IBM Security SiteProtector System Two-Factor Authentication API Guide



Similar documents
IBM Security SiteProtector System Migration Utility Guide

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

Platform LSF Version 9 Release 1.2. Migrating on Windows SC

IBM Security QRadar Version Installing QRadar with a Bootable USB Flash-drive Technical Note

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

IBM Security QRadar Version (MR1) Checking the Integrity of Event and Flow Logs Technical Note

IBM Security QRadar Version (MR1) Replacing the SSL Certificate Technical Note

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment

IBM Enterprise Marketing Management. Domain Name Options for

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2

IBM Configuring Rational Insight and later for Rational Asset Manager

OS Deployment V2.0. User s Guide

IBM Cognos Controller Version New Features Guide

Patch Management for Red Hat Enterprise Linux. User s Guide

Tivoli Endpoint Manager for Configuration Management. User s Guide

IBM Lotus Protector for Mail Encryption. User's Guide

Tivoli Endpoint Manager for Security and Compliance Analytics

Installing on Windows

Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal

Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version First Edition (December 7, 2007)

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

IBM Connections Plug-In for Microsoft Outlook Installation Help

IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager

IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM

IBM Endpoint Manager. Security and Compliance Analytics Setup Guide

IBM Enterprise Marketing Management. Domain Name Options for

Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.

IBM Cloud Orchestrator Content Pack for OpenLDAP and Microsoft Active Directory Version 2.0. Content Pack for OpenLDAP and Microsoft Active Directory

IBM Security QRadar Version (MR1) Configuring Custom Notifications Technical Note

Getting Started With IBM Cúram Universal Access Entry Edition

Packet Capture Users Guide

IBM Security QRadar Version Common Ports Guide

IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide

IBM TRIRIGA Application Platform Version Reporting: Creating Cross-Tab Reports in BIRT

IBM Cognos Controller Version New Features Guide

Rational Build Forge. AutoExpurge System. Version7.1.2andlater

IBM Tivoli Web Response Monitor

IBM Client Security Solutions. Password Manager Version 1.4 User s Guide

Tivoli IBM Tivoli Monitoring for Transaction Performance

Active Directory Synchronization with Lotus ADSync

IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog

Linux. Managing security compliance

Remote Support Proxy Installation and User's Guide

Remote Control Tivoli Endpoint Manager - TRC User's Guide

Software Usage Analysis Version 1.3

IBM Client Security Solutions. Client Security User's Guide

IBM Lotus Protector for Mail Encryption

IBM XIV Management Tools Version 4.7. Release Notes IBM

IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration

Tivoli Security Compliance Manager. Version 5.1 April, Collector and Message Reference Addendum

Endpoint Manager for Mobile Devices Setup Guide

IBM VisualAge for Java,Version3.5. Remote Access to Tool API

IBM FileNet System Monitor FSM Event Integration Whitepaper SC

IBM SmartCloud Analytics - Log Analysis Version User's Guide

Cúram Business Intelligence and Analytics Guide

IBM Security QRadar Version (MR1) Installing QRadar 7.1 Using a Bootable USB Flash-Drive Technical Note

Power Management. User s Guide. User s Guide

IBM Lotus Protector for Mail Encryption

Requesting Access to IBM Director Agent on Windows Planning / Implementation

IBM TRIRIGA Application Platform Version 3 Release 4.1. Single Sign-On Setup User Guide

S/390 Virtual Image Facility for LINUX Guide and Reference

Sterling Supplier Portal. Overview Guide. DocumentationDate:9June2013

Implementing the End User Experience Monitoring Solution

CA Performance Center

IBM FlashSystem. SNMP Guide

IBM WebSphere Adapter for PeopleSoft Enterprise Quick Start Tutorials

z/os V1R11 Communications Server system management and monitoring

IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan

Reading multi-temperature data with Cúram SPMP Analytics

IBM Endpoint Manager Version 9.0. Patch Management for Red Hat Enterprise Linux User's Guide

IBM BigFix Version 9.2. Patch for CentOS User's Guide IBM

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide

Patch Management for Windows. User s Guide

IBM Enterprise Content Management Software Requirements

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

IBM XIV Provider for Microsoft Windows Volume Shadow Copy Service Version Release Notes

