Securing the TrueSight Infrastructure Management components

You can upgrade the security in your enterprise environment by using Transport Layer Security (TLS 1.2) to communicate with the various components of the TrueSight Operations Management solution. The following section shows an illustration of the security architecture diagram, and provides the procedure to enable the TLS 1.2 security standards.

Related topics

TLS considerations for TrueSight Capacity Optimization Open link

TLS considerations for TrueSight Operations Management Reporting Open link

Network port schematics for Infrastructure Management Open link

Security Architecture Diagram - TrueSight Infrastructure Management Server and related components

Note: The arrow in the above diagram indicates connection initiation request from client to server.

To configure the TrueSight Infrastructure Management and its components to enable TLS 1.2, see  Securing communication among Infrastructure Management components Open link

Was this page helpful? Yes No Submitting... Thank you


  1. Oludare Ogunmadewa

    The "Security Architectural Diagram" is missing and not shown on this page. Please update the page.


    Jan 28, 2018 11:55
    1. Rashmi Gokhale

      Thank you for the feedback. I have corrected the issue and published the page.

      Thanks, Rashmi

      Feb 08, 2018 02:35