Configuring Post Office Security

You can configure the POA in various ways to meet the security needs of the post office.


Securing Client/Server Access through a Proxy Server

If the server where the POA runs is behind your firewall, you can link it to a proxy server in order to provide client/server access to the post office for GroupWise client users who are outside the firewall.

  1. In ConsoleOne, browse to and right-click the POA object, then click Properties.

  2. Click GroupWise > Network Address to display the POA Network Address page.


    POA Network Address property page
  3. Make sure the POA is already configured for client/server processing as explained in Using Client/Server Access to the Post Office.

  4. Click the pencil icon for the Proxy Server Address field to display the Edit Network Address dialog box.


    Edit Network Address dialog box
  5. Select IP Address, then specify the IP address, in dotted decimal format, of the server that GroupWise client users access from outside your firewall.

    or

    Select DNS Host Name, then provide the DNS hostname of that server.

  6. Click OK.

  7. If you want to use a different port number for the proxy server than you are using for client/server access to the POA itself, provide the port number in the Internet Proxy Client/Server field.

  8. Click OK to save the proxy server network address and port and return to the main ConsoleOne window.

    ConsoleOne then notifies the POA to restart and begin communicating with the proxy server.

POA Web Console
You can list all POAs in your GroupWise system, along with their proxy server addresses. On the Configuration page, click IP Addresses Redirection Table under the General Settings heading.


Controlling Client Redirection Inside and Outside Your Firewall

When a user tries to access his or her mailbox without providing the IP address of the POA for his or her post office, any POA or a GroupWise name server POA can redirect the request to the POA for the user's post office.

A POA that is configured with both an internal IP address and a proxy IP address automatically redirects internal users to internal IP addresses and external users to proxy IP addresses. However, if you want to control which users are redirected to which IP addresses based on other criteria than user location, you can configure a post office with one POA to always redirect users to internal IP addresses and a second POA to always redirect users to proxy IP addresses. Users are then redirected based on which POA IP address they provide in the GroupWise Startup dialog box when they start the GroupWise client to access their mailboxes.

  1. Configure the initial POA for the post office with the IP address that you want for internal users. For instructions, see Using Client/Server Access to the Post Office.

    Do not fill in the Proxy Server Address field on the Network Address page of the POA object.

  2. Create a second POA object in the post office and give it a unique name, such as POA_PRX. For instructions, see Creating a POA Object in eDirectory.

  3. Configure this second POA with a proxy IP address. For instructions, see Securing Client/Server Access through a Proxy Server.

    Do not fill in the TCP/IP Address field on the Network Address page of the POA object.

  4. Create a startup file for the new instance of the POA.

    1. Use the /name switch to specify the name of the POA object that you created in Step 2.

    2. Use the /ip switch to specify the IP address of the server where this instance of the POA runs.

    3. Use the /port switch to specify the client/server port that this instance of the POA listens on.

      This information needs to be specified in the POA startup file because this information is not specified in ConsoleOne for this instance of the POA.

  5. Start the new instance of the POA.

  6. Give users that you want to be redirected to internal IP addresses the IP address you used in Step 1.

  7. Give users that you want to be redirected to proxy IP addresses the IP address you used in Step 3.


Enhancing Post Office Security with SSL Connections to the POA

Secure Sockets Layer (SSL) ensures secure communication between the POA and other programs by encrypting the complete communication flow between the programs. For background information about SSL and how to set it up on your system, seeEncryption and Certificates.

To configure the POA to use SSL:

  1. In ConsoleOne, browse to and right-click the POA object, then click Properties.

  2. Click GroupWise > Network Address to display the Network Address page.


    POA Network Address property page
  3. To use SSL connections between the POA and GroupWise clients located inside your firewall, select Enabled in the Local Intranet Client/Server SSL drop-down list to let the GroupWise client determine whether an SSL connection or non-SSL connection is used. (Non-SSL connections are still protected by native GroupWise encryption.)

    or

    Select Required in the Local Intranet Client/Server SSL drop-down list if you want the POA to force SSL connections, so that non-SSL connections are denied.

