"Security settings, authentication, authorization, logging, and other parameters can be set in configuration files." . . . . . .