HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.127 Secure configuration of browser access to Lotus Notes

S 4.127 Secure configuration of browser access to Lotus Notes

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator

To access a Lotus Domino server via the Web interface, the user needs a "Web client" in the form of a browser. Access to the server data involves querying the HTTP module of Domino Server. This extracts the data from the relevant databases and converts it to WWW pages so that they can be displayed by the user's browser. Through the use of active content (JavaScript, Java applets) it is possible for the database content to be modified via a graphical user interface that emulates the normal Notes client.

Security during Web access depends on the security of the components involved. As well as the secure configuration of the server (see S 4.122 Configuration for browser access to Lotus Notes) and active protection of communications (see S 5.86 Use of encryption procedures with browser access to Lotus Notes), the security of the Web client is also an important factor.

During Web access, the confidential authentication information is stored on the client. If an unauthorised third party gains access to this data, then he can access the databases on a server using the authorisations of the compromised user. The authentication data requiring protection in this context is as follows:

In general a distinction can be made between the physical security of the computer which serves as client and the security of the browser used as Web client. This gives rise to the security aspects described below.

Local storage of the authentication data makes physical security especially important. Therefore modules in Chapter 5 that are relevant to the security of the client should be carefully implemented.

In particular the following measures where applicable should be applied to the computers used:

In addition the security of the browser must also be considered. This applies especially where authentication data is stored locally by the browser. The issues requiring consideration include the following:

If authentication data is stored locally on the client, this data should be protected so that access cannot be gained to it even after the computer or the protection mechanisms of the operating system has/have been physically compromised. This normally requires the use of encryption mechanisms within the browser. If these requirements are not satisfied by the browser, then a risk assessment must be carried out and a decision made as to whether Web access should still be allowed. This will depend ultimately also on what data is to be accessed.

Another problem area is the use of active content during Web access. In order that the functionality of the Web interface can be used to the full, it is necessary that processing and execution of active content are enabled in the browser used, as the HTML pages generated by Domino Server contain JavaScript and Java applets. If the relevant support is disabled in the browser, then virtually a complete loss of functionality must be accepted.

If, however, the browser is also used to access the Internet, then generally the execution of active content must be disabled (see S 5.69 Protection against active content). If the adjustment is made by the user himself, then it is easy with mixed use of the browser to forget to disable active content for Internet access. This then implies an increased danger to the local computer network, as it is now possible for harmful active content to be executed by the browser. Mixed use of the browser should therefore be avoided if possible.

Incorrect use of browsers by users can result in a number of security problems. Therefore users must be instructed as to how to use browsers securely and obliged to observe the security guidelines that are in force.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home