The Dispatcher Security Checklist
The dispatcher as a front end system offers an extra layer of security to your Adobe Experience Manager infrastructure. Adobe strongly recommends that you complete the following checklist before going on production.
Use the Latest Version of Dispatcher
You should install the latest available version that is available for your platform. You should upgrade your Dispatcher instance to use the latest version to take advantage of product and security enhancements. See Installing Dispatcher .
You can check the current version of your dispatcher installation by looking at the dispatcher log file.
[Thu Apr 30 17:30:49 2015] [I] [23171(140735307338496)] Dispatcher initialized (build 4.1.9)
To find the log file, inspect the dispatcher configuration in your
Restrict Clients that Can Flush Your Cache
Enable HTTPS for transport layer security
Adobe recommends to enable HTTPS transport layer on both author and publish instances.
Make Sure Access to Administrative URLs is Denied
Make sure you use filters to block external access to any administrative URLs, such as the Web Console.
See Testing Dispatcher Security for a list of URLs that need to be blocked.
Use Whitelists Instead Of Blacklists
Whitelists are a better way of providing access control since inherently, they assume that all access requests should be denied unless they are explicitly part of the whitelist. This model provides more restrictive control over new requests that might not have been reviewed yet or taken into consideration during a certain configuration stage.
Run Dispatcher with a Dedicated System User
When configuring the Dispatcher you should ensure that the web server is ran by a dedicated user with least privileges. It is recommended to only grant write acess to the dispatcher cache folder.
Additionnaly, IIS users need to configure their website as follows:
- In the physical path setting for your web site, selectConnect as specific user.
- Set the user.
Prevent Denial of Service (DoS) Attacks
A denial of service (DoS) attack is an attempt to make a computer resource unavailable to its intended users.
At the dispatcher level, there are two methods of configuring to prevent DoS attacks: filter
- Prevent the dispatcher from caching URLs with spurious extensions by using filters . For example, change the caching rules to limit caching to the expected mime types, such as:
An example configuration file can be seen for restricting external access , this includes restrictions for mime types.
To safely enable full functionality on the publish instances, configure filters to prevent access to the following nodes:
Then, configure filters to allow access to the following node paths:
- /libs/cq/personalization/*(JS, CSS and JSON)
- /libs/cq/security/userinfo.json(CQ user information)
- /libs/granite/security/currentuser.json(data must not be cached)
Configure Dispatcher to prevent CSRF Attacks
AEM provides a framework aimed at preventing Cross-Site Request Forgery attacks. In order to properly make use of this framework, you need to whitelist CSRF token support in the dispatcher. You can do this by:
- Creating a filter to allow the/libs/granite/csrf/token.jsonpath;
- Add theCSRF-Tokenheader to theclientheaderssection of the Dispatcher configuration.
To prevent clickjacking we recommend that you configure your webserver to provide the
X-FRAME-OPTIONSHTTP header set to
Perform a Penetration Test
Adobe strongly recommends to perform a penetration test of your AEM infrastructure before going on production.