IBM Books

Planning Volume 2, Control Workstation and Software Environment


Protecting your authentication database

A primary consideration when you install and configure your SP system is the security of the workstations on which the authentication servers are to run. Because the authentication server is the repository of the secret keys for all principals, you need to protect it. Consider taking the following steps:


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]