19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

Referral<br />

A uniform resource locator (URL) of an alternative LDAP server can be<br />

entered in this text box. If for example a client sends a request to the server<br />

which the latter cannot reply to because the Suffix was set, this URL is<br />

returned to the LDAP client. <strong>The</strong> client is then able to forward the request to<br />

the specified server.<br />

Enable NDS User Bind<br />

If this check box is activated, a user has to authenticate himself with his NDS<br />

password when issuing a bind request. <strong>The</strong> passwords are not encrypted<br />

between the LDAP client and the LDAP server, however, i.e. they are<br />

transmitted across the network as plain text. Given a suitable network monitor<br />

(LANalyzer), an attacker is therefore in a position to spy out these passwords<br />

in this way. For security reasons this setting should not be used, unless you are<br />

using accounts that have been set up specifically for LDAP accesses and apart<br />

from that have no further rights in NDS nor with respect to the Netware file<br />

system.<br />

Proxy Username<br />

<strong>The</strong> proxy user is an NDS account that does not require a password, nor a<br />

password change. When an anonymous bind is requested (a connection setup<br />

without a user name or password), the LDAP server authenticates this request<br />

with the Proxy Username in NDS. Typically, the rights of these proxy users<br />

will be heavily restricted. If no Proxy Username has been defined, however,<br />

these anonymous binds will be validated as a user [Public] and will therefore<br />

also be given the corresponding rights.<br />

LDAP Services for NDS obtains an additional security feature via the Access<br />

Control Page: the Access Control List (ACL). <strong>The</strong> LDAP ACL defines the<br />

access rights to the LDAP object properties for users and groups. <strong>The</strong> LDAP<br />

server uses the ACL to establish whether a user request is forwarded to the<br />

NDS or rejected. If a user has the appropriate rights, the request is forwarded<br />

to the NDS. In turn, NDS checks on the basis of the NDS rights whether the<br />

request will be processed or rejected.<br />

Rights can be assigned to the users via the LDAP ACL dialog window. <strong>The</strong><br />

following levels are possible:<br />

None<br />

If this option is activated, the user is granted no rights of any kind to the<br />

NDS tree.<br />

Search<br />

This right allows the user to search for LDAP object properties. <strong>The</strong>se<br />

must be defined in the Access To list, however. Access to properties can be<br />

explicitly enabled by clicking on the Add button.<br />

Compare<br />

Assignment of this right enables the user to compare LDAP object property<br />

values with the corresponding NDS object property values.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!