Инструменты пользователя

Различия

Показаны различия между двумя версиями страницы.

Ссылка на это сравнение

Предыдущая версия справа и слеваПредыдущая версия
Следующая версия
Предыдущая версия
en:h2k:doc:5 [2023/07/31 08:06] anelen:h2k:doc:5 [2023/07/31 10:38] (текущий) anel
Строка 6: Строка 6:
   * external outbound network rules allow communication only with 3 fixed nodes (HTTPS), 2 [[en:h2k:terms#Managing Server|management servers]] (encrypted traffic between Domino servers);   * external outbound network rules allow communication only with 3 fixed nodes (HTTPS), 2 [[en:h2k:terms#Managing Server|management servers]] (encrypted traffic between Domino servers);
   * external inbound network rules allow only SSH connections to the console;   * external inbound network rules allow only SSH connections to the console;
-  * the console authorizes through Open [[https://ru.wikipedia.org/wiki/SSL|SSL]]certificates;+  * the console authorizes through Open [[https://ru.wikipedia.org/wiki/SSL|SSL]] certificates;
   * the internal firewall repeats the external network rules.   * the internal firewall repeats the external network rules.
  
Строка 13: Строка 13:
 ====HCL Notes==== ====HCL Notes====
  
-The Domino® security model is based on the principle of securing resources, such as the Domino® server itself, databases, workstation data, and documents. The resources or objects that are protected are configured to define user access and edit rights to the object. Information about access rights and privileges is stored with each protected resource. That way, a given user or server can have different sets of access rights depending on the resources to  which this user or server needs an access to.+The Domino® security model is based on the principle of securing resources, such as the Domino® server itself, databases, workstation data, and documents. The resources or objects that are protected are configured to define user access and edit rights to the object. Information about access rights and privileges is stored with each protected resource. That way, a given user or server can have different sets of access rights depending on the resources to which this user or server needs access.
  
 ---- ----
Строка 28: Строка 28:
 ====Solution  BlackBox==== ====Solution  BlackBox====
 ===OS=== ===OS===
-  * VmWare virtual machine;+  * VMware virtual machine;
   * Oracle Linux operating system;   * Oracle Linux operating system;
   * The partition is encrypted;   * The partition is encrypted;

This website uses cookies. By using the website, you agree with storing cookies on your computer. Also, you acknowledge that you have read and understand our Privacy Policy. If you do not agree, please leave the website.

More information