This section of the Reference document describes changing passwords for components in SAKA. Some of these passwords have little impact on the operations of the appliance, while some have the ability to destroy all encrypted data, creating either temporary disruption to services or a complete denial-of-service attack (depending on operational procedures).
Copyright (c) 2001-2024 StrongAuth, Inc. (dba StrongKey) All Rights Reserved