I'm currently working on a proposal to implement Red5 in a two-phase  
process in our organization.

The first phase would be to have a Red5 installed on a server that  
also runs IIS, and use the Red5 only for streaming some small Flash  
videos. The second phase would be to create a dedicated Red5 server  
and allow use of more of the capabilities.

We will be limiting access to people within the corporate network. I  
need to know for both phases what kinds of security concerns we  
should be aware of, and for the first phase -a limited streaming  
server, is there anything particular we should do to lock down the  
Red5 server to keep it from becoming a point of vulnerability for the  
rest of the box?

I've found a couple of pages on security considerations for Flash  
Communications server - is it similar enough to use as a basis for  
looking at Red5 security?

http://www.adobe.com/devnet/flashcom/articles/security_overview.html
http://www.adobe.com/devnet/flashcom/articles/security_setup.html


Thanks!

Ellen




http://thedesignspace.net

_______________________________________________
Red5 mailing list
[email protected]
http://osflash.org/mailman/listinfo/red5_osflash.org

Reply via email to