JD Edwards Enterprise One 8.98 Security Best Practices
JD Edwards Enterprise One 8.98 Security Best Practices
JD Edwards Enterprise One 8.98 Security Best Practices
April 2009
Copyright Notice
Copyright 2009, Oracle and/or its affiliates. All rights reserved.
Trademark Notice
Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.
Warranty Disclaimer
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.
This product includes code licensed from RSA Data Security. All rights reserved. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). All rights reserved. This product includes the Sentry Spelling-Checker Engine, Copyright 1993 Wintertree Software Inc. All rights reserved.
Table of Contents
Security Best Practices Overview 7
Introduction......................................................................................................7
Overview.................................................................................................................. 15 Oracle Application Server........................................................................................ 16 IBM WebSphere ...................................................................................................... 16 Secure Configuration Files ...................................................................................... 16 Secure Log Files...................................................................................................... 16 J2EE Session Timeout Setting ................................................................................ 17 Limit Access to Media Object Queue Directory....................................................... 17 Set Up FTP User Access to Media Objects ............................................................ 17 Use SSL (HTTPS) Between Browser and Web Server........................................... 17 Turn Off Directory Listing......................................................................................... 18 Denial-of-Service Attacks ........................................................................................ 18
Overview.................................................................................................................. 26 Change Default JD Edwards EnterpriseOne Passwords ........................................ 26 JD Edwards EnterpriseOne Authorization Model .................................................... 26 Set Up Role-Based Authorization............................................................................ 28 Follow the Principle of Least Privilege..................................................................... 28 Secure JD Edwards EnterpriseOne Administration Applications and Reports ....... 28 Secure JD Edwards EnterpriseOne Administration Tables..................................... 28 Regularly Run Security Maintenance Reports ........................................................ 29 Set Up Password Policies ....................................................................................... 29 Enforce Security Settings Immediately.................................................................... 29 Change Password Frequently ................................................................................. 29 Set Force Immediate Password Change when Creating a User Account............... 30 Lock Out User Account After Invalid Login Attempts .............................................. 30 Enable Auditing of Security Operation..................................................................... 30 Purge Audit Table Records ..................................................................................... 30 Limit Access to Design Tools and Universal Table Browser................................... 30 Limit Access to Data Browser.................................................................................. 30 Set Up Processing Option Security ......................................................................... 31 Set Up Column Security on Work with Submitted Jobs .......................................... 31 Set Up OMW Security.............................................................................................. 31 Set Up LDAP SSL.................................................................................................... 31 Assign Role with Least Privilege for _LDAPDEFLT User........................................ 31 Set Up Single Sign-on Node.................................................................................... 32 Support of Longer User Names and Passwords ..................................................... 32 Disable the Unused User Accounts......................................................................... 32 Set Up an Independent Security Environment ........................................................ 32
Appendix A - Default Database User Accounts Appendix B Additional Network Infrastructure Security Appendix C Useful Links
34 35 36
Introduction
In todays environment, a properly secured computing infrastructure is critical. As companies expand, so does the complexity of their business processes. In an internet environment, the risks to valuable and sensitive data are greater than ever before. In addition, a companys computing infrastructure grows as more third-party products are integrated with its enterprise software. As a result, this type of environment can create potential security gaps. This best practices guide will help you ensure that JD Edwards EnterpriseOne and the various components involved in a JD Edwards EnterpriseOne setup are properly secured. This best practices guide provides guidance in setting up security for JD Edwards EnterpriseOne systems beyond application security. It provides information about securing the overall infrastructure of a deployed JD Edwards EnterpriseOne system. It is critical that you secure a JD Edwards EnterpriseOne environment in alignment with your companys enterprise security policies. Those policies should be created based upon your established security model. When securing a JD Edwards EnterpriseOne environment, you should take a comprehensive approach that is in concert with the overall corporate security policies, guidelines, and business requirements. This guide covers guidelines and recommendations for securing a JD Edwards EnterpriseOne environment based on security features available in JD Edwards EnterpriseOne Applications 9.0 and JD Edwards EnterpriseOne Tools 8.98.
