86
Chapter 5 Configuring Advanced Security
accessed or altered by another company’s applications. It also ensures that no
applications can tamper with system resources.
The access permissions you assign to a directory tree through a security sandbox
override any other access permissions users might have for the tree. For example,
suppose you designate the directory
c:/applications/hr_app
as a security
sandbox. You configure the sandbox so that nobody could write to any of the Human
Resources department data sources via an application running from
c:/
applications/hr_app
. Even the Vice President of HR, who would typically have
write permissions to the HR data sources in all other contexts, would be unable to
write to those sources via an application run from this sandbox.
Note
The security sandbox feature is only available in the Enterprise edition of ColdFusion
Server.
Securing the ColdFusion Administrator
If you’ve already read earlier chapters of Administering ColdFusion Server, you know
that the ColdFusion Administrator is a browser-based interface that lets you perform
administrative tasks like managing server performance, adding and configuring
ColdFusion data sources, scheduling pages, and managing log files. For any
ColdFusion development project, some level of administration is generally necessary
to set up ColdFusion Server for your application. In some cases, it’s feasible for a
single person to perform all the necessary administrative tasks. Many times, though,
you’ll want to be able to delegate some ColdFusion management tasks.
With ColdFusion Server, you can decentralize administrative responsibility by
creating multiple administrators. Overall security is maintained because these
additional administrators can control only the resources and policies for which
you’ve given them explicit responsibility. You can assign the following types of
administrative access to any user:
•
Administrator
Provides complete read and write access to all ColdFusion
Administrator pages.
•
Privileged
Provides read and write access to all the ColdFusion pages except the
Basic and Advanced Security pages; Privileged users have no access at all to the
security pages.
•
Restricted
Provides read and write access only to the Datasources
Administrator pages, the Verify Data Source page, and the Verity Collections
page; Restricted users have no access to any other ColdFusion Administrator
pages. You can configure Restricted access so that a user only has access to
specified data sources
The ColdFusion decentralized administration model provides two important
benefits:
•
It helps your teams streamline the development process and work together more
efficiently.
•
It lightens the administrator’s load without sacrificing his control over the system.
Summary of Contents for COLDFUSION 5-ADVANCED ADMINISTRATION
Page 1: ...Macromedia Incorporated Advanced ColdFusion Administration ColdFusion 5...
Page 20: ......
Page 56: ...38 Chapter 1 Advanced Data Source Management...
Page 74: ...56 Chapter 2 Administrator Tools...
Page 76: ......
Page 86: ...68 Chapter 3 ColdFusion Security...
Page 87: ...To Learn More About Security 69...
Page 88: ...70 Chapter 3 ColdFusion Security...
Page 130: ...112 Chapter 5 Configuring Advanced Security...
Page 132: ......
Page 154: ...136 Chapter 6 Configuring Verity K2 Server...
Page 162: ...144 Chapter 7 Indexing XML Documents...
Page 202: ...184 Chapter 8 Verity Spider...
Page 236: ...218 Chapter 10 Verity Troubleshooting Utilities...
Page 238: ......
Page 348: ...330 Chapter 14 ClusterCATS Utilities...
Page 349: ...Using sniff 331...
Page 350: ...332 Chapter 14 ClusterCATS Utilities...
Page 362: ...344 Chapter 15 Optimizing ClusterCATS...
Page 372: ...354 Index...