Advanced security concepts not included
These security configuration methods are less common and more complex and are not covered in this guide. For details about how to perform these configurations, see Landmark User Setup and Security.
Security technique | Description/reason to perform |
---|---|
Creating security administrators | Adding users who have super-user access rights. |
Configuring login pages | You can customize a sign in page for your site. |
Setting up and administering user proxies | Determine if users can designate another user to act for them in their absence. |
Administering password policies | Authentication mechanisms should always require
sufficiently complex passwords. Consider these requirements when
creating a password policy:
|
Making domain-wide configuration changes | For example, adding a new domain. |
Configuring vulnerability mitigation | Information about configuring tools for preventing attacks to web-based products. This includes tools for preventing XSS scripting attacks and configuring session validation. |
Using command-line tools for administering Landmark, including Infor Security | An overview of the basic administration tools, including command-line tools, and how to use them. |