docmain.css" /> Install the Security Proxy Server - Installation Guide

Install the Security Proxy Server

Use the automated installer to install and configure the Security Proxy Server and to generate the required trusted certificates so you can begin creating secure sessions.

If you cannot use the automated installer, other installation options are available that require additional configuration.

NOTE: About secure connections

The Security Proxy Server can be installed on the same computer as the Administrative Server or on a different computer. Although data between the terminal session and the Security Proxy server is encrypted, data between the Security Proxy server and the host computer is typically not encrypted.

If you install and run the Security Proxy server directly on the host computer, connections will be highly secure but CPU-intensive because additional processing is required to encrypt and decrypt the data stream.

With any installation method, you can increase the security of terminal session connections by ensuring that there is only one known, secure link between the Security Proxy server and the host computer. If you select End to end encryption when configuring a session, the connection between the Security Proxy and the host will use TLS.

Installation Methods