Mac OS X Security Framework
|
|
|
- Ursula Miles
- 10 years ago
- Views:
Transcription
1 Mac OS X Security Framework Leon Towns-von Stauber, Occam's Razor Seattle SAGE Group, February
2 X Contents Opening Remarks...3 Overview...5 Daemons...8 Authorization Services...12 Common Data Security Architecture...28 Keychains...33 Resources...44
3 X Opening Remarks 3 I'm assuming basic familiarity with UNIX operating system design Where I'm coming from: UNIX user and some-time admin since 1990 Full-time UNIX admin since 1995 NeXTstep/OS X user and admin since 1991 This presentation primarily covers Mac OS X
4 X Legal Notices 4 This presentation Copyright 2004 Leon Towns-von Stauber. All rights reserved. Trademark notices Apple, Mac OS, Finder, Panther, and other terms are trademarks of Apple Computer. See appletmlist.html. Other trademarks are the property of their respective owners.
5 X Overview 5 Provides infrastructure for security-related functionality to Mac OS X apps Privileged access, encryption, certificate handling, password storage, etc. Examples Login Window uses the framework to authenticate graphical logins Installer and Software Update verify permission to install software Finder permits superuser-level access Disk Copy creates encrypted disk images Apple Mail Server supports SSL connections Keychain Access is entirely dependent on the Security framework
6 X Overview 6 Security framework and associated components
7 X Overview 7 What is a Mac OS X framework? Like a versioned shared library, encapsulated with resources in a structured directory with a.framework extension (a "bundle") Resources include headers, images, NIBs, property lists, etc. [Show framework] Panther (Mac OS X 10.3) splits Security framework into more pieces /System/Library/Frameworks/Security.framework provides the bulk of the API (in C) /System/Library/Frameworks/SecurityFoundation.framework provides an abstracted Objective-C API to Authorization Services /System/Library/Frameworks/SecurityInterface.framework and /System/Library/PrivateFrameworks/ SecurityHICocoa.framework provide Obj-C APIs for GUI elements
8 X Daemons 8 Introduction Security Server Security Agent
9 X Daemons Introduction 9 Every app linked to the Security framework maintains its own instance of the framework in its address space Think of the large box in the Security framework diagram as the address space of a single process To put distance between apps and sensitive data, external daemons handle most passwords and private keys Daemon executables located in /System/Library/CoreServices/
10 X Daemons Security Server 10 The Security Server processes authorization requests, stores keys in memory, performs cryptographic computations on keys, evaluates ACLs in keychains, and manages keychain master keys Executable is named SecurityServer Started by SecurityServer startup item (in /System/Library/ StartupItems/) Contacted via a privileged Mach IPC port, providing some assurance that processes are talking to the right daemon when making sensitive requests
11 X Daemons Security Agent 11 The Security Agent handles user interaction, acquiring user secrets (passwords, biometric data, smart card keys, etc.), thus further separating such data from the app requesting access Executable is named SecurityAgent When the Security Server requires user interaction, it launches a Security Agent running under the user's UID The Agent remains to handle further requests until the user logs out Interacts with user via onscreen dialogs Any Security framework requests are sent to the user at the graphical console, even if the request came from another user's process If no one is logged into the console, requests automatically fail Darwin, lacking Aqua GUI, doesn't include the Security Agent, and many Security framework capabilities don't work with Darwin
12 X Authorization Services 12 Introduction Policy Database Sequence of Events AuthorizationExecuteWithPrivileges Command-Line Tools
13 X Authorization Introduction 13 Authorization Services enables programs to determine whether a user should be permitted to take certain actions This is what give members of group admin much of their privileged access Kind of like sudo, but primarily intended for GUI functions [Examples: System Preferences, Finder] An action is associated with an authorization right, configured in a policy database
14 X Authorization Policy Database 14 The policy database is an XML file, /etc/authorization Fills a role analogous to sudoers, by defining authorization requirements Example entry in /etc/authorization, used by authopen: <key>sys.openfile.</key> <dict> <key>class</key> <string>user</string> <key>group</key> <string>admin</string> <key>mechanisms</key> <array> <string>builtin:authenticate</string> </array> <key>shared</key> <false/> <key>timeout</key> <integer>300</integer> </dict>
