Orchestration Architecture
Target hosts are the computers where the deployment or management actions will take place.
At the moment, two deployment method are used to interact with target hosts:
- Local deployment: The actions are carried out on the same host from where MutableSecurity was downloaded and executed.
- Remote deployment: MutableSecurity securely connects to a single remote host or a list of remote hosts with whom it can communicate over the network. The computer hosting MutableSecurity is referred to as the orchestration host in this scenario. Password-based or key-based SSH authentication is used.