Centralized Oracle Database Authentication and Authorization in a Directory



Similar documents
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

Integrating OID/SSO with E- Business Suite and Third-Party SSO Solutions. Presented by Paul Jackson (Norman Leach)

Oracle Enterprise Manager 12c

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

5 Day Imprivata Certification Course Agenda

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Security Provider Integration Kerberos Server

Integrating OID with Active Directory and WNA

Enterprise Identity Management Reference Architecture

Microsoft Active Directory and Windows Security Integration with Oracle Database

To integrate Oracle Application Server with Active Directory follow these steps.

Mod 2: User Management

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Remote Authentication and Single Sign-on Support in Tk20

Single Sign-on (SSO) technologies for the Domino Web Server

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Red Hat Enterprise ipa

Configuring Sponsor Authentication

Oracle Identity Manager, Oracle Internet Directory

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support

External and Federated Identities on the Web

Oracle Fusion Middleware 11g Release 1 IDM Suite

Server-based Password Synchronization: Managing Multiple Passwords

OracleAS Identity Management Solving Real World Problems

TIBCO Spotfire Platform IT Brief

Novell to Microsoft Conversion: Identity Management Design & Plan

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

An Oracle White Paper March Integrating Microsoft SharePoint Server With Oracle Virtual Directory

Creating a Single Sign on Web Portal using Azure. Robert Crane Office 365

Setting Up Your Team-SQL Database for ORACLE 8.05

Open Source Identity Management

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

Vyom SSO-Edge: Single Sign-On for BMC Remedy

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Secret Server Qualys Integration Guide

Centrify Cloud Connector Deployment Guide

Trust but Verify: Best Practices for Monitoring Privileged Users

SAML-Based SSO Solution

Centralized Self-service Password Reset: From the Web and Windows Desktop

Working with Structured Data in Microsoft Office SharePoint Server 2007 (Part1): Configuring Single Sign On Service and Database

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Authentication Methods

Identity Management and Single Sign-On

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

CA SiteMinder SSO Agents for ERP Systems

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Configuring User Identification via Active Directory

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO)

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

MySQL Security: Best Practices

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

OneLogin Integration User Guide

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Cloud Services ADM. Agent Deployment Guide

How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros

Integrating Webalo with LDAP or Active Directory

VMware Identity Manager Administration

Using YSU Password Self-Service

Oracle E-Business Suite Single Sign On Using Oracle Access Manager

From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen

External Authentication with WebCT. What We ll Discuss

Installation Troubleshooting Guide

PRiSM Security. Configuration and considerations

NetIQ Identity Manager Setup Guide

Oracle Database Security and Audit

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Secure the Web: OpenSSO

OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

Protected Trust Directory Sync Guide

<Insert Picture Here> Oracle Identity And Access Management

Single Sign On. SSO & ID Management for Web and Mobile Applications

Installing, Configuring, and Managing a Microsoft Active Directory

Virtual Code Authentication User s Guide. June 25, 2015

Single Sign-On Architectures. Jan De Clercq Security Consultant HPCI Technology Leadership Group Hewlett-Packard

Integrated Approach to User Account Management

DIGIPASS Authentication for GajShield GS Series

User Roles & Adding Domains & Users

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

User Management Tool 1.5

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

CA Performance Center

Implementing Oracle Enterprise User Security

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting

Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory

Active Directory Management. Agent Deployment Guide

These requirements led to several challenges in deploying identity related applications within the enterprise:

Securing Data in Oracle Database 12c

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

Transcription:

Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager, Security Consulting 1

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 2

Agenda Problem Definition Enterprise Directory Overview and benefits Enterprise Directory Deployment Architectures Enterprise Directory Technical Deep Dive Demo 3

The Problem Each Database is an island. Users are managed separately in each database. 4

The Problem Problem Definition EUS Overview and benefits EUS Deployment Architectures EUS Technical Deep Dive Demo 5

The Cost User Productivity multiple database login names and passwords to remember No self-service capability for password reset Database Administrator time DBAs manage the same user many times Audit & Compliance Each database must be examined individually to find out who has which privileges Security Hard to ensure user access to all databases is removed Ensuring passwords meet complexity/change requirements is difficult 6

The Answer Centralized User Management Define users in one place Assign a user s privileges in one place Delegate database user management to the help desk Control user s passwords through a common identity store such as your corporate Directory 7

Standard Database Users Database Users are managed in each database. A user has multiple database login names/passwords to remember. 8

Centