Principles of ThingWorx Application Security

Receive documented recommendations for establishing or improving your application security

In this service, PTC will provide best practices and give recommendations, applied to your specific use case, on how to control access to data and mashups using access control techniques available in ThingWorx. Topics covered include organizations, visibility, permissions, users and groups, the system user, REST API, Edge, and application keys.

How it Works

This a 12-hour engagement and includes the following activities:

  1. Review your existing security requirements
  2. Review your existing user model
  3. Review application security best practices
  4. Advise and share recommendations
  5. Optional 2 hours for post-delivery mentoring to follow up on questions

Prerequisites

The following criteria must be completed before this service can be consumed:

  • You must have a validated use case
  • You must provide written requirements

Additional Information

Outcome: Receive documented recommendations for establishing or improving your application security

Journey: IoT

Remote or Onsite: Both

Success Points*: 8 points for NA and 3 additional points for Onsite

*Please note: Information including Success Point values may vary depending on location. Success Point values shown are for reference only and based on North America. Contact your Success Manager for specific services and point values for your location. Please refer to our terms and conditions for additional details