Home > Storage > ObjectScale and ECS > Product Documentation > ECS: Overview and Architecture > Introduction
ECS security is implemented at the administration, transport and data levels. User and administrator authentication are achieved using Active Directory, LDAP methods, Keystone or directly within the ECS portal. Data level security is done using HTTPS for data in motion and/or server-side encryption for data-at-rest.