3 Security configuration issues
This section describes security configuration issues you must consider when implementing XCA.
- General security principles
This section describes fundamental security principles for using any application securely. - Configure strong database passwords
This section discusses configuring strong passwords on the database. - Follow the principle of least privilege
This section describes the principle of least privilege. - Disable Telnet service
This section describes why you should not use the Telnet service. - Disable other services
This section explains why you should disable other unused services. - Design multiple layers of protection
This section describes the need for multiple layers of protection. - Use SSL
This section describes why SSL is a good choice for XCA.