General Security Considerations for AEM Forms on JEE general-security-considerations-for-aem-forms-on-jee
This article provides introductory information that helps you prepare for hardening your AEM Forms environment. It includes prerequisite information about AEM Forms on JEE, operating system, application server, and database security. Review this information before you continue to lock down your environment.
Vendor-specific security information vendor-specific-security-information
This section contains security-related information about operating systems, application servers, and databases that are incorporated into your AEM Forms on JEE solution.
Use the links in this section to find vendor-specific security information for your operating system, database, and application server.
Operating system security information operating-system-security-information
When securing your operating system, carefully consider implementing the measures described by your operating system vendor, including the following:
- Defining and controlling users, roles, and privileges
- Monitoring logs and audit trails
- Removing unnecessary services and applications
- Backing up files
For security information about operating systems that AEM Forms on JEE supports, see the resources in the table:
Application server security information application-server-security-information
When securing your application server, carefully consider implementing the measures described by your server vendor, including the following:
- Using non-obvious administrator user name
- Disabling unnecessary services
- Securing the console manager
- Enabling secure cookies
- Closing unneeded ports
- Limiting clients by IP addresses or domains
- Using the Java™ Security Manager to programmatically restrict privileges
For security information about application servers that AEM Forms on JEE supports, see the resources in this table.
Database security information database-security-information
When securing your database, consider implementing the measures described by your database vendor, including the following:
- Restricting operations with access control lists (ACLs)
- Using non-standard ports
- Hiding the database behind a firewall
- Encrypting sensitive data before writing it to the database (see the database manufacturer’s documentation)
For security information about databases that AEM Forms on JEE supports, see the resources in this table.
This table describes the default ports that are required to be open during your AEM Forms on JEE configuration process. If you are connecting over https, adjust your port information and IP addresses accordingly. For more information about configuring ports, see the Installing and Deploying AEM Forms on JEE document for your application server.
>
WebLogic Managed Server
>
WebSphere®
9060, if Global Security is enabled the default SSL port value is 9043.
9080
>
BAM Server
>
SOAP
>
MySQL
>
Oracle
>
DB2®
>
SQL Server
>
LDAP
Configuring JBoss® to use a non-default HTTP port configuring-jboss-to-use-a-non-default-http-port
JBoss® Application Server uses 8080 as the default HTTP port. JBoss® also has pre-configured ports 8180, 8280, and 8380, which are commented out in the jboss-service.xml file. If you have an application on your computer that already uses this port, change the port that AEM Forms on JEE uses by following these steps:
-
Open the following file for editing:
Single-Server installation: [JBoss® root]/standalone/configuration/standalone.xml
Cluster installtions: [JBoss® root]/domain/configuration/domain.xml
-
Change the value of port attribute in the <socket-binding> tag to a custom port number. For example, the following uses port 8090:
<socket-binding name=“http” port=“8090”/>
-
Save and close the file.
-
Restart the JBoss® application server.
AEM Forms on JEE security considerations aem-forms-on-jee-security-considerations
This section describes some AEM Forms on JEE-specific security issues that you should know about.
Email credentials not encrypted in database email-credentials-not-encrypted-in-database
The email credentials stored by applications are not encrypted before they are stored in the AEM Forms on JEE database. When you configure a service endpoint to use email, any password information used as part of that endpoint configuration is not encrypted when it is stored in the database.
Sensitive content for Rights Management in the database sensitive-content-for-rights-management-in-the-database
AEM Forms on JEE uses the AEM Forms on JEE database to store sensitive document key information and other cryptographic material that is used for policy documents. Securing the database against intrusion helps to protect this sensitive information.
Password in clear text form password-in-clear-text-format-in-adobe-ds-xml
The application server that is used to run AEM Forms on JEE requires its own configuration for access to your database through a data source that is configured on the application server. Ensure that your application server does not expose your database password in clear text in its data source configuration file.
The lc_[database].xml file should not contain password in clear text format. Consult your application server vendor about how to encrypt these passwords for your application server.
IBM® WebSphere® Application Server and Oracle WebLogic Server may encrypt data source passwords by default. However, you should confirm with your application server documentation to ensure that it is happening.
Protecting the private key stored in Trust Store protecting-the-private-key-stored-in-trust-store
The private keys or credentials imported in Trust Store are stored in AEM Forms on JEE database. To secure the database and restrict access to designated administrators only, take appropriate precautions.