Encrypting Destiny® data filesProtecting data on the Destiny application server for v9.0 and higherOverviewThis content describes how a system administrator can further protect application data on the Destiny application server by encrypting external Destiny data files. Certain Destiny data files are stored and served from standard drive folders on the Destiny application server. This data includes text documents such as patron import files and report output as well as image files such as patron pictures. These files are external to the SQL database and as such are to be protected from unauthorized access with normal Windows access controls—logon authentication and file permissions. External files can still be accessible to physical access such as theft of the server or hard drive. Hard drive protection by normal logon access control can be bypassed by booting a separate operating system or plugging the hard drive into another computer. Protecting with EncryptionSome customers may wish to protect Destiny files against such physical access. You can do this with file encryption. With file encryption, files are stored as unintelligible characters and are therefore protected even when an attacker has full physical access to the hard drives. Even a remote user session cannot read the files if that account has not been granted encryption rights to them. Using the Encrypted File SystemThe encryption mechanism recommended for use with Destiny is the Encrypted File System (EFS) technology built into Windows Server®. EFS allows the system administrator to designate that certain files should be encrypted whenever they are saved to disk. Because EFS is integrated with NTFS, the encryption process occurs automatically and is transparent to authorized user accounts. Furthermore, there are no third-party add-ons to install and manage. According to Microsoft, "Only authorized users and designated data recovery agents can decrypt encrypted files. Other system accounts that have permissions for a file—even the Take Ownership permission—cannot open the file without authorization. Even the administrator account cannot open the file if that account is not designated as a data recovery agent. If an unauthorized user tries to open an encrypted file, access will be denied." EFS encryption strengthEFS uses industry-standard public-private key technology to provide strong encryption. Windows Server uses the Advanced Encryption Standard (AES) algorithm by default, which uses a 256-bit key for encryption and decryption. The encrypting/decrypting process is performed in kernel mode, eliminating the risk of keys being left in an external paging file. Encrypting Destiny dataEFS encryption can be set at the folder level so that all files created in that folder are automatically encrypted. In Destiny, the FSC-Destiny folder is the parent folder under which non-SQL data files are stored. Assigning EFS encryption to this folder and below will encrypt external Destiny files. You can use an existing user account on the server to encrypt the Destiny folder, or create a new one specifically for this purpose. The steps below assume you will be creating a new account. important Be sure to stop the Destiny service before performing these steps. Create a new user account on the server for the Destiny service
Make sure you select the following options:
important Do not select these options: User must change password at next logon and Account is disabled.
Modify the Destiny service to run under the new account
note If the server is not part of a domain, use the machine name instead of a domain name.
Update the folder properties on
|
|
Destiny v16.5 Help includes the most recent product updates. For details, see What's New in Destiny Version 16.5.