Configuring Security Settings
To ensure system security, the security administrator can configure the security settings of platform login, account, and network access.
Procedure
- Log in to a database encryption and access control instance as the secadmin user.
- In the navigation tree on the left, choose System Management > System Settings.
- In the Platform Login Security Settings area, configure the parameters.
Figure 1 Platform login security settings
Table 1 Parameters of platform login security settings Parameter
Description
Security Management Mode
HTTPS security mode is supported with updatable certificates.
Image Verification Code
- You can choose whether to enable this function.
- Once enabled, an image verification code is required for system login to prevent brute-force attacks.
Idle Timeout Logout
Set the automatic logout interval.
Multi-terminal Login
You can choose whether to enable this function.
- Yes: An account can be logged in at different places.
- No: An account cannot be logged in at different places.
Login Security Policy
- You can choose whether to enable this function to prevent brute-force attacks.
- For example, if the login information is incorrect for three consecutive times within 3 minutes, the account is locked for 5 minutes.
Two-factor Security Authentication
Configure the login authentication mode.
- Password: Only password is required for login.
- Password and USBKey: You need to enter the password and insert the USBKey with the certificate to the device.
- In the Account and Password Security Settings area, set the password validity period.
- In the Network Access Security Settings area, set the access restrictions.
Figure 2 Network access security settings
Table 2 Parameters of network access security settings Parameter
Description
Login IP Address Limit
Whether to restrict the access source.
- Accept All IP Addresses: All IP addresses can access the system.
- Allow Specific IP Addresses: Only IP addresses in the allowlist can access the console of database encryption and access control.
Allowed Login IP Addresses
Enter the allowed IP addresses and separate them with line breaks.
Network Permission Configuration
You choose whether to disable ICMP probing and SSH login.
- Disable ICMP Probing: If you enable this function, other devices cannot ping the system.
- Disable SSH Login: SSH login is disabled.
NOTE:If Disable SSH Login is enabled, O&M engineers cannot access the server background through SSH.
Host Proxy Whitelist
Enter the host proxy whitelist. The value can be an IP address or a domain name.
- Click Confirm.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot