VMware Logo Docs
MyLibrary
times
  • MyLibrary

RSS
Twitter Facebook LinkedIn 微博
 

You can consider the following additional security measures to make your deployment secure:

  • Importing TLS certificates
  • Pseudo-random number generators (PRNG) algorithm
  • Configuring a secure Broker
  • Setting the SM_AUTHORITY variable
  • Specifying alternate security configuration files
  • Options to run as non-root on Linux systems
  • Preventing Elastisearch from being vulnerable to dynamic scripting
    If you configure Elasticsearch for access from a remote host, arbitrary code can execute. You can prevent this vulnerability.
  • Importing TLS certificates
    By default, an generates a self-signed TLS certificate that is presented to the incoming TLS connections. However, you can configure a certificate to use by performing the following step:
  • Pseudo-random number generators (PRNG) algorithm
    Global Console SSL uses (HMACDRBG256) as the default PRNG algorithm.
  • Configuring a secure Broker
    You can configure the to run in a secure manner.
  • Setting the SM_AUTHORITY variable
    The environment variable controls the authentication security features provided by the software. You can add and set the variable in the file.
  • Specifying alternate security configuration files
    You can define separate and files on hosts where multiple servers or clients are running. The environment variables that allows you to specify distinct configuration files are and .
  • Options to run as non-root on Linux systems
    This topic lists the options that are used in conjunction with each other to run as non-root user. These two options are only available on Linux systems. These options are available for the and commands.
Parent topic: Security Configuration Settings
check-circle-line exclamation-circle-line close-line
Scroll to top icon

Share on Social Media?
exclamation-circle-line
check-circle-line
:
exclamation-circle-line
|
check-circle-line
exclamation-circle-line

x
" "?