Installation security
This section provides information on aspects of installation security.
Supported operating systems
For the list of supported system environments, see Support Matrix.
About system files permission in Windows: Server files and folders by default inherit the permissions from the root folder where the server files and folders are stored. This enables all regular users to read and execute these files. We recommend you either remove the read and execute permissions from all regular users or not inherit such permissions to them. For details, see the Microsoft documentation.
Web server security recommendations
It is important to configure your front-end web server for strong encryption (ciphers and protocols) to ensure a secure channel between the client and the server. For information on how to restrict the use of certain cryptographic algorithms and protocols at the web server level (IIS and Apache) see this KB article.
IIS Web Server
For information on enabling SSL/TLS for all interactions with the web server, see the Microsoft documentation.
Note: SSL/TLS should be enabled for the entire IIS web server under which you installed the OpenText Application Quality Management applications.
To disable weak ciphers on IIS, see the Microsoft documentation.
Apache web server
For information on enabling SSL/TLS for all interactions with the web server and on enforcing strong security, see the Apache documentation.
Application server security recommendations
-
For information on how to configure Jetty to support HTTP Strict Transport Security (HSTS), see this KB article.
Note: This is irrelevant if you are using 15.0.1 Patch 3, 15.5.1 Patch 1, or their later versions, because the HSTS header is configured by default when TLS or SSL is enabled.
- When configuring SSL/TLS on the ALM application server (Jetty), keep your keystore in a private directory with restricted access. Although the Java keystore is password protected, it is vulnerable as long as the password was not changed from its default value of changeit.
-
Always change default passwords.
-
Always obfuscate passwords entered into the jetty.xml file. For details, see the Jetty documentation.
-
Since the default td user password is documented, it is strongly recommended to change the td user’s password. This is done during the installation in the Create new SA schema step, if the td user does not yet exist in this database server. Each subsequent installation that uses the same database server uses the existing td user credentials. To change the password for the previously created td user, follow the steps in this KB article.
-
Configure jetty to use secure cookies.
-
Always change the default password when creating a database schema.
-
Limit the access to directories to relevant users (such as system administrators, the user who runs the OpenText Application Quality Management service, and users who have a site administrator role in the application).
-
Always use the minimal possible permissions when installing and running.
Note: It is recommended to limit access to directories to relevant users, such as the site administrator, system administrator, and the user who runs the OpenText Application Quality Management service.
| Action | Permissions Needed for User |
|---|---|
| Installing |
|
| Running |
|
| Database connection | The td user permissions must be set properly according to the recommendations in Prerequisites: Microsoft SQL Database Servers or Prerequisites: Oracle Database Servers. Do not use a higher level of permissions than required. Do not use the default password when creating the schema. |
FAQ
Question
Does OpenText Application Quality Management ensure that configuration files are not stored in the same directory as user data?
Answer
The user can change the location of the repository and log files according to best practices to avoid mixing user data with configuration files.
Question
Does OpenText Application Quality Management install with unnecessary functionality disabled by default?
Answer
Yes, functionality is license driven.
Question
Are application resources protected with permission sets that allow only an application administrator to modify application resource configuration files?
Answer
Yes, only the user with permission to access specific directories on the OpenText Application Quality Management server machine can modify OpenText Application Quality Management configuration files.
Question
Does OpenText Application Quality Management execute with no more privileges than necessary for proper operation?
Answer
Yes, the permissions model is constantly reviewed and only necessary permissions are required.