Release 7.1 Installation Guide

Strong Authentication for Microsoft SharePoint

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

StoneGate SSL VPN Technical Note Adding Bundled Certificates

Strong Authentication for Microsoft TS Web / RD Web

Tivoli Endpoint Manager for Software Distribution. User s Guide

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

CA Nimsoft Service Desk

IBM Tivoli Service Request Manager 7.1

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

HP Device Manager 4.7

Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal

IBM PowerSC Technical Overview IBM Redbooks Solution Guide

Rational Developer for IBM i (RDI) Distance Learning hands-on Labs IBM Rational Developer for i. Maintain an ILE RPG application using

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

XenClient Enterprise Synchronizer Installation Guide

IBM DB2 Data Archive Expert for z/os:

RSA Two Factor Authentication

Installing and using the webscurity webapp.secure client

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

IBM MaaS360 Mobile Device Management. Configuration Guide. Version 2 Release 1.1

Transcription:

IBM Security IBM Security SiteProtector System Two-Factor Authentication API Guide Version 2.9

Note Before using this information and the product it supports, read the information in Notices on page 13. This edition applies to Version 2.9 of the IBM Security SiteProtector System and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright IBM Corporation 1994, 2011. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Contents Technical support.......... v Overview.............. 1 RADIUS protocol plug-in.......... 1 Certificate and smart card authentication plug-in.. 3 User Principal Name with smart card plug-in... 4 LDAP with user password certificate plug-in... 5 LDAP without user password plug-in...... 7 Default password plug-in.......... 9 Using multiple plug-ins simultaneously..... 10 Encrypting sensitive property........ 10 Encrypting property.......... 10 Removing encrypted property....... 11 Notices.............. 13 Trademarks.............. 14 Copyright IBM Corp. 1994, 2011 iii

iv SiteProtector System: Two-Factor Authentication Guide

Technical support IBM Security provides technical support to customers who are entitled to receive support. The IBM Support Portal Before you contact IBM Security about a problem, see the IBM Support Portal at http://www.ibm.com/ software/support. The IBM Software Support Guide If you need to contact technical support, use the methods described in the IBM Software Support Guide at http://www14.software.ibm.com/webapp/set2/sas/f/handbook/home.html. The guide provides the following information: v Registration and eligibility requirements for receiving support v Customer support telephone numbers for the country in which you are located v Information you must gather before you call Copyright IBM Corp. 1994, 2011 v

vi SiteProtector System: Two-Factor Authentication Guide

Overview The IBM Security SiteProtector System two-factor authentication feature provides a plug-in interface that supports any authentication software you use. This document provides information for helping you determine the best authentication plug-in interface for your network, and provides sample code for creating your authentication.xml files. Important requirement To use this feature, you must create your own authentication XML file ( authentication.xml ) and place it in the SiteProtector Application Server\config directory. RADIUS and LDAP authentication SiteProtector two-factor authentication provides specific plug-in interfaces for RADIUS, Smart Card, and LDAP certificate authentication. Audience This document is intended for experienced Java developers. You must also have a working knowledge of SiteProtector. Restriction The SiteProtector two-factor authentication feature does not manage user credentials. Licensing agreement For licensing information on IBM Security products, download the IBM Licensing Agreement from http://www.ibm.com/services/us/iss/html/contracts_landing.html. Topics RADIUS protocol plug-in Certificate and smart card authentication plug-in on page 3 User Principal Name with smart card plug-in on page 4 LDAP with user password certificate plug-in on page 5 LDAP without user password plug-in on page 7 Default password plug-in on page 9 Using multiple plug-ins simultaneously on page 10 Encrypting sensitive property on page 10 RADIUS protocol plug-in The RADIUS token protocol allows the SiteProtector server to send user-entered information to another server for verification. Copyright IBM Corp. 1994, 2011 1

