Deployment
There are many aspects of security that should be considered when installing and running Stroom.
There are many aspects of security that should be considered when installing and running Stroom.
Authentication against other systems.
User accounts for authentication when using Stroom’s internal identity provider.
The Stroom user and group entities that can be granted application and document permissions.
Assigning application level permissions (such as ‘Manage Users’) to users or groups.
Assigning document level permissions (such as ‘View’) to users or groups.