Xton Access Manager (XTAM) Security Hardening Guide
Introduction
This section outlines some of the best practices for securing your XTAM instance, whether it be installed on a single server or in a multi-clustered environment.
Technical Support
If questions remain or issues arise while using XTAM, please contact the Xton Technologies Support team using the following email address: