Connections Security
- Allow third-party applications access to data via the OAuth2 protocol
- Configure single sign-on
- Configure the AJAX proxy
- Enable locked domains
- Enable virus scanning
- Force traffic to be sent over SSL
- Force users to log in before they can access an application
- Secure applications from malicious attack
Related reference: