NexJ Logo

Configuring security settings

This section describes how to configure single sign-on authentication for NexJ applications and how to create custom authentication interceptors for flexible authentication. It also describes how to secure NexJ applications using security models, perimeter authentication, and by encrypting deployment files.