IONA Security Platform



Similar documents
Single Sign On In A CORBA-Based

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features

CTS2134 Introduction to Networking. Module Network Security

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Introduction to the EIS Guide

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.1

Agenda. How to configure

Oracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

A Guide to New Features in Propalms OneGate 4.0

INTRODUCTION TO FIREWALL SECURITY

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

WebSphere Training Outline

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

GlobalSCAPE DMZ Gateway, v1. User Guide

Proxies. Chapter 4. Network & Security Gildas Avoine

IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>

DMZ Network Visibility with Wireshark June 15, 2010

Configuring Security Features of Session Recording

Web Application Firewall

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

DMZ Gateways: Secret Weapons for Data Security

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations

enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards

Xerox SMart esolutions. Security White Paper

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Oracle Database Security and Audit

Angel Dichev RIG, SAP Labs

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Installation and configuration guide

Crawl Proxy Installation and Configuration Guide

IBM Managed Security Services Vulnerability Scanning:

FIREWALL POLICY DOCUMENT

SonicWALL PCI 1.1 Implementation Guide

How To Protect Your Network From Attack

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Achieving PCI Compliance Using F5 Products

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Overview - Using ADAMS With a Firewall

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Overview - Using ADAMS With a Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Chapter 11 Cloud Application Development

Building A Secure Microsoft Exchange Continuity Appliance

Network Security and Firewall 1

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Configuration Guide BES12. Version 12.3

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Chapter 9 Firewalls and Intrusion Prevention Systems

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?

Secure web transactions system

Administering the Web Server (IIS) Role of Windows Server

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

The Enterprise Service Bus

Chapter 17. Transport-Level Security

PROFESSIONAL SECURITY SYSTEMS

APIs The Next Hacker Target Or a Business and Security Opportunity?

Last Updated: July STATISTICA Enterprise Server Security

The Bomgar Appliance in the Network

Computer and Network Security Exercise no. 4

How To Protect A Network From Attack From A Hacker (Hbss)

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Administering the Web Server (IIS) Role of Windows Server

Overview. SSL Cryptography Overview CHAPTER 1

Owner of the content within this article is Written by Marc Grote

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Setup Guide Access Manager 3.2 SP3

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Installation and configuration guide

12. Firewalls Content

March PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

FIREWALL POLICY November 2006 TNS POL - 008

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

Prerequisites Guide for ios

GlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Intro to Firewalls. Summary

Strategic Information Security. Attacking and Defending Web Services

StreamServe Persuasion SP5 StreamStudio

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Firewall Environments. Name

Release Version 4.1 The 2X Software Server Based Computing Guide

Introduction to Mobile Access Gateway Installation

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Transcription:

IONA Security Platform February 22, 2002 Igor Balabine, PhD IONA Security Architect Copyright IONA Technologies 2001 End 2 Anywhere

Agenda IONA Security Platform (isp) architecture Integrating with Enterprise security services and administration isp adapter internals Protecting Web Services Q&A Copyright IONA Technologies 2001 End 2 Anywhere 2

isp Architecture Copyright IONA Technologies 2001 End 2 Anywhere

Why A Security Platform? IONA Security Platform (isp): allows to insulate applications from the diverse and changing enterprise security infrastructures. provides a uniform standards based approach to communicating security related requests across the enterprise. provides applications a single access point to multiple security services such as authentication, authorization and PKI. isp binds IONA products with any enterprise security infrastructure via development of a custom adapter! Copyright IONA Technologies 2001 End 2 Anywhere 4

isp Architecture Request/Response messages over IIOP/http(s)/RMI: support for distributed and colocated deployments JART Application App isp Adapter IONA Security Service (is2) isp ESS Adapter Native API calls: no changes in the application code! Native API example: EJBContext.getCallerPrincipal() EJBContext.isCallerInRole() Enterprise Security System (ESS) Third party security system native protocol Copyright IONA Technologies 2001 End 2 Anywhere 5

IONA Security Service (is2) IONA Security Service (is2): Is a servlet running in JART or in any standard application server. Uses a very simple flow: receives a request message determines the request type from the message content loads an appropriate protocol specific module (if the module is not loaded yet) dispatches message content to protocol specific module. In short: is2 is a scaleable (intelligent) dispatcher! is2 is isp s focal point but not a bottleneck! Copyright IONA Technologies 2001 End 2 Anywhere 6

Integration With Enterprise Security Services And Administration Copyright IONA Technologies 2001 End 2 Anywhere

AuthN and AuthZ Services Authentication and authorization services are supported via is2 adapters. Internal protocol: SAML satisfies purposes and allows extensibility. Could be easily replaced if necessary: internal interface is generic. Supported authorization models: coarse grain RBAC (J2EE, Web Services), fine grain DAC (CORBASEC, B2Bi). SAML protocol allows communicating arbitrary security assertions between applications and is2! Copyright IONA Technologies 2001 End 2 Anywhere 8

