5.0 Securing the Logging System

The following sections review how to secure the connection between Identity Manager and your logging system: