Managed Search Security Overview The SearchStax Managed Search service automatically secures your Solr search infrastructure with built-in industry-standard security measures at the cluster, network and dashboard levels. Learn more about… Continue reading Managed Search Security Overview
Category: Security
Topics related to passwords and authentication.
Change Your Password
Change Your Managed Search Password There are multiple ways to change a password in the SearchStax Managed Search service depending on context. If you are locked out of your Managed… Continue reading Change Your Password
Two-Factor Authentication
Managed Search Two-Factor Authentication All SearchStax Managed Search service users have the option of enabling Two-Factor Authentication (2FA) using the Google Authenticator. Navigate to the User Preferences > Two-Factor Authentication… Continue reading Two-Factor Authentication
Single Sign-On – Okta
Managed Search Single Sign-On (SSO) for Okta The SearchStax Managed Search service now offers the ability for clients to set up Single Sign-On (SSO) to let their users log into… Continue reading Single Sign-On – Okta
Single Sign-On – OneLogin
Managed Search Single Sign-On (SSO) OneLogin The SearchStax Managed Search service now offers the ability for customers to set up Single Sign-On (SSO) using OneLogin to let their users log… Continue reading Single Sign-On – OneLogin
Single Sign-On – PingFederate
Managed Search Single Sign-On (SSO) PingFederate The SearchStax Managed Search service now offers the ability for customers to set up Single Sign-On (SSO) using PingFederate to let their users log… Continue reading Single Sign-On – PingFederate
Single Sign-On – Azure AD
Managed Search Single Sign-On (SSO) Azure AD The SearchStax Managed Search service now offers the ability for customers to set up Single Sign-On (SSO) to let their users log into… Continue reading Single Sign-On – Azure AD
Securing Deployments
Securing Solr Deployments The SearchStax Managed Search service takes the security of your Solr search infrastructure very seriously. We have built-in industry-standard security at the level of the cluster, network… Continue reading Securing Deployments