15 X Authorization Policy Database 15 After transformation into NeXT property list format with /usr/bin/pl < /etc/authorization: "sys.openfile." = { class = user; group = admin; mechanisms = ("builtin:authenticate"); shared = 0; timeout = 300; }; sys.openfile.: The name of the right This is a wild card entry, indicated by the trailing dot class: Requirement for successful authorization The user class requires membership in a specified group group: Users who authenticate as members of group admin satisfy the requirements for this right
16 X Authorization Policy Database 16 sys.openfile. (cont'd.) mechanisms: Actions taken to authorize In this case, user authentication is performed shared: If true, other applications need not reauthorize (within the timeout period) In this case, authorization credentials are not shared with other apps timeout: After the specified number of seconds since last acquisition of the right, the credentials cached by the Security Server are dropped, requiring reauthorization A timeout of 0 means that reauthorization is never required
17 X Authorization Policy Database 17 Another example, used by the Login Window application: "system.login.console" = { class = "evaluate-mechanisms"; mechanisms = ( "loginwindow_builtin:login", authinternal, "loginwindow_builtin:success", "builtin:getuserinfo", "builtin:sso" ); }; Requested by Login Window after bootup, causing the Security Server to start a Security Agent (running as root) to display the login dialog Upon login, this Agent is killed Class of evaluate-mechanisms causes Security Server to execute each of the routines listed for the mechanisms key The authinternal mechanism creates a shared credential that negates the need for reauthentication by applications after logging in
18 X Authorization Policy Database 18 Another example, used by PAM: "system.login.tty" = { class = "evaluate-mechanisms"; mechanisms = ("push_hints_to_context",authinternal); }; Requested by the pam_securityserver.so module, referenced in several service config files in /etc/pam.d/ There is a system.login.pam right, which is unused (Huh?) Thanks to this, successful password-based authentication through a PAM-enabled service results in the creation of a shared credential within the context of that service (SSH session, etc.) Possible for remote logins due to push_hints_to_context, which forwards auth info to the Security Server, bypassing the Security Agent (which normally needs to put up a graphical dialog) [Demonstrate using authorize and sudo]
19 X Authorization Policy Database 19 Another example: "system.login.screensaver" = { class = rule; rule = "authenticate-session-owner-or-admin"; }; The rule class uses an entry defined in the rules section of /etc/authorization to determine how authorization is performed Rules offer reusable collections of values "authenticate-session-owner-or-admin" = { "allow-root" = 0; class = user; group = admin; mechanisms = ("builtin: authenticate"); "session-owner" = 1; shared = 0; }; allow-root: If true, user logged in as root requires to authentication session-owner: Right granted by successful authentication as user whose GUI session is up on the system's console
20 X Authorization Policy Database 20 Default entry applies when requested right doesn't match any other entry: "" = { class = rule; rule = default; }; The default rule produces a shared credential if a person can authenticate as an administrative user, which times out in 5 minutes: default = { class = user; group = admin; mechanisms = ("builtin: authenticate"); shared = 1; timeout = 300; };
21 X Authorization Policy Database 21 Changes to /etc/authorization take effect on the fly, no signaling of SecurityServer required (unlike syslogd, xinetd, etc.) [Show /etc/authorization, processed through /usr/bin/pl] Naming conventions Most rights prefixed by system., indicating they're provided with the OS Entries by third parties are encouraged to follow a convention like that used for Java classes: reversed DNS domain name associated with the organization, followed by segments describing the right (e.g., com.occam.syslog.reload)
