You are looking at documentation for an older release.
Not what you want? See the
current release documentation.
Now that you have Shield up and running, you might want to:
- Define and Use Custom Roles for fine-grained access control.
- Integrate with LDAP or Active Directory, or require certificates for authentication.
- Use SSL/TLS encryption to secure communications to and from nodes.
- Use IP Filtering to allow or deny requests from particular IP addresses or address ranges.