This guide is not intended to replace the JD Edwards EnterpriseOne Tools documentation delivered with the product. It provides references to relevant information in JD Edwards EnterpriseOne Tools guides. The reader of this guide should have a well-rounded understanding of the JD Edwards EnterpriseOne system.
10
Enable Minimum Level of Logging Always run the JD Edwards EnterpriseOne and other systems with a minimum level of logging in the production environment. Running JD Edwards EnterpriseOne with a debug level of logging in the production environment adversely impacts system performance as well as it logs unnecessary sensitive information about the environment. Furthermore, the logs can be used to exploit the system if a malicious user obtains access to the log files. Set Up Change Management Process Establish a policy to set up a change management process to keep track of all the changes in your software systems. All changes should be approved and audited.
11
This illustration shows the recommended firewall setup for JD Edwards EnterpriseOne:
You should also install an Intrusion Detection System (IDS) and establish a policy to regularly monitor unauthorized traffic.
Database Security
Overview JD Edwards EnterpriseOne stores all the system and business data in a supported relational database. Therefore, it is extremely important that you carefully set up security for the database server. Change Default Database Installation Passwords Following an installation, the application database instance might contain default, open schema accounts with default passwords. These accounts and corresponding passwords are well-known, and they should be changed, especially for a database used in a production environment. Change Default JD Edwards EnterpriseOne Database User Passwords JD Edwards EnterpriseOne installation process creates various database users with a default password (Same as User). You should change these database user passwords after a successful installation or upgrade. After changing a database users password, you might have to modify configuration files for the deployment server and JD Edwards EnterpriseOne security server because these servers use information from the configuration files to connect to database. See Appendix A in this guide for a list of default database user accounts for JD Edwards EnterpriseOne 9.0.
12
Lock Database User Accounts for Previous Releases If you are upgrading a JD Edwards EnterpriseOne application release, delete or lock all the database accounts used by previous JD Edwards EnterpriseOne releases. Limit Access to Query Tools Database user passwords should be strong and end users should have limited access to Query Tools. Use SETOWAUT for iSeries SETOWAUT is a set of tools you can use in the end of installation to secure JD Edwards EnterpriseOne objects on your iSeries Enterprise Server. The libraries and tables delivered by the Platform Pack installation are not secured. To provide sufficient security, you should run the tool SETOWAUT which allows you to lock down libraries and IFS directories delivered by the Platform Pack installation. Use JD Edwards EnterpriseOne SETOWAUT tool to exclude public access to the JD Edwards EnterpriseOne database on an iSeries system. Refer to Working with Database Security in the JD Edwards EnterpriseOne Applications Release 9.0 Installation Guide for DB2/400 on iSeries Guide for more information on SETOWAUT.
13
Secure Configuration File The deployment server configuration file (JDE.INI) might contain the override password for the default database user to connect to JD Edwards EnterpriseOne data sources when doing an installation, upgrade, or applying a software update. Therefore, you need to secure this file using operating system security such as Microsoft Windows security, UNIX object security, or iSeries object security. After a successful install, upgrade, or software update, remove the [DSPWD] section from JDE.INI. Secure Log Files You should give only certain users access to view deployment server log files (error and debug), as these files might contain sensitive information about the user and location of the database.
14
Limit Access to Administer JD Edwards EnterpriseOne Services You should give only certain users authority to start and stop JD Edwards EnterpriseOne processes and to run scripts because this authority also requires access to the JDE.INI file, which contains the database password. Do not give users access to update JD Edwards EnterpriseOne script files for starting and stopping services. Secure Log Files You should give only certain users access to log files (error and debug) on the Enterprise Server. These files might contain sensitive information about the user and the location of the database. Caution Implementing security on these files will prevent Server Manager from being able to display the logs.
