Configuration

This section covers the configuration of the Security Proxy.

  • A list of environment Properties
  • Running multiple instances of the Security Proxy in a Cluster
  • Redis configuration for the Security Proxy