22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

216 Lotus Security Handbook<br />

Encryption is important, because of the potential damage that could occur if<br />

Carole was able to get a legible copy of the information being exchanged by<br />

Alice and Bob.<br />

However, it’s important to consider what could happen if Carole could<br />

impersonate Alice or Bob. Carole could both get more information and could also<br />

modify the information to be exchanged. The resulting damage could be far<br />

worse than what could happen with simple eavesdropping.<br />

Authentication is thus the cornerstone of effective security. It is also the<br />

cornerstone of Notes and Domino security, because it permits the system to<br />

differentiate one user from another.<br />

Without authentication, the following problems would occur:<br />

► The system could not verify the identity of anyone using the services provided<br />

by the Domino server.<br />

► Users would have to be treated equally since they would fall under one<br />

category. Therefore, there could be no granularity of access to Notes<br />

databases and services offered by the Domino Server.<br />

Authentication is what permits administrators to permit or deny access to the<br />

resources of the system. Once a person has been granted permission to access<br />

the system, different privileges (commonly called access levels) can be<br />

conferred to that person.<br />

Authentication is thus the key to providing restricted access to Notes and Domino<br />

resources.<br />

The authentication procedure in Notes is generally misunderstood. People<br />

assume that it is a simple user ID/password challenge/response mechanism<br />

when, in reality, it is far more sophisticated than that.<br />

Because the authentication procedure in Notes is dependant on the public key<br />

infrastructure natively built into the client and the server, we are taking the time<br />

now to see how the native PKI is architected and then explain how Notes<br />

authentication works.<br />

Note: The term “Notes authentication” is used because it denotes<br />

authentication of a user using the Notes client against a Domino server. We’ll<br />

refine the term a little bit later on, but using this term helps us differentiate this<br />

type of authentication from the other types of authentication that we discuss<br />

later in this book.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!