Limit Access to BSFN Trace Logs Change the ClientLog setting to 0 in the [DEBUG] section of the JDE.INI so that Call Object kernel does not send the BSFN server logs back to the workstation after executing the BSFN calls. Refer to the JD Edwards EnterpriseOne Tools Release 8.98 Server Manager Guide for more information about this setting. Limit Access to PrintQueue Directory JD Edwards EnterpriseOne Enterprise Server stores all the report output in the PrintQueue directory. You should give only certain users access to the PrintQueue directory. Use Security Server In a production environment, always use the security server. You can run business logic on the enterprise server without using a security server when logged in with a user ID that is also a database user.
15
EnterpriseOne. JD Edwards EnterpriseOne supports Oracle Application Server and IBM WebSphere Application Server for a web solution. Oracle Application Server If you have deployed an Oracle Application Server, take the steps listed on the following website to make the installation more secure: http://www.oracle.com/technology/deploy/security/as_security/index.html IBM WebSphere If you have deployed an IBM WebSphere server, follow IBMs recommendations to make the installation more secure: http://www.redbooks.ibm.com/abstracts/sg246573.html (WebSphere V5) http://www.redbooks.ibm.com/abstracts/sg246316.html (WebSphere V6.1) Secure Configuration Files JD Edwards EnterpriseOne HTML Web Server uses these configuration files:
JAS.INI JDBj.INI JDELOG.PROPERTIES
In addition, the web server can have a Tokengen.ini in a single sign-on environment. These files contain sensitive information that should not be available to all users, so you should use operating system security to secure the files. Caution Implementing security on these files will prevent Server Manager from modifying configuration settings within these files.
Secure Log Files You should give only certain users access to log files (error and debug) on the JD Edwards EnterpriseOne HTML Web Server. These files might contain sensitive information about the user and the location of the database. Caution Implementing security on these files will prevent Server Manager from being able to display the logs.
16
J2EE Session Timeout Setting After a user signs in, he or she can stay connected as long as the sign-in time allows and as long as the browser does not sit idle for longer than the timeout interval. A timeout interval specifies how long the users machine can remain idle before J2EE Application server automatically disconnects the user from the application. Set up the policy for inactive session timeout and set this value accordingly. For the web application server, this value is 30 minutes by default. Refer to the JD Edwards EnterpriseOne Tools 8.98 HTML Web Server Reference Guide for more information on setting the timeout values. Limit Access to Media Object Queue Directory The JD Edwards EnterpriseOne HTML Web Server caches the media object files under /jde/moqueue/ directory of the installed web application. The operating system user for whom the web application server process is running must have full access to this directory. Secure access for all other users to this directory on the web server. You should use media object security in JD Edwards EnterpriseOne to secure access to media object attachments from JD Edwards EnterpriseOne applications. Refer to Working with Security Workbench in the JD Edwards EnterpriseOne Tools Release 8.98 Security Administration Guide for more information on setting up media object security. Set Up FTP User Access to Media Objects You can configure the system to use Windows NT Share or FTP protocol to access media object files from media object queue directories. The FTP user ID and password should be provided in the JAS.INI file to access media object queue directories. The FTP user or operating system user (in case of Windows NT Share) for whom the web server process is running should have full access to media object queue directories. You should limit the access to any other directories on the server where the media object queue directories are located for this FTP user or operating system user. All other users should not have access to media object queue directories when users are not accessing media objects from the Windows client. Use SSL (HTTPS) Between Browser and Web Server Information sent over the network and across the internet in clear text can be intercepted. The Secure Socket Layer (SSL) protocol, developed by Netscape Corporation, is an industry-accepted standard for network transport layer security. SSL is supported by all currently available web servers and web browsers. You should configure SSL on JD Edwards EnterpriseOne HTML Web Server, especially in an internet environment. Refer to Configuring Secure Socket Layer for JAS in the JD Edwards EnterpriseOne Tools 8.98 HTML Web Server Reference Guide for more information on setting up SSL with JD Edwards EnterpriseOne HTML Web Server running on the Oracle Application Server or IBM WebSphere Application Server.
