Post-Installation Configuration This section explains additional security configuration steps to complete after Simphony is installed. Operating System Application Database Platform Passwords Overview Changing Default Passwords Encryption Keys Integrity Keys Changing Database Passwords Parent topic: Performing a Secure Simphony Installation