Creating a security policy settings document
A security policy settings document allows you to manage IBM® Notes® and Internet passwords, configure customized password polices for your organization, set up key rollover, manage administration ECLs, push trusted cross-certificates to clients, and configure an ID vault. You can also configure settings for signed plug-ins and the home portal server for composite applications.
Before you begin
- PolicyCreator role to create a settings document
- PolicyModifier role to modify a settings document
About this task
Procedure
Managing Notes and Internet passwords
Procedure
Configuring Internet password lockout
About this task
Procedure
Configuring custom password policies
About this task
You need to complete the following fields only if you have chosen to implement a custom password policy.
Procedure
Configuring administration ECLs
About this task
Complete the fields on the Execution Control List tab to configure administration ECLs used in your organization.
Field | Action |
---|---|
Admin ECL | Choose one:
Note: The Edit and Manage buttons are displayed only when the
security settings document is in edit mode. |
Update mode | Choose one:
If the client ECL lists a signature that the admin ECL does not, than that signature and its settings stay the same in the client ECL. If the admin ECL lists a signature that the client ECL does not, than that signature and its settings are added to the client ECL. If the client ECL and the admin ECL list the same signature, than the settings for the signature in the client ECL are discarded and replaced by those for the signature in the admin ECL.
|
Update frequency | Choose one:
|
Managing administration Execution Control Lists (ECLs)
About this task
Procedure
Results
Clicking Cancel leaves the name of the admin ECL displayed in the settings document unchanged.
Enabling key rollover
About this task
Complete the fields on the Keys and Certificates tab to configure key rollover for groups of users. You specify triggers that initiate key rollover for a group or groups of users. You have the option of spacing out the rollover process over a specified period of time for the group of users to which this policy applies.
See the related topics for information on configuring AES for mail and document encryption.
Procedure
Enabling On-line Certificate Status Protocol (OCSP) checking
About this task
Applying trusted cross-certificates to clients
About this task
Configuring installation of signed plug-ins
About this task
Plug-ins can be provisioned to a Notes user and are ordinarily signed with a certificate that is trusted by the Notes client, and verifies that the data they contain is not corrupted. Users can then install or update the signed plug-ins.
Occasionally, a plug-in is found to have a problem. Either it is unsigned, not signed with a trusted certificate, or the certificate has either expired or is not yet valid. For these cases, you can establish a policy for never installing these plug-ins, always installing them, or asking users to decide at the time the plug-in is installed on their computers.
You can time-stamp plug-in jar signatures using the jar signer tool provided by the Java SDK to ensure the long term validity of plug-in signatures. The Notes client uses a time stamp included with a plug-in jar signature to determine if the plug-in signing certificate was valid at the time of signing. If a plug-in signing certificate has expired but was valid at the time of signing, Notes accepts it so that users do not see security prompts during plug-in installation or provisioning. Use the Ignore expiration for time stamping certificate setting on the Signed Plug-ins tab to control whether to allow the installation of signed plug-ins with expired time stamping certificates. Their installation is allowed by default.
Field | Action |
---|---|
Installation of plug-ins that are expired or not yet valid |
|
Installation of unsigned plug-ins |
|
Installation of plug-ins signed by an unrecognized entity |
|
Trust IBM plug-in signing certificate |
|
Ignore expiration for time stamping certificate |
|
Configuring Portal Server settings
About this task
Field | Action |
---|---|
Home portal server | Enter the name of the IBM WebSphere Portal Server that hosts Notes user accounts. |
Authentication URL | Enter the URL that Notes users need to access in order to authenticate with the portal server. |
Authentication type | Choose one:
|