17
Disable non-secure HTTP on the web application server after making sure that HTTPS is set up and working properly. Refer to the Network Infrastructure Security section in this guide for information about setting up network security in an internet environment. Turn Off Directory Listing Directory indexes display the contents of a directory if there is no index.html or similar file available. Disabling this entry prevents an intruder from viewing the files in a directory and potentially finding a file that could provide access to the system. Refer to the HTTP Server documentation to disable this feature in the web server configuration file. Denial-of-Service Attacks Denial-of-service (DOS) attacks can occur when a large number of poorly formed requests are sent to servlets. You can reduce the impact of Dos attacks, but it is impossible to prevent them. If an attacker throws enough data at a server to continuously use all the available network bandwidth, it will crowd out legitimate traffic, regardless of how the software is configured. Denial of service can only be handled at an application server level. To configure to reduce the impact of denial of service attacks, refer to the security documentation for your application server.
Collaborative Portal Note the following items when setting up single sign-on for Collaborative Portal:
A single sign-on token is generated by Collaborative Portal. You should set up a new node to support single sign-on for the Collaborative Portal server. You can create a single sign-on node configuration using the JD Edwards EnterpriseOne SSO application. TokenGen.ini, which is located in following directory should be modified with the node name and node password:
For WebSphere 6.0: AppServer\profiles\<profile_name>\properties Oracle Portal Note the following items when setting up single sign-on for Oracle Portal:
Single sign-on token is generated by the JD Edwards EnterpriseOne provider server. The provider server can be either WebSphere Application Server or Oracle Application Server and can be used as a standalone HTML server. You should set up a new node for supporting single sign-on from provider server. You should create a single sign-on node configuration using the JD Edwards EnterpriseOne SSO application. TokenGen.ini, located in the /system/generator directory, should be modified with the node name and node password before generating the Portlets. Refer to Generating the Required Portlets to the WebClient_Oracle_Portal.war File in the JD Edwards EnterpriseOne Tools Release 8.98 Portal Reference Guide for All Portals and Platforms for more information on setting up TokenGen.ini.
The TokenGen.ini file contains node name and node password in plain text. You need to secure this file using operating system security. In addition to the above guidelines, follow all the instructions in the JD Edwards EnterpriseOne HTML Web Server Security section in this guide to secure your web environment.
19
Secure Integration Server Access It is recommended that you allow an administrator access to the server so that he or she can develop and update packages, as well as secure Integration Server ports. Refer to Managing Server Security in the webMethods Integration Server Administrators Guide. Set Up User IDs, Passwords, and Permissions Ask the database administrator to set up the user IDs, passwords, and database permissions required for Integration Server to connect to the database. Integration Server requires create, update, and delete permissions. The first time Configuration Editor is accessed, it creates new tables or modifies existing tables. Initially, the database user needs administrative privileges; however you should limit these privileges once Configuration Editor has created the tables. Disable Well-Known User Accounts WSG Integration Server uses the default passwords for privileged user accounts such as Administrator and Developer. It is recommended that you change these passwords or disable these accounts immediately after installation. Refer to Managing Users and Groups in the webMethods Integration Server Administrators Guide. Secure Configuration Files WSG stores the JD Edwards EnterpriseOne user ID and password in plain text in the jdeinterop.ini file to connect to JD Edwards EnterpriseOne. An administrator should secure this file as well as other configuration files (JDBj.INI and JDELOG.PROPERTIES) so that only certain users have read and write access to them. Caution Implementing security on these files will prevent Server Manager from modifying configuration settings within these files.
Secure Log Files You should give only certain users access to view Integration Server log files (error and debug), as these files might contain sensitive information about the user and location of the database. Caution Implementing security on these files will prevent Server Manager from being able to display the logs.
