Configuring secure MDM environments
Your first security step is to set up your MDM infrastructure: the MDM database, the application server, communications, operating-system access, and LDAP integration.
About this task
Procedure
- For the operating systems, configure privileges. You set up the operating system before you install InfoSphere® MDM. For example, create operating-system user names that map to the applicable read, write, and execute access for the directories where InfoSphere MDM is installed.
- For user security, configure user authentication and encryption for the operational server, the MDM database, source systems, and clients. The installation programs create initial users in the application server. Also, you can use InfoSphere Guardium® for some configuration.
- For LDAP environments, configure how the application server uses your LDAP user registry.
- For the application server and the operational server, configure the security settings for gateway security devices (firewalls), ports, cookies, session security, and identity propagation. The application server includes libraries for programmatic password encryption.
- For SSL and cryptographic communications, configure the keys, certifications, and FIPS. Optionally, configure how InfoSphere MDM interacts within a virtual private network (VPN).