Secure the installation
This topic describes how to manage the security of your Connect instance.
Security configurations
This table lists the areas that you need to configure in order to ensure a secure instance of Connect.
Step | Learn more |
---|---|
Configure an SSL connection for the database. |
|
Configure Connect to be accessible over SSL/TLS. | |
Install endpoint certificates for Connect data sources to ensure secure communication | |
Configure SSO authentication | |
Ensure that all secrets are encrypted in the configuration files | |
Backup the Connect data on a regular basis |
Linux secure usage
To ensure a secure environment for Connect on Linux, it is mandatory to have a dedicated installation user. This user should be used exclusively for installing, upgrading, and managing the Connect services. For details, see Linux pre-installation considerations.
See also: