Security Guide Performing a Secure Simphony Installation Post-Installation Configuration Post-Installation Configuration This section explains additional security configuration steps to complete after Simphony is installed. Operating System Application Database Platform Passwords Overview Changing Default Passwords Encryption Keys Integrity Keys Changing Database Passwords Parent topic: Performing a Secure Simphony Installation