PV-WAVE Advantage > JWAVE User Guide > JWAVE Server Configuration
JWAVE Server Configuration
 
 
warning
JWAVE uses an insecure protocol without authentication. This makes JWAVE insecure to use in an Internet facing configuration and would allow an attacker to execute arbitrary code on the server. If you choose to implement JWAVE in this way, you are responsible for the security of those applications that leverage JWAVE.
This chapter explains how to set up and configure the main portions of your JWAVE system. This section discusses: