Version

    Post-installation best practices

    To improve security of CloverDX Server, you should:

    • Change the default password for clover user. Without changing the password, everybody would be able to log in as clover. See Change credentials.

    • Create a user different from clover and add it to the admin group. If there are more administrators, create a user account for each. See Users.

    • Set the master password. Without the master password, you cannot use secure parameters. See Securing job parameters in Server.

    • Run CloverDX Server with privileges of an ordinary user, e.g. create a system account clover used only for running CloverDX Server. Do not run CloverDX Server under the root account.

    • The communication with a system database may be unencrypted. Consider encrypting the connection to system database too.

    • If a database provides you with a root/admin account, do not use this account for CloverDX Server. Create a separate database user account, e.g. clover.

    • Configure CloverDX Server to run on HTTPS. If you communicate over HTTP, your data is sent unencrypted and eavesdroppers can easily see it.

    • Disable the HTTP API if you do not need it. See Simple HTTP API.

    • In Data Services, put KeyStores outside a sandbox and run the service on HTTPS. If you have a KeyStore in a sandbox, a user with write permissions could replace it with another KeyStore. HTTPS Connectors.

    • Enable user lockout after repeated failed login attempts. If you use this feature in Cluster, make sure that all Cluster nodes have the same lockout configuration. See User lockout