Important
All management services are provided through the management interface on HTTP port 1060. It is essential that
any production server lock down access to this port - preferably with firewall/ssh tunneling.
Introduction
This guide discusses the security configuration of the 1060 NetKernel System and
describes how to configure your system to secure your applications. As with any
security system there is no magic bullet - good security is a combination of appropriate technology,
careful testing, monitoring and basic common sense. This guide discusses the security components
and their default settings - it requires that the administrator makes necessary decisions about
the applications they are deploying and the level of trust they have in those applications.
Security administration is simply a matter of degrees of trust. If you don't trust something, can't verify it
or plain don't know enough about something then by definition it is insecure. This document will help
in making a judgement about the level to which you can trust your system configuration and show that
with a few sensible considerations secure trustworthy XML applications can be readily created.
Before configuring the security of your system it is vital that you are familiar with the general architecture.
Read the NetKernel Concepts documents before going any further.
If in doubt about any aspect of the system all source code is provided and may be examined, customized or replaced entirely.
Security Model
NetKernel does not enforce a role-based application security model. It is the responsibility of the administrator
and module development teams to manage the local security policy of each module in the system. The NetKernel Module model
allows powerful module firewalls to be created. Modules provide public and private
URI address spaces which when combined with XACML policies
or URI Gatekeeper
provide multi-layered flexible access control capabilities.
Logging
Logging is the most basic form of security. Careful use of logs and frequent inspection provides a good baseline for
a trustworthy platform. NetKernel can be flexibly configured with multiple logs. It is recommended that in addition module developers
implement module specific loggers depending on the role of a module in a given application.