The security framework permits authentication of connecting components and authorization of operations for all communicating components of the cluster.
Security Implementation Introduction and Overview
Encryption, SSL secure communication, authentication, and authorization help to secure the cluster.
Security Detail Considerations
This section gathers discrete details in one convenient location to better help you assess and configure the security of your environment.
A cluster using authentication bars malicious peers or clients, and deters inadvertent access to its cache.
Client operations on a cache server can be restricted or completely blocked based on the roles and permissions assigned to the credentials submitted by the client.
SSL/TLS protects your data in transit between applications.