What's in Security
In the Security section, you will find information on how to configure and optimize the Zend Server for IBM i and components to function more securely.
This document includes information on the following information:
- Allowed Hosts - This section describes the Allowed Hosts lists and offers recommendations on which hosts to add to the Allowed Hosts list for development and production environments.
- Securing the Administration Interface - This section provides information on how to set an IP address-based access control list on the Web server running the Administration Interface .
- Configuring PHP for Security - This section explores how you can add an additional security boost to your PHP applications by properly configuring your PHP runtime environment settings.
- Configuring Debugger Access Control - The how, when and why you should limit IP permissions.
- Monitor Security Blacklist - How to hide certain values that are not relevant for diagnostics for security reasons.