Use this page to define the security settings to be used with Directory Server:
Click this to add a security manager from the pool of available definitions.
There are two main methods that a remote user can use to connect to the Directory Server:
If Directory Server is running in Restricted mode, Web browser clients have to authenticate themselves to the Directory Server, carry out any operations, and then log off. Program clients always run in Restricted mode. During the time period between the authentication and removal the client is entered into the authenticated client list maintained internally by the Directory Server process. To stop the list from accidentally growing too large (not all users or applications log off correctly after they have been authenticated) and also to maintain security, the Directory Server removes both Web browser and program client sessions after a configurable timeout period.
Optional custom server certificate passphrase.
mfsecret:configuration-name:secret-path
or:
mfsecret::secret-path
or:
mfsecret:secret-path
Click this to add a security manager from the pool of available definitions. This button is only present if you are using the MFDS Internal Security Manager. As MFDS Internal Security cannot be used alongside other security managers, when you add the new manager MFDS Internal Security will be removed.
The cipher suite priority is formed using a combination of keywords and keyword modifiers for a space-separated string:
By default, the following cipher suite list is used:
kEECDH+ECDSA kEECDH kEDH HIGH MEDIUM +3DES +SHA !RC4 !aNULL !eNULL !LOW !MD5 !EXP
openssl ciphers -v 'ALL:COMPLEMENTOFALL'
Specify the maximum interval in seconds since the last activity of a program client before it is automatically unbound.
The minimum value is 60 seconds (1 minute). A value of -1 indicates an infinite timeout period.
The default value is 6000 seconds (100 minutes).
The description column indicates the description for a security manager.
secp521r1;secp384r1;prime256v1;secp256k1;secp224r1;secp224k1;prime192v1
This column indicates whether or not the security manager is enabled. If it is not enabled, it will be ignored by Directory Server and those enterprise servers that reference it.
Custom keyfile path.
Custom keyfile passphrase.
This column indicates the module used by a security manager to access an external security manager or to implement the security rules.
This column indicates the name that used to identify a security manager.
Indicates the position of the security manager in the sequence in which the security managers are queried.
Click this to remove the currently selected definition from this list.
Check this to cause all administrative access to the Directory Server to be authenticated and authorized by the entries on the Security Manager Priority List.
Unless a specific secure port is specified, the SSL connection will use a dynamically assigned port each time the MF Directory Server process is restarted. A fixed known port might be useful if configuring firewall settings.
This is the list of security managers taken from the available pool that MF Directory Server can use to perform security queries.
Use the up and down arrows to reposition the selected entry.
Use this to select a security manager for removal or for moving to a different position in the list.
You must use @SECLEVEL=0 for TLS 1.1 and earlier. See Security Levels for more information.
For example, to only use TLS1.1 and TLS1.2, type the following:
-ALL+TLS1.1+TLS1.2
Uncheck this if the user is to have only the permissions of the group specified in the initial security API call that requested verification (authentication) of the user's credentials. Where no group is specified in the verify call, a default group is used.
Check this if you want to use your default ES security manager list for Directory Server, rather than the Security Manager List below. To define the default ES Security settings, click Security on the menu on the left hand side, and then click .
The minimum value is 60 seconds (1 minute). A value of -1 indicates an infinite timeout period. We recommend you use this value sparingly and always reset to a finite period as soon as possible. This is because if the Directory Server is running with an infinite Web client timeout, there is more likelihood that an unauthorized user might gain access to the system using an unattended machine; also the Directory Server will tend to become overloaded with clients who have not logged off.
The default value is 300 seconds (5 minutes).
The Security Facility Configuration parameters are available on this screen only when MFDS is configured to use an ESF (that is, set up to use a Security Manager other than "MFDS Internal Security"). Otherwise no ESF security configuration options, including the caching options, will be seen on this MFDS Security tab screen:
You might use this in circumstances where you only want to restrict access to some resources.
If this is not set, the entries will be queried in the order that they appear on the Priority List until one gives a response of Allow, Deny, or Fail (equivalent to Deny). This response will then be used to decide what action should be taken.
If this field is set, all entries on the list will be queried, and if any returns a Deny or Fail, the access request will be denied. If there are no Deny or Fail responses and at least one of the entries on the list gives Allow as its response, the request will be allowed.
If a security manager does not have a rule for the resource or user specified in the request, it gives a response of Unknown. Whatever the setting of the Verify against all Security Managers field, if all of the entries on the priority list respond with Unknown, the request will be denied unless you have checked Allow unknown resources or Allow unknown users.
See Configuring a Cipher Suites List and Security Levels for more information.
For additional information on cipher suite configuration please refer to the OpenSSL documentation, click here.