    IMPORTANT:  Clients older than GroupWise 6.5 cannot connect to the POA if SSL is required.

  4. To use SSL connections between the POA and GroupWise clients located outside your firewall (for example, across the Internet), select Enabled in the Internet Client/Server SSL drop-down list to let the GroupWise client determine whether an SSL connection or non-SSL connection is used. (Non-SSL connections are still protected by native GroupWise encryption.)

    or

    Select Required in the Internet Client/Server SSL drop-down list if you want the POA to force SSL connections, so that non-SSL connections are denied.

    IMPORTANT:  Clients older than GroupWise 6.5 cannot connect to the POA if SSL is required.

  5. To use SSL connections between the POA and IMAP clients, select Enabled in the IMAP SSL drop-down list to let the IMAP client determine whether an SSL connection or non-SSL connection is used.

    or

    Select Required in the IMAP SSL drop-down list if you want the POA to force SSL connections, so that non-SSL connections from IMAP clients are denied.

  6. To use SSL connections between the POA and its MTA, select Enabled in the Message Transfer SSL drop-down list.

    The POA must use a TCP/IP link with the MTA in order to enable SSL for the connection. See Using TCP/IP Links between the Post Office and the Domain.

    The MTA must also have SSL enabled for the connection to be secure. See Enhancing Domain Security with SSL Connections to the MTA. If the MTA does not have SSL enabled, the POA falls back to native GroupWise encryption.

  7. To use SSL connections between the POA and the POA Web console displayed in your Web browser, select Enabled in the HTTP SSL drop-down list.

    To set up the POA Web console, see Setting Up the POA Web Console.

  8. Click Apply to save the settings on the Network Address page.

  9. Click GroupWise > SSL Settings to display the SSL Settings page.


    POA SSL Settings property page

    For background information about certificate files and SSL key files, see Encryption and Certificates.

    By default, the POA looks for the certificate file and SSL key file in the same directory where the POA executable is located, unless you provide a full pathname.

  10. In the Certificate File field, browse to and select the public certificate file provided to you by your CA.

  11. In the SSL Key File field:

    1. Browse to and select your private key file.

    2. Click Set Password.

    3. Provide the password that was used to encrypt the private key file when it was created.

    4. Click Set Password.

  12. Click OK to save the SSL settings.

    ConsoleOne then notifies the POA to restart and access the certificate and key files.

Corresponding Startup Switches
You could also use the /certfile, /keyfile, /keypassword, /httpssl, /msgtranssl, /imapssl, and /imapsslport switches in the POA startup file to configure the POA to use SSL.

POA Web Console
You can view SSL information for the POA on the Status and Configuration pages. In addition, when you list the client/server users that are accessing the post office, SSL information is displayed for each user.


Providing LDAP Authentication for GroupWise Users

By default, GroupWise client users' passwords are stored in eDirectory and the POA authenticates users to their GroupWise mailboxes through eDirectory. For background information about passwords, see GroupWise Passwords.

By enabling LDAP authentication for the POA, users' password information can be retrieved from any network directory that supports LDAP. For background information about LDAP, see Authenticating to GroupWise with Passwords Stored in an LDAP Directory.

When you enable LDAP authentication, it is important to provide fast, reliable access to the LDAP directory because GroupWise client users cannot access their mailboxes until they have authenticated. The following sections provide instructions for configuring the POA to make the most efficient use of the LDAP servers available on your system:


Providing LDAP Server Configuration Information

Information about your available LDAP servers must be provided in ConsoleOne before you can enable LDAP authentication for users.

  1. In ConsoleOne, click Tools > GroupWise System Operations > LDAP Servers to display the Configure LDAP Servers dialog box.


    Configure LDAP Servers dialog box
  2. Click Add to add an LDAP server and provide configuration information about it.


    Add LDAP Server dialog box
  3. In the Name field, type the name by which you want the LDAP server to be known in your GroupWise system.

  4. In the Description field, provide additional information about the LDAP server as needed.

  5. If the LDAP server requires an SSL connection, select Use SSL, then browse to and select the SSL key file, as provided by the LDAP server.