How SiteProtector works with RADIUS SiteProtector will display a second password field to the user on the Logon to Site window, and then package the information the user enters into a single request, as either a PAP or CHAP password attribute. SiteProtector relays the information package to the RADIUS authentication server, and the server then either grants or denies access to the user in its next message. SiteProtector treats any subsequent challenges issues by the RADIUS server as deny messages since SiteProtector cannot request more information from the user. Message-Authenticator attributes sign outgoing messages, and incoming messages with the field are verified, although this verification is not required. Details The following table provides the detail descriptions for the RADIUS authentication plugin. Detail Default Description server none Address or name of the server to send RADIUS packets to. port 1812 Port to send RADIUS packets to. sharedsecret none The RADIUS shared secret between the SiteProtector Application Server and the authentication server. passwordencryption PAP Can be PAP or CHAP. This is the way the password/token will be encoded in RADIUS packets. username none If the user s name must be modified from how it was typed for the RADIUS server to accept it, make a template here. %USER% and %DOMAIN% will be filled in with the appropriate data. Default is not to do anything. Example: %USER%@%DOMAIN %.com timeout 3000 The number of milliseconds to wait for a response before retrying a send or quitting. Increase if RADIUS server is frequently overloaded or is far away. retries 2 RADIUS packets run on UDP and can be dropped from the network. Two retries means three total attempts before rejecting the authentication. Example code Use the code in the example below to set up a RADIUS authentication.xml file on your system. 2 SiteProtector System: Two-Factor Authentication Guide

<?xmlversion="1.0" encoding="utf-8"?> <SiteProtectorAuthentication> <AuthenticationConfiguration> <name>radius Token Authentication</name> <!-- Make sure to remove line breaks added by page formatting --> <type>net.iss.rssp.security.auth.plugin.radiusauthenticationplugin</type> <primary>true</primary> <message>log in using your PIN plus the value on your token.</message> <permissions> <ALLUSERS/> </permissions> <detail attribute="server" value="radius_server_name_or_address"/> <!-- see your property encryption documentation for information about how to enter sharedsecret value --> <detail attribute="sharedsecret"> <encrypted-file>authentication_propertiesencrypted-file></encrypted-file> <keyname>radius.sharedsecret</keyname> </detail> <detail attribute="passwordencryption" value="pap"/> <detail attribute="username" value="%domain%\%user%"/> <detail attribute="timeout" value="3000"/> <detail attribute="retries" value="2"/> <!-- fields 0 (username) and 1 (password) are inferred when parsing the file, they can be manually defined in order to change the prompt --> <field id="2" type="password" prompt="token"/> </AuthenticationConfiguration> </SiteProtectorAuthentication> Certificate and smart card authentication plug-in SiteProtector can be configured to verify that a user has a private key, which corresponds to a public certificate that is also submitted with the login attempt. SiteProtector can allow a user to select a private key from a certificate store or from a smart card. The SiteProtector server generates a random challenge that the client signs and returns with the public certificate. How the plug-in is chosen The plug-in for certificate and smart card authentication is chosen based on the way the certificate-to-user name mapping should be done. v For LDAP, a Windows domain controller can be used, and may possibly contain the certificate mappings already. v If the controller does not contain the certificate mappings, then a new directory can be created and the certificates can be manually imported into it. Overview 3

Smart card PKCS#11 library requirement The smart card log in procedure requires additional configuration on the SiteProtector Console. The Console must have the filename of a properly configured PKCS#11 library. This PKCS#11 library is provided by the hardware vendor and may be different for each Console. Online Certificate Status Protocol Any of the protocols that use certificates can use the Online Certificate Status Protocol (OCSP). You can choose whether you want to use OCSP or a Certificate Revocation List (CRL) to authenticate a certificate. One significant difference between the two protocols is that OCSP is enabled on a global basis whereas CRL can be used on a case-by-case basis. When OCSP is (globally) enabled, it gets the URL of the OCSP server (also called the OCSP responder) from the certificate. The OCSP responder is queried to determine the revocation status of the certificate embedded in the Smart Card. Depending on how the OCSP responder is configured, you may need to explicitly add the responder's certificate to either the certificateauthority or usecacerts keystores, both of which hold trusted certificates. If the response from the OCSP responder contains the responder's certificate, you don't need to explicitly add a certificate for the responder to the certificateauthority keystore or the usecacerts keystore. Only the public certificate from the smart card, and any certificates that are found in the intermediatecertificates keystore that compose the chain of issued certificates -- from the smart card's public certificate through to a trusted certificate -- are verified using OCSP. Trusted certificates are not checked for revocation. Use Java's keytool in the Java bin folder to load the certificates into a file (and/or specify the use of the default IBM JRE CACerts keystore that is found in %JAVA_DIR%/jre/lib/security.) User Principal Name with smart card plug-in The User Principal Name (UPN) with Smart Card authentication plug-in requires the user to log in using a smart card that contains a certificate that in turn contains the UPN login name (username) within the SubjectAlternativeName field. How SiteProtector works with UPN with smart card The username (also known as the User Principal Name or UPN) is embedded within the certificate (in the SubjectAlternativeName field) contained on the Smart Card. The SiteProtector Console sends the certificate, along with the extracted username, to the Application server for authentication. If the Online Certificate Status Protocol (OCSP) is globally enabled, this process uses OCSP to determine if a certificate is valid. Use Java's keytool in the Java bin folder to load the certificates into a file (and/or specify the use of the default IBM JRE CACerts keystore that is found in %JAVA_DIR%/jre/lib/security.) Details The following table provides the detail descriptions for the User Principal Name (UPN) with Smart Card authentication plug-in. Detail certificateauthority Description The full path to a JKS keystore that has the certificate authorities that are trusted to issue certificates with User Principal Names. 4 SiteProtector System: Two-Factor Authentication Guide

