Security best practices

When self-hosted SeekTable is used only for company's internal purposes (and you can control the access with VPN) in most cases it is ok to use a default app configuration. However, if on-premise SeekTable is accessible from internet and/or used to access reports that contain sensitive data you may follow best practices to avoid many security vulnerabilities:

In case of strong security requirements also it is possible to:

Some technical details that may be important if you need to pass a security audit: