Tutorials Security

Security

Firewalls, hardening, encryption, access control

security Advanced

Configure OpenVPN LDAP authentication for enterprise users with Active Directory integration

Set up OpenVPN server with LDAP authentication against Active Directory, enabling centralized user management and group-based access control for enterprise VPN deployments.

45 min 4 distros 160 views
security Intermediate

Configure Redis backup encryption with GPG for secure automated backups

Set up encrypted Redis backups using GPG keys with automated scheduling through systemd timers. This tutorial covers GPG key management, backup script creation, and secure restoration procedures for production Redis environments.

45 min 4 distros 214 views
security Advanced

Configure Airflow DAG security and isolation with RBAC policies

Set up comprehensive security for Apache Airflow with role-based access control, DAG-level permissions, and resource isolation. Configure user authentication, implement fine-grained security policies, and establish monitoring for production-grade workflow orchestration.

45 min 4 distros 160 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 175 views
security Intermediate

Setup Nginx with ModSecurity 3 web application firewall for advanced threat protection

Configure Nginx with ModSecurity 3 and OWASP Core Rule Set to protect web applications against SQL injection, XSS, and other common attacks. This tutorial covers complete WAF setup with security rules, performance optimization, and threat testing.

45 min 4 distros 167 views
security Intermediate

Configure SonarQube LDAP authentication with Active Directory and user group management

Set up SonarQube to authenticate users against Active Directory using LDAP. Configure automatic user provisioning, group synchronization, and role-based access control for enterprise environments with centralized authentication.

25 min 4 distros 133 views
security Advanced

Implement HAProxy WAF integration with ModSecurity 3 for advanced threat protection

Configure HAProxy with ModSecurity 3 using SPOE protocol to create a high-performance web application firewall that protects against OWASP Top 10 threats while maintaining load balancing capabilities.

45 min 4 distros 175 views
security Intermediate

Set up centralized logging with rsyslog and logrotate for security events

Configure a centralized rsyslog server to collect security events from multiple systems, implement automated log rotation with logrotate, and set up filtering and alerting for critical security incidents across your infrastructure.

45 min 4 distros 153 views
security Intermediate

Configure Node.js JWT authentication with Redis session storage and security hardening

Set up secure JWT authentication for Node.js applications with Redis session storage, security middleware, and production-ready hardening practices.

45 min 4 distros 129 views
security Intermediate

Configure SonarQube LDAP authentication and user management with Active Directory integration

Set up enterprise user authentication for SonarQube using LDAP and Active Directory. Configure group mapping, role-based access control, and automated user provisioning for centralized identity management.

45 min 4 distros 160 views
security Advanced

Configure advanced Consul ACL policies for production security hardening

Set up comprehensive Consul Access Control Lists with bootstrap tokens, role-based permissions, and secure inter-node communication for production environments. This tutorial covers ACL system initialization, policy creation, and agent token configuration.

35 min 4 distros 207 views
security Advanced

Configure Kibana 8 advanced security with field-level restrictions and role-based access control

Implement comprehensive security controls in Kibana 8 with field-level restrictions, document-level security, and role-based access control for production Elasticsearch deployments.

45 min 4 distros 156 views