Detail intermediatecertificates certificaterevocationlist usecacerts Description The full path to a JKS keystore that has the certificates that are not trusted but are necessary to build a path from a leaf certificate to a trusted certificate. URL to the certificate authority's Certificate Revocation List (CRL). This is optional, but recommended unless usernames are always changed when keys are compromised. Note: If you are using OCSP or CRLDP to perform your certificate authentication, then it is not necessary to specify a CRL. Use the default IBM JRE CACerts keystore (in addition to any specified by the certificateauthority detail) as a source of trusted certificates. The CACerts keystore contains the most common and well-known certificate authorities. If both certificateauthority and usecacerts are used, their contents are combined for the purposes of authentication. Example code Use the code in the example below to set up User Principal Name (UPN) with Smart Card authentication XML file on your system. <?xmlversion="1.0" encoding="utf-8"?> <SiteProtectorAuthentication> <AuthenticationConfiguration> <name> UPN from Smartcard</name> <type>net.iss.rssp.security.auth.plugin.upncertificateplugin</type> <primary>false</primary> <message>log in using your smart card. Requires that public certificate have a valid chain to a trusted certificate authority within the domain and that the certificate includes the UserPrincipalName</message> <!--Sign random data when submitting login dialog--> <challenge>sponsubmit</challenge> <!--There is no NT username/password to check--> <donotcheckpassword/> <permissions> <ALLUSERS> </permissions> <!--Client should provide certificate when logging in--> <field id="0" type="certificate" prompt="key"/> <detail attribute="usecacerts" value="true"/> <detail attribute="certificateauthority" value="c:\\program Files\\ISS\\SiteProtector\\Application Server\\smartcard_login_CAs"/> <detail attribute="intermediatecertificates" value="c:\\program Files\\ISS\\SiteProtector\\Application Server\\intermediateCerts"/> <detail attribute="certificaterevocationlist" value="http://[certificate_services_machine]/certenroll/ [domain_name].crl"/> </AuthenticationConfiguration> </SiteProtectorAuthentication> LDAP with user password certificate plug-in The LDAP with user password plug-in requires the user to log in using both his username and password, and also requires the certificate or smart card. Overview 5

How SiteProtector works with LDAP SiteProtector searches the configured directory for certificates that are associated with the user. If any certificates successfully validate the signature for the challenge provided, then the authentication is successful. If a certificate s signature is updated, or the certificate is otherwise altered, but the key has not changed from the certificate enrolled in the directory, then this authentication mechanism will continue to work. Details The following table provides the detail descriptions for the LDAP with user password certificate authentication plug-in. Detail Default Description server none The URL of the LDAP or AD server, including ldap:// or ldaps://, port number, and the part of the directory needed to log in to. Examples: ldap://servername:389/ dc=testsite,dc=com ldaps://secure:636/dc=testsite, dc=com authtype simple How to authenticate to the LDAP server. Can be simple (clear-text password) or other SASL types, such as DIGEST-MD5 or GSSAPI. username ANONYMOUS Username for authentication to LDAP server. For AD use domain\username unless it is only an LDAP login account. password none Password for authentication to LDAP server. searchfield userprincipalname Attribute to match username to. searchtemplate %USER%@%DOMAIN% A username will usually need to be formatted in a different way to match correctly. Create a template here. Examples: %USER%@%DOMAIN%.com %USER%@testsite.com certattribute usercertificate The attribute in LDAP where the valid certificates for the user object are stored. searchlocation CN=Users Where to search in the LDAP tree. referral follow Tell LDAP server that referrals can be followed. 6 SiteProtector System: Two-Factor Authentication Guide

