# Security

- [Security overview](https://docs.weka.io/security/security.md): The system implements a comprehensive security framework with multiple controls to ensure secure communication and protect user data in the cluster.
- [Obtain authentication tokens](https://docs.weka.io/security/obtain-authentication-tokens.md)
- [Manage token expiration](https://docs.weka.io/security/manage-token-expiration.md): Learn how to configure and manage token expiration settings to maintain a secure authentication environment aligned with best practices.
- [Manage account lockout threshold policy](https://docs.weka.io/security/account-lockout-threshold-policy-management.md)
- [Manage KMS](https://docs.weka.io/security/kms-management.md): Efficiently manage and safeguard WEKA system keys through strategic KMS configurations and best practices. Optimize security and operational resilience.
- [Manage KMS using GUI](https://docs.weka.io/security/kms-management/kms-management.md): Explore procedures for managing Key Management System (KMS) integration with the WEKA system using the GUI.
- [Manage KMS using CLI](https://docs.weka.io/security/kms-management/kms-management-1.md): Explore commands for managing Key Management System (KMS) integration with the WEKA system using the CLI.
- [Manage TLS certificates](https://docs.weka.io/security/tls-certificate-management.md): Manage TLS certificates to encrypt data in transit and verify system identity, ensuring secure communication in the WEKA cluster.
- [Manage TLS certificates using GUI](https://docs.weka.io/security/tls-certificate-management/manage-the-tls-certificate-using-the-gui.md)
- [Manage TLS certificates using CLI](https://docs.weka.io/security/tls-certificate-management/manage-the-tls-certificate-using-the-cli.md)
- [Manage Cross-Origin Resource Sharing](https://docs.weka.io/security/manage-cross-origin-resource-sharing.md)
- [Manage CIDR-based security policies](https://docs.weka.io/security/manage-cidr-based-security-policies.md): Manage CIDR-based security policies to control access to WEKA clusters based on client IP address ranges, enhancing security and simplifying administration.
- [Manage login banner](https://docs.weka.io/security/manage-the-login-banner.md): This page describes how to set a login banner displayed on the sign-in page.
- [Secure cluster membership with join secret authentication](https://docs.weka.io/security/secure-cluster-membership-with-join-secret-authentication.md)
- [Security hardening](https://docs.weka.io/security/security-hardening.md): Harden the security of a WEKA deployment. This guide covers Linux best practices, architectural requirements, port configurations, and auditing capabilities.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.weka.io/security.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