22 X Authorization Sequence of Events 22 When an application requests authorization for an action (such as starting a network service from System Preferences), here's what happens: 1) The application uses the Authorization Services API to contact the Security Server, requesting a named right (like system.preferences) 2) The Security Server looks for the right in the policy database (/etc/authorization), and determines the requirements 3) If the right requires authentication, and the Security Server doesn't already possess cached credentials that can be shared with the application, it triggers the Security Agent 4) The Security Agent prompts the user logged into the console, then attempts to auth the user through the Directory Services framework 5) Directory Services reports success or failure, which is passed back through the Security Agent to the Security Server 6) The Security Server returns result to the application
23 X Authorization AEWP 23 The AuthorizationExecuteWithPrivileges (AEWP) routine lets a program specify an external command to be run with superuser privileges Command invoked by /System/Library/CoreServices/ AuthorizationTrampoline, which is setuid root Access to AEWP controlled by system.privilege.admin right in /etc/authorization, and is thus limited to root and to those in the admin group Since granting an app full superuser privileges to run an arbitrary command opens the possibility of a security hole, Apple warns against use in its developer documentation Used by some software, such as installers that set the setuid bit on binaries that copy files to restricted areas Be sure you trust software that asks you to authorize a privileged action
24 X Authorization Command-Line Tools 24 /usr/libexec/authopen Lets authorized users read and write files to which they wouldn't normally have access Example: nidump group. authopen -w /etc/group Request made for sys.openfile./private/etc/group right Note symlink resolution If authorization successful, text from standard input replaces contents of /etc/group Man page contains more details
25 X Authorization Command-Line Tools 25 authorize Available from Takes name of right as argument, returns result of authorization attempt Not really intended for high-security uses Opportunity for malicious interference in exchange of information between authorize and tool invoking it Better to include calls to Authorization Services in same code performing privileged actions, rather than calling an external authorization tool sudo is more flexible for CLI uses than authorize Mainly intended to demonstrate how /etc/authorization works Could also be useful for casual authorization scenarios
26 X Authorization Command-Line Tools 26 authorize.c #include <stdlib.h> #include <Security/Authorization.h> int main(int argc, char *argv[]) { char *commandname = argv[0]; char *rightname; if (argc == 2) rightname = argv[1]; else { fprintf(stderr, "usage: %s authorization_right_name\n", commandname); exit(exit_failure); } OSStatus status; AuthorizationItem right = { rightname, 0, NULL, 0 }; AuthorizationRights rightset = { 1, &right }; AuthorizationFlags flags = kauthorizationflagdefaults kauthorizationflagextendrights kauthorizationflaginteractionallowed;
27 X Authorization Command-Line Tools 27 authorize.c (cont'd.) status = AuthorizationCreate(&rightSet, kauthorizationemptyenvironment, flags, NULL); } if (status == errauthorizationsuccess) { fprintf(stdout, "success\n"); exit(exit_success); } else { fprintf(stdout, "failure\n"); exit(exit_failure); } Compile with cc -framework Security -o authorize authorize.c
28 X Common Data Security Architecture 28 Introduction Modules System Services STOS Projects
29 X CDSA Introduction 29 The Common Data Security Architecture (CDSA) is a standard originally developed by Intel, and now promoted by The Open Group Apple has implemented it as part of the Mac OS X Security framework Nearly all of it part of open-source Darwin project At the base are plug-in modules of various types Access to module functionality is through the Common Security Services Manager (CSSM) API, the centerpiece of the CDSA
30 X CDSA Modules 30 CSP (Cryptographic Service Provider): Random number generation, encryption/decryption, key generation, hashes, digital signatures Symmetric encryption algorithms: ASC (Apple Secure Compression), RC2, RC4, RC5, DES, 3DES, AES/Rijndael Asymmetric encryption algorithms: FEE (NeXT's Fast Elliptic Encryption), RSA, DSA, Diffie-Hellman Message digesting algorithms: MD2, MD5, SHA-1 Pseudo-randum number generation algorithm: Yarrow DL (Data Library): File-based storage of certificates, keys, etc. CSP/DL: Manages keychains X509CL (Certificate Library): Manages X.509 certificates in memory X509TP (Trust Policy): Determines validity of X.509 certs
