Configure Security Options
This chapter describes how to set options relating to security – who can log into the node, how they are authenticated, and what rights they have once logged in.
The chapter includes the following sections:
About Security and Access |
About Role-Based Access |
Configure Authentication and Authorization (AAA) |
Configure AAA Authentication Options |
Grant Roles with External Authentication Servers |
Add AAA Servers to the Node’s List |
Configure Roles in External Authentication Servers |
Supported Clients |
Default Ports |
FIPS 140-2 Compliance |
UC APL Compliance |
Common Criteria |
GigaVUE‑OS Security Hardening |
Best Practices for Security Hardening |