This redbook provides best practices and guidance towards building a secure "collaboration" infrastructure utilizing IBM Lotus technologies. It is actually the third “Lotus Security” oriented Redbook to be published. However, unlike the previous two Redbooks in this series, “The Domino Defense: Security in Lotus Notes 4.5 and the Internet” (SG24-4848) and “Lotus Notes and Domino R5.0 Security Infrastructure Revealed” (SG24-5341), this third book focuses not just on Notes/Domino - but on all IBM Lotus collaborative products, as well as general security best practices for any infrastructure. This book should be considered essential reading for anyone responsible for Lotus technology based applications, systems, and infrastructures.
The book is broken into four main parts:
Part 1: introduces the basic concepts related to security, and then covers a number of methodologies for architecting and deploying security from beginning to end in an organization.
Part 2: dives into the specific concepts and components involved in a secure infrastructure. This includes discussions around security zoning, as well as single-sign-on (SSO), public key infrastructures (PKI), and directory strategies.
Part 3: discusses the specific security features included in the latest versions of Lotus products. Detailed security features of Lotus Notes and Domino 6, Sametime 3, QuickPlace 2.08, Domino Web Access (iNotes), WebSphere Portal, and other IBM/Lotus collaborative technologies are all discussed.
Part 4: provides a real-life scenario demonstrating a secure "single sign on" implementation of Lotus collaborative technologies, following the guidelines and best practices provided in the first three parts of this Redbook.
NOTE: It is assumed that the reader of this Redbook has a good understanding of the basic concepts involved with the Lotus Notes and Domino’s security model. Those looking for a general overview of Notes and Domino security, would be best be served by first reviewing the IBM Redbook, “Lotus Notes and Domino R5.0 Security Infrastructure Revealed” (SG24-5341), available for download at:
NOTE #2: Also available for download via the "additional material" link in the right hand corner of this abstract page, is the powerpoint presentation from the recent Redbooks Lotus Single Sign On Solutions webcast - which was based on the SSO content from this Redbook.
Part 1. Security concepts introduced
Chapter 1. Fundamentals of IT security
Chapter 2. Security methodologies
Part 2. Building a secure infrastructure
Chapter 3. Secure infrastructure requirements
Chapter 4. Security components and layers
Chapter 5. Proxies
Chapter 6. Public Key Infrastructures
Chapter 7. Single Sign On
Chapter 8. Directory strategies
Chapter 9. Server hardening
Part 3. Security features of Lotus products
Chapter 10. The Notes/Domino security model
Chapter 11. Domino/Notes 6 security features
Chapter 12. Security features of other Lotus products
Part 4. A secure scenario
Chapter 13. Sample scenario described
Chapter 14. Scenario implementation details
Appendix A. ÒDebuggingÓ with a Protocol Analyzer
Appendix B. A sample DSAPI program
Appendix C. Domino 6 HTTP Òplug-inÓ hints and tips
Draft Redbooku čítající 734 stran ve formátu PDF najdete zde (7,5 MB).
Za tip děkuji Marku Fialovi :-)