Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:hw:025-gate:01-first-steps [2021/05/03 11:31]
avsetula
en:hw:025-gate:01-first-steps [2021/08/09 13:07] (current)
avsetula
Line 1: Line 1:
 ====== First steps ====== ====== First steps ======
 +<WRAP group>
 +<WRAP half column 81%>
 The Unipi Gate is delivered with Linux Debian OS that already includes the [[en:​sw:​03-3rd-party:​nodered|Node-RED]] open-source SW platform - a programming tool for interconnecting hardware devices, various APIs or online services. This article assumes Unipi Gate is in factory settings and uses the OS with Node-RED. The Unipi Gate is delivered with Linux Debian OS that already includes the [[en:​sw:​03-3rd-party:​nodered|Node-RED]] open-source SW platform - a programming tool for interconnecting hardware devices, various APIs or online services. This article assumes Unipi Gate is in factory settings and uses the OS with Node-RED.
 +</​WRAP>​
 +<WRAP half column 15%>
 +;;#
 +<​html><​span class="​dev-tag dev-gate">​Gate</​span></​html>​
 +;;#
 +</​WRAP>​
 +</​WRAP>​
  
 {{ :​en:​sw:​03-3rd-party:​node-red-icon-2.png?​250 |}} {{ :​en:​sw:​03-3rd-party:​node-red-icon-2.png?​250 |}}
Line 12: Line 21:
 {{page>​en:​sw:​03-3rd-party:​nodered:​connection-to-gate-hidden}} {{page>​en:​sw:​03-3rd-party:​nodered:​connection-to-gate-hidden}}
  
-{{page>​en:​sw:​03-3rd-party:​nodered:​securing-os-ssh-hidden}}+{{page>​en:​automation:​securing-os-ssh-hidden}}
  
 ===== Security in Node-RED ===== ===== Security in Node-RED =====
-Securing access to the programming and user interface in Node-RED is as important as securing the OS. If the SW is not secured, unauthorized personnel may gain access to the Unipi controller ​- this can lead to the same consequences as using an OS that was not secured according to [[#​securing_the_os_ssh|the description mentioned above]].+Securing access to the programming and user interface in Node-RED is as important as securing the OS. If the SW is not secured, unauthorized personnel may gain access to the Unipi unit - this can lead to the same consequences as using an OS that was not secured according to [[#​securing_the_os_ssh|the description mentioned above]].
  
 It is thus crucial to **have the Node-RED SW properly secured** each time a new project is created. ​ It is thus crucial to **have the Node-RED SW properly secured** each time a new project is created. ​