📄️ Downloading Opscotch
Opscotch is distributed as downloadable ZIP files and as Docker images. This page covers installation options, verification, and configuration.
📄️ Starting the runtime
This page describes the main ways to start the opscotch runtime.
📄️ Cryptography
Opscotch provides cryptographic capabilities at two layers: the packager for key generation and workflow package security, and the runtime for in-workflow cryptographic operations.
📄️ Packager
Opscotch is secure by design: packaged configurations are deployed to the agent in encrypted form.
📄️ Licensing
Licensing in opscotch uses time-limited issued licenses and a delegated license hierarchy.
📄️ Monitoring
opscotch has in-built delivery of logs and operational metrics to your monitoring platform, or logs can be collected by your own monitoring systems.
📄️ Securing
opscotch was built to operate in the most securely demanding environments and has been designed with many features to increase its security posture. The single most governing principal of opscotch is to "keep the customers data in the customers network".
📄️ Testing
opscotch was built to be reliable, and that includes workflow authoring.