Security configuration

Security architecture

Security configuration

How to secure your installation / restrict which files the deployment can access or modify

For a Linux deployment, see  Secure your installation.

For a Windows deployment, see Secure your installation.

How to create an SSL/TLS connection


To configure HTTPS connections, see:

To configure HTTP connections, see:


To secure JMX connection, see JMX over SSL encryption.

Protocols and Cipher suites

By default, the configuration pertaining to protocols and cipher suites is secure. However, it can be configured. For more information, see Global SSL excluded ciphersuites and protocols.

How to import certificates or keys

See How to create a key store for HTTPS communication.

How to secure primary / replicas communication

See Primary / Replica network prerequisites.

Related Links