Skip to content

Commit f51a7e3

Browse files
committed
Update SSL-encrypted to TLS-encrypted.
1 parent fe2a4ac commit f51a7e3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/pages/docs/octopus-cloud/frequently-asked-questions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ Octopus Cloud supports these [authentication providers](/docs/security/authentic
105105
All communication between the Tentacle and Octopus is performed over a secure TLS connection. We recommend TLS1.2+. We configure the [trust relationship](/docs/security/octopus-tentacle-communication) between Octopus Server and a Tentacle using public-key cryptography. The server and Tentacle establish the trust relationship using [X.509 self-signed certificates](/docs/security/octopus-tentacle-communication#Octopus-Tentaclecommunication-Octopuscertificates) generated upon installation and using 2048-bit private keys.
106106

107107
### How secure is Tentacle communication?
108-
Octopus Cloud communicates with Tentacles you deploy on your targets via SSL-encrypted data transmitted over a TCP connection. You can set up [Tentacle communication](/docs/infrastructure/deployment-targets/tentacle/tentacle-communication) modes as listening (acting as the TCP server) or polling (acting as the TCP client). Many customers prefer polling for greater security of the Tentacle host.
108+
Octopus Cloud communicates with Tentacles you deploy on your targets via TLS-encrypted data transmitted over a TCP connection. You can set up [Tentacle communication](/docs/infrastructure/deployment-targets/tentacle/tentacle-communication) modes as listening (acting as the TCP server) or polling (acting as the TCP client). Many customers prefer polling for greater security of the Tentacle host.
109109

110110
### Can a Tentacle access customer data?
111111
Every process within a Tentacle is executed by the user account configured on its service. Tentacles can be configured to run under a [specific user account](/docs/infrastructure/deployment-targets/tentacle/windows/running-tentacle-under-a-specific-user-account) if elevated or alternative permissions are required. The user account configured constrains the Tentacle's access to data.

0 commit comments

Comments
 (0)