Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS Guide de l'utilisateur Page 63

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 328
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 62
Configuration Management Function
1-41
Configuration Management Function
This section describes how to deal with security threats using the Configuration Management function.
Configuration Management Function Usage Model
The following figure shows a typical usage model for the Configuration Management function.
Figure 1-3 Configuration Management Function Usage Model
The Configuration Management function stores operations in the Interstage Management Console
internally. For this reason, users do not need to be aware of the configuration of the configuration
management function. This chapter explains the settings information for the Environment Settings
window in a repository that is available to the system administrator, and also explains security breach
threats.
Resources to be Protected
This section explains the resources that should be protected for the repository that is managed by the
Configuration Management function.
Functions to be Protected
The following functions and procedures should be protected:
Operations using the Interstage Management Console
Vue de la page 62
1 2 ... 58 59 60 61 62 63 64 65 66 67 68 ... 327 328

Commentaires sur ces manuels

Pas de commentaire