys Enterprise user selects Enable Enterprise Cloud Services on the Verasys SBH user interface, the SBH requests an access token from the IMS. Later, the SBH uses the same access token to communicate with the data platform cloud services.

When you navigate to the Verasys Enterprise web user interface in the browser, your browser redirects to the Data Platform IMS login page. After you log in with your user credentials, the Data Platform IMS generates a unique access token and your browser redirects back to the application dashboard. The Verasys Enterprise application uses the access token to communicate with the Data Platform REST APIs over HTTPS.

The time series API contains Access Control List (ACL) permissions for each time series identifier for the customer organization, or user rights to post or pull time series API data. The entity data is stored in a separate logical partition for each customer.