Skip to main content

Securing the Striim server(s)

Administrators and other users should not log into the shell or other services of the operating systems hosting Striim Platform, configuration files, and scripts using usernames and passwords. Instead, the operating system should be configured to require clients to authenticate to a specific machine instance using an SSH certificate. See, for example: