Solr Security

SearchStax Managed Search automatically secures your Solr search infrastructure with built-in industry-standard security measures at the cluster, network and dashboard levels

What security features do I need to ensure my Solr environment and data is protected?

Authentication & Authorization

to control who has access to your Solr instance

Transport
Security

to protect communication between the Solr service and client applications

Secure
Configuration Access

to ensure configuration files are only accessible to authorized users

Restrict
API access

to authorized users through firewalls, IP whitelisting and access control lists

Monitor
Logs

to regularly identify and respond to security incidents and suspicious events

Keep Solr
Up-to-Date

with the latest security patches and updates so known vulnerabilities are addressed

SearchStax Managed Search lets you focus on growing your business instead of worrying about Solr security

SearchStax has you covered with robust Solr security features:

Add the optional Security Pack for environments with higher compliance requirements

The SearchStax Solr Security Pack is an optional add-on for any Gold, Platinum or Platinum Plus plan. The Security Pack covers all Solr deployments in an account.

Single Sign-On
(SSO)

SSO provides a seamless user experience by allowing a user to sign on to SearchStax using the same credentials they use for other applications within the same company. The use of SSO enforces risk-based access policies, automates provisioning workflows and helps reduce IT costs.

Transport Layer Security

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. TLS protocol provides privacy and data integrity between two or more communicating applications

Monthly Scans & Priority Patching

With the Security Pack, we increase the frequency of vulnerability scans from quarterly to monthly. We also provide priority patching which means that Security Pack customers will have their patches applied before other customers.

Check out these resources to get more information on Solr security with SearchStax

Download additional information about Solr Security

Check out the SearchStax Cloud documentation for securing Solr

Review the Help Center questions and answers around Solr security

Frequently Asked Questions About
Solr Monitoring and Alerting

What standard Solr security features are included with SearchStax Managed Search?

The following security features come out-of-the-box with SearchStax Managed Search:

  • Encryption in Transit – SearchStax provides Transit Level Encryption (TLS) of all traffic going over the network using the latest TLS encryption algorithms.
  • Encryption at Rest – Encryption at Rest converts sensitive data into another form of data that can only be read by someone else who has the matching encryption key. Using encryption at rest prevents the unauthorized users from accessing the unencrypted data by ensuring that all data is encrypted when it is on disk.
  • Solr Basic Authentication – You have the option to enable the Solr Basic Authentication Plugin through the SearchStax dashboard to restrict access to your Solr dashboard, and demand authorization for query requests and index updates.
  • Two-Factor Authentication – Two-Factor Authentication or 2FA is an optional security protocol available to all accounts and users, and adds an extra layer of protection to the account login.
  • IP Filtering – SearchStax provides IP Filtering using the API methods or the SearchStax dashboard.
  • User Roles – Each SearchStax account is restricted to the Owner of that account plus any SearchStax users who have been granted access to that account by the Owner.
  • Audit Logs – Audit log provides you with a list of all user actions within your account, including those of the SearchStax Support team.
  • Zookeeper Security – We lock down the Zookeeper ensemble so it cannot be reached from the Internet by using IP Filtering.
  • Dashboard Security – All connections to the SearchStax dashboard use HTTPS, which encrypts your traffic in transit. We follow industry best practices for passwords.
What features are included with the Solr Security Pack?

The SearchStax Managed Search Security Pack includes:

  • Single Sign-On (SSO) – SSO provides a frictionless user experience by allowing a user to sign on to SearchStax using the same credentials they use for other applications within the same company. The use of SSO enforces risk-based access policies and automates provisioning workflows and enables self-service tools to help companies reduce IT costs. Our SSO uses the Microsoft Azure Active Directory and open standard Security Assertion Markup Language (SAML) to pass authorization credentials to service providers.
  • Monthly Vulnerability Scans – With the Security Pack, we increase the frequency of vulnerability scans from quarterly to monthly. We also provide priority patching which means that Security Pack customers will have their patches applied before other customers.
  • Transport Layer Security – Transport Layer Security (TLS version 1.2) is a cryptographic protocol designed to provide communications security over a computer network. TLS protocol provides privacy and data integrity between two or more communicating applications. The Security Pack allows the customer to specify the TLS version and ciphers.
How do we implement SSO for SearchStax Managed Search?

SearchStax Managed Search now offers the ability for customers to set up Single Sign-On (SSO) to let their users log into SearchStax apps with a single ID and password that works across multiple software systems.

We use the open standard Security Assertion Markup Language (SAML) to allow identity providers (IdP) to pass authorization credentials to service providers (SP). We use Microsoft Azure Active Directory to implement SSO for SearchStax.

SSO is an add-on SearchStax feature that is purchased separately as part of the Security Pack. If you are interested in the Security Pack, check with our sales team or your Account Manager for more information.

What are the best practices for Solr security?

The following are best practices for managing security for your Solr deployments:

  • Authentication and authorization to control who has access to your Solr instance
  • Transport security to protect communication between the Solr service and client applications
  • Secure configuration access to ensure configuration files are only accessible to authorized users
  • Restrict API access to authorized users through firewalls, IP whitelisting and access control lists
  • Monitor logs to regularly identify and respond to security incidents and suspicious events
  • Keep Solr up-to-date with the latest security patches and updates so known vulnerabilities are addressed

Ready to take the next step?
Schedule a demo to see how SearchStax makes Solr search infrastructure easy