BlueCielo Kronodoc 5.0 Administrator's Guide | BlueCielo ECM Solutions

You are here: About Kronodoc security mechanisms > Network configuration

Network configuration

Kronodoc should be placed behind the organization's firewall to shield it from attackers.

To further minimize the impact of a potential Kronodoc server compromise, a reverse proxy can be set up to prevent an attacker from gaining system level access to documents stored in Kronodoc Kronodoc.


Copyright © 2000-2012 BlueCielo ECM Solutions

www.bluecieloecm.com