31 X CDSA System Services 31 Atop the CSSM, Apple provides higher-level APIs as part of the Security framework Secure Transport: Implements SSL/TLS Offers cleaner integration and abstraction for developers,, and possibly greater performance, but OpenSSL is more familiar and cross-platform Certificate, Key, and Trust Services: Manages certs and public keys Keychain Services: Programmatic interface to keychains
32 X CDSA STOS Projects 32 The Secure Trusted Operating System (STOS) Consortium ( brings together representatives from the U.S. federal government, academia, and private industry to work on advanced security capabilities using the Darwin kernel as a starting point Several projects involving Apple's CDSA implementation: Apache SSL module using CDSA instead of OpenSSL PGP implementation using CDSA OpenSSH on CDSA
33 X Keychains 33 Introduction Keychain Contents Sequence of Events Keychain Files Tools
34 X Keychains Introduction 34 A keychain is a file containing keys, certificates, passwords, and other secured data Contents are encrypted, protected by an access password Convenience: a single password unlocks access to a multitude of passwords used for web sites, mail servers, file shares, etc. Makes it practical to use unique, well-chosen passwords for each
35 X Keychains Contents 35 Keychains contain three kinds of objects: keys, access control lists (ACLs), and other items Storage and access of objects in keychains is done by the AppleCSPDL module, via Keychain Services and the CSSM Each key in the keychain has an ACL, processed by the Security Server, which determines which applications can access it, and how An app is identified by a hash of the invariant parts of the app binary Thus, application access to keys must be re-established after a software update Provides reasonable assurance that app is the same as when the user gave it permission to access a key Only way to modify ACLs is by user direction through a Security Agent, and the Security Server will only accept ACL changes from an Agent that it has started
36 X Keychains Contents 36 Keychain items you see in Keychain Access aren't actually keys Each item (password, secure note, etc.) is stored in the keychain, and encrypted with its own key, which is also stored in the keychain ACLs are applied to per-item encryption keys, but they're made to look as if they're properties of the items the keys protect A master signing key is used to sign the per-item keys and their ACLs Per-item keys and the master signing key are themselves encrypted with a master key ACLs can't be encrypted, since they're needed to determine whether access to encrypted keys should be permitted The master key is encrypted with the keychain password The master key and master signing key are also stored in the keychain, making the keychain file completely portable, requiring only the password to unlock its contents
37 X Keychains Contents 37 Keychain items you see in Keychain Access aren't actually keys Each item (password, secure note, etc.) is stored in the keychain, and encrypted with its own key, which is also stored in the keychain ACLs are applied to per-item encryption keys, but they're made to look as if they're properties of the items the keys protect A master signing key is used to sign the per-item keys and their ACLs Per-item keys and the master signing key are themselves encrypted with a master key The master key is encrypted with the keychain password The master key and master signing key are also stored in the keychain, making the keychain file completely portable, requiring only the password to unlock its contents
38 X Keychains Sequence of Events 38 Here's what happens when an app desires access to a keychain item: 1) App makes a request with Keychain Services, through the CSSM, which calls on the AppleCSPDL 2) If the default keychain is locked, AppleCSPDL retrieves the encrypted master key and hands it to the Security Server 3) The Security Server has a Security Agent prompt the user for the keychain password, which is passed back to the Security Server 4) The Security Server uses the password to decrypt the master key, then caches it in memory (A keychain is unlocked when the Security Server has its decrypted master key cached in memory.) 5) Once the keychain is unlocked, the AppleCSPDL retrieves the desired item, the item's encryption key, and the key's ACL, handing them to the Security Server
39 X Keychains Sequence of Events 39 Accessing a keychain item (cont'd): 6) The Security Server verifies the signature on the key and ACL with the master signing key 7) If the signature checks out, the Security Server processes the ACL, resulting in denial, permission, or another prompt through the Security Agent 8) If access is permitted, the Security Server decrypts the keychain item and hands it to the AppleCSPDL, which passes it back up the software stack to the application Note that the application process never sees the user's keychain password, nor any of the decrypted keys in the keychain
