Specifications

CHAPTER 13: ADVANCED ADMINISTRATION 187
Configure Security
The Security Manager is used to manage how CC-SG provides access to users. Within Security
Manager you can configure authentication methods, SSL access, AES Encryption, strong
password rules, lockout rules, the login portal, certificates, and access control lists.
Remote Authentication
Please refer to Chapter 10: Configuring Remote Authentication for detailed instructions on
configuring remote authentication servers.
About CC-SG and AES Encryption
You can configure CC-SG to require AES 128 encryption between your client and the CC-SG
server. When AES encryption is required, all users must access CC-SG using an AES-enabled
client. If AES encryption is required, and you try to access CC-SG with a non-AES browser, you
will not be able to connect to CC-SG.
Check Your Browser for AES Encryption
If you do not know if your browser uses AES, check with the browser manufacturer.
You may also want to try navigating to the following web site using the browser whose
encryption method you want to check:
https://www.fortify.net/sslcheck.html. This web site will
detect your browser’s encryption method and display a report. Raritan is not affiliated with this
web site.
Requiring AES Encryption between Client and CC-SG
In Security Manager, you can configure CC-SG to require AES-encryption for sessions between
the client and the CC-SG server.
1. On the Administration menu, click Security.
2. In the General tab, check the Requires AES Encryption between Client and Server check
box.
3. A message appears to alert you that your clients must use AES encryption to connect to CC-
SG once this option is selected. Click OK to confirm.
4. The Key Length field displays 128. 128-bit encryption will be required between your client
and the CC-SG server.
5. The Browser Connection Protocol field displays HTTPS/SSL selected.
6. Click Update to save your change.