Chapter 6: Configuring CLM security
Overview
Purpose
This chapter describes fundamental CLM system security elements, and includes important information that you must consider as you deploy a CLM system or entity.
For additional CLM security information such as post-deployment configuration, see the NSP Security Hardening Guide.
Contents
Operating system security for CLM stations
CLM Kubernetes Platform Communications
Restricting root-user system access
HTTPS Strict-Transport Security (HSTS)
CLM user authentication functions
CLM Transport Layer Security (TLS)
CLM TLS configuration requirements
CLM TLS configuration procedures
To generate custom TLS certificate files for the CLM