Setup CGE Security

Overview of the CGE security setup process

Setting up security for a given instance of CGE involves the following steps:
  • Configure authorized logged in Linux users (including the database owner) in an appropriate authorized_keys file
  • Configure any super client authorized users using the public SSH key of the Super Client and the usernames of the various users in the appropriate authorized_keys file
  • Configure user permissions in the database ACL file
  • Optionally create an SSL configuration for cge-cli fe
  • Create an authentication configuration (private or LDAP, simple or forms based) for cge-cli fe
  • Start the CGE Web UI using cge-cli fe with appropriate security options