Steps to protect Access ApplianceThis section includes the following topics:About Access Appliance hardening FIPS 140-2 conformance for Access ApplianceManaging the login banner using the UIManaging the password policy using the UISupport for immutability in Access ApplianceAbout system certificates on Access ApplianceAbout single sign-on (SSO) configuration Configuring user authentication using digital certificates or smart cardsAbout multifactor authenticationConfiguring an isolated recovery environment using the command lineForwarding logs to an external server