Skip to content

Security

Planned coverage:

  • Proxy authentication (basic auth, OAuth2)
  • TLS modes — insecure, self-signed, managed certificate
  • Network exposure — what’s published to the host, what’s internal to the bridge network
  • License file handling
  • Credential storage
  • Recommendations for production deployments