Security Concept for AWA

In this section you find the details of the AWA security concept.

General

As a distributed application, AWA security is important. The pages of this section contain a step-by-step guide on how to enhance the security of your AWA installation.
The default installation comes with a solid and secure configuration, however this page will guide you through the operation security of the different components. All steps are independent and optional, thus you can skip steps if they are not necessary for your business.

Reading this guide is not a substitute for reading and understanding the detailed configuration documentation. Fuller descriptions of configuration parameters and attributes can be found in the relevant documentation pages.

Make sure that all other components in the system (operating system, network, database, etc.) are secured.

Depending on the operating system various security improvements are possible, for example on operating system level. Please consult the vendor of your operating system for further assistance and security best practices.

How to secure: