22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

212 Lotus Security Handbook<br />

► Cross-certification, if done improperly, can reduce the level of security in the<br />

organization’s Domain. The most liberal cross-certification model provides for<br />

access to the organization’s servers by the people whose organization was<br />

cross-certified. This means that servers with confidential information could be<br />

accessible to these people. In light of that, it would be wise to set up server<br />

access restrictions to prevent people from the other organization from<br />

accessing the servers that contain information that is confidential in nature<br />

and meant for the people within the organization only.<br />

► To keep things simple in the examples that follow, we have not factored in<br />

Server access lists and database ACLs and their ability to restrict access to<br />

servers and the databases on these servers.<br />

Cross-certification between two organizations<br />

Let’s assume a common organizational occurrence these days, in which two<br />

distinct organizations, Widget and Acme, decide to merge.<br />

Here, the organizations want the broadest form of cross-certification, in that they<br />

want all users and servers in both organizations to authenticate with one another.<br />

The following steps will accomplish this goal:<br />

1. The Acme organization certifier (/Acme) obtains a cross-certificate for the<br />

Widget organization certifier (/Widget) and stores it in Acme's Domino<br />

Directory.<br />

2. The Widget organization certifier (/Widget) obtains a cross-certificate for the<br />

Acme organization certifier (/Acme) and stores it in Widget's Domino<br />

Directory.<br />

As a result of this procedure, a special relationship (that is, “Acme and Widget<br />

trust each other”) is established. This is illustrated in Figure 6-10. In this<br />

cross-certification model, all users and servers in both organizations are now<br />

able to authenticate with each another.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!