Book Image

Learning Magento 2 Administration

By : Cyndi Williams
Book Image

Learning Magento 2 Administration

By: Cyndi Williams

Overview of this book

Magento 2 has been completely re-written and re-designed to take the world’s most popular open source e-commerce platform to new heights of productivity and usability. With this overhaul comes improved opportunities to leverage the world’s most successful open source e-commerce platform for your online retail and wholesale business. The focus of this book is on operational aspects: those actions you, as a proprietor, can take to give your customers a more delightful shopping experience. In this guide, we delve into all aspects of managing a Magento 2 store, from product creation to marketing, customer management to search engine optimization. This book is not only a step-by-step course in setting up your Magento 2 website, it will be a handy reference as continue to improve and refine your online presence.
Table of Contents (16 chapters)
Learning Magento 2 Administration
About the Authors
About the Reviewer

Securing your server

Your Magento developer should be skilled enough to have installed Magento 2 on your server in such a manner that all known vulnerabilities are eliminated.


Magento, Inc. is generally good at attacking any discovered vulnerabilities in their platform by issuing patches and guidance to the user community. No server is 100% secure as some vulnerabilities may not have yet been discovered. However, you and your developer can make sure you address all the known possibilities.

However, any breach of security ultimately rests with you, the store owner. You should ask your developer for confirmation of the following:

  • File permissions: Are the files on your server properly configured to prevent outside access? (Hackers love to find unprotected files.)

  • Database access: Is any outside access to your database limited by the IP number?

  • Developer access: If your developer is employing other developers, what controls are put in place to control access? Is this access eliminated once the...