MLDAP ESM Module

For Security Managers using the MLDAP ESM Module, Micro Focus makes the following hardening recommendations:

Module
Set this to mldap_esm, with no path, and for Linux/UNIX installations, no bitness, threadedness, or file extension suffixes. ESF loads ESM Modules from the product installation directory automatically – it does not search the library load path. ESF will select the appropriate bitness and threadedness automatically.
Connection path
For optimal security, use LDAP-over-TLS by enabling TLS in your LDAP server and using the ldaps: scheme prefix in the value for this field. Depending on the LDAP client library (also known as "provider") in use, you might also have to configure the LDAP client to support TLS. For OpenLDAP, for example, you might need to edit a configuration file such as ldaprc to set the root-certificate file or path so that the OpenLDAP client can validate the server's certificate.
Authorized ID / Password
Micro Focus strongly recommends that you do not use the default credentials. For improved security, configure your LDAP server with an account which gives the appropriate level of access for Enterprise Server use. Typically, this is read-only access to groups and resource access rules, and write access to user objects if necessary for updating attributes such as passwords and last-login-time. Then set these fields to use that account.
Note: You can use the Micro Focus Vault Facility to store a secret for the Authorized ID and Password fields. These fields can be specified using the forms:
mfsecret:configuration-name:secret-path

or:

mfsecret::secret-path

or:

mfsecret:secret-path
Cache Limit / Cache TTL
From Enterprise Server 7.0, the MLDAP ESM Module can cache the results of some LDAP searches. This can significantly improve performance, but introduces the possibility of making security decisions with stale information. If the cache is enabled, set the TTL to meet the organization's tolerance for latency in recognizing changes to security information.
Note: The ESF Update mechanism will flush the MLDAP ESM Module's cache, reducing this exposure.

Configuration Information settings relevant to hardening

The MLDAP ESM Module supports a large number of options that can be added to the Configuration Information field. Many of these relate to LDAP repository configuration or other aspects which do not directly affect the security of Enterprise Server. Some options which might be useful when hardening an installation are discussed here.

Set login count / Set login time
Enables the module to update these attributes in the user record can provide useful information to administrators. The login-count attribute is also required for implementing account lockout, which is a useful security feature in many environments. This require giving Enterprise Server write access to user objects in LDAP, which is a risk. You will need to determine if that trade-off is appropriate to your organization.
Signon attempts
If Set login count is enabled, this setting can be used to lock accounts out after the specified number of failed signon attempts. This is generally considered good practice.
Note: This requires write access to the user object. Also, the MLDAP ESM Module does not currently support automatic unlocking after a period of time; the account must be manually unlocked by an administrator.
Check TLQ first / Maximum qualifiers for initial check
These options affect the processing of security rules, particularly for data sets. They can improve performance but could result in unexpected behavior and undesirable, if the organization uses rules which begin with wildcards.
Bind
On Windows, the negotiate and es-user options for this setting are somewhat more secure, particularly if LDAP-over-TLS is not used. These options are not currently supported on other platforms.
Password type
This setting only has an effect if Micro Focus password hashes are in effect, and only when users or administrators set passwords. Currently the best choice for this is MF-A2, which uses a salted Argon2 hash, a state-of-the-art type of password verifier. This is the default in current product releases.
Migrate passwords
Enabling this setting is useful if the customer is using Micro Focus password hashes, and has existing user objects that use password verifiers that are not of the MF-A2 type. In this case, Micro Focus recommends enabling this feature.
Password settings
A variety of settings under the [Password] section affect password processing and enables the administrator to harden password use. Most of these only apply when MF-hash passwords are used; otherwise the LDAP server and its interaction with the operating system determine the password-strengthening rules. With MF-hash passwords, Micro Focus recommends the following settings for hardening:
  • Configure Expiration to meet the organization's requirements. Note many security experts now believe regular password expiration is counterproductive.
  • The History setting can be used to prevent password reuse.
  • Set length requirements using Minimum length and Maximum length. Remember that Enterprise Server supports long passphrases in most interfaces, but some applications, such as older CICS applications, might not.
  • The Required and Complexity settings can be used to enforce password complexity. Often organizations have specific requirements for passwords which can be represented using the Required setting; otherwise, Micro Focus recommends setting Complexity to 2 or 3 if the minimum password length is less than 20 characters.
SecretFile
If ESF passtokens are used, for passing authentication between subsystems such as MFDS and ESCWA, or for DCAS, then Micro Focus strongly recommends using this option. The "secret file" can contain anything, as long as it has at least 128 bits of entropy; even 1 KB or so of ordinary text would suffice. The point of this setting is to avoid using either the built-in secret (which is available to anyone with a copy of the product) or a secret in the configuration (which is available to anyone who can view the configuration) to generate passtokens. Otherwise, a technically-skilled attacker could forge passtokens.
Note: there is no space between "Secret" and "File" in the name of this setting.
Trace settings
Tracing can useful in diagnosing issues, but might reveal sensitive data to an attacker who can obtain copies of log files. Micro Focus recommends that you disable tracing when it is not required.