HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 3.24 Training on the Lotus Notes system architecture for Administrators

S 3.24 Training on the Lotus Notes system architecture for Administrators

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management

In order to be able to administer a Lotus Notes system correctly and securely, it is essential that the responsible Administrators are given proper training. Even minor configuration errors can result in security weaknesses. Examples here are the uncontrolled creation of cross-certificates and incorrect access control lists (ACLs) for databases. For this reason Administrators must be informed about the system architecture of Lotus Notes and in particular about the security mechanisms.

Figure 1 shows in simplified form the general architecture underlying a client/server model. Databases which can be accessed over the Internet through the Lotus Domino Server software are held on the so-called Notes server. Access to the databases by the user is possible with two client programs:

  1. Through the original Notes Client which is provided by Lotus Notes as client software. Access here is using the proprietary Notes protocol. The Notes client forwards processing requests to the Domino server which carries out processing on the databases on behalf of the client.
  1. Through a browser (Web client). Since the advent of Notes version 4.6 it is also possible to access databases on a Domino server using a normal browser. For this purpose a special Web server module which functions as HTTP server has been provided. The content of the databases is dynamically converted to the HTML format by the so-called HTML engine during access, so as to enable viewing in the browser. The Hyper Text Transfer Protocol (HTTP) is used as transport protocol.

Figure 1: overview of the Lotus Notes architecture

Access control for a Notes server is designed in two stages (see Figure 2) and is based on user authentication using the Notes ID or the Web authentication mechanisms "User name and password" or "SSL certificate". Once a user has been authenticated, if he attempts to access a database on a server, first of all a check is carried out as to whether he is allowed to access the server generally. If this is allowed, then in a second stage the system checks whether the user is allowed to carry out the requested operation on this particular database.


Figure 2: authentication and access control in Lotus Notes

Access to a server can be limited by various mechanisms (see S 4.119 Instituting restrictions on access to Lotus Notes servers). The same applies to the possible restrictions on access to databases (see S 4.120 Configuration of access control lists for Lotus Notes databases). It can be a problem if the restrictions on access to databases are configured so that they presuppose a particular restriction on access to the servers. If the restrictions on access to the servers are changed, it is easy for configuration mistakes to creep in (see example below).

The training given to the Administrators should consider the following aspects and, as a minimum, it should cover the following subjects:

The subjects listed constitute only a selection of the most important topics, which should be tailored to the particular application and expanded as appropriate.

Example:

A brief account is now provided as to which mechanisms are used to control database access via HTTP without SSL. This process should be explained to the Administrators in order to convey a basic understanding of the manner in which access control operates.

Even if role separation between administration of the Lotus Notes system and the underlying operating system is in place, the Lotus Notes Administrators should be taught a basic knowledge of the operating system. Otherwise it will be difficult to work together to resolve any problems.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home