Implementing Secondary Brokers Scenarios
Last updated
Was this helpful?
Last updated
Was this helpful?
The inclusion of Secondary Brokers in Thinfinity® Workspace architecture provides a secure and scalable deployment model. It ensures seamless access for both remote and local users while optimizing resource distribution and performance across multiple secondary brokers.
Enhanced Security
By placing the Gateway in the DMZ and using encrypted TLS 1.3 traffic, Thinfinity Workspace ensures robust protection against external threats.
Secondary Brokers do not require inbound ports, further strengthening security.
Scalability and Load Distribution
Distribute workloads across multiple Secondary Brokers, optimizing resource utilization.
Allows organizations to scale their infrastructure efficiently as demand grows.
Seamless User Experience
Centralized authentication through the Gateway simplifies access for both remote and local users.
Users experience seamless access to resources without manual interventions.
No Inbound Port Requirement for Secondary Brokers
Communication between the Primary Broker and Secondary Brokers is secured and does not require additional firewall configurations.
Firewall Configuration: Ensure port 443 is open for inbound connections to the Gateway.
Redundancy: Implement multiple Secondary Brokers to achieve high availability and fault tolerance.
Monitoring: Utilize Thinfinity Workspace monitoring tools to track resource usage and user sessions across Brokers.