20
Limit Access to RTE Administration Applications Use JD Edwards EnterpriseOne Application security to limit access to the following JD Edwards EnterpriseOne applications to administrators only:
P90701A (Event definition and activation) P90702A (subscriber and subscription) R90706 (Convert Event Subscriptions) to create Queue Entries
Refer to Using Guaranteed Events in the JD Edwards EnterpriseOne Tools 8.98 Interoperability Guide for more information. Secure Log Files You should give only certain users access to view Transaction Server log files (error and debug), as these files might contain sensitive information about the user and location of the database. Caution Implementing security on these files will prevent Server Manager from being able to display the logs.
21
Connectors Security
Overview Connectors are point-to-point component-based interoperability models that enable thirdparty applications and JD Edwards EnterpriseOne to share logic and data. JD Edwards EnterpriseOne connector architecture includes Java, Dynamic Java, and Component Object Model (COM) connectors and provides access to JD Edwards EnterpriseOne business logic and data. Secure Configuration Files Java connector and COM connector use configuration files to connect to a JD Edwards EnterpriseOne environment. Secure JDBj.ini, interop.ini and JDELOG.PROPERTIES using operating system security. Caution Implementing security on these files will prevent Server Manager from modifying configuration settings within these files.
Secure Log Files You should give only certain users access to view connector log files (error and debug), as these files might contain sensitive information about the user and location of the database. Refer to JD Edwards EnterpriseOne Tools 8.98 Connectors Guide for more information about connectors.
Caution Implementing security on these files will prevent Server Manager from being able to display the logs.
22
Oracles JD Edwards EnterpriseOne Performance Monitor enables you to view real-time and historical performance data of your JD Edwards systems. JD Edwards EnterpriseOne Performance Monitor provides the information that you need to solve immediate performance issues and analyze trends in system performance. By default, JD Edwards EnterpriseOne Performance Monitor is disabled on a new JD Edwards EnterpriseOne installation. Limit Access to Performance Administration Applications Use JD Edwards EnterpriseOne Application security to limit access to the following applications to administrators:
P95900 Global Administration P9500 Agent Related
Refer to Administering JD Edwards EnterpriseOne Performance Monitor in the JD Edwards EnterpriseOne Tools 8.98 Performance Monitor Guide for more information on administration applications. Secure Configuration Files Performance Monitor uses the bootstrap user and password from JDBj.INI in install_directory/E1TranSrv/cfg directory. Secure this file, as well as other configuration files (JAS.INI and JDELOG.PROPERTIES), using operating system security. Caution Implementing security on these files will prevent Server Manager from modifying configuration settings within these files.
Secure Log Files You should give only certain users access to view Transaction Server log files (error and debug), as these files might contain sensitive information about the user and location of the database. Caution Implementing security on these files will prevent Server Manager from being able to display the logs.
Disable PPMConsole The PPMConsole setting under the [PERFMON] section of the JAS.INI file controls whether or not users can view the monitor servlets status. If true, then users can check
23
the monitor servlets status. Some HTML pages can be used to view the status of different PerfMon Servlets and E1PmJavaAdapter process. By default, this setting is set to False. If the setting was enabled to troubleshoot during the installation, you should set it to False to make sure end users can not access the PPMConsole.
