Securing WebFOCUS A Primer. Bob Hoffman Information Builders



Similar documents
Perceptive Experience Single Sign-On Solutions

Agenda. How to configure

The Challenges of Web single sign-on

Flexible Identity Federation

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Deploying RSA ClearTrust with the FirePass controller

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

SAP Business Objects Security

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Administering Jive Mobile Apps

Configuring Single Sign-on for WebVPN

QLIKVIEW MOBILE SECURITY

The increasing popularity of mobile devices is rapidly changing how and where we

WebNow Single Sign-On Solutions

TIBCO Spotfire Platform IT Brief

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Securing ArcGIS Server Services: First Steps

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

From centralized to single sign on

Hybrid for SharePoint Server Search Reference Architecture

The Role of Federation in Identity Management

SAML SSO Configuration

CA Performance Center

managing SSO with shared credentials

Adding Stronger Authentication to your Portal and Cloud Apps

Use Enterprise SSO as the Credential Server for Protected Sites

Copyright: WhosOnLocation Limited

An Overview of Samsung KNOX Active Directory-based Single Sign-On

From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen

Getting Started with AD/LDAP SSO

ADFS Integration Guidelines

Crawl Proxy Installation and Configuration Guide

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

How To Use Salesforce Identity Features

nexus Hybrid Access Gateway

Connecting Users with Identity as a Service

PingFederate. SSO Integration Overview

IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

Authentication Integration

Getting Started with Clearlogin A Guide for Administrators V1.01

An Overview of Samsung KNOX Active Directory and Group Policy Features

Google Identity Services for work

Get Success in Passing Your Certification Exam at first attempt!

Single Sign On. SSO & ID Management for Web and Mobile Applications

CA Spectrum and CA Embedded Entitlements Manager

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Single Sign-on (SSO) technologies for the Domino Web Server

Perceptive Content Security

Identity. Provide. ...to Office 365 & Beyond

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Enabling SSO between Cognos 8 and WebSphere Portal

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

QLIKVIEW SECURITY OVERVIEW

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Administering the Web Server (IIS) Role of Windows Server

Authentication Methods

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

SAML-Based SSO Solution

Configuring Sponsor Authentication

CA Nimsoft Service Desk

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

TrustedX - PKI Authentication. Whitepaper

Version 1.0 January Xerox Phaser 3635MFP Extensible Interface Platform

Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal

Enabling single sign-on for Cognos 8/10 with Active Directory

CA Single Sign-On Migration Guide

Configuration Guide BES12. Version 12.3

SSO Plugin. Release notes. J System Solutions. Version 3.6

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Setting Up Resources in VMware Identity Manager

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

WebFOCUS 8: Technical Overview

Integrating EJBCA and OpenSSO

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Leveraging SAML for Federated Single Sign-on:

VMware Identity Manager Administration

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

The Top 5 Federated Single Sign-On Scenarios

JumpCloud is your Directory-as-a-Service. A fully managed directory to rule your infrastructure whether on-premise or in the cloud.

Sisense. Product Highlights.

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

Integrating LivePerson with Salesforce

SchoolBooking LDAP Integration Guide

NCSU SSO. Case Study

Protect Everything: Networks, Applications and Cloud Services

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards

Siteminder Integration Guide

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

McAfee Cloud Identity Manager

SchoolBooking SSO Integration Guide

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Transcription:

Securing WebFOCUS A Primer Bob Hoffman Information Builders 1

Agenda Gain an understanding of the WebFOCUS Architecture Where can security be implemented? Review the internal WebFOCUS repository and resource templates. Review securing the communications layer. Review how to integrate WebFOCUS with external security provider. 2

Discuss Security What should we think about in regards to security? Encrypting the transport protocol. Prevent an attacker from being able to sniff the network to obtain data, passwords Authentication Make sure that the user is who they say they are! Authorization Make sure that the authenticated users can only do what they are permitted to do. 3

WebFOCUS Architecture A basic WebFOCUS report request User requests a The Reporting Server reviews The data source processes WebFOCUS interprets the report from the request, and determines the data request, and request that the user made, WebFOCUS. how and where to retrieve returns the the smallest data (This is done through and a requests the Reporting data. It requests the data set of possible to the URL call to Server the to execute the report. the data source. Reporting Server. WebFOCUS servlet) Web Server Data Source Users WebFOCUS delivers the report to the user. The Reporting Server does any additional calculations, joins and formats it into the desired output (HTML, EXCEL, PDF ) The report is then passed back to WebFOCUS. (Once the report is returned to WebFOCUS, the agent on the Reporting Server is released, making its resources available to subsequent requests) 4

WebFOCUS 8 Repository WebFOCUS Managed Reporting has a built in repository that manages all of the WebFOCUS content, as well as controls who has access to that content. This can be used on it s own, or in conjunction with external security providers. 5

WebFOCUS 8 Repository The WebFOCUS Repository contains all the WebFOCUS content: Folders, Reports, Report Objects, HTML pages, Portals and Schedules. This is a view of the WebFOCUS Content Tree. 6

