Configure Security Options
This chapter describes how to set options relating to security – who can log into the node, how they are authenticated, and what rights they have once logged in.
The chapter includes the following sections:
| About Security and Access |
| About Role-Based Access |
| Configure Authentication and Authorization (AAA) |
| Configure AAA Authentication Options |
| Grant Roles with External Authentication Servers |
| Add AAA Servers to the Node’s List |
| Configure Roles in External Authentication Servers |
| Supported Clients |
| Default Ports |
| FIPS 140-2 Compliance |
| UC APL Compliance |
| Common Criteria |
| GigaVUE‑OS Security Hardening |
| Best Practices for Security Hardening |



