App management
Understand how Secure Agent 2.0 app deployments work and their relationship to connector types, data sources, and workflows.
Understand how Secure Agent 2.0 app deployments work and their relationship to connector types, data sources, and workflows.
Architecture overview and core components of Secure Agent 2.0
Understand how Secure Agent 2.0 authentication works and why it protects your enterprise infrastructure.
Configure firewall rules and network policies to secure communication between Secure Agent 2.0 and Atlan services
Customer environment security best practices for deploying and operating Secure Agent 2.0
Understand how metadata moves from your sources to Atlan and what visibility you get into operations.
Deploy Secure Agent 2.0 on Kubernetes for Amazon Redshift connectivity using Helm charts, Docker images, and proper configuration
Frequently asked questions about Secure Agent 2.0 deployment and security
Understand how Secure Agent 2.0 deploys across different container environments.
Understand how Atlan securely connects to your SAP ECC system to extract metadata.
Understand how Atlan securely connects to your SAP S/4HANA system to extract metadata.
Understand how Secure Agent 2.0 handles secrets and why credentials never leave your environment.
Hardware and infrastructure requirements for running Secure Agent with SAP ECC connector.
Hardware and infrastructure requirements for running Secure Agent with SAP S/4HANA connector.
Security overview and controls for Secure Agent 2.0
Verify the authenticity and integrity of Secure Agent container images with Cosign