24
Desktop Security
Overview In the context of JD Edwards EnterpriseOne, a desktop is considered the working environment for end users when accessing JD Edwards EnterpriseOne from the Microsoft Windows client or web browser. Disable Browser Cache Setting A browser caches various pages and states in memory to increase performance. It may be necessary to disable these performance features on the browser for security reasons, especially for a kiosk environment. Refer to the JD Edwards EnterpriseOne Tools 8.98 HTML Web Server Reference Guide for information about configuring the browser to disable caching. Update Browser Update the browser when new versions are released because they often include new security features. Refer to the minimum technical requirements on Customer Connection for information regarding JD Edwards EnterpriseOne supported browsers. Turn Off Browser AutoComplete Setting For kiosk machines, turn off the autocomplete setting for the browser. Although desirable for frequently accessed pages, this feature should be disabled for privacy and security reasons. Even for an intranet environment, do not enable the autocomplete setting to store passwords. Set Policy for Unattended PC Sessions You should create a corporate policy for handling unattended PC sessions. Users are recommended to use the password-locked screen savers feature on all PCs. Turn Off Server BSFN Trace for Windows Client Change the ServerLog setting to 0 in the [DEBUG] section of JDE.INI file so that the Windows client does not request the BSFN server logs from Call Object kernel. Refer to the JD Edwards EnterpriseOne Tools 8.98 Server Manager Guide for more information about this setting.
25
User
Roles
*PUBLIC
26
Action Security Secures users from performing certain actions when in JD Edwards EnterpriseOne applications or forms. Security can be set on OK, Select, Add, Copy, Delete, and so forth (Toolbar exits). Row Security Secures users from certain actions on specific records in a table. For example, you can secure a user from seeing profile records that belong to other users. Also, you can secure users from accessing a particular range or list of data in any table. Column Security Secures users from certain actions on specific columns in tables, applications, or forms. For example, you can secure a user from viewing all salary-related fields in a table. Processing Option Security Secures users from viewing or modifying values in processing options. Tab Security Secures users from viewing or modifying values on tab forms. Exit Security Secures users from using hyper exits. Exclusive Application Security Secures users into an application when all other securities are set up against objects associated with that application. External Calls Security Secures users from running executables from within JD Edwards EnterpriseOne. Portal Security Secures users from performing certain Portal actions such as Personalization or Modifying Relationships. Solution Explorer Security Secures users from performing and viewing certain features within Solution Explorer, such as Fine Cut and Fast Path. Media Object Security Secures user from updating, viewing, creating, or deleting media object attachments. Button, Image & Link Security - Secures user from viewing and enabling button, image, and link objects. Data Browser Security - Secures user from accessing the Data Browser program. You can also use it to secure users from accessing an individual table or business view when creating queries.
Refer to Using Security Workbench in the JD Edwards EnterpriseOne Tools Release 8.98 Security Administration Guide for more information on JD Edwards EnterpriseOne authorization security.
Business Unit Security - JD Edwards EnterpriseOne business unit security provides the ability to filter data by business unit for UDCs and for transaction tables. For UDCs, you create subgroups of values that can be shared among various business units or might be unique to one particular business unit. This is referred to as UDC sharing. For transaction tables, business unit security enables you to limit the transaction records that a user can access based on business unit. This is called transaction security.
With UDC sharing, JD Edwards EnterpriseOne provides the ability to control or regulate how organizational data among different business units is shared. Transaction security enables you to determine the transaction records a user can view. Transaction security ensures that users can only access and modify transaction data for the business unit to which they are associated.
Copyright 2009, Oracle. All rights reserved 27
You should set up business unit security when users are allowed to access data only for their business unit. Refer to Setting up Business Unit Security in the JD Edwards EnterpriseOne Tools Release 8.98 Security Administration Guide for more information on business unit security. Set Up Role-Based Authorization Administrators prefer to set up security that can be easily managed and maintained. The easiest way to manage security in JD Edwards EnterpriseOne is by applying security to roles. Role-based authorization prevents you from having to set up a large number of security records for each individual user. Instead of having to revise multiple security records when a user moves to another position or responsibility, you only have to assign that user to a different role that already contains the required security for that position. Follow the Principle of Least Privilege The principle of least privilege states that users should be given the least amount of privilege to perform their jobs. Over ambitious granting of responsibilities, roles, and permissions, especially when people are few and work needs to be done quickly, often leaves a system wide open for abuse. You should initially establish a policy to determine and assign least privileges to users. Periodically review user privileges to determine relevance to current job responsibilities. Secure JD Edwards EnterpriseOne Administration Applications and Reports Use application security to allow only CNC administrators access, at a minimum, to the following applications and reports:
Applications under the System Administration Tools menu. Applications under the Package and Deployment Tools menu. Applications under the System Installation Tools menu.
