Security considerations for Engineering Insights

Learn about the security considerations in the IBM® Engineering Lifecycle Optimization - Engineering Insights (ENI).

Image whitelist

You can use images in ENI that are visible at different places. The following examples state where you can set the URL for the image source:
  • The image container – You can specify the URL as the location of an image that you want to display in an image container.
  • The page properties of a view – You can specify the image URL to set an image as a background for a view.
  • The UI Type tab on the Node editor – You can set the Fill Type parameter to Pattern in the Fill property dialog box and set the Image URL to display an image as node background.
Image files are susceptible to malware attack. You must add the domains of the images to a whitelist to prevent the attack. For more information, see Managing the whitelist for uploading images.
Note: Only administrators who have access to the JTS server file system can add domain names to the whitelist.

Resolving data spill by removing sensitive data

In views and impact analysis diagrams, ENI shows related artifacts from Engineering Lifecycle Management (ELM) applications that are registered with the Lifecycle Query Engine (LQE). ENI stores the definitions that determine what data to display in views and impact analysis diagrams, but it does not store the data itself. The artifacts that are shown in views, impact analysis diagrams, and search results are retrieved from the Lifecycle Query Engine (LQE).

Only administrators can resolve data spills in ENI. To remove sensitive data from ENI views, administrators must follow the data spill procedure for the affected ELM applications. For details, see Resolving data spill by removing sensitive data.

video icon Video channel
Software Education channel

learn icon Courses

IoT Academy
Skills Gateway

ask icon Community forums library

support icon Support

IBM Support Community
Deployment wiki