This section describes how to secure your application, use certificates, and implement HTTPS.
General Recommendations Securing your installation with HTTPS and SSL Protecting Your Application from Web Attacks Deactivating Roles for Production