We are currently validating the network and security requirements for a One Identity Manager implementation deployed in a highly segmented environment.
In our scenario, all main components are deployed in separate VLANs, and some of them are located in different datacenters:
-
Web Server (API Server)
-
Application Server
-
Database Server
-
Job Server
-
Workstation (IAG Tools / Designer / Manager)
From a supported and recommended product perspective, we would like to clarify the following points related strictly to component communication requirements:
-
Workstation connectivity
Is it required that a Workstation (used for IAG Tools such as Designer, Manager, etc.) has direct network communication with all backend components (Application Server, Database Server, Job Server), or is communication with the Application Server only sufficient to fully manage and administer the environment? -
Application Server connectivity
From a functional and supported standpoint, should the Application Server have network communication only with the Database Server and the Job Server, or are there any additional direct communication requirements with other components?
The objective of these questions is to ensure our network rules and firewall configurations align with the minimum required and supported communication paths for One Identity Manager, without overexposing components unnecessarily.
Thank you in advance for your guidance.