This Knowledge Base article provides an overview of the advanced security configurations Replicator supports. Security configurations are applied at multiple levels within Replicator, SharePoint and IIS. Replicator relies upon the security that is configured within your SharePoint farm first and foremost.
The following diagram demonstrates the various areas that can be secured when replicating packages between two web applications:
This document will reference the above diagram while providing an overview of Secure Replication.
The first step to securing Replicator is to secure the SharePoint farm. The primary steps in securing a SharePoint farm are done through the configuration of secure connections and the use of least-privileged accounts.
Secure connections can be configured for SharePoint by using the Hypertext Transfer Protocol Secure (HTTPS) option when creating or extending web applications. Another method to secure connections is to create a Virtual Private Network (VPN) connection between farms. These methods can be used separately or in tandem to enhance connection security.
© 2021 Quest Software Inc. ALL RIGHTS RESERVED. Feedback Conditions d’utilisation Confidentialité