5 Security Considerations for Developers

This chapter provides information for developers about how to create secure applications for LSMS Query Server, and how to extend LSMS Query Server without compromising security.

Consider the following guidelines:

  • Use encrypted (hashed) passwords for user-accessible files.
  • Delete or disable unused user accounts.
  • Remove redundant code.