| | | | |
| S |
| |
| | scalability requirements ( ) |
| | | satisfied in the architecture ( ) |
| |
| | security |
| | | authentication ( ) |
| | | use of hardened computers ( ) |
| | | use of load balancers ( ) ( ) |
| | | use of network segmentation ( ) |
| | | use of network topology ( ) |
| | | use of Portal Server Secure Remote Access ( ) |
| | | use of private IP addresses ( ) |
| | | use of subnets ( ) |
| |
| | security requirements ( ) |
| | | implementing with network topology ( ) |
| |
| | service requirements, detailed ( ) |
| |
| | specifications |
| | | for computer hardware ( ) |
| | | for LDAP directory tree ( ) |
| | | for operating system ( ) |