Chapter 6: Configuring CLM security

Overview

Purpose

This chapter describes fundamental CLM system security elements, and includes important information that you must consider as you deploy a CLM system or entity.

For additional CLM security information such as post-deployment configuration, see the NSP Security Hardening Guide.

Contents

Overview

CLM system security

Introduction

Securing the CLM

Operating system security for CLM stations

CLM Kubernetes Platform Communications

CLM platform user accounts

Restricting root-user system access

HTTPS Strict-Transport Security (HSTS)

CLM user authentication

Overview

CLM user authentication functions

CLM user activity logging

CLM Transport Layer Security (TLS)

CLM TLS overview

CLM TLS configuration requirements

CLM TLS configuration procedures

To generate custom TLS certificate files for the CLM

To suppress security warnings in CLM browser sessions