Security
Protecting data and access is central to every Fusion SMB deployment. This section focuses on authentication, authorization, auditing, and secure transport.
Topics
- Access Management — Control who can connect and what they can do.
- User Management — Configure identity providers, file-backed users, and group mappings.
- SMB Protocol-Level Security — Understand SMB security modes, signing, and encryption.
- Windows Privileges — Delegate Windows privileges required by Fusion SMB.
- Audit Logging — Capture and review security events emitted by the server.
Review these articles when hardening a deployment or integrating Fusion SMB into existing security processes.