Security considerations for IBM® Rational® Lifecycle Integration Adapters Tasktop Edition

You can take actions to ensure that your installation is secure, customize your security settings, and set up user access controls. You can also ensure that you know about any security limitations that you might encounter with this application.

Enabling security during the installation process

There are no unique steps that are related to security during interaction with the installation wizard. If the product is installed as a Windows service, a password must be set for a service account that is used by the product on the system, see Windows Service How-to.

The product uses a local H2 database for storage. The database is not encrypted and accessible with fixed credentials: username user and password pass. The database is not accessible to the user. File access to the database and other local storage in the working directory must be secured by the product administrator.

Web container must use the HTTPS protocol in production. See Web Container Configuration.

Authentication must be enabled for the OSLC adapter. See Task Linking Configuration.

Ports, protocols, and services

Web container uses the HTTP or HTTPS protocol and a port that is chosen by the product administrator. For details, see Web Container Configuration.

The product communicates with the ALM repositories through protocols and ports that are configured by the repositories. Usually it is the HTTPS protocol.

Customizing your security settings

The product delegates password storage to the Eclipse platform on which it runs. See FAQ entries: How does Tasktop Sync store passwords and how are they encrypted? and How do I specify the keyring for Tasktop Sync to use, rather than using the default? If the HTTPS protocol is enabled for Web Container (see Web Container Configuration) then a JVM keystore is used, see Configuring Jetty Connectors.

Privacy policy considerations

This software offering does not use cookies or other technologies to collect personally identifiable information. For more information about cookies, see the Notices topic.


Feedback