40 X Keychains Files 40 A keychain is created as ~/Library/Keychains/login.keychain upon first login Keychain password same as login password, synced when changing login password through GUI If keychain and login passwords are the same, the keychain is automatically unlocked upon login The login keychain is also the initial default keychain, meaning that new items are added to it, and that it's the default argument for many of the security utility's commands On first boot, the SecurityServer startup item uses systemkeychain to create /Library/Keychains/System.keychain Also creates /var/db/systemkey, which presumably contains a randomly generated keychain password Used by system processes running as root (daemons, boot processes)
41 X Keychains Tools 41 Keychain Access is the primary UI for keychain management In the Settings dialog (under the Edit menu), you can set the keychain to lock after some idle timeout, and/or when the machine sleeps "Locking" means to have the Security Server throw away its cached copy of the keychain's decrypted master key You should consider lowering the idle timeout Keychain First Aid (under Window menu) meant to fix certain problems that can corrupt a keychain, but with certain setups in the past it has caused more damage than it repairs Run it in Verify mode, and try to fix things manually Password Assistant (under Edit->Change Password...->Details->i) can help choose strong password Keychain Status menu bar item provides convenient access to functions
42 X Keychains Tools 42 Keychain Access
43 X Keychains Tools 43 The security command can help manage keychains from the CLI security list-keychains security lock-keychain keychain security show-keychain-info keychain security dump-keychain keychain See man page for more
44 X Resources 44 Web Sites Mailing Lists Books
45 X Resources Web Sites 45 Security Framework developer documentation CoreTechnologies/coretechnologies.html Apple CDSA site Intel CDSA site The Open Group CDSA site CDSA specification
46 X Resources Mailing Lists 46 apple-cdsa (Apple) Very low traffic, mostly developers MacOSX-admin (Omni Group) Moderate to heavy traffic
47 X Resources Books 47 Mac OS X Panther in a Nutshell Chuck Toporek, Chris Stone Mac OS X Panther for Unix Geeks Brian Jepson, Ernest E. Rothman Both contain references for Security framework-related CLI commands (written by yours truly)
Smart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Guidelines for Developing Cryptographic Service Providers (CSPs) for Acrobat on Windows
Technical Note Providers (CSPs) for Acrobat C ONTENTS Requirements for Minimal Functionality 1 Recommendations for Maximum Functionality 2 For a Better User Experience Using CSPs in Acrobat 3 Other Recommendations
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
DeployStudio Server Quick Install
DeployStudio Server Quick Install v1.7.0 The DeployStudio Team [email protected] Requirements OS X 10.7.5 to 10.11.1 DeployStudioServer_v1.7.x.pkg and later NetBoot based deployment 100 Mb/s switched
QuickStart Guide for Client Management. Version 8.7
QuickStart Guide for Client Management Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
FileMaker Server 15. Getting Started Guide
FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Configuring and Monitoring Hitachi SAN Servers
Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
What s New in Centrify Server Suite 2014
CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
QuickStart Guide for Managing Computers. Version 9.2
QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
FileMaker Server 8. Administrator s Guide
FileMaker Server 8 Administrator s Guide 1994-2005 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.,
Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012
Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that
FIPS 140-2 SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SERVER August 31, 2011 FIPS 140-2 LEVEL-1 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SERVER 1. Introduction This document describes
FileMaker Server 13. Getting Started Guide
FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any
Mac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
JAMF Software Server Installation Guide for Linux. Version 8.6
JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.
Review Quiz 1. What is the stateful firewall that is built into Mac OS X and Mac OS X Server?
