What's in Security
In the Security section, you will find information on how to configure
and optimize the Zend Server
and components to function more securely.
This document includes information on the following information:
- Allowed Hosts - This section describes
the Allowed Hosts lists and offers recommendations on which hosts
to add to the Allowed Hosts list for development and production environments.
- Securing the
User Interface - This section provides information on
how to set an IP address-based access control list on the Web server
running the User Interface for
the Windows, Linux and
Mac OS Xoperating
systems.
- Configuring PHP for
Security - This section explores how you can add an additional
security boost to your PHP applications by properly configuring your
PHP runtime environment settings.
- Monitor Security Blacklist -
How to hide certain values that are not relevant for diagnostics for
security reasons.