- Authentication Basics
- Configuring Single Sign-On
- Token-based Single Sign On Authentication
- Authenticating with SAML
- Using OpenAM
- Using OpenID Connect
- Authenticating with CAS (Central Authentication Service)
- Authenticating with Kerberos
- Multi-Factor Authentication
- Using Multi-Factor Authentication
- Multi-Factor Authentication Checkers
- Fast IDentity Online 2
- Securing Web Services
- Setting Service Access Policies
- Using Authentication Verifiers
- Setting Up CORS
There are several aspects of securing a Liferay installation—including, but not limited to, following the best security practices for your hosting environment, database, search provider, application server, and Liferay DXP itself.
For example, Liferay DXP relies on the application server for sanitizing CRLF in HTTP headers. You must ensure this is configured properly on the application server. Skipping this configuration may result in security verification products, like Veracode, flagging false positives in security reports.
Here you’ll learn the basic elements to secure Liferay DXP. This includes configuring how users authenticate to your Liferay DXP installation, authorizing users with permissions, configuring secure access to Liferay DXP Web Services, and fine-tuning security features on an as-needed basis.
Customers are advised to deploy security patches as they are released. For community and CE installations, we recommend always using the latest community release, which contains all previous security patches.
Liferay DXP authentication is flexible. By default, users log into Liferay DXP by using the Sign In widget, which uses the database to authenticate the user. By default, guests can use the Sign In widget to create accounts with default permissions. Nearly every element of the default authentication experience can be changed by an administrator. For example,
You can configure Multi-Factor authentication.
You can use an SSO to manage authentication.
Liferay can also be integrated with LDAP to validate users instead of using the portal database.
Guest account creation can be turned off.
To learn more, see Authentication Basics.
Liferay DXP has a robust role-based access control (RBAC) system. Users can be assigned to Sites, Teams, User Groups, or Organizations. Custom Roles can be created, permissions can be assigned to these Roles, and those Roles can be assigned to Users. Roles are scoped to apply only in a specific context, such as a Site, Organization, or globally. See Roles and Permissions for more information.
Securing Web Services¶
Liferay Web Services have a multi-layered and configurable approach to security and authorization:
Service Access Policies control access to remote APIs.
Authentication Verifiers verify provided credentials.
Cross-Origin Resource Sharing configuration can enable retrieving resources from trusted sources only.
See Introduction to Securing Web Services to learn more.
There are many ways to fine-tune or disable additional security features:
Configure Liferay Portal’s HTTPS web server address.
Configure the list of allowed servers to which users can be redirected.
Configure the list of portlets that can be accessed from any page.
Configure the file types allowed to be uploaded and downloaded.
These features can be configured using portal properties.
Liferay Portal’s philosophy is “secure by default.” Please exercise significant caution when modifying security-specific defaults or white-lists. Such actions may lead to security misconfiguration and an insecure deployment.
There are additional security plugins available from Liferay Marketplace.