Client Security Settings Preventing an attacker from bypassing 2fa Setting Client Application Policies Using a Proxy Server Improving Cookie Security Configuring OAuth for SCIM Integration