Secure Topology

ITBA is designed to be part of a secure architecture, and can meet the challenge of dealing with the security threats to which it could potentially be exposed.

Several measures are recommended to securely deploy ITBA:

  • Use of the TLS/SSL communication protocol.
  • Reverse proxy architecture:

    ITBA uses Apache HTTP server as a reverse proxy, it’s an intermediate server that is positioned between the browser and the application server.

  • Separation between web servers, application servers, and database servers.