Configuration 4 GNU (CFG)
|
|
External Entities | |
---|
This section describes how the Config4GNU system will interact with
external entities. These are things that Config4GNU cannot
necessarily control, being outside the boundaries of what
constitutes a running instance of Config4GNU.
The native config files are maintained as the authoritative
version of configuration. When a UI requests an XML
representation of the current configuration, the native files will
be checked to ensure they have not been hand-edited since the last
XML cache of each file was made (during the previous usage of the
program), and either the cached XML or freshly generated XML is
used depending on the situation.
The Config4GNU system will be able to read and write configuration
on remote computers. This remote access will be done by requesting
the remote computer to generate an XML representation of its
configuration (by invoking a command-line CFG over
ssh). Thus Config4GNU will need to be installed
on all computers that you wish to configure using the system.
All communication with remote computers should use a secure
protocol, particularly since some configuration data contains
sensitive data. However, even if the data is not sensitive, with
the availability of free encryption utilities, there is no
reason not to make communication secure.
| |
|
|