Go to main content
1/22
Contents
Title and Copyright Information
Preface
1
Token Proxy Service Security Overview
Basic Security Considerations
Token Proxy Exchange Service
Recommended Deployment Configurations
Component Security
Personal Data Security
2
Performing a Secure Token Proxy Service Installation
Configuring the Installation
Installing the Token Proxy Service
Post-Installation Configuration
Applying Software Patches
Configuring the Token Proxy Exchange Service
Data Purging
3
Implementing Token Proxy Service Security
Token Proxy Service Exchange Security
Managing Users
Authenticating the Service
Using the Audit Trail
4
Appendix Secure Deployment Checklist
Scripting on this page enhances content navigation, but does not change the content in any way.