Security
As soon as possible, perform these security tasks.
Set a strong password
Make sure your password has 8 to 16 characters, is difficult to guess, and contains a mixture of uppercase, lowercase, and non-alphabetic characters.
Restrict Helix Core Server access to your client workspace root directory
Helix Core Server only needs access to the file revisions in your workspace. Access can be confined to the workspace by setting the P4CLIENTPATH variable to the root directory of your workspace. The P4CONFIG variable can be used to make that automatically apply whenever Helix Core client applications, such as P4 and P4V, use the workspace. Follow the steps for your operating system.
Windows | Linux and macOS |
---|---|
|
|
To learn more, see P4CLIENTPATH and P4CONFIG in the Helix Core Command-Line (P4) Reference.
Contact your administrator about authentication features
Your Helix Core Server controls the following features.
-
SSL connections to connect to an SSL-enabled server. If SSL is in use, you should only accept the fingerprint shown when
p4 trust
is run after the administrators has validated that it is correct. -
Ticket based authentication. This depends on the server security level that the administrator chooses.
-
Integration with an identity provider through Helix Authentication Service and multi-factor authentication through your identity provider (IdP). To learn more, see Helix Authentication Service Administrator Guide.
-
The Helix MFA app, which should only be used when your password store and your MFA service are separated, such as using LDAP as your password store with Okta as your MFA service. To learn more, see Multi-factor authentication in the Helix Core Server Administrator Guide.