Skip to main content
Nextedy Apps run inside the Siemens Polarion ALM application server. They share the same JVM process, the same authenticated session, and the same data storage as Polarion itself. This architecture means that Nextedy does not introduce a separate attack surface — security controls are inherited directly from the Polarion platform.

Core Principle: Inherited Security

Nextedy Apps do not maintain their own databases or authentication systems. While apps expose their own REST endpoints, these endpoints are accessible only within the Polarion server perimeter and are protected by Polarion’s authentication and session management. Every operation executes within the security context of the currently authenticated Polarion user. The practical consequence is that the security posture of a Nextedy deployment is determined by the security posture of the underlying Polarion installation. This leads to a clear responsibility model:
ResponsibilityOwner
Secure app code, dependency management, vulnerability scanningNextedy
Polarion platform security, authentication, encryption, backupCustomer (on-premise) or Siemens (Polarion X)
User provisioning, access control policies, project permissionsCustomer

Deployment Modes

Nextedy Apps support both deployment models offered by Polarion:
  • On-premise — The customer manages the entire Polarion infrastructure, including OS, JVM, TLS certificates, backup, and network security.
  • Polarion X (SaaS) — Siemens manages the Polarion infrastructure. Nextedy Apps have been cleared by Siemens IT security review for deployment on Polarion X.

Explore This Section