1/7
Contents
Title and Copyright Information
Preface
Audience
Related Documents
Documentation Accessibility
1
Instant Messaging Server Security Overview
Basic Security Considerations
Understanding the Instant Messaging Server Environment
Overview of Instant Messaging Server Security
Recommended Deployment Topologies
Operating System Security
Firewall Port Configuration
Transport Layer Security
LDAP Security
2
Performing a Secure Instant Messaging Server Installation
Pre-Installation Tasks
Installing Instant Messaging Server
Post-Installation Tasks
3
Implementing Instant Messaging Server Security
About System Security in Instant Messaging Server
About Transport Layer Security for Instant Messaging Server
Overview of Using TLS in Instant Messaging Server
Setting Up TLS for Instant Messaging Server
Activating TLS on Instant Messaging Server
To Activate TLS Communication in Instant Messaging Server
Enabling TLS Protocols
Encrypting Passwords
Writing a Custom Single Sign-On Module
API Reference Documentation
How the Custom SSO Module for Instant Messaging Server Works
Implementing the Custom SSO Module
Troubleshooting the Custom SSO Module
Writing a Custom SASL Module
API Reference Documentation
How the Custom SASL Module for Instant Messaging Server Works
Implementing the Custom SASL Module
Controlling End User and Administrator Privileges
Policy Configuration Properties
Setting the Policy Management Method
Managing Policies by Using Access Control Files
Changing End-user Privileges in Access Control Files
Using Access Control Files in a Server Pool
Access Control File Location
Access Control File Format
A
Secure Deployment Checklist
Secure Deployment Checklist
Scripting on this page enhances content navigation, but does not change the content in any way.