Setup CGE Security
Overview of the CGE security setup process
Setting up security for a given instance of CGE involves the following steps:
- Configure authorized logged in Linux users (including the database owner) in an appropriate authorized_keys file
- Configure any super client authorized users using the public SSH key of the Super Client and the usernames of the various users in the appropriate authorized_keys file
- Configure user permissions in the database ACL file
- Optionally create an SSL configuration for cge-cli fe
- Create an authentication configuration (private or LDAP, simple or forms based) for cge-cli fe
- Start the CGE Web UI using cge-cli fe with appropriate security options