You can also obtain a list of all JD Edwards EnterpriseOne Tools-related applications by searching in Object Management Workbench (OMW) for H9* system code. Secure JD Edwards EnterpriseOne Administration Tables Use row security to allow only CNC administrators the ability to insert and modify data, at a minimum, from these system administration tables:
Table Description Security Workbench Sign-on security Table Name F00950 F98OWSEC
28
System user security OCM Data Source Master OMW User Roles User Profile User Preferences User-Role Relationship
Regularly Run Security Maintenance Reports Run the following security reports to analyze the security setup and access rights for user, groups, and *PUBLIC in JD Edwards EnterpriseOne:
Security Analyzer by Data Source Report (R98OWSECA) Security Analyzer by User or Role Report (R98OWSECB) Security Audit Report by Object (R009501) Security Audit Report by User/Role (R009502)
Set Up Password Policies If you are managing user IDs and passwords in a JD Edwards EnterpriseOne database, you are strongly encouraged to create strict password policies to avoid passwords that can be easily compromised. Refer to Setting Processing Options for P98OWSEC in the JD Edwards EnterpriseOne Tools Release 8.98 Security Administration Guide for more information on setting up password policies. Enforce Security Settings Immediately If a system administrator makes any changes to the security records using the Security Workbench application, those changes may not be enforced for the user when he signs in because security records are cached by JD Edwards EnterpriseOne HTML Web Server. Enforce security changes immediately by performing one of these actions:
Restart the JD Edwards EnterpriseOne Application Server instance. Clean up the JDBj security cache using Security Administration Workbench (SAW).
Change Password Frequently Set up the Password Change Frequency value in the User Security (P98OWSEC) application to ensure that users frequently change their passwords. Refer to Setting up
29
User Security in the JD Edwards EnterpriseOne Tools Release 8.98 Security Administration Guide for more information on setting up the password policies. Set Force Immediate Password Change when Creating a User Account Select the Force change password for user option when creating a new user account so that the system will prompt the user to change the password on the next sign-in. Refer to Setting up User Security in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information on setting up the password policies. Lock Out User Account After Invalid Login Attempts Limit the number of invalid password attempts (usually three) before a user account is disabled. Refer to Setting up User Security in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information on setting up password policies. Enable Auditing of Security Operation Set the history setting to 1 under the [SECURITY] section of the JDE.INI file on the security server. This setting turns on the auditing for users login and logoff actions. Use the Security History form exit from the Work with User Security application (P98OWSEC) to review this history or audit records regularly according to your organizations security policy. Purge Audit Table Records Security audit records can grow quickly and increase the size of the database. Therefore, you should set up a policy to purge security audit records regularly from the Security History table (F9312) using database tools. Keep a copy of these records for audit purposes. Limit Access to Design Tools and Universal Table Browser Set up External Calls security using Security Workbench to limit access to Windowsbased design toolsFDA.exe, TDA.exe, and RDA.exeand UTBrowse.exe. Refer to Using Security Workbench in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information on External Call security. Limit Access to Data Browser Set up Data Browser security to limit access to the Data Browser application as this can be used to easily access sensitive data from different data sources. Refer to Using Security Workbench in JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information on Data Browser security.
