Securing Seeker Deployment
Recommended measures that can help you secure your Seeker deployment.
Allow only secure connections to the server
By default, the Seeker server is configured to accept both HTTP and HTTPS communications. To strengthen the communication security, we recommend disabling HTTP connections by deleting or commenting out the corresponding entries in the server configuration file. For detailed instructions, see Customize Seeker Connection Settings.
Replace the self-signed certificate
The initial installation of Seeker provides a self-signed certificate to enable HTTPS connections on a dedicated port. By default, this port number is 8443, but you can customize it during or after an installation. While this certificate is enough for testing and training purposes, you should not rely on it for production usage. Instead, provide your own certificate and deploy it, as described in Configure HTTPS Certificates.
Integrate with your enterprise identity provider
Seeker provides a local account system for the manual creation and maintenance of users and groups. Additionally, Seeker can integrate with LDAP/Active directory or SAML IdPs (identity providers) for user authentication. If your enterprise IdP supports one of these protocols, we recommend enabling this integration instead of managing local accounts on the Seeker server. This way you will be taking advantage of all the capabilities of your IdP, for example, two-factor authentication.
For detailed instructions, see Configure LDAP/Active Directory, Configure SAML 2.0-based SSO.