User guide

Chapter 1: Security Risks
1-2
Interstage Management Console and Interstage
Operation Tool
The Interstage Management Console and the Interstage Operation Tool can be used with the following
products:
Interstage Application Server Enterprise Edition
Interstage Application Server Standard Edition
Interstage Application Server Web-J Edition (Interstage Management Console only)
Interstage Application Server Plus
This section gives an overview of possible security risks in the general operating environment of the
Interstage Management Console and the Interstage Operation Tool.
Resources to be Protected
This section describes the resources to be protected when the Interstage Management Console and the
Interstage Operation Tool are used.
Functions to be Protected
The following functions and procedures should be protected:
User authentication
Connection to Web server
Interstage Management Console
Interstage Operation Tool environment setup
Resources to be Protected
The following resources should be secured in order to protect their corresponding function:
Table 1-1 Resources to be Protected
Function Resource
User authentication User ID and password used for authentication
Connection to Web server
(When Interstage HTTP Server is
used)
Definition file for Interstage HTTP Server
Connection to Web server
(When InfoProvider Pro is used)
Definition file for the InfoProvider Pro
Interstage Operation Tool
environment setup
Definition file for the Interstage Operation Tool