Inter-service Communication

File Access Manager uses SSL communications for all its deployed services.

SSL communications use server and client certificates which, by default, are self-signed and created when each service is installed. While the operating system may not trust these certificates, File Access Manager components do trust them.

The table below lists the relationships among the services and clients.

 

Service

Clients

Default Port

Agent Configuration Manager

Activity Monitor
Event Manager
Central Data Classification
Central Permissions Collector
Data Classification Collector
Permissions Collector
Collector Installation Manager

8000

Event Manager

User Interface
Central Data Classification
Scheduled Task Handler
Central Permissions Collection
Web Server

8001

Reporting Service

User Interface

8006

User Interface

File Access Manager Administrative Client

8005

Workflow

User Interface

8008

Elasticsearch

Event Manager
Reporting Service
Scheduled Task Handler
User Interface
Web Server
Activity Analytics

9200

Elasticsearch

Elasticsearch

9300

RabbitMQ

Central Permissions Collector
Central Data Classification
Permissions Collector
Data Classification Collector
Activity Monitor
Event Manager

5671

RabbitMQ

Schedule Task Handler

15671

Activity Analytics

None

8010

It is a best practice for all components to be in a safe, secure network, behind firewalls, even though SSL secured communication is enabled.