PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES



Similar documents
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

Network Configuration Settings

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Hosted Microsoft Exchange Client Setup & Guide Book

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

How To Configure Apple ipad for Cyberoam L2TP

Security. TestOut Modules

Immotec Systems, Inc. SQL Server 2005 Installation Document

Configuring Security Features of Session Recording

Hosted Microsoft Exchange Client Setup & Guide Book

RSA SecurID Ready Implementation Guide

Locking down a Hitachi ID Suite server

Purple Sturgeon Standard VPN Installation Manual for Windows XP

RSA SecurID Ready Implementation Guide

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Prerequisites Guide for ios

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Course Outline. Mobile Device Management Course 55078: 2 days Instructor Led

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

Access Your Cisco Smart Storage Remotely Via WebDAV

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Managing Ports and System Services using BT NetProtect Plus firewall

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

1. Introduction What is Axis Camera Station? What is Viewer for Axis Camera Station? AXIS Camera Station Service Control 5

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Preparing for GO!Enterprise MDM On-Demand Service

Filtering remote users with Websense remote filtering software v7.6

Advanced Administration

Introduction to Mobile Access Gateway Installation

Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

BlackBerry Enterprise Service 10. Version: Configuration Guide

Configuration Guide BES12. Version 12.2

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely

RSA SecurID Ready Implementation Guide

Connecting an Android to a FortiGate with SSL VPN

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Interwise Connect. Working with Reverse Proxy Version 7.x

When enterprise mobility strategies are discussed, security is usually one of the first topics

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Configuration Guide. BES12 Cloud

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Mobile Admin Security

Enterprise Security Interests Require SSL with telnet server from outside the LAN

QUANTIFY INSTALLATION GUIDE

Elluminate Live! Access Guide. Page 1 of 7

Proxies. Chapter 4. Network & Security Gildas Avoine

Configuration Guide BES12. Version 12.1

Phone: Fax: Box: 230

Windows 7, Enterprise Desktop Support Technician

This section provides a summary of using network location profiles to identify network connection types. Details include:

Ensuring the security of your mobile business intelligence

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

BlackBerry Enterprise Service 10. Version: Installation Guide

Owner of the content within this article is Written by Marc Grote

University of Central Florida UCF VPN User Guide UCF Service Desk

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Introduction to the Mobile Access Gateway

Topics in Network Security

Shipping Services Files (SSF) Secure File Transmission Account Setup

Using a VPN with Niagara Systems. v0.3 6, July 2013

Sophos UTM. Remote Access via IPsec. Configuring UTM and Client

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Elluminate Live! Access Guide. Page 1 of 7

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

PrintFleet Enterprise Security Overview

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Weidmueller minirouter with two Ethernet ports (IE-ARM-E) Firmware (please use appl-note_router-update-en.pdf for updates)

SBBWU PROXY SETTING IT CENTRE How to Set a Proxy Server in All Major Internet Browsers for Windows

introducing The BlackBerry Collaboration Service

Configuration Guide BES12. Version 12.3

VIA CONNECT PRO Deployment Guide

Computer Networks. Secure Systems

Installing T-HUB on multiple computers

Overview - Using ADAMS With a Firewall

Using LifeSize Systems with Microsoft Office Communications Server 2007

Zeroshell: VPN Host-to-Lan

Windows Server 2003 default services

Xerox DocuShare Security Features. Security White Paper

Overview - Using ADAMS With a Firewall

OPAS Prerequisites. Prepared By: This document contains the prerequisites and requirements for setting up OPAS.

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Installation and Administration Guide

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Source-Connect Network Configuration Last updated May 2009

Basic instructions for configuring PPP MSSQL Express Firewall Settings for Server 2008 and Windows 7 Operating Systems

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Latest IT Exam Questions & Answers

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1

Business mail 1 MS OUTLOOK CONFIGURATION... 2

Transcription:

M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8

CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC Encryption... 4 3. Configuring M-Files to Use RPC Encryption... 5 M-Files Client... 5 M-Files Server Administrator... 6 M-Files API... 6 M-Files Server... 7 Replica Server... 7 Page 2 of 8

1. OVERVIEW "Data in transit" refers to information that flows over the network. For an M-Files system, this typically means the network communication between M-Files clients and M-Files Server. Three different client types need to be considered: M-Files desktop client (Windows) Web client (M-Files Web Access) Mobile apps of M-Files (ios, Android, and Windows Phone) If all communication between the clients and M-Files Server is within the organization's private network, unencrypted network communication between the client applications and M-Files Server may be acceptable. However, even in this case the organization should consider the risks of users within the organization potentially being able to gain unauthorized access to content by means of network sniffing, for example. If users access data from outside the organization's private network, encrypting the network communication is usually mandatory. This is typically achieved either by using the HTTPS protocol or VPN technology. The best practice for ensuring that data in transit does not cause a security risk is to encrypt the network communication between M-Files clients and M-Files Server in all cases, regardless of if the information flows over the public Internet or in the organization's internal network. This document describes the recommended ways for protecting data in transit between M-Files clients and M-Files Server with encryption. Page 3 of 8

