
22
Novell iFolder 3.6 Security Administration Guide
n
ov
do
cx (e
n)
11
Ju
ly 20
08
A.3 August 15, 2006
The following change was made to this section:
A.4 November 1, 2005
The entire guide was reformatted to comply with revised Novell documentation standards. The
content is unchanged.
Section 2.14, “Controlling
Access to And Backing Up
the iFolder Audit Logs,” on
page 15
Updated the default path to the iFolder audit logs.
Section 2.18, “Loading the
Recovery Agent
Certificates,” on page 16
The Novell iFolder service by default is not configured for the Recovery
agent. During server configuration via YaST, ensure that the Recovery
agent path is configured.
Section 3.4, “Creating an
Encrypted iFolder,” on
page 18
The Novell iFolder 3.6 server supports encrypted iFolder storage. To store
the files encrypted, the user must ensure that the iFolder is created
encrypted before uploading the files.
Section 3.5, “Using the
Recovery Agent,” on
page 18
The Novell iFolder 3.6 enterprise server uses a Recovery agent, which is
an X.509 certificate-based entity used to recover a lost or otherwise
unavailable key.
Section 3.6, “Transferring
the Encryption Key,” on
page 18
For secure OTP transfer, make sure that the Recovery agent uses an out-
of-band communication or a separate e-mail communication to send the
passphrase and the key the user.
Location
Change
Section 2.6, “Configuring a
Cipher Suite to Use for SSL/
TLS,” on page 13
Do not disable the Low and Export cipher suites if they are required by
your customer base. Individuals using older browsers (4-5 years old) and
older versions of Windows, such as Windows 98, might still need those
cipher suites for other services.
Location
Change