Incorta logo
Documentation
START FOR FREE
  1. Home
  2. Guides
    1. Start
    2. Administer
    3. Analyze
    4. Configure
    5. Deploy
    6. Install
    7. Migrate
    8. Secure
      1. Incorta Security Guide
      2. Secure Communication and Data
      3. Secure Access
      4. Secure Objects and Business Data
    9. Upgrade
    10. Content Manager
  3. Tours
  4. Concepts
  5. Tools
  6. References
  7. Integrations
  8. Data applications
  9. Releases

Security Configurations

To learn more about the Incorta security model and optional security configurations, first review the Incorta Security Guide.

For more details on to secure Incorta, review the following topics:

  • Secure Communication and Data:
    • Secure Tomcat
    • Secure Zookeeper
    • Encrypt Metadata Database Password
  • Secure Access:
    • Monitor Logins and Access
    • Use Incorta Login
    • Use OneLogin SSO
    • Use Directory Services SSO
    • Use ADFS SSO
    • Use IBM CIS SSO
    • Use Okta SSO
    • Mobile SSO
    • Configure LDAP
    • Enable and Test SSO
  • Secure Objects and Business Data:
    • Security Roles
    • Reset Super User Password
    • Set Read-only Schema Access
    • Runtime Security Filters
    • Session Variables
    • SOX Compliance

© Incorta, Inc. All Rights Reserved.

Privacy Policy