Jump to: navigation, search
Line 13: Line 13:
 
For details about how Web Services handles authentication, see [[SecuredConnectionsSAMLHTCCFlow|Web Services authentication flow]].
 
For details about how Web Services handles authentication, see [[SecuredConnectionsSAMLHTCCFlow|Web Services authentication flow]].
  
==Next step==
 
* [[StartWSA|Starting and stopping Web Services and Applications]]
 
 
[[Category:V:HTCC:9.0.0DRAFT]]
 
[[Category:V:HTCC:9.0.0DRAFT]]

Revision as of 13:38, January 28, 2020

Configuring security

Web Services adheres to the standards described in the Open Web Application Security Project (OWASP) Top 10 — see the OWASP website for details about the Top 10 — and has adopted several methods of ensuring security, for example:

  • Errors are logged locally to prevent information leakage through API requests.
  • User sessions have a timeout option.
  • Cross Site Request Forgery Protection

Web Services includes additional security configurations that you can use with your installation:

For details about how Web Services handles authentication, see Web Services authentication flow.

Comments or questions about this documentation? Contact us for support!