Advanced security concepts not included

These security configuration methods are less common and more complex and are not covered in this guide. For details about how to perform these configurations, see Landmark User Setup and Security.

Security technique Description/reason to perform
Creating security administrators Adding users who have super-user access rights.
Configuring login pages You can customize a sign in page for your site.
Setting up and administering user proxies Determine if users can designate another user to act for them in their absence.
Administering password policies Authentication mechanisms should always require sufficiently complex passwords. Consider these requirements when creating a password policy:
  • Require a minimum of eight characters
  • Require alphanumeric characters
  • Require a mix of uppercase and lowercase characters
  • Do not allow passwords that contain the user name
  • Do not allow passwords that contain three or more identical characters in a row. For example, aaa or 111.
  • Do not allow passwords that contain three or more consecutive characters. For example, abc or 123.
Making domain-wide configuration changes For example, adding a new domain.
Configuring vulnerability mitigation Information about configuring tools for preventing attacks to web-based products. This includes tools for preventing XSS scripting attacks and configuring session validation.
Using command-line tools for administering Landmark, including Infor Security An overview of the basic administration tools, including command-line tools, and how to use them.