SecureTransport 5.4 Administrator Guide Save PDF Selected topic Selected topic and subtopics All content Access control Use the Axway SecureTransport Access menu to configure how SecureTransport performs access control. Access control defines and restricts the rights of individuals to obtain data from, or place data onto, a storage device. Also, access control defines and restricts the rights of individuals to login. Access control changes are copied to all SecureTransport Servers in your Enterprise Cluster (EC). Note If your SecureTransport deployment includes SecureTransport Edge servers in a peripheral network (DMZ), you must configure all the settings under the Access menu that are applicable to SecureTransport Edge exactly the same on both SecureTransport Edge and SecureTransport Servers. The following topics describe the various methods to control access to SecureTransport: User classes Secure Socket Layer access Virtual groups Filesystem restrictions Upload restrictions Download restrictions FTP command restrictions Protocol server access control User limits User and group access Login restrictions Related Links
Access control Use the Axway SecureTransport Access menu to configure how SecureTransport performs access control. Access control defines and restricts the rights of individuals to obtain data from, or place data onto, a storage device. Also, access control defines and restricts the rights of individuals to login. Access control changes are copied to all SecureTransport Servers in your Enterprise Cluster (EC). Note If your SecureTransport deployment includes SecureTransport Edge servers in a peripheral network (DMZ), you must configure all the settings under the Access menu that are applicable to SecureTransport Edge exactly the same on both SecureTransport Edge and SecureTransport Servers. The following topics describe the various methods to control access to SecureTransport: User classes Secure Socket Layer access Virtual groups Filesystem restrictions Upload restrictions Download restrictions FTP command restrictions Protocol server access control User limits User and group access Login restrictions