Security - User Manager
Manage administrator users, roles, and permissions
Overview
The User Manager (available in ColdFusion Enterprise edition) provides role-based access control (RBAC) for the ColdFusion Administrator. Instead of sharing a single administrator password among multiple team members, you can create individual user accounts with specific permissions tailored to each person's responsibilities.
This feature enables the principle of least privilege, improves accountability through audit trails, and eliminates the security risks associated with shared credentials.
User Management
Create and manage individual administrator user accounts.
Creating Administrator Users
• Password (strong, unique)
• Description (user's name/role)
• Assigned roles (permissions)
- Use real names or email addresses for accountability (e.g., "john.doe" or "jdoe@company.com")
- Avoid generic names like "admin", "webmaster", "developer"
- Use consistent naming convention across team
- Document who each account belongs to
Password Requirements
- Use password manager to generate and store complex passwords
- Never reuse passwords from other systems
- Enforce password expiration policies
- Lock accounts after multiple failed login attempts
- Require password change on first login
- Maintain password history to prevent reuse
User Account Lifecycle
Role-Based Access Control
Assign granular permissions through predefined or custom roles.
Administrator (Full Access)
- Permissions
- Complete control over all settings
- Use Case
- Senior admins, infrastructure team leads
- Count
- Limit to 2-3 people maximum
Full administrative privileges including user management and security settings
Database Administrator
- Permissions
- Datasource management only
- Use Case
- DBA team managing database connections
- Access
- Data Sources, caching related to DB
Limited to database-related settings, cannot modify server configuration
Application Developer
- Permissions
- Mappings, debugging, logging
- Use Case
- Development team needing config access
- Access
- Dev tools, no production changes
Can configure development settings but not security or production settings
System Monitor
- Permissions
- Read-only access to logs and metrics
- Use Case
- Operations team monitoring health
- Access
- View only, no modifications
Monitor server status, logs, and performance without ability to change settings
Security Administrator
- Permissions
- Security settings, user management
- Use Case
- Security team managing access control
- Access
- Security section, sandboxes, users
Manage security policies, users, and access control without server config access
Custom Roles
- Permissions
- Tailored combination of access rights
- Use Case
- Specific organizational needs
- Configuration
- Select from available permissions
Create roles matching your organization's specific requirements and workflows
Permission Types
Available Permission Categories
- Server Settings: Core server configuration, request handling, caching
- Data & Services: Datasources, web services, Solr, mail settings
- Debugging & Logging: Debug output, log files, monitoring
- Extensions: Java applets, CFX tags, custom tag paths
- Event Gateways: Gateway configuration and management
- Security: Sandboxes, RDS, secure profile, user manager (if authorized)
- Packaging & Deployment: CAR/EAR file operations
- System Information: View server info, license, update status (read-only)
CUSTOM ROLE: "Production Support Engineer"
==============================================
Business Need:
Support team needs to troubleshoot production issues without
ability to modify critical settings or access sensitive data.
Permissions Granted:
✓ View server status and system information
✓ Access log files (read-only)
✓ View datasource settings (no passwords visible)
✓ Monitor active sessions and requests
✓ Clear template cache
✓ View debug information (when enabled)
✓ Access performance monitoring
Permissions Denied:
✗ Modify any server settings
✗ Change datasource configurations
✗ Access security settings
✗ Manage users or roles
✗ Enable/disable features
✗ View or modify RDS settings
✗ Execute administrative operations
Example Users Assigned This Role:
- On-call support engineers (nights/weekends)
- Level 1/2 support technicians
- Offshore support team
- Contractors without admin access
Review Schedule:
Quarterly review to ensure permissions still appropriateAccess Control Best Practices
Principle of Least Privilege
- Start with minimal permissions, add only what's needed
- Grant access to specific sections, not full administrator
- Use temporary privilege elevation for one-time tasks
- Remove permissions when no longer required
- Regular access reviews (quarterly minimum)
- Document business justification for each permission
Separation of Duties
- Developer vs. Production Admin: Developers shouldn't have production write access
- Security vs. Operations: Separate security policy management from daily operations
- Database vs. Application: DBA manages datasources, app team manages code deployments
- Monitoring vs. Configuration: Support can view logs but not change settings
User Account Auditing
- Review all user accounts quarterly - disable unused accounts
- Verify each user still requires their assigned permissions
- Check for accounts of departed employees
- Review recent administrator actions in logs
- Verify no shared accounts exist
- Confirm password rotation compliance
- Check for failed login attempts (potential attacks)
- Document all findings and remediation actions
