uCosminexus Application Server, Security Management Guide
The information listed in the table below provides relevant details about the methods and functionality for the security measures described in this chapter.
Table 2-2 Details about the methods and functionality for ensuring security
| Measure | Functionality | Relevant information |
|---|---|---|
| Realizing a system configuration that will ensure security | -- | Chapter 3, Chapter 4 |
| Operating the system securely | -- | Chapter 4 |
| Preventing unauthorized users from accessing the system (authentication functionality) | User login authentication through the integrated user management framework | Chapter 5 |
| Web container-based authentication with DD settings | 6.2 | |
| Authentication with security identities | 6.3 | |
| Ensuring communication path security (encryption functionality) | SSL encryption (on the Web server) | Manual HTTP Server User Guide |
| SSL/TLS encryption of authentication information and data | Chapter 7 | |
| Preventing invalid processing | Web container runtime protection provided by SecurityManager | 2.2.5 |
| Taking other actions | Use of an API for direct access to load balancers, and control of load balancers using the operation management functionality | Chapter 8 |
--: Not available
All Rights Reserved. Copyright (C) 2013, Hitachi, Ltd