Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS Guide de l'utilisateur Page 93

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 328
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 92
Measures for Configuration Manager
2-27
Measures for Configuration Manager
This section explains the security measures for the Configuration Manager.
Illegal Access to Resource Files
The Configuration Manager uses the following files.
Business configuration management function repository (Note 1)
(Note 1) This is the folder that is set in “Repository Environment Settings” of the Interstage Management
Console [Configuration Management] tab.
It is possible that these files may be exposed to the threat of illegal access by a person (or machine)
with malicious intent.
One measure to reduce this threat is to prevent access by general users. To achieve this, it is
recommended that settings are made for these files so that only a user with administrator authority can
access them (in Solaris OE/Linux systems, this is a super user, and in Windows(R) systems it is the
Administrator).
Vue de la page 92
1 2 ... 88 89 90 91 92 93 94 95 96 97 98 ... 327 328

Commentaires sur ces manuels

Pas de commentaire