Product area | Potential "personal data" | Where data could be stored |
Correlator, IAF, dashboard servers | User identifiers and IP addresses for direct connections to/from Apama server processes (typically only for machine-to-machine communication between server processes, or monitoring and management by system administrator accounts). These are logged to provide an audit trail in case of an attack or accidental mistake by a system administrator. | correlator main log file correlator input log correlator persistence database IAF and dashboard server log files |
Scenario Service API, queries, DataViews, dashboard servers, custom clients and dashboards | The Scenario Service event protocol contains a username field, identifying users who created instances of scenarios (for example, DataViews or queries). There are various places where this username could show up. See also
Scenario Service API. Note: Apama queries are deprecated and will be removed in a future release. | correlator and dashboard server log files correlator input log correlator in-memory state correlator persistence database |
Dashboard servers | User identifiers and IP addresses of dashboard clients that connect, who may be end-users. These are logged to provide an audit trail. | dashboard server log files |
Dashboard servers, if using JAAS | User identifiers of dashboard clients for authentication purposes. These are logged to provide an audit trail. | Under the control of the JAAS plug-in used. For example, the UserFileLoginModule provided by Apama stores usernames in plaintext in an XML file, whereas other plug-ins are available that hold usernames on a remote server such as an LDAP server. See
Administering Dashboard Security. You can choose an appropriate JAAS plug-in which complies with the way you need to protect the user data if required. |
HTTP server connectivity plug-in | User identifiers and IP addresses of clients that connect to the HTTP server, as specified in HTTP header. These are written to the log file. Along with other HTTP headers they are also present in the message metadata. Thus they can optionally be mapped to fields in an Apama event, using a connectivity codec such as the mapper codec. | correlator main log file correlator input log file correlator in-memory state correlator persistence database |
HTTP server connectivity plug-in, only if authentication is enabled | User identifiers of clients who are permitted to connect to the HTTP server (with a secure hash of the passwords). | HTTP server authentication password file, which is stored on disk in plaintext and contains un-encrypted usernames and hashed salted passwords, see
Authentication. As the file is completely under the user's control, you can use standard tools included with your operating system to set access control for protecting this data as needed. Users can be deleted from the file using a text editor or the httpserver_passman provided by Apama as described in the documentation. |