Adding clarity to my original question in hopes this will spark some discusson on this thread. Thank you in advance... Because Unix (Microsoft Subsystem for Unix Applications, SUA) permission bits are limited to a “owner”, “group”, “world” paradigm, and there is no direct comparable Windows NTFS security setup, it is impossible to derive a Windows security model from the Unix settings. (Note that it is possible to translate security in the other direction: Windows NTFS security can be “simplified” and expressed as SUA permission bits - but that is not the problem I need to solve.)
As I understand things, Lawson installs on top of “default” Microsoft Windows file system security permission settings. It appears that additional file system security is applied onto selected directories within the Lawson application folder structure, implemented as Unix permission bits in the scripts provided by Lawson. However due to the limited nature of SUA permission bits, the result is not an effective control of file system security.
Windows by default allows read access to all domain users for most files. Lawson SUA permission bits settings are overlaid on top of the default Microsoft permissions without removing the default. Therefore having limited effect.
Best Practices:
· tighten up security by default (initially provide no access to the Lawson files and folders)
· as specific requirements are identified, provide access
· appropriate (multiple) Active Directory global security groups would be created and used to document the needed access
To implement the best practices I need to know security requirements for
· users
· services
· which folders/files
I hope the above is helpful in getting the right documentation and recommendations from Lawson. Thank you.
Posted By George on 05/25/2011 09:40 AM Windows by default allows read access to all domain users for most files. Lawson SUA permission bits settings are overlaid on top of the default Microsoft permissions without removing the default. Therefore having limited effect.