This section provides specific instructions on how to install, configure, and maintain iFolder in the most secure way possible.
-
Section 2.1, Secure Communication with the LDAP Server
-
Section 2.2, Communication between the Web Admin Server and the Web Admin Browser
-
Section 2.3, Enterprise Client/Server Communications
-
Section 2.4, Web Access Server Communications
-
Section 2.5, Disabling the SSL 2.0 Protocol
-
Section 2.6, Configuring a Cipher Suite to Use for SSL/TLS
-
Section 2.7, Installing Trusted Roots and Certifications on the iFolder Server
-
Section 2.8, Installing Server Certificates from a Known Certificate Authority
-
Section 2.9, Using a Shared Certificate in iFolder Clusters
-
Section 2.10, Ensuring Privilege Separation for the iFolder Proxy User
-
Section 2.11, Using Synchronize Now to Remove Users
-
Section 2.12, Controlling Access to the iFolder Data Store
-
Section 2.13, Controlling Access to the iFolder Server Configuration Files
-
Section 2.14, Controlling Access to And Backing Up the iFolder Audit Logs
-
Section 2.15, Encrypting Data on the Server
-
Section 2.16, Preventing the Propagation of Viruses
-
Section 2.17, Backing Up the iFolder Server
-
Section 2.18, Loading the Recovery Agent Certificates