For Security Managers using the MLDAP ESM Module, 
               		Micro Focus makes the following hardening recommendations: 
               	 
            
 
            	 
             
               		 
               		  
               - Module 
                  		  
               
- Set this to 
                  			 mldap_esm, with no path, and for Linux/UNIX installations, no bitness, threadedness, or file extension suffixes. ESF loads ESM Modules
                  from the product installation directory automatically – it does not search the library load path. ESF will select the appropriate
                  bitness and threadedness automatically. 
                  		  
               
- Connection path 
                  		  
               
- For optimal security, use LDAP-over-TLS by enabling TLS in your LDAP server and using the 
                  			 ldaps: scheme prefix in the value for this field. Depending on the LDAP client library (also known as "provider") in use, you might
                  also have to configure the LDAP client to support TLS. For OpenLDAP, for example, you might need to edit a configuration file
                  such as 
                  			 ldaprc to set the root-certificate file or path so that the OpenLDAP client can validate the server's certificate. 
                  		  
               
- Authorized ID / Password 
                  		  
               
- Micro Focus strongly recommends that you do not use the default credentials. For improved security, configure your LDAP server with an
                  account which gives the appropriate level of access for 
                  			 Enterprise Server use. Typically, this is read-only access to groups and resource access rules, and write access to user objects if necessary
                  for updating attributes such as passwords and last-login-time. Then set these fields to use that account.
                  			 
                  Note: You can use the 
                     		 Micro Focus Vault Facility to store a secret for the 
                     		 Authorized ID and 
                     		 Password fields. These fields can be specified using the forms: 
                     		 mfsecret:configuration-name:secret-path or: 
                        		
                      mfsecret::secret-path or: 
                        		
                      mfsecret:secret-path 
 
- Cache Limit / Cache TTL 
                  		  
               
- From 
                  			 Enterprise Server 7.0, the MLDAP ESM Module can cache the results of some LDAP searches. This can significantly improve performance, but introduces
                  the possibility of making security decisions with stale information. If the cache is enabled, set the TTL to meet the organization's
                  tolerance for latency in recognizing changes to security information. 
                  			 
                  Note: The ESF Update mechanism will flush the MLDAP ESM Module's cache, reducing this exposure. 
                     			 
                   
               Configuration Information settings relevant to hardening
 
               		 
               		
               The MLDAP ESM Module supports a large number of options that can be added to the 
                  		  Configuration Information field. Many of these relate to LDAP repository configuration or other aspects which do not directly affect the security of
                  
                  		  Enterprise Server. Some options which might be useful when hardening an installation are discussed here. 
                  		
               
 
               		
                
                  		   
                  			 
                  - Set login count / Set login time 
                     			 
                  
- Enables the module to update these attributes in the user record can provide useful information to administrators. The login-count
                     attribute is also required for implementing account lockout, which is a useful security feature in many environments. This
                     require giving 
                     				Enterprise Server write access to user objects in LDAP, which is a risk. You will need to determine if that trade-off is appropriate to your
                     organization. 
                     			 
                  
- Signon attempts 
                     			 
                  
- If 
                     				Set login count is enabled, this setting can be used to lock accounts out after the specified number of failed signon attempts. This is generally
                     considered good practice. 
                     				
                     Note: This requires write access to the user object. Also, the MLDAP ESM Module does not currently support automatic unlocking after
                        a period of time; the account must be manually unlocked by an administrator.
                        				
                      
- Check TLQ first / Maximum qualifiers for initial check 
                     			 
                  
- These options affect the processing of security rules, particularly for data sets. They can improve performance but could
                     result in unexpected behavior and undesirable, if the organization uses rules which begin with wildcards.
                     			 
                  
- Bind 
                     			 
                  
- On Windows, the 
                     				negotiate and 
                     				es-user options for this setting are somewhat more secure, particularly if LDAP-over-TLS is not used. These options are not currently
                     supported on other platforms. 
                     			 
                  
- Password type 
                     			 
                  
- This setting only has an effect if 
                     				Micro Focus password hashes are in effect, and only when users or administrators set passwords. Currently the best choice for this is 
                     				MF-A2, which uses a salted Argon2 hash, a state-of-the-art type of password verifier. This is the default in current product releases.
                     
                     			 
                  
- Migrate passwords 
                     			 
                  
- Enabling this setting is useful if the customer is using 
                     				Micro Focus password hashes, and has existing user objects that use password verifiers that are not of the MF-A2 type. In this case, 
                     				Micro Focus recommends enabling this feature. 
                     			 
                  
- Password settings 
                     			 
                  
- A variety of settings under the 
                     				[Password] section affect password processing and enables the administrator to harden password use. Most of these only apply when MF-hash
                     passwords are used; otherwise the LDAP server and its interaction with the operating system determine the password-strengthening
                     rules. With MF-hash passwords, 
                     				Micro Focus recommends the following settings for hardening: 
                     				
                      
                        				  
                        - Configure 
                           					 Expiration to meet the organization's requirements. Note many security experts now believe regular password expiration is counterproductive.
                           
                           				  
                        
- The 
                           					 History setting can be used to prevent password reuse. 
                           				  
                        
- Set length requirements using 
                           					 Minimum length and 
                           					 Maximum length. Remember that 
                           					 Enterprise Server supports long passphrases in most interfaces, but some applications, such as older CICS applications, might not. 
                           				  
                        
- The 
                           					 Required and 
                           					 Complexity settings can be used to enforce password complexity. Often organizations have specific requirements for passwords which can
                           be represented using the Required setting; otherwise, 
                           					 Micro Focus recommends setting Complexity to 2 or 3 if the minimum password length is less than 20 characters. 
                           				  
                        
 
- SecretFile 
                     			 
                  
- If ESF passtokens are used, for passing authentication between subsystems such as MFDS and 
                     				ESCWA, or for DCAS, then 
                     				Micro Focus strongly recommends using this option. The "secret file" can contain anything, as long as it has at least 128 bits of entropy;
                     even 1 KB or so of ordinary text would suffice. The point of this setting is to avoid using either the built-in secret (which
                     is available to anyone with a copy of the product) or a secret in the configuration (which is available to anyone who can
                     view the configuration) to generate passtokens. Otherwise, a technically-skilled attacker could forge passtokens. 
                     				
                     Note: there is no space between "Secret" and "File" in the name of this setting. 
                        				
                      
- Trace settings 
                     			 
                  
- Tracing can useful in diagnosing issues, but might reveal sensitive data to an attacker who can obtain copies of log files.
                     
                     				Micro Focus recommends that you disable tracing when it is not required.