Security features How security works Configuring authentication Controlling authentication Encryption Encrypted passwords Encrypted seed files Encrypted connections Configuring a secure Broker Additional safeguards Example security configurations Previous topic: Controlling the Startup of VMware Smart Assurance Software Next topic: Operation of the Broker