Security Considerations
When planning your environment, take the security considerations discussed in the following section into account.
Service Accounts
Review the topic Accounts used in an Installation for details of the various accounts used in a Nintex Automation installation and some practice recommendations for these accounts to comply with the STRIDE security model .
Kerberos vs Pass-Through Authentication
When planning an environment whether it be Standalone, Distributed or Farm, the topic of a secure method of authentication is of paramount importance. When it comes to the product stack as a whole, there are two available options: Kerberos and Pass-Through Authentication.
From a product perspective it is recommended that Kerberos authentication be used as a the primary form of authentication to pass user credentials between physical or logical machine boundaries. If Kerberos is not available or cannot be configured, Pass-Through Authentication can be used.
Site Authentication
The Site uses the systems security mechanisms for users (more on that in the topic SmartForms Authentication), but can also be set up to allow anonymous access to sites, Views or Forms. The two methods of allowing anonymous access are:
Separation of the Designer and Runtime sites
An option is to separate the Designer and Runtime sites on different physical machines in an environment. This allows for an extra layer of security, so that if a site or machine is brought down by an attack, the other components are able to continue function. One draw back of such an approach is the performance impact when separating components across multiple machines. It is recommended that if this approach is taken, adequate resources are applied to the machines that will host theses sites and network communication between them, to ensure acceptable levels of performance.
PDF Converter Server-Side Request Forgery Prevention Configuration
When working with the PDF Converter Service or Save as PDF control, you can configure security settings to restrict which hosts and IP addresses it is allowed to load any type of resource from. See PDF Converter Server-Side Request Forgery Prevention Configuration for more information.
Nintex K2 for SharePoint
When considering security with Nintex K2 for SharePoint, the focus should be placed on SharePoint itself. Ensure that all necessary rights and permissions are set up correctly and any SharePoint security requirements are met prior to integrating with the product.
Custom extensions and unauthorized assemblies
It is possible to customize the product using custom components like SmartBrokers, Controls, OAuth Extensions, User Providers, and others. This customization loads installed custom assemblies dynamically. A risk exists that unauthorized assemblies can be installed into certain folders on the server which will then be automatically loaded by the system. To prevent this security risk, it is essential to follow the principle of least privilege and use Windows Server administration best practices.
Focus on these best practices:
- Only allow accounts with administrators access to log into the Server machine.
- Do not give write/modify access to the installation directory, to any users that are not automatically assigned rights by the Setup Manager. Make sure that only server administrators can make changes to any folders within the installation directory.
For specific information about folder locations for custom components, refer to the following documentation:
- K2 blackpearl 4.7: Extending the Nintex K2 platform
- K2 Five (5.6): Extending the Nintex K2 platform