Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The current user driven, device management event flow at the a high level, is as follows, 

...

Data handling policy will define, how the sensitive storage data will going to be handledhandling, on encryption algorithm change, 

...

When an EVE node faces network outage, it will keep operating, using the last known policy configuration received.

On power recycle, followed by a network outage, the EVE node may require physical access/user intervention,

...

This consists of  set of Keys information( max. 2). For a key rotation scheme, a maximum of two keys will be intimated to the EVE node. Controller will store and publish, the last published key along with the most current key. This will cover cases, when the EVE node is not able to communicate with controller.

...