Table of Contents
- 14.1. Use SSL and HTTPS
- 14.2. Restrict REST Access to the HTTPS Port
- 14.3. Encrypt Data Internally & Externally
- 14.4. Use Message Level Security
- 14.5. Replace Default Security Settings
- 14.6. Secure Jetty
- 14.7. Protect Sensitive REST Interface URLs
- 14.8. Protect Sensitive Files & Directories
- 14.9. Obfuscate Bootstrap Information
- 14.10. Remove or Protect Development & Debug Tools
- 14.11. Protect the OpenIDM Repository
- 14.12. Adjust Log Levels
- 14.13. Set Up Restart At System Boot
After following the guidance in this chapter, make sure that you test your installation to verify that it behaves as expected before putting it into production.
Out of the box, OpenIDM is set up for ease of development and deployment. When deploying OpenIDM in production, take the following precautions.

