I was wondering which is the recommended setup on a Production environment. Are tentacles exposed to the public? Or usually they are kept within the internal lan?
Will impose a great vulnerability?
I would like to see some blog or something depicting this.
Thanks for getting in touch! We have both a documentation page describing the communcation: http://docs.octopusdeploy.com/pages/viewpage.action?pageId=360622
And a blog post that talks about certificates: http://octopusdeploy.com/blog/why-self-signed-certificates
Hope that helps!