Security
Security recommendations and guidelines for running IBM® Sterling Call Center are
listed in this topic. It is intended to help you create a reasonably secure implementation of the
application.
Authentication
Authentication identifies users who have access to the application.
Authorization
Authorization enables you to grant permissions to a user for different resources. It occurs after you are authenticated in an application.
Adding login pages
The underlying UI framework enables you to set up more than one login page.
Supporting multiple guest users
With the underlying UI framework, your authentication process can include the authentication of one or more guest users for a particular URL of the application.
Adding request validators
The underlying UI framework allows you to set up more than one validation for a request.
Cross site request forgery
The underlying framework provides protection for the application against cross-site request forgery (CSRF), which maliciously exploits a web site where unauthorized commands are transmitted from a user that the web site trusts.
Protecting against the CSRF attacks
You can protect against the CSRF attacks.
Enabling cross-frame protection
You can implement cross-frame protection for your application.