You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/pages/docs/octopus-cloud/frequently-asked-questions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ Octopus Cloud supports these [authentication providers](/docs/security/authentic
105
105
All communication between the Tentacle and Octopus is performed over a secure TLS connection. We recommend TLS1.2+. We configure the [trust relationship](/docs/security/octopus-tentacle-communication) between Octopus Server and a Tentacle using public-key cryptography. The server and Tentacle establish the trust relationship using [X.509 self-signed certificates](/docs/security/octopus-tentacle-communication#Octopus-Tentaclecommunication-Octopuscertificates) generated upon installation and using 2048-bit private keys.
106
106
107
107
### How secure is Tentacle communication?
108
-
Octopus Cloud communicates with Tentacles you deploy on your targets via SSL-encrypted data transmitted over a TCP connection. You can set up [Tentacle communication](/docs/infrastructure/deployment-targets/tentacle/tentacle-communication) modes as listening (acting as the TCP server) or polling (acting as the TCP client). Many customers prefer polling for greater security of the Tentacle host.
108
+
Octopus Cloud communicates with Tentacles you deploy on your targets via TLS-encrypted data transmitted over a TCP connection. You can set up [Tentacle communication](/docs/infrastructure/deployment-targets/tentacle/tentacle-communication) modes as listening (acting as the TCP server) or polling (acting as the TCP client). Many customers prefer polling for greater security of the Tentacle host.
109
109
110
110
### Can a Tentacle access customer data?
111
111
Every process within a Tentacle is executed by the user account configured on its service. Tentacles can be configured to run under a [specific user account](/docs/infrastructure/deployment-targets/tentacle/windows/running-tentacle-under-a-specific-user-account) if elevated or alternative permissions are required. The user account configured constrains the Tentacle's access to data.
0 commit comments