Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue 2488: boundary diagram updates #2770

Merged
merged 7 commits into from
Dec 18, 2023
Merged
Show file tree
Hide file tree
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/Security-Compliance/File-Transfer-TDRS/diagram.drawio

Large diffs are not rendered by default.

Binary file modified docs/Security-Compliance/File-Transfer-TDRS/diagram.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
6 changes: 3 additions & 3 deletions docs/Security-Compliance/boundary-diagram.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,17 +18,17 @@ Developers will deploy new code through GitHub, initiating the continuous integr

### User access

All web users will log into the system through their web browsers.
All web users will log into the system through their web browsers. An [Nginx server](../../tdrs-frontend/nginx/README.md) sits in front of each frontend application to serve as a reverse proxy to block traffic to TDP from outside the US/US territories. For traffic *within* the US/US territories:

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The main reason of having that Nginx is to serve the frontend app, so I suggest changing the wording to:

"All web users will log into the system through their web browsers. An Nginx server sits in front of each frontend application to serve the frontend application as well as acting as a reverse proxy which blocks traffic to TDP from outside the US/US territories. For traffic within the US/US territories:"

- all non-acf users will leverage Login.gov and two factor authentication.
- all ACF users will leverage ACF AMS and authenticate using PIV/CAC. Developers will also have access to the `dev` and `staging` spaces using SSH.

All users will be required to be approved within the application by an administrator.

### Access points

Beyond web-based authentication through ACF AMS or Login.gov, and developer SSH access to the dev Space, CircleCI will also have access to the various environments to support deployments.
Beyond web-based authentication through ACF AMS or Login.gov, and developer SSH access to the dev Space, CircleCI will also have access to the various environments to support deployments. TDP system administrators will trigger CircleCI-based deployments via GitHub.

TDP system administrators will trigger CircleCI-based deployments via GitHub.
Additionally, the [SendGrid E-mail API](../Technical-Documentation/Architecture-Decision-Record/021-sendgrid.md) receives requests from the backend applications in each environment to trigger email notifications for key user activities in TDP: requests for access, admin changes to user accounts (approval, denial, deactivation), and data submissions. SendGrid only has access to TDP user email addresses.

### Configuration

Expand Down
Loading
Loading