Configuring domains

EAServer 6.0 uses the “user@domain” style for user security. This improves the ability for administrators to separate different user security settings into different domains. For example, you can separate users into different domains, and use a different access control policy for each domain.

As a result, every user is a member of a domain. For example, admin@system represents the admin user in the system domain. If you provide only the user name, the server assigns it to the ‘default’ domain; user@default. Any user, in any domain, can have “admin-role” assigned to it. “admin@system” is the default. EAServer includes two preinstalled domains; system, and default.

In addition, there is no default password set for the user 'admin@system'. When you install EAServer, you are asked to provide an admin password. Otherwise use the set-admin-password command to set the admin password. You must set this password before you can start EAServer.

StepsAdding a new domain

  1. From the Web Management Console, expand the Security folder.

  2. Right-click the Domains folder and select Add.

  3. The New Domain wizard guides you through adding a new security domain. You can then set domain properties.

StepsSetting domain properties

  1. From the Web Management Console, expand the Security folder.

  2. Select Domains | domain_name, where domain_name is the domain for which you are setting properties. The right pane displays the domain properties.

  3. Select the General, Password Settings, or Login Properties tab to access the properties. See Table 10-1 (General) and Table 10-2 (Password Settings) for a description of the properties.

    The Login Properties tab contains one property, Certificate Digest Algorithm, which defines the Secure Hash Algorithm (SHA) used for logins to this domain. SHA-512 is the default.

  4. Select Apply to apply your changes, or Reset to restore them to their previous values.

Table 10-1: General domain properties

Property name

Description

Login Method

Select the method used for login from the drop-down list. See “Login methods” for a description of each.

Login Cache Timeout

Specifies how long to cache login information before timing out. The value is in seconds.

Once a user is logged in, the login information (user name and password) is maintained in the system. The next time the same user logs in, the system checks the cached information and compares it with the password. This way, normal authentication is bypassed and performance enhanced.

Login Failure Lock Threshold

Specifies the number of times the client can retry with wrong credentials before being locked out.

Login Failure Lock Timeout

Specifies the amount of time a user is locked out when the login failure lock threshold is reached.

Access Control Policy

The access control policy for the selected login method.

The Access Control Policy should be configured to the name of the policy class for all security domains which might be associated with JACC-enabled modules. The policy class selected for this purpose is expected to perform JACC policy checks only. See “JACC (JSR-115) support”.

JRE-related policy can be separately enabled (if required) using standard JRE security policy mechanisms.

Audit Access Denied

When set to true, any failure caused by a user trying to access a server resource is logged to the server’s log file ($EAServer/logs/server_name.log).

Audit Access Permitted

When set to true, any success caused by a user trying to access a server resource is logged to the server’s log file ($EAServer/logs/server_name.log).

Permission Cache Timeout

The number of seconds that the result of an authorization (access control) check is cached. This applies to both denied access and permitted access. Caching of authorization results improves performance.

Authentication Service

The name and path to your custom authentication service component (if any). This allows you to customize EAServer security and to integrate with third-party enterprise security software. See Chapter 7, “Creating and Using Custom Security Components.”

FTP Host Name(s)

The host name of the FTP server to which the security domain delegates authentication requests. A comma-separated list can be used to specify multiple servers (for high availability, not load balancing).

FTP Port Number

The port number of the FTP server to which the security domain delegates authentication requests.

Http Resource URL(s)

The URL for an HTTP resource which the security domain attempts to access when delegating authentication requests to an HTTP server. A comma-separated list can be used to specify multiple URLs (for high availability, not load balancing).

JAAS Login Context

The name of a JAAS (Java Authentication and Authorization Service) login context that has been configured in jaas.conf. Refer to the JDK documentation for details on jaas.conf.

JDBC Driver Class

The JDBC driver class to be used for database authentication.

JDBC Database URL(s)

The URL for a JDBC database which the security domain attempts to access when delegating authentication requests to a database server. A comma-separated list can be used to specify multiple URLs (for high availability, not load balancing).

JNDI Initial Context Factory

The name of an initial context factory class to be used for JNDI authentication.

JNDI Provider URL

The provider URL which the security domain attempts to access when delegating authentication requests to a JNDI server.

JNDI Lookup Name

The name of a JNDI-bound object which the security domain attempts to lookup when delegating authentication requests to a JNDI server.

Role Service Component

The name and path to your custom role service component (if any). This allows you to customize EAServer security and to integrate with third-party enterprise security software. See Chapter 7, “Creating and Using Custom Security Components.”

Web Realm Names

EAServer contains a default security realm. The security realm is a container used to store the roles used to allow and limit access to your Web services. When you connect to EAServer from the Web Management Console, you see the security realm.

Table 10-2: Domain password properties

Property name

Description

Password Hash Algorithm

The algorithm used to encrypt the password. The strongest supported algorithm is used (currently SHA-512).

Minimum Password Length

The minimum total number of characters.

Maximum Password Length

Defines the maximum password length. Used only if the Login Method is Local-hash. The default value is 14.

Minimum Password Letters

The minimum number of letters contained in the password.

Require Mixed Case Passwords

When true, the password must contain both uppercase and lowercase letters.

Password Start Characters

When set, the password must start with one of the characters in the string you enter here. For example: a, B, r, t, 3.

Minimum Password Digits

The minimum number of digits (0 – 9) the password contains.

Minimum Password Special Characters

The minimum number of special characters (*, &, #, and so on) the password contains.

Password Special Characters

A comma-separated list of special characters the password can contain.

Password End Characters

A comma-separated list of characters required to end the password. If left blank, any character can end the password.

Retain Old Passwords

The number or historical passwords saved for this user.