As with any system, good security requires proper configuration. This section lists recommendations to ensure that the method functions properly.