Table of Contents Table of Contents Title and Copyright Information Preface 1 Token Proxy Service Security Overview Basic Security Considerations Token Proxy Exchange Service Recommended Deployment Configurations Component Security Personal Data Security 2 Performing a Secure Token Proxy Service Installation Configuring the Installation Installing the Token Proxy Service Post-Installation Configuration Applying Software Patches Configuring the Token Proxy Exchange Service Data Purging 3 Implementing Token Proxy Service Security Token Proxy Service Exchange Security Managing Users Authenticating the Service Using the Audit Trail 4 Appendix Secure Deployment Checklist