----------------------------- Chapter 1 PLANNING SYSTEM 1. What is the formal definition of utilization? 2. Name the common units in which heat load is measured. 3. What is the easiest way to determine
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Configuring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
Linux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Security Configuration Guide P/N 300-010-493 Rev A05
EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed
How To Harden Ancient Mac Xp On Mac Moonlight 2.5.2 (Mac) On A Macbook V.Xo (Apple) With A Hardening Mode On A Windows Xp 2.4.2.2 On A
OS X Hardening Mountain Lion 10.8 Version: 1.00 Date: 8/2/2013 Classification: Author(s): Public Florian Grunow, Matthias Luft, Michael Thumann, Michael Schaefer TABLE OF CONTENT 1 INTRODUCTION... 4 2
SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Installing Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Zend Server 4.0 Beta 2 Release Announcement What s new in Zend Server 4.0 Beta 2 Updates and Improvements Resolved Issues Installation Issues
Zend Server 4.0 Beta 2 Release Announcement Thank you for your participation in the Zend Server 4.0 beta program. Your involvement will help us ensure we best address your needs and deliver even higher
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more Security Review Version 8.1 March 31, 2016 Contacting Leostream Leostream Corporation http://www.leostream.com
Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1
Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1 October 15, 2012 The following user messages appear on the AnyConnect client GUI. A description follows each message, along with recommended
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server November 6, 2008 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail:
FileMaker Security Guide
TECH BRIEF FileMaker Security Guide The Key to Securing Your Solutions Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
FileMaker Server 10 Help
FileMaker Server 10 Help 2007-2009 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and the Bento logo
Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac
Practical Mac OS X Insecurity Security Concepts, Problems and Exploits on your Mac Who am I? Student of physics, mathematics and astronomy in Bonn Mac user since 1995 I love Macs Mac evangelist Intentions
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
E-CERT C ONTROL M ANAGER
E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...
Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for BlackBerry Version 12.0 Published: 2014-11-12 SWD-20141106140037727 Contents Introduction... 7 About this guide...8 What is BES12?...9 Key features of
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
Likewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
eggon SDK for ios 7 Integration Instructions
eggon SDK for ios 7 Integration Instructions The eggon SDK requires a few simple steps in order to be used within your ios 7 application. Environment This guide assumes that a standard ios Development
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Enterprise Apple Xserve Wiki and Blog using Active Directory. Table Of Contents. Prerequisites 1. Introduction 1
Table Of Contents Prerequisites 1 Introduction 1 Making the Xserve an Open Directory Master 2 Binding the Xserve to Active Directory 3 Creating a Certificate 3 Setting up Apache Web Server 4 Applying the
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
EMC Data Protection Search
EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
WiMAX Public Key Infrastructure (PKI) Users Overview
WiMAX Public Key Infrastructure (PKI) Users Overview WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum Certified, the WiMAX Forum logo and the WiMAX Forum Certified logo are trademarks
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015
YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,
Configuring Secure Socket Layer (SSL)
7 Configuring Secure Socket Layer (SSL) Contents Overview...................................................... 7-2 Terminology................................................... 7-3 Prerequisite for Using
VMware Horizon Workspace Security Features WHITE PAPER
VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon
Practical Mac OS X Insecurity
Practical Mac OS X Insecurity Security Concepts, Problems, and Exploits on Your Mac Angelo Laub [email protected] December 11, 2004 1 Introduction While rumors have it that Mac OS X is extremely secure
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Aqua Connect Load Balancer User Manual (Linux)
Aqua Connect Load Balancer User Manual (Linux) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Mac OS X ACRDS Server Computer Node Setup... 5 Managing Inactive Sessions...
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
Wolfr am Lightweight Grid M TM anager USER GUIDE
Wolfram Lightweight Grid TM Manager USER GUIDE For use with Wolfram Mathematica 7.0 and later. For the latest updates and corrections to this manual: visit reference.wolfram.com For information on additional
Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.
Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.3 Table of Contents Overview... 1 Configuring One-Way Secure Socket
Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/
Proto Balance SSL TLS Off-Loading, Load Balancing http://www.protonet.co.za/ User Manual - SSL Copyright c 2003-2010 Shine The Way 238 CC. All rights reserved. March 13, 2010 Contents 1. Introduction........................................................................
QuickStart Guide for Managing Mobile Devices. Version 9.2
QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html
IBM 000-596 IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam TYPE: DEMO http://www.examskey.com/000-596.html Examskey IBM 000-596 exam demo product is here for you to
If you prefer to use your own SSH client, configure NG Admin with the path to the executable:
How to Configure SSH Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP
Network Management Card Security Implementation
[ APPLICATION NOTE #67 ] OFFER AT A GLANCE Offers Involved Network Management Card, APC Security Wizard Applications Configuration and monitoring of network managed devices Broad Customer Problem Secure
McAfee Firewall Enterprise 8.3.1
Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
