Note: This page uses Javascript. You are seeing this note because your browser either doesn't support Javascript or Javascript is turned off. To view this help system as it is meant to be viewed please use a Javascript enabled browser.
Collapse
Expand
Security Guidance Overview
Safe Deployment
Administrative Privileges Needed for Installation and Operation
Minimum Client Permissions Needed
Physical Security Requirements
Application Security Settings
Files to Protect
Authentication Options
Authorization
Confidentiality
Sensitive Data
Reliability
Cookie Usage