2.3 Restricting Access to eDirectory Server

  • It is recommended to use high-strength ciphers for SSH keys. For more information, see Configuring Protocols and Ciphers Using ldapSSLConfig Attribute.

  • It is also important to audit logins and access to the system to keep a report of all activities performed by any user at the console. This can be achieved by using third-party tools such as Check Pass Act to monitor user activities.

  • It is essential to set filesystem permissions correctly, particularly for DIB and config files, to ensure that only the user hosting the service has all the necessary permissions. Other users should not have read permission.

  • To prevent data modification, it is recommended to create RO replicas and partitions.

  • Recommended to use LDAP proxy.

  • It is important for Network Administrators to take necessary measures to prevent DOS attacks.