Example code Use the code in the example below to set up LDAP with user password certificate authentication XML file on your system. <?xmlversion="1.0" encoding="utf-8"?> <SiteProtectorAuthentication> <AuthenticationConfiguration> <name>smartcard<</name> <type>net.iss.rssp.security.auth.plugin.ldapcertificateplugin</type> <primary>false</primary> <!-- Make sure to remove line breaks added by page formatting --> <message>log in using your smart card. This will not work if you haven t yet configured your PKCS#11 dll.</message> <challenge>sponsubmit</challenge> <permissions> <ALLUSERS/> </permissions> <!-- details on how to find and log into the LDAP/AD server --> <detail attribute="server" value="ldap://domain_controller:389/dc=domain,dc=net"/> <detail attribute="authtype" value="simple"/> <detail attribute="username" value="cn=adamuser,ou=adamusers,ou=test,dc=domain,dc=net"/> <detail attribute="password" value="password"/> <detail attribute="referral" value="follow"/> <!-- details on how to query for known good certificates for the user --> <detail attribute="searchfield" value="userprincipalname"/> <detail attribute="searchtemplate" value="%user%@%domain%.net"/> <detail attribute="certattribute" value="usercertificate"/> <detail attribute="searchlocation" value="cn=users"/> <!-- Fields 0 and 1 contain username and password by default, additionally select a certificate --> <field id="2" type="certificate" prompt="key"/> </AuthenticationConfiguration> </SiteProtectorAuthentication> LDAP without user password plug-in This plug-in uses only the certificate or smart card. SiteProtector searches the configured directory for the user that the certificate belongs to. The certificate is not examined by SiteProtector and is passed to the directory in binary/serialized form. If the directory responds with a user associated with the certificate, the login proceeds with that user. Overview 7

Details The following table provides the detail descriptions for the LDAP authentication plug-in. Detail Default Description server none The URL of the LDAP or AD server, including ldap:// or ldaps://, port number, and the part of the directory needed to log in to. Examples: ldap://servername:389/ dc=testsite,dc=com ldaps://secure:636/dc=testsite, dc=com authtype simple How to authenticate to the LDAP server. Can be simple (clear-text password) or other SASL types, such as DIGEST-MD5 or GSSAPI. username ANONYMOUS Username for authentication to LDAP server. For AD use domain\username unless it is only an LDAP login account. password none Password for authentication to LDAP server. sidfield objectsid Attribute where the SID is stored. Default probably works. certattribute usercertificate The attribute to match the certificate with. searchlocation CN=Users Where to search in the LDAP tree. referral follow Tell LDAP server that referrals can be followed. Example code Use the code in the example below to set up the LDAP without user password authentication.xml file on your system. <?xmlversion="1.0" encoding="utf-8"?> <SiteProtectorAuthentication> <AuthenticationConfiguration> <name>smartcard<</name> <type>net.iss.rssp.security.auth.plugin.ldapcertificateonlyplugin</type> <primary>false</primary> <!-- Make sure to remove line breaks added by page formatting --> <message>use only the certificate to log in. Server will look for username mappings.</message> <challenge>sponsubmit</challenge> <donotcheckpassword/> <permissions> <ALLUSERS/> </permissions> 8 SiteProtector System: Two-Factor Authentication Guide

