Product security

The security section provides instructions and recommendations to strengthen the security of Central Governance. Provided are:

  • How to manage users in Central Governance
  • Fine-grained access control
  • Overview of identity and access management (IAM)
  • Best practices and use of certificates

This section is targeted at:

  • Network engineers
  • Product administrators

Identity Providers

Central Governance supports 3 types of Identity Providers:

  • Custom: Users are managed outside of Central Governance in an external Identity Provider. The communication between Central Governance and the external Identity Provider is done using SAML 2.0 (Security Assertion Markup Language).
  • Internal: Users are managed internally by Central Governance.
  • Default: User creation and authentication is managed by Central Governance, while authorization is provided by the Access and Security service.

You can use the cgcmd configure utility to switch from one Identity Provider setup to another. For more information about migrating between Identity Provider set ups, see the Central Governance 1.1.3 Migration Guide.


Central Governance | Document Directory

Related Links