RSA Archer Platform 6.4 Security Configuration Guide
User Manual:
Open the PDF directly: View PDF
Page Count: 114 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Preface
- Chapter 1: Security Configuration Settings
- User Access Control
- Configuring an Instance for Single Sign-On
- Configuring the Instance Database Connection String and Pooling Options
- Changing SysAdmin and Services Account Passwords
- Configuring the Login Page
- Authentication Methods
- Message Logging
- Port Usage
- Network Encryption
- Encrypting Data
- Configuring the Hardware Security Module
- Additional Security Considerations
- JavaScript Transporter Security Considerations
- Java Runtime Environment Deployment
- Privilege Levels for Archer Services
- Least Privileges Requirement for RSA Archer Database Objects
- RSA Archer Supported Environments
- Support Categories
- File Repository Path
- Restrict Permissions on Repository Files
- Keyword Index Files
- Company Files Path
- Building Global iViews
- Formatting iView Videos
- Adding Objects to the Layout
- Offline Access
- Installing Offline Access
- Disabling ASMX Web Services
- Chapter 2: Secure Deployment and Usage Settings
- Chapter 3: Maintaining Security
- Chapter 4: FIPS Compliant Mode
- Appendix A: Authentication Methods