+

Search Tips   |   Advanced Search

Deployment on a single Domino Server

You must run the necessary configuration steps to deploy the plug-in on a single Domino® Server.

To install the Domino HTTP Password Synchronizer on the Domino, run the installer on the system where the Domino Server is installed. The installer places all required files in the appropriate directory structures. The file paths of the Domino Server data directories are as follows:

Notes:

  1. The Domino HTTP Password Synchronizer ships with the TDI_install_dir/pws_plugins/domino/pwsync.props template configuration file that has all the required properties preset by default, and ready for use.
  2. The default Password Store, which is configured in the shipped pwsync.props file is the Log Password Store. This Password Store logs all the captured passwords in the log file of the proxy. You must use this Password Store only for diagnostic purposes.

The following table explains the deployment steps.

Step Description
1 Make sure that the new files that are copied during the post-install phase are read by the Domino Server.
2 The external databases that are shipped with the Security Directory Integrator must be signed by the Domino Server to be able to vouch for their integrity.

See Signing databases with Server ID.

3 By editing the pubnames.ntf template, we can change the behavior of the names.nsf database. A code is placed on several key places to intercept the plain password. When the password is captured, it is passed to the appropriate Java agent such as IDIPWSyncClientAgent or IDIPWSyncWebAgent.

See Updating pubnames.ntf template design.

4 By editing the admin4.ntf template, we can change the behavior of the admin4.nsf database. The copied Java agent IDIPWSyncAdminRequestAgent is responsible to periodically process the administration requests, posted by various users when they change the passwords.

See Updating the admin4.ntf template design.

5 Agents are run with the rights of their signer. The agents of the Password Synchronizer must run restricted operations such as network access or file system access. Therefore, they can be signed by someone who has the sign or run unrestricted methods and operations privilege.

See Signing the agents with a signer.

6 Refreshing the design of the names.nsf database applies the changed template to the existing database.

See Refreshing names.nsf database design.

7 Refreshing the design of the admin4.nsf database applies the changed template to the existing database.

See Refreshing the design of the admin4.nsf database.

8 The various Java agents use the idipwsync.nsf database to store the documents that need further processing. You must encrypt the documents to protect them in this database. The secret key that is created in this step is used in the database encryption process.

See Set up secret key encryption infrastructure.

9 Port encryption encrypts the communication between Lotus® Domino Administrator and the Domino Server, bringing an additional layer of security to the network communication.

See Set up port encryption.

10 SSL is necessary to secure the communication between the web browser and the Domino HTTP Server. If SSL is not set up, the password is transferred over the network in plain text.

See Set up SSL for Domino HTTP Server.

11 The Java Proxy runs in the JVM that is shipped with the Domino. The process starts as a server task when you start the Domino Server.

See Configure Domino Server to automatically start and stop Java proxy.

12 Configure each Lotus Domino Administrator client to enable administrative password changes.

See Configure execution control list of Lotus Domino Administrator clients.

13 The IDIPWSync group contains a list of users who has the rights to change the password of other users. Typically, only the administrators are present in this group. Regular users can still change the passwords through iNotes® even if they do not belong to this group.

Only members of this group can access the idipwsync.nsf database. The idipwsync.nsf database is used to transfer data between Lotus script and the Password Synchronizer agents. The signer of the Password Synchronizer agents must also be added to the IDIPWSync group so that the agents can access the idipwsync.nsf database. Agents are run with the rights of their signer.

See Configure Access Control List.

14 The pwsync_install_r8.nsf database is used only to distribute the required template objects. When the Domino HTTP plug-in is set up, the database is no longer required and we can delete the database.

See Deleting pwsync_install_r8.nsf database.


Parent topic:

Domino HTTP Password Synchronizer