Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Content Matrix 9.9 - Security Guide

Network Communications





Content Matrix Console


Job DB, Agent DB

MSSQL (default 1433 TCP) or SQLCE

SharePoint Server (remote machine)

Native Web Service

User selected port (TCP)

Nintex Web Service

443 (TCP) or 80 (TCP)


Native Web Service port (TCP)

SharePoint DB

MSSQL (default 1433 TCP)

Quest Web Services

Metalogix License Service

443 (TCP)

Nintex Conversion Service

443 (TCP)

Azure Cloud

Azure Blob Storage

443 (TCP)

Azure Queue

443 (TCP)

Microsoft 365 (SPO CSOM)

443 (TCP)

Nintex Online

443 (TCP)


Content Matrix Agents

135 (TCP) and dynamic ports (TCP)

Content Matrix Agents

Agent DB

MSSQL (default 1433 TCP) or SQLCE


Figure 2: List of protocols used and associated ports



Authentication of Users and Services

Quest® Content Matrix relies upon

·Windows Authentication and Active Directory group membership to authenticate users

·Forms Based Authentication which authenticates through IIS

·Microsoft Entra ID authenticating via Microsoft 365 OAuth Authentication

·Microsoft Entra ID authenticating via Microsoft 365 Web Browser

FIPS 140-2 Compliance

Quest® Content Matrix cryptographic usage is based on FIPS 140-2 compliant cryptographic functions. Quest® Content Matrix makes use of FIPS 140-2 compliant encryption keys stored locally using Microsoft DPAPI.

Quest® Content Matrix has undergone a Quest internal Self-Affirmation process to confirm that all cryptographic usage relies exclusively on Third-Party FIPS 140-2 validated modules.

More information: Microsoft and FIPS:

Air Gap Compliance

Quest® Content Matrix is Air Gap compliant.

What is Air Gap?

Air Gap is an architecture based on physical separation and trusted people. Its goal is to demonstrably protects all product builds and code delivery from potential mischievous employee or external actors, regardless of world location.

Air Gap Components

Air Gap consists of:

· A secure facility within Quest that contains the complete supply and assembly chain for all products in scope.

·Limited access: only select employees have access to review, accept, and transfer contributions into this environment.

·A vetted secure build process which entirely separates the Product Development from the Product Build.

Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation