Security considerations for Rhapsody
You can take actions to ensure that your installation is secure, customize your security settings, and set up user access controls. You can also ensure that you know about any security limitations that you might encounter with this application.
- Enabling security during installation
- Customizing your security settings
- Setting up user roles and access
- Privacy policy considerations
- Security limitations
Enabling security during installation
On the Windows operating system, you must have either administrator privileges for the machine on which you are installing the product or know the credentials for an administrative account to be able to install the product successfully. For more information, see Installing Rhapsody.
Customizing your security settings
Rhapsody does not require user authentication, login, or passwords. The product does not use any encryption.
Encrypting data at Rest
Rhapsody does not encrypt the models or data files. To keep your data secure, refer to best practices of IT policy of your organization for device or file system encryption, or by any other methods.
Setting up user roles and access
Since Rhapsody does not use authentication, there are no user roles or groups.
Privacy policy considerations
For Rhapsody , the software offering does not use cookies or other technologies to collect personally identifiable information. For more information about cookies, see the Notices topic.
Security limitations
Rhapsody does not have any specific security limitations.