<!-- details on where to find and log into LDAP/AD server --> <!-- ldaps uses ssl, add ldap server's certificate to ISS\JRE1.6.0_03\lib\security\cacerts --> <detail attribute="server" value="ldaps://domain_controller/dc=domain,dc=net"/> <detail attribute="authtype" value="simple"/> <detail attribute="username" value="domain\username"/> <detail attribute="password" value="password"/> <detail attribute="referral" value="follow"/> <!-- details on how to query for the username, using the full binary certificate --> <detail attribute="sidfield" value="objectsid"/> <detail attribute="certattribute" value="usercertificate"/> <detail attribute="searchlocation" value="cn=users"/> <field id="2" type="certificate" prompt="key"/> </AuthenticationConfiguration> </SiteProtectorAuthentication> Default password plug-in SiteProtector comes with a default password plug-in that allows users to log in without entering a second authentication factor. You may decide to allow some users to access SiteProtector using only a password in case the external RADIUS or LDAP server is unavailable or configured incorrectly in some way. If a user that is not enrolled in an authentication mechanism requires access to SiteProtector, the user s username or group can be added here for normal password access. Example code Use the code in the example below to set up the default password authentication.xml file on your system. <?xmlversion="1.0" encoding="utf-8"?> <SiteProtectorAuthentication> <AuthenticationConfiguration> <name>default Password</name> <type>net.iss.rssp.security.auth.plugin.passwordplugin</type> <primary>false</primary> <message>log in using your username and password. Not everyone can use this method.</message> <!-- Only the following users may log in using single factor username/password authentication --> <permissions> <spgroup>administrator</spgroup> <ntgroup>anntusergroup</ntgroup> <user>username exactly as you log-in here</user> </permissions> </AuthenticationConfiguration> </SiteProtectorAuthentication> Overview 9

Using multiple plug-ins simultaneously You can configure multiple plug-ins to work at the same time. You can include any number of <AuthenticationConfiguration> entries in a single SiteProtector authentication.xml file. Your users can select among them on the Console's login dialog window. Example code In this example, both Smart card login and Steve has no smart card are included, which means that only the user Steve will be able to authenticate without using a smart card: <?xmlversion="1.0" encoding="utf-8"?> <SiteProtectorAuthentication> <AuthenticationConfiguration> <name>smart card login</name> <permissions> <ALLUSERS/> </permissions> </AuthenticationConfiguration> <AuthenticationConfiguration> <name>steve has no smart card</name> <permissions> <user>steve</user> </permissions> </AuthenticationConfiguration> </SiteProtectorAuthentication> Encrypting sensitive property This topic describes how to encrypt property and remove an encrypted property from the system. About this task SiteProtector two-factor authentication supports the encrypting of details about the configuration so that sensitive information, such as LDAP passwords or RADIUS shared secrets, is not stored directly in the filesystem, where it could be viewed easily or unintentionally cataloged. Encrypting property Procedure 1. Create a blank target file, or use a file that is already being used for this purpose. 2. Open a command prompt to Program Files\ISS\SiteProtector\Application Server\bin. 3. Enter the command Run "ccengine.bat -encryptproperty <filename> <keyname> <value>" where filename is the file to put the property in, and keyname is an identifier that will be used to find the property. Important: v Double-check to be sure the filename file exists. v The file you create must go in the \CONFIG directory, unless you are using the absolute path in the authentication.xml file. Note: You can use any keyname, but make sure you remember it. This name will go in the keyname attribute of the authentication.xml file to help find the value. 10 SiteProtector System: Two-Factor Authentication Guide

Note: The value is what should be passed to the authentication plug-in. This value would have appeared in the value attribute of the authentication.xml file, but now it does not have to. 4. In the authentication.xml file, change the following: <detail attribute= attribute value= value > To <detail attribute= attribute encrypted-file= filename keyname= keyname > Removing encrypted property Procedure To remove an encrypted property from the system, do one of the following: v To remove the property entirely, delete the file that contains the encrypted property. v To remove individual properties without losing everything from the file, use this command: Run: ccengine.bat -encryptproperty <filename> <keyname> Overview 11

12 SiteProtector System: Two-Factor Authentication Guide

Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: Intellectual Property Licensing Legal and Intellectual Property Law IBM Japan Ltd. 1623-14, Shimotsuruma, Yamato-shi Kanagawa 242-8502 Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Copyright IBM Corp. 1994, 2011 13

Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation SiteProtector Project Management C55A/74KB 6303 Barfield Rd., Atlanta, GA 30328 U.S.A Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent agreement between us. All statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at Copyright and trademark information at Copyright and trademark information at www.ibm.com/ legal/copytrade.shtml. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. 14 SiteProtector System: Two-Factor Authentication Guide

Printed in USA