2. ENCRYPTION OF DATA IN TRANSIT IN M-FILES There are multiple options for achieving encryption of network communication between M-Files clients and M-Files Server. Some of the options are independent of M-Files, such as using VPN technology for remote users, or IPSec for encrypting network communications in the local area network. Such techniques can be used with any version of M-Files and are out of the scope of this document. This document describes the two main options for encrypting data in transit in M-Files 10.2 and later: HTTPS RPC Encryption (requires M-Files 10.2 or later) HTTPS The HTTPS protocol uses TLS/SSL to encrypt the data flow between client and server. In M-Files, HTTPS can be used as the communication protocol with all client types of M-Files: M-Files desktop client (Windows) Web client (M-Files Web Access) Mobile apps of M-Files (ios, Android, and Windows Phone) For M-Files web clients and mobile apps, HTTPS is the only available encrypted communication protocol. HTTPS can be used with the desktop client of M-Files as well, if Microsoft Internet Information Services (IIS) and RPC over HTTP Proxy are set up as described in the article "Enabling RPC over HTTPS connections to M-Files Server" (ID 48424). Using HTTPS as the secure communications protocol for all client types of M-Files is a good option especially if users access M-Files both within the internal company network and from the public Internet. In such case, you may want to use pre-shared keys and a separate proxy server for additional security as described in the article "Securing Access to M-Files Vaults with a Pre-Shared Key" (ID 143601). RPC ENCRYPTION The desktop client of M-Files (M-Files Client) and M-Files Server communicate by using the Remote Procedure Call (RPC) protocol. By default, the RPC communication uses TCP port 2266 and is not encrypted. Prior to M-Files 10.2, the only option to encrypt the network communication between M-Files Client and M-Files Server was to use HTTPS (RPC over HTTP with TLS/SSL). M-Files 10.2 adds the option to use RPC encryption to secure the communication between M-Files Client and M-Files Server. RPC encryption does not require IIS or any other additional components and is often the simplest way to achieve encryption of network communication between M-Files Client and M-Files Server in the organization's internal network. For connections from outside the organization's internal network, HTTPS or VPN should still be used because RPC communication to TCP port 2266 would often be blocked by firewalls. Page 4 of 8

3. CONFIGURING M-FILES TO USE RPC ENCRYPTION To enable RPC encryption in M-Files 10.2 and later, turn on the "Encrypted connection" option when specifying connection properties. The "Encrypted connection" option is available for the TCP/IP protocol only. If the protocol is HTTPS, the connection is always encrypted at the HTTPS protocol level. Enabling the "Encrypted connection" option does not affect the port that is used (TCP port 2266 by default). For RPC encryption to work, the user as well as the computer must be able to authenticate to the server computer. In practice, this requires that the client computer belongs to the Windows domain and that the user is a domain user. M-FILES CLIENT To enable RPC encryption between M-Files Client and M-Files Server, use M-Files Client Settings to turn on the "Encrypted connection" option: Figure 1 The "Encrypted connection" option in M-Files Client Settings Page 5 of 8

M-FILES SERVER ADMINISTRATOR To enable RPC encryption between M-Files Server Administrator and M-Files Server, turn on the "Encrypted connection" option when specifying connection properties in M-Files Server Administrator: Figure 2 The "Encrypted connection" option in M-Files Server Administrator M-FILES API To enable RPC encryption between an application that uses M-Files API and M-Files Server, specify True in the EncryptedConnection parameter when connecting to M-Files Server. The following methods of the MFilesServerApplication object support the EncryptedConnection parameter: ConnectEx ConnectAdministrativeEx Applications that use the client interface of M-Files API rely on the connection settings of M-Files Client and automatically use an encrypted connection if specified in the vault connection properties in M-Files Client Settings. Page 6 of 8

M-FILES SERVER In M-Files 10.2 and later, M-Files Server supports RPC encryption by default and no configuration steps are necessary to enable encrypted connections. However, M-Files Server still accepts unencrypted connections by default. If you want to ensure that clients can only connect to M-Files Server with encryption enabled, you can configure M-Files Server to require RPC encryption by specifying the following registry setting: Key name: HKEY_LOCAL_MACHINE\Software\Motive\M-Files\<version>\Server\MFServer Value name: RequireRPCSecurity Value type: REG_DWORD Value data: 1 (default = 0) After changing the above registry setting, the M-Files Server service needs to be restarted for the setting to take effect. When the RequireRPCSecurity option is set to non-zero on the server, connections from clients will fail with the "Access denied" message if the "Encrypted connection" option is not enabled on the client side. By default, M-Files Server will still allow connections via the RPC over HTTP protocol without RPC-level security if RPC over HTTP has been enabled on the server by specifying a non-zero value for the EnableRPCOverHTTP registry setting. This is typically desirable because those connections already have encryption at the HTTPS level and do not use RPClevel encryption by default. If you want M-Files Server to require RPC-level encryption for RPC over HTTP connections as well, you can set the registry setting RequireRPCSecurityAlsoWithRPCOverHTTP to a non-zero value. After changing any of the above registry settings, the M-Files Server service needs to be restarted for the settings to take effect. REPLICA SERVER M-Files Server may act as a replica server for one or more cached replica vaults. In such a case, the M-Files Server service on the replica server establishes a connection to the M-Files Server service on the master server. The connection is configured in M-Files Server Administrator under Cached Replica Vaults. The configuration user interface for cached replica vaults in M-Files Server Administrator does not support the "Encrypted connection" option for TCP/IP connections. Thus, the connection between the cached replica server and the master M-Files server will not use RPC encryption by default. In order to encrypt the connection between the cached replica server and the master M-Files server, you can configure the cached replica server to use RPC encryption in its connections to master M-Files servers by specifying the following registry setting: Key name: HKEY_LOCAL_MACHINE\Software\Motive\M-Files\<version>\Server\MFServer Value name: UseRPCEncryptionWithRemoteServers Value type: REG_DWORD Value data: 1 (default = 0) After changing the above registry setting, the M-Files Server service needs to be restarted for the setting to take effect. Page 7 of 8

Another possibility for achieving an encrypted connection between a cached replica server and a master M-Files server is to use the HTTPS protocol. This requires that RPC over HTTP has been enabled on the master M-Files server as described in the article "Enabling RPC over HTTPS connections to M-Files Server" (ID 48424). Page 8 of 8