Workflow to secure the server

The following workflow summarizes the steps required to secure the server and authenticate users. The order might vary, depending on the authentication method used and on whether users are automatically created.

  1. Set up SSL if needed.
  2. Set up a firewall if needed.
  3. Set up protections for users and user groups.
  4. Review available authentication options and server security levels.
  5. Set the security level for the server.
  6. Define the authentication to be used for existing users and new users.
  7. Create authentication triggers if you are planning to use a non-standard LDAP server.
  8. Enable and configure LDAP authentication if you are planning to authenticate users against an LDAP or Active Directory server.

See also the Support Knowledgebase articles on "Securing Your Helix Server" and "Connecting an ssh client to Helix Core Server through a firewall".