PKI Services PKI services are supported via is2 adapters. Internal language: XKMS powerful and extensible. Endorsed by industry leaders (Verisign, Entrust, MSFT). Initial use: integration with certificate stores. Advanced use: validation services. Many PKI vendors are expected to adopt XKMS: is2 PKI adapter becomes a pass through! Copyright IONA Technologies 2001 End 2 Anywhere 9

isp At Work CORBA or Web Application Product specific adapter IONA C/C++ SAML/XKMS Library IIOP Interface Product specific adapter IONA Java SAML/XKMS Library http/https Interface Product specific interface example: EJBContext.getCallerPrincipal() EJBContext.isCallerInRole() 3 rd party A2 system adapter: Netegrity, Windows Domain, LDAP, Evidian, etc. To Au+Az system CSI v.2/saml Mapper IONA Security Server (is2) SAML/A2 adapter A2 System Adapter XKMS/PKI adapter JART PKI System Adapter 3 rd party PKI system adapter: Entrust Authority, Baltimore, Verisign, etc. To PKI system Copyright IONA Technologies 2001 End 2 Anywhere 10

isp Administration Solutions integrated with 3 rd party systems are managed using native administrative tools, e.g. SiteMinder console for an enterprise which uses Netegrity SiteMinder IONA applications use isp authorization models (RBAC, DAC) class libraries to manage native authorization policies via IONA Administrator isp Auditing Component provides logs in a standard format (syslog) easily consumable by event monitoring systems. isp offloads administrative tasks to 3 rd party tools where possible and provides components to manage custom security information! Copyright IONA Technologies 2001 End 2 Anywhere 11

isp Adapter internals Copyright IONA Technologies 2001 End 2 Anywhere

Application Adapter Architecture Support for message formatting and transport Application specific interface is2 Bindings Library Product specific service adapter Protocol Library (isaml, ixkms) Copyright IONA Technologies 2001 End 2 Anywhere 13

is2 Plug-In Modules is2 Message over http(s)/iiop/rmi Verifies and decrypts protected is2 messages and dispatches to the appropriate plug-in adapter based on the message type. IONA Security Service is2 Plug-in Module SPI JART or App Server Converts is2 message into a Java object is2 Java object mapper Native Service Protocol Communicates with Enterprise Security Service Copyright IONA Technologies 2001 End 2 Anywhere 14

Protecting Web Services Copyright IONA Technologies 2001 End 2 Anywhere

Typical Secure Deployment Internal Application Firewall Proxy servlet Web Service Firewall Intranet Secondary protocol connection (IIOP, SSH, FTP, etc.) DMZ Incoming http/https connection Copyright IONA Technologies 2001 End 2 Anywhere 16

Problems With Traditional Deployment Internal firewall has to be opened for secondary IIOP connections: nothing prevents the attacker from penetrating internal firewall using the secondary protocol! Same problem with SSH especially after discovery of a weakness in the SSH protocol (short byte sequences e.g. key strokes - allow to recover session key). FTP client and server in the active mode open listening ports and require a hole in the firewall. FTP client and server in the passive mode suffer from the server side PASV exploits ( Pizza Thief : rogue client connects to a newly opened port) and from port number substitution exploits by rogue servers (see http://www.securiteam.com/exploits/5yp0e000hg.html). Traditional deployment exposes internal hosts to potentially hostile DMZ environment! Copyright IONA Technologies 2001 End 2 Anywhere 17

Deployment With IONA Secure Gateway (isg) Internal Application Web Service IONA GW Backend Firewall XML Validation Identity servlet IONA GW Frontend Web Server Firewall Intranet DMZ Internet http/https connection Pool of outbound https connections Incoming http/https connection Copyright IONA Technologies 2001 End 2 Anywhere 18

isg At Work req (RES) 6 IONA GW Backend Web Server Firewall Web Server Firewall 5 RES REQ* 4 7 REQ RES 2 Web Service XML Validation Identity servlet IONA GW Frontend req ( ) 1 res (REQ*) 3 Intranet DMZ Internet Copyright IONA Technologies 2001 End 2 Anywhere 19

isg Benefits The internal firewall is closed to all inbound traffic. HTTP headers of the inbound messages are parsed and filtered in the DMZ preventing buffer overflow attacks (e.g. CodeRed Worm, Nimda) on the Intranet machine running Web Service. Message headers and content could be scanned for viruses and attack signatures by virus and IDS plugins. Incoming messages on the DMZ machine are never written to the disk. There are no inbound connections through the Internal firewall! Copyright IONA Technologies 2001 End 2 Anywhere 20

More isg Benefits isg scales linearly and could be deployed in n:m configuration. Computationally intensive SSL handshake is offloaded to machines in the DMZ. SSL connections between the Internal Gateway machine and machine in the DMZ could be authenticated using certificates issued by a private CA. isg offloads computationally intensive cryptographic computations from internal application servers! Copyright IONA Technologies 2001 End 2 Anywhere 21

Conclusion IONA Security Platform (isp) provides applications a robust integration layer with Enterprise wide security services. isp architecture is flexible and allows integration with diverse security solutions. isp covers such important aspects of security as network protection, authentication, authorization and PKI services. Copyright IONA Technologies 2001 End 2 Anywhere 22

Q&A Copyright IONA Technologies 2001 End 2 Anywhere