Designing Portal Security Strategies
Chapter 5
Creating Your Portal Design
103
•
Minimize the size of the operating environment installation
. When installing
a Sun server in an environment that is exposed to the Internet, or any untrusted
network, reduce the Solaris installation to the minimum number of packages
necessary to support the applications to be hosted. Achieving minimization in
services, libraries, and applications helps increase security by reducing the
number of subsystems that must be maintained.
The Solaris™ Security Toolkit software provides a flexible and extensible
mechanism to minimize, harden, and secure Solaris Operating Environment
systems. The primary goal behind the development of this toolkit is to simplify
and automate the process of securing Solaris systems. Please see:
http://www.sun.com/software/security/jass/
•
Track and monitor file system changes
. Within systems that require inclusion
of security, a file change control and audit tool is indispensable as it tracks
changes in files and detects possible intrusion. You can use a product such as
Tripwire for Servers, or Solaris Fingerprint Database (available from SunSolve
Online).
Using Platform Security
Usually you install Portal Servers in a trusted network. However, even in this
secure environment, security of these servers requires special attention.
UNIX User Installation
You can install and configure Portal Server to run under three different UNIX
users:
•
root
. This is the default option. All Portal Server components are installed and
configured to run as the system superuser. Some security implications arise
from this configuration:
❍
An application bug can be exploited to gain
root
access to the system.
❍
You need
root
access to modify some of the templates. This raises
potential security concerns as this responsibility is typically delegated to
non-system administrators who can pose a threat to the system.
•
User
nobody
. You can install Portal Server as the user
nobody
(uid 60001). This
can improve the security of the system, because the user
nobody
does not have
any privileges and cannot create, read, or modify the system files. This feature
prevents user
nobody
from using Portal Server to gain access to system files
and break into the system.
Summary of Contents for Portal Server 6 2005Q1
Page 8: ...8 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 10: ...10 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 12: ...12 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 20: ...Sun Welcomes Your Comments 20 Portal Server Secure Remote Access 6 2005Q1 Administration Guide...
Page 36: ...A Typical Portal Server Installation 36 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 50: ...Proxylet 50 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 78: ...SRA Sizing 78 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 132: ...Identity and Directory Structure Design 132 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 142: ...Configuration Files 142 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 152: ...Tuning Parameters for etc system 152 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 178: ...Portal Design Task List 178 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 182: ...182 Portal Server 6 2005Q1 Deployment Planning Guide...
Page 192: ...Section X 192 Portal Server 6 2005Q1 Deployment Planning Guide...