Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:hw:025-gate:01-first-steps [2021/02/09 07:59]
avsetula [Security in Node-RED]
en:hw:025-gate:01-first-steps [2021/08/09 13:07] (current)
avsetula
Line 1: Line 1:
 ====== First steps ====== ====== First steps ======
-The Unipi Gate is delivered with Linux Debian OS that already includes the [[en:​sw:​03-3rd-party:​nodered|Node-RED]] open-source SW platform - a programming tool for interconnecting hardware devices, various APIs or online services. This article assumes Unipi Gate is in factory settings and uses the OS with Node-RED. ​+<WRAP group> 
 +<WRAP half column 81%> 
 +The Unipi Gate is delivered with Linux Debian OS that already includes the [[en:​sw:​03-3rd-party:​nodered|Node-RED]] open-source SW platform - a programming tool for interconnecting hardware devices, various APIs or online services. This article assumes Unipi Gate is in factory settings and uses the OS with Node-RED. 
 +</​WRAP>​ 
 +<WRAP half column 15%> 
 +;;# 
 +<​html><​span class="​dev-tag dev-gate">​Gate</​span></​html>​ 
 +;;# 
 +</​WRAP>​ 
 +</​WRAP>​
  
 {{ :​en:​sw:​03-3rd-party:​node-red-icon-2.png?​250 |}} {{ :​en:​sw:​03-3rd-party:​node-red-icon-2.png?​250 |}}
Line 12: Line 21:
 {{page>​en:​sw:​03-3rd-party:​nodered:​connection-to-gate-hidden}} {{page>​en:​sw:​03-3rd-party:​nodered:​connection-to-gate-hidden}}
  
-{{page>​en:​sw:​03-3rd-party:​nodered:​securing-os-ssh-hidden}}+{{page>​en:​automation:​securing-os-ssh-hidden}}
  
 ===== Security in Node-RED ===== ===== Security in Node-RED =====
-Securing access to the programming and user interface in Node-RED is as important as securing the OS. If the SW is not secured, unauthorized personnel may gain access to the Unipi controller ​- this can lead to the same consequences as using an OS that was not secured according to [[#​securing_the_os_ssh|the description mentioned above]].+Securing access to the programming and user interface in Node-RED is as important as securing the OS. If the SW is not secured, unauthorized personnel may gain access to the Unipi unit - this can lead to the same consequences as using an OS that was not secured according to [[#​securing_the_os_ssh|the description mentioned above]].
  
 It is thus crucial to **have the Node-RED SW properly secured** each time a new project is created. ​ It is thus crucial to **have the Node-RED SW properly secured** each time a new project is created. ​