Securing the system
This topics in this section describe how the Security user can secure the system:
- Enhancing-access-management— Explains security features for all components of the BMC Real End User Experience Monitoring.
- Handling-encrypted-traffic — Explains how to configure the system so that it can decipher encrypted traffic.
- Managing-security-configuration — Explains how to use the security configuration file.
- Securing-sensitive-data — Provides an example on how to secure private data in your web traffic (such as passwords and credit card numbers).
- Enabling-cross-domain-data-loading — Explains the cross-domain data loading.
- Managing-server-certificates-on-the-Console — Explains how to use server certificates to establish secure connections.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*