30
Set Up Processing Option Security Set up Processing Option security to limit access to the User Security application (P98OWSEC). JD Edwards EnterpriseOne password policies are managed as processing options for P98OWSEC. Refer to Using Security Workbench in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information on Processing Option security. Set Up Column Security on Work with Submitted Jobs Set up Column security on the User field of the Submitted Job Search form (W986110BA). When you set up this security, only the user that is logged in and submitted the batch job can view the records in the grid that are a result of the batch job. The user cannot see batch jobs submitted by other users and more importantly, the output from those batch jobs. Refer to Using Security Workbench in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information on Column security. Set Up OMW Security Administrators should configure roles and allowed actions for a JD Edwards EnterpriseOne developer. Refer to Configuring User Roles and Allowed Actions in the JD Edwards EnterpriseOne Tools 8.98 Object Management Workbench Guide for more information on setting up OMW security. Set Up LDAP SSL If LDAP authentication is enabled in JD Edwards EnterpriseOne, you should securely configure LDAP access from the JD Edwards EnterpriseOne security server by using LDAP over SSL (LDAPS). Refer to Using LDAP Over SSL in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information. Assign Role with Least Privilege for _LDAPDEFLT User If LDAP authentication is enabled and user-role relationships are being managed in JD Edwards EnterpriseOne, you must set up a default role relationship for the _LDAPDEFLT user. All new users who are synchronized from LDAP to JD Edwards EnterpriseOne database will be assigned the default user-role relationship. It is recommended that you assign a default role to _LDAPDEFLT user that has least privilege. An administrator can assign or remove other roles using JD Edwards EnterpriseOne User Role Relationship application (P95921) at a later time. Refer to Modifying the LDAP Default User Profile Settings in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information.
31
Set Up Single Sign-on Node Change the default node password for _GLOBALNODE even when you are not using single sign-on from Collaborative Portal or Oracle Portal. It is recommended that you set up a unique single sign-on node with a trusted relationship if you are using multiple security servers on different machines in your environment. Refer to Understanding JD Edwards EnterpriseOne Single Sign-On and Setting Up EnterpriseOne Single SignOn in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information on setting up single sign-on nodes. Support of Longer User Names and Passwords JD Edwards EnterpriseOne does not support more than 10 characters in a user name or password for sign-on. If you want to use more than 10 characters for a user name or password due to compliance issues for web users, you should use Oracle Single Sign-on or Collaborative Portal Single Sign-on with JD Edwards EnterpriseOne. In this solution, Oracle Single Sign-on server or Collaborative Portal is responsible for authenticating a longer user name and password. JD Edwards EnterpriseOne uses the single sign-on token to validate the user. You can configure the JD Edwards EnterpriseOne security server to use the same LDAP Server used by the single sign-on server. User mappings from longer user names to JD Edwards EnterpriseOne user names can be provided in LDAP Server. However, in this case, JD Edwards EnterpriseOne non-web users (such as Windows client, WSG, and Java Connector users) will not be able to log in with more than 10 character user names and passwords. Refer to the following chapters in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information:
Understanding JD Edwards EnterpriseOne Single Sign-On Setting Up EnterpriseOne Single Sign-On Understanding Single Sign-On between JD Edwards EnterpriseOne and Oracle
Disable the Unused User Accounts It is difficult to monitor and administer accounts that are not in use. An administrator should disable these accounts to stop unauthorized access to JD Edwards EnterpriseOne. Refer to Setting up User Security in the JD Edwards EnterpriseOne Tools 8.98 Security Administration Guide for more information to disable an account. Set Up an Independent Security Environment Set up a separate environment to design and test security before deploying it to the production environment. When testing, start with the least privileges and add more rights as required.
32
33
34
Enable Predefined JDENET Ports in JDE.INI When there is a firewall between the JD Edwards EnterpriseOne HTML Web Server and an enterprise (business logic) server, set the PredfinedJDENETPorts setting to 1 in the JDE.INI file of the Enterprise Server. This setting enables JDENET network process to use a predefined range of TCP/IP ports. This port range starts at the port number that is specified by serviceNameListen and ends at the port that is calculated by the equation serviceNameListen = maxNetProcesses 1. You must open these ports in a firewall setup to successfully connect the JD Edwards EnterpriseOne HTML Web Server to the Enterprise Server.
35
36