Securing SRMPDF version

Security overview

Learn how to set up security for SRM.

SRM can operate in both secure and unsecure environments, as well as a mix of both. In addition, it can also connect to clusters that have differing security setups. Configuring security can be achieved by adding the appropriate security related properties to your srm.properties configuration file. The properties set should match the security setup of the cluster or clusters that SRM is connecting to.

We want your opinion

How can we improve this page?

What kind of feedback do you have?