For the list of all supported Decision Insight downloads and releases, see the Downloads page.

Security configuration

Security architecture

Security configuration

How to secure your installation / restrict which files the deployment can access or modify

For a Linux deployment, see  Secure your installation.

For a Windows deployment, see Secure your installation.


How to create an SSL/TLS connection

HTTP / HTTPS

To configure HTTPS connections, see:

To configure HTTP connections, see:

JMX

To secure JMX connection, see JMX over SSL encryption.

Protocols and Cipher suites

By default, the configuration pertaining to protocols and cipher suites is secure. However, it can be configured. For more information, see Global SSL excluded ciphersuites and protocols.

How to import certificates or keys

See How to create a key store for HTTPS communication.

How to secure primary / replicas communication

See Primary / Replica network prerequisites.


Related Links