Contents

 
Security overview
Application security overview
General security principles
Secure installation and configuration
Installation overview
Transport Layer Security (TLS)
Signing authorizations and deployment packages
Use digital certificates issued by Certificate Authorities
Configure strong database passwords
Close all unused ports
Disable all unused services
Post-installation configuration
Restrict access to Central Designer server machines
Configure strong user passwords
Configure rights and roles
Configure IIS to prevent clickjacking
Security features
User security features
Password configuration for user security
Passwords for new users
Login security
No data loss after a session transaction
Automatically deactivated user accounts
Restricted access to the application
Security events logs
Application security features
Rights assigned to roles
Users assigned to roles
Default user
Data security features
Protecting study objects
Audit trails for data security