Incorta logo
Documentation
START FOR FREE
  1. Home
  2. Guides
    1. Start
    2. Administer
    3. Analyze
    4. Configure
    5. Deploy
    6. Install
    7. Migrate
    8. Organize
    9. Secure
      1. Incorta Security Guide
      2. Secure Communication and Data
      3. Configure SSO
      4. Secure Objects and Business Data
    10. Upgrade
    11. Visualize
  3. Concepts
  4. Tools
  5. References
  6. Integrations
  7. Data applications
  8. Release Notes
  9. Incorta Premium

Guides → Secure

To learn more about the Incorta security model and optional security configurations, first review the Incorta Security Guide.

For more details on how to secure Incorta, review the following topics:

  • Secure Communication and Data:
    • Secure Tomcat
    • Secure Zookeeper
    • Encrypt Metadata Database Password
    • Setting the Session Timeout
  • Configure SSO:
    • Enable and Test SSO
    • Use Incorta Login
    • Use Azure AD as SAML2 SSO
    • Use Microsoft ADFS SSO
    • Use Auth0 SSO
    • Use IBM CIS SSO
    • Use Okta SSO
    • Use OneLogin SSO
    • Mobile SSO
    • Configure LDAP
    • Monitor Logins and Access
  • Secure Objects and Business Data:
    • Security Roles
    • Reset Super User Password
    • Set Read-only Schema Access
    • Runtime Security Filters
    • Session Variables
    • SOX Compliance

© Incorta, Inc. All Rights Reserved.

Privacy Policy