Go to main content
1/9
Contents
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
1
Overview
Product Overview
Security
General Security Principles
Keep Software Up To Date
Restrict Network Access
Keep Up To Date on Latest Security Information
2
Secure Installation
Understand Your Environment
Which resources need to be protected?
From whom are the resources being protected?
What will happen if the protections on strategic resources fail?
Securing the Library
Installing Streamline Library Console (SLC) application and the Web Application Archive (WAR) file
Post Installation Configuration
Assign the user (admin) password.
Enforce password management
3
Security Features
A
Secure Deployment Checklist
B
References
Scripting on this page enhances content navigation, but does not change the content in any way.