Skip to content

Security

Security configuration schemas.

Overview

Security-related configuration.

Components

JWT Configuration

Token-based security.

SSO Configuration

Single sign-on.

Encryption

Data encryption settings.