WebFOCUS 8 Repository In the repository you can also manage WebFOCUS users and groups. This is a view of the WebFOCUS Security Center. 7

WebFOCUS 8 Repository On every object in the content tree, users and/or groups can be mapped to specific rules. However, this can also become This allows very complicated! for greater control for administrators to delegate who can do what with every object in the repository. 8

Resource Templates Resource Templates are there to make managing security easier. They allow you to easily create a content folder, portal, groups and associated rules. Each template creates several sub-groups that have appropriate rules already applied to the content folder and portal. Administrator, Developer, Advanced User, and Basic User. All you need to do is add users to the appropriate group to give them the desired access to WebFOCUS content. Out of the box we provide an Enterprise Template, as well as several SaaS Templates. WebFOCUS also allows you to customize these templates, or create your own. 9

Resource Templates Built-in Resource Templates 10

Resource Templates Built-in Resource Templates Enterprise Group Administrators Can Create new users (WF puts them into the parent group) Edit properties of users in their parent group They can see all users and add anyone to their sub-groups SaaS Group Administrators Cannot create new users Can only manage group membership of their users 11

Resource Templates Consider Your User Role Requirements 12

Discuss Security What should we think about in regards to security? Encrypting the transport protocol. Prevent an attacker from being able to sniff the network to obtain data, passwords Authentication Make sure that the user is who they say they are! Authorization Make sure that the authenticated users can only do what they are permitted to do. 13

WebFOCUS Security Where can the transport layer be encrypted? HTTPS TSL Native RDBMS Encryption Web Server Data Source Users Communications between the user and WebFOCUS can be encrypted. Communications between WebFOCUS and the Reporting Server can be encrypted. Depending on the RDBMS, communications between the Reporting Server and a RDBMS can be encrypted. 14

Discuss Security What should we think about in regards to security? Encrypting the transport protocol. Prevent an attacker from being able to sniff the network to obtain data, passwords Authentication Make sure that the user is who they say they are! Authorization Make sure that the authenticated users can only do what they are permitted to do. 15

WebFOCUS Security Where can authentication be done? Pre Internal External Web Server Users user1 Administrators PM/BasicUsers Authentication can be WebFOCUS performed prior to WebFOCUS Managed Reporting by the web server, a third party can authenticate to web authenticator (WebSEAL, it s internal SiteMinder ) or a token handoff repository. from custom applications. WebFOCUS can authenticate externally to LDAP, AD, an RDBMS or to tables in a data source. Data Source Active Directory COR-WF-PM-CORE COR-WF-PM-SERVER 16

Authentication Pre-Authentication Support Single Sign-on Web Server IIS/Windows Auth Web Access Mgt CA SiteMinder Tivoli WebSEAL OpenID Google, Yahoo Internal Provider Custom SSO SAML SaaS Applications 17

Authentication Configuring Pre Authentication using IIS/IWA The user does not get prompted for credentials. The web browser and IIS automatically handle the authentication. 18

Discuss Security What should we think about in regards to security? Encrypting the transport protocol. Prevent an attacker from being able to sniff the network to obtain data, passwords Authentication Make sure that the user is who they say they are! Authorization Make sure that the authenticated users can only do what they are permitted to do. 19

WebFOCUS 8 Security Where can authorization of the application be done? Internal External Web Server Users user1 Administrators PM/BasicUsers WebFOCUS Managed Reporting can authorize access to it s internal repository. Data Source Active Directory COR-WF-PM-CORE COR-WF-PM-SERVER WebFOCUS can map groups in it s internal repository back to elements in LDAP, AD, or tables in a data source. This allows integrated authorization to just about any external source. 20

Authentication & Authorization to LDAP Reporting Server LDAP Provider Reporting Server Console Directory type is automatically detected Appropriate defaults are automatically filled in to simplify configuration Test the provider

Authentication & Authorization to LDAP WebFOCUS Trusted Connection to the Reporting Server WebFOCUS Administration Console Simple one-click setting Reporting Server edaprint.log &FOCSECUSER &FOCSECGROUP

Authentication & Authorization to LDAP WebFOCUS Trusted Connection to the Reporting Server Administrator Maps the Value to a WebFOCUS Group Resource Templates Can Configure the Mapping Group DN or attribute value is mapped to WF group

Authentication & Authorization WebFOCUS External Authorization (to the RS) WebFOCUS Security Center WebFOCUS groups can be mapped to external groups Accounts for these users are automatically created when they first sign-in User description and email pulled from external directory

WebFOCUS Data Security Traditional Approach Rules in the MFD or Central DBAFILE Dynamic DBA Leverages MFD Profile Reads entitlements from file or Table 25

Wrap up Where can I find out more? Security is a very broad topic, and it can be as simple, or as complex as your requirements need it to be. This presentation was merely a taste, and did not get into many areas of security that we do support. The WebFOCUS security manual, in addition to several instructional videos, are available at https://techsupport.informationbuilders.com. These contain everything that was reviewed, and much, much more. We have resources that can help you from our education and professional services organization. If you need a hand, please contact your account representative to point you in the right direction. 26

Questions? 27