+

Search Tips   |   Advanced Search

Secure the MobileFirst Server administration

The security threat is that any person who can install mobile applications in a production environment is able to modify the behavior of these apps on the mobile devices. The apps are served to the clients through the MobileFirst runtime environments, which get these apps from the administration services through JMX. The administration services fetch these apps from the administration database. The administration services and the MPF operations console allow any user in the roles...

...to deploy applications. A similar threat exists for adapters.


Enable https in the application server

The ability to use https with the application server is a prerequisite.

For WAS Liberty profile:

For Apache Tomcat:


Enable application security in the application server

Without this step, anyone can connect to the web applications without credentials.

For WAS full profile:

For WAS Liberty profile:


Protecting the passwords of users in the roles worklightadmin and worklightdeployer

If the password of any user who is mapped to the roles worklightadmin or worklightdeployer is compromised, that is, becomes potentially known to an unauthorized person, unauthorized MobileFirst administration operations are possible. Here are steps to mitigate this risk.


Protecting the administration database

If the password of the administration database (or of the user who owns the corresponding schema of that database) is compromised, that is, becomes potentially known to an unauthorized person, unauthorized deployments of apps and adapters are possible. Here are steps to mitigate this risk.


Protecting the JMX communication

If the JMX communication between administration services and the MobileFirst runtime environments are not secured, unauthorized persons who have local access to the MobileFirst Server machines can play man-in-the-middle attacks and thus activate tampered apps and adapters. Here are steps to mitigate this risk.


Protecting the apps and adapters to deploy

If the source from which the MobileFirst administrator receives apps and adapters is not secured, tampered apps and adapters can be submitted to the MobileFirst administrator, who then deploys them. Here are steps to mitigate this risk.


Protecting against attacks from the internet

Attackers from the internet might attempt to search for security flaws in the operations console and administration services and try to circumvent the security measures. Here is a tip to mitigate this risk. It assumes that mobile application users connect to MobileFirst Server from the internet, but all legitimate uses of the operations console Console and administration services are from an intranet.


Parent topic: Security configuration