Multi-Factor Authentication (MFA)
Enhanced Login Security
• SSO providers (SAML, OAuth)
• VPN with MFA as access layer
• Custom authentication filters
- Network Level: Require VPN with MFA before accessing admin port
- Web Server: Apache/IIS authentication modules with MFA
- Directory Integration: LDAP/AD with built-in MFA support
- Proxy/Gateway: Reverse proxy requiring MFA before CF admin
Integration with Enterprise Directory
LDAP / Active Directory Integration
• Single sign-on capability
• Automated account provisioning/deprovisioning
• Group-based role assignment
• Enterprise password policies enforced
LDAP/AD Group to ColdFusion Role Mapping
==========================================
Active Directory Groups → CF Admin Roles:
AD Group: "CF-Admins-Full"
→ ColdFusion Role: Administrator (Full Access)
→ Members: Senior infrastructure team (2-3 people)
AD Group: "CF-Admins-Database"
→ ColdFusion Role: Database Administrator
→ Members: DBA team (3-5 people)
AD Group: "CF-Developers"
→ ColdFusion Role: Application Developer
→ Members: Development team (10-15 people)
AD Group: "CF-Support-ReadOnly"
→ ColdFusion Role: System Monitor
→ Members: Support team, offshore support (5-10 people)
AD Group: "CF-Security-Team"
→ ColdFusion Role: Security Administrator
→ Members: InfoSec team (2-3 people)
Benefits:
✓ User leaves company → AD account disabled → CF access auto-revoked
✓ Role changes → Update AD group membership only
✓ Password policies → Managed centrally in AD
✓ MFA → Configured once in AD, applies everywhere
✓ Audit trail → AD logs combined with CF logs
Emergency Access:
Local CF account: "emergency_admin"
Stored in: Sealed envelope in safe
Used for: AD outage or emergency access
Review: Quarterly password rotationCommon Issues & Solutions
User Cannot Login After Creation
- Verify username entered correctly (case-sensitive)
- Confirm password meets complexity requirements
- Check that user account is enabled (not disabled)
- Verify user has at least one role assigned
- Restart ColdFusion if user was just created
- Check for special characters in username/password
- Review administrator logs for authentication errors
User Has No Access to Any Sections
- Verify user has at least one role assigned
- Check that assigned role has permissions configured
- Confirm role assignments saved properly
- Review role permissions to ensure they include desired access
- Test with different role to isolate permission issue
- Check for typos in custom role configuration
Lost Administrator Access
- Stop ColdFusion service
- Edit
neo-security.xmlconfiguration file - Reset administrator password or re-enable account
- Use password reset utility if available (CF2021+)
- Restore from configuration backup if available
- Contact Adobe Support with server license info
- Document incident and update password management procedures
LDAP Integration Not Working
- Verify LDAP server connection (host, port, SSL)
- Check LDAP bind credentials are correct
- Confirm DN (Distinguished Name) format matches your directory
- Test LDAP query returns expected groups/users
- Verify group membership in AD/LDAP
- Check firewall allows LDAP traffic (port 389 or 636 for SSL)
- Review ColdFusion logs for LDAP connection errors
- Test with LDAP browser tool to verify directory structure
Security Documentation Template
COLDFUSION ADMINISTRATOR ACCESS CONTROL
========================================
Server: production-cf01.company.com
Last Updated: 2025-10-27
Owner: Infrastructure Team
ADMINISTRATOR USERS
-------------------
Username | Name | Role | Created | Last Login
-----------------|-------------------|---------------------|------------|------------
john.doe | John Doe | Administrator | 2024-01-15 | 2025-10-26
jane.smith | Jane Smith | Administrator | 2024-01-15 | 2025-10-25
bob.jones | Bob Jones | Database Admin | 2024-03-20 | 2025-10-27
sarah.wilson | Sarah Wilson | Security Admin | 2024-06-10 | 2025-10-24
mike.chen | Mike Chen | System Monitor | 2024-08-15 | 2025-10-27
emergency_admin | Emergency Account | Administrator | 2024-01-15 | Never
ROLE DEFINITIONS
----------------
Administrator:
- Full access to all sections
- User management
- Security configuration
- Assigned to: john.doe, jane.smith
Database Administrator:
- Data Sources section
- Database-related caching
- Read-only system info
- Assigned to: bob.jones
Security Administrator:
- Security section
- User Manager
- Sandbox configuration
- Assigned to: sarah.wilson
System Monitor:
- Read-only access to logs
- Server monitoring
- Performance metrics
- Assigned to: mike.chen
ACCESS REVIEW LOG
------------------
Date | Reviewer | Actions Taken
-----------|-------------|-----------------------------------------------
2025-10-27 | Jane Smith | Quarterly review - no changes needed
2025-07-15 | John Doe | Removed tom.brown (departed employee)
2025-04-20 | Jane Smith | Added mike.chen with System Monitor role
2025-01-15 | John Doe | Quarterly review - all accounts verified
EMERGENCY ACCESS PROCEDURES
----------------------------
Emergency Account: emergency_admin
Location: Sealed envelope in server room safe
Access Required: Two senior team members (dual control)
Usage: AD/LDAP outage or loss of all other administrator access
Post-Use: Change password immediately, document usage
INTEGRATION
-----------
Directory: Active Directory (ad.company.com)
Authentication: LDAP over SSL (port 636)
Group Mapping: See LDAP Integration section above
MFA: Required via VPN (Cisco AnyConnect + Duo)
NEXT REVIEW DUE
---------------
Date: 2026-01-27 (quarterly)
Responsible: Infrastructure Team Lead