Secure the installation

This topic describes how to manage the security of your Connect instance.

Security configurations

This table lists the areas that you need to configure in order to ensure a secure instance of Connect.

Step Learn more
Configure an SSL connection for the database.

Secure the connection

Configure Connect to be accessible over SSL/TLS.

SSL/TLS configuration

Install endpoint certificates for Connect data sources to ensure secure communication

Install SSL certificates

Configure SSO authentication

SSO authentication setup

Ensure that all secrets are encrypted in the configuration files

SSL/TLS configuration

Database connection configuration

SSO authentication setup

Backup the Connect data on a regular basis

Back up data

Back to top

Linux secure usage

To ensure a secure environment for Connect on Linux, it is mandatory to have a dedicated installation user. This user should be used exclusively for installing, upgrading, and managing the Connect services. For details, see Linux pre-installation considerations.

Back to top

See also: