

#Drupal whitelist ip menu item password#
Add a user, entering the username, password and role (see below).Select the desired Deployment and click the Security > Auth option in the menu tree.To enable the Basic Authentication plugin: When disabled, Solr will delete all existing Solr users.


If your application is hosted elsewhere, try to host it as close to your search infrastructure as possible. Internal network security for these hosting providers is extremely high and eliminates any chance of a hacker potentially sniffing your network traffic. SearchStax recommends that you situate your application infrastructure in the same local network as your hosting provider (for example, AWS or Azure). You can lock down your clusters as described below. Premium customers may also request at-rest encryption for their data files. For our premium customers (Gold, Platimum, and Platinum Plus levels) who have high security requirements, we recommend a SearchStax Cloud Private environment with VPC Peering.
