Application Security

Application security includes configuring Web applications and gateways.

Application security includes Zones 2 and 3 in Figure 1.
Figure 1. Security Zones

Multiple zones (DMX, Web Services, Application Services, Network Systems) separated by firewalls.

MATRIXX Engine must be deployed within a secure area of your network. Think of MATRIXX Engine as a black box server with limited access points for event processing, business support systems, maintenance, and monitoring.

The Gateway Proxy restricts which applications, services, and IP addresses can communicate with MATRIXX Engine. It is located between provisioning and self-care systems and MATRIXX Engine and uses Linux firewall rules to enforce access restrictions. This prevents unauthorized services from communicating with the engine.

The Business API Gateway should be in Zone 4 so that it is separate from MATRIXX Engine and not directly exposed to the internet like the Web services in zone 3.

My MATRIXX

In cloud-native environments, you install My MATRIXX as a separate pod with its own Docker Image. You can deploy it on the same nodes as the Gateway Proxy pods or on remote nodes that communicate through the Gateway Proxy to MATRIXX Engine. MATRIXX recommends that you deploy My MATRIXX separately from the Business API Gateway pods, because the tool is a design-time environment for creating configuration files to deploy to the run-time MATRIXX Engine. This ensures the separation of responsibilities between design-time and run-time systems. For example, the nodes can be located within Zone 1 as the service provider internal network, along with other non-network IT systems.

For information about user authentication, see the discussion about configuring and customizing My MATRIXX authentication.