HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.118 Configuration as a Lotus Notes server

S 4.118 Configuration as a Lotus Notes server

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator

The configuration of a Notes server as a database server must take into account the environment in which it will be operated and the planned application profile (see S 2.206 Planning the use of Lotus Notes and S 4.117 Secure configuration of a Lotus Notes server). In general, physical security and the secure configuration of the operating system of the computer on which the Notes software is used are also necessary for the security of a Notes installation. The safeguards for the relevant modules from Chapters 4 and 6 (e.g. 4.3.2 "Server Room", 4.4 "Protective cabinets", 6.4 "Windows NT Network", 6.2 "UNIX Server") must therefore be used.

In general the following aspects must be considered for the secure configuration of a Notes server:

If a server is networked with other servers, then the authorisations of the servers amongst each other must be configured also. This concerns also the exchange of data between servers in the course of database replication. The communication paths that are necessary for communication must be configured through creation of so-called connection documents. Information on the encryption of communication links which may sometimes be necessary is provided in S 5.84 Use of encryption procedures for Lotus Notes communication.

The security of the server depends also on the security of user authentication. This is essentially determined also by the security of the Notes ID password of a given user. It is possible to define quality requirements which passwords must satisfy. These are specified on creation of a new user ID and then have to be adhered to every time that the password is changed. A numeric quality scale from 0 (no password) to 16 is provided. The minimal password quality for user should be set to the value "8" or higher (see also S 4.129 Secure handling of Notes ID files).

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home