    For additional instructions about using SSL connections, see the following resources:

  6. Click the pencil icon for the LDAP Server Address field.


    Edit LDAP Server Address dialog box
  7. Select IP Address, then specify the IP address, in dotted decimal format, of the LDAP server.

    or

    Select DNS Host Name, then provide the DNS hostname of the LDAP server.

    The default LDAP port is 389 for non-SSL connections and 636 for SSL connections.

  8. If the default port number is already in use, specify a unique LDAP port number.

  9. Click OK to save the LDAP server address and port information.

  10. In the User Authentication Method field, select Bind or Compare.

    For a comparison of these methods, see Authenticating to GroupWise with Passwords Stored in an LDAP Directory.

  11. Click OK to save the configuration information for the LDAP server.

  12. Repeat Step 2 through Step 11 for each LDAP server that you want to make available to GroupWise for LDAP authentication.

    Providing configuration information for multiple LDAP servers creates a pool of LDAP servers, which provides fault tolerance and load balancing to ensure fast, reliable mailbox access for GroupWise users.

  13. Continue with Enabling LDAP Authentication for a Post Office

Corresponding Startup Switches
You could also use the /ldapipaddr, /ldapport, /ldapuserauthmethod, /ldapssl, and /ldapsslkey startup switches in the POA startup file to provide the LDAP server information.


Enabling LDAP Authentication for a Post Office

To configure the POA to perform LDAP authentication for the users in a post office:

  1. In ConsoleOne, browse to and right-click the Post Office object, then click Properties.

  2. Click GroupWise > Security to display the Security page.


    Security property page
  3. For Security Level, select High.

  4. In the High Security Options box, select LDAP Authentication.

  5. If you want the POA to access the LDAP server with specific rights to the LDAP directory, specify a username that has those rights.

    If you are using a Novell LDAP server, you can browse for an eDirectory User object. The information returned from eDirectory uses the following format:

    cn=username,ou=orgunit,o=organization

    If you are using another LDAP server, you must type the information in the format used by that LDAP server.

    If the LDAP username for the POA requires a password, click Set Password, type the password twice for verification, then click Set Password.

    For more information about LDAP usernames, see Authenticating to GroupWise with Passwords Stored in an LDAP Directory.

  6. If you want to prevent GroupWise users from changing their LDAP passwords by using the Password dialog box in the GroupWise client, select Disable LDAP Password Changing.

    This option is deselected by default, so that if users change their passwords in the GroupWise client through the Security Options dialog box (GroupWise Windows client > Tools menu > Options > Security) or on the Passwords page (GroupWise WebAccess client > Options > Password), their LDAP passwords are changed to match the new passwords provided in the GroupWise client.

  7. If the LDAP server is configured for bind connections, as described in Providing LDAP Server Configuration Information, specify the number of seconds the POA should maintain an inactive connection to the LDAP server.

    The default is 30 seconds.

  8. If you have only one LDAP server, click OK to save the security settings for the post office. You have provided all the necessary information to provide LDAP authentication for users in the post office.

    or

    If you have multiple LDAP servers and want to configure them into an LDAP server pool, click Apply, then continue with Configuring a Pool of LDAP Servers.

    or

    If you have multiple LDAP servers and want to configure them for failover, click OK to save the security settings for the post office, then continue with Specifying Failover LDAP Servers (Non-SSL Only)

Corresponding Startup Switches
You could also use the /ldapuser, /ldappwd, /ldapdisablepwdchg, and /ldaptimeout startup switches in the POA startup file to configure POA access to the LDAP server.

POA Web Console
You can see if LDAP is enabled on the Configuration page. Under the General Settings heading, click LDAP Authentication to view LDAP settings and change some of them for the current POA session.


Configuring a Pool of LDAP Servers

You can configure the POA to contact a different LDAP server each time it needs to access the LDAP directory. This provides load balancing and fault tolerance because each LDAP server in the pool is contacted equally often by the POA. The LDAP server pool can include as many as five servers.

  1. Make sure you have enabled LDAP Authentication as described in Enabling LDAP Authentication for a Post Office.

  2. In the LDAP Pool Server Reset Timeout field, specify the number of minutes the POA should wait before trying to contact an LDAP server in the pool that failed to respond to the previous contact.

    The default is 5 minutes.

  3. Click Select Servers to define the specific pool of LDAP servers that you want to be available to users in this post office for LDAP authentication.


    Select LDAP Servers dialog box
  4. Select one or more LDAP servers in the Available Servers list, then click the arrow button to move them into the Selected Servers list.

  5. Click OK to save the list of LDAP servers.

  6. Click OK to save the security settings for the post office.

    ConsoleOne then notifies the POA to restart so the new LDAP settings can be put into effect.

Corresponding Startup Switches
You could also use the /ldapippooln and /ldappoolresettime startup switches in the POA startup file to configure the LDAP server pool and the timeout interval. If you choose to configure the LDAP server pool in the startup file rather than in ConsoleOne, additional switches must be provided to complete the configuration (/ldapportpooln, /ldapsslpooln, and /ldapsslkeypooln. Configuring the pool in ConsoleOne is the recommended approach.

If you previously set up LDAP authentication on the post office Security page in ConsoleOne and then you add the pooling startup switches to the POA startup file, the pooling switches override any LDAP information provided in ConsoleOne.


Specifying Failover LDAP Servers (Non-SSL Only)

If the POA does not need to use an SSL connection to your LDAP servers, you can use the /ldapipaddr switch to list multiple LDAP servers. Then, if the primary LDAP server fails to respond, the POA tries the next LDAP server in the list, and so on until it is able to access the LDAP directory. This provides failover LDAP servers for the primary LDAP server but does not provide load balancing, because the primary LDAP server is always contacted first.

  1. Make sure you have provided the basic LDAP information on the post office Security page in ConsoleOne, as described in Enabling LDAP Authentication for a Post Office.

  2. Edit the POA startup file with an ASCII text editor.

    For information about the POA startup file, see Starting the POA.

  3. Use the /ldapipaddr startup switch to list addresses for multiple LDAP servers. Use a space between addresses.

    For example:

    /ldapipaddr-123.45.67.89 135.246.7.8 987.65.43.21

    IMPORTANT:  Do not include any LDAP servers that require an SSL connection. There is currently no way to specify multiple SSL key files unless you are using pooled LDAP servers, as described in Configuring a Pool of LDAP Servers.

  4. Save the POA startup file, then exit the text editor.

  5. Stop the POA, then start the POA so that it reads the updated startup file.


Enabling Intruder Detection

You can configure the POA to detect system break-in attempts in the form of repeated unsuccessful logins. This feature can be especially helpful when allowing Remote client users to establish client/server connections to MTAs in your system. See Enabling Live Remote.

  1. In ConsoleOne, browse to and right-click the Post Office object, then click Properties.

  2. Click GroupWise > Client Access Settings to display the Client Access Settings page.


    Client Access Settings property page
  3. Select Enable Intruder Detection.

  4. Specify how many unsuccessful login attempts are allowed before the user is locked out.

    The default is 5: valid values range from 3 to 10.

  5. Specify in minutes how long unsuccessful login attempts are counted.

    The default is 15; valid values range from 15 to 60.

  6. Specify in minutes how long the user login is disabled.

    The default is 30; the minimum setting is 15.

  7. Click OK to save the intruder detection settings.

    ConsoleOne then notifies the POA to restart so the new settings can be put into effect.

If a user gets locked out by intruder detection, his or her GroupWise account is disabled. To restore access for the user in ConsoleOne, right-click the User object, click GroupWise > Account, then deselect Disable Logins. At restore access for the user at the POA Web console, click Configuration > Intruder Detection, then clear the lockout.

Corresponding Startup Switches
You could also use the /intruderlockout, /incorrectloginattempts, /attemptsresetinterval, and /lockoutresetinterval startup switches in the POA startup file to configure the POA for intruder detection.

POA Web Console
You can view current intruder detection settings on the Configuration page and change them using the Intruder Detection link.


Configuring Trusted Application Support

For background information about setting up trusted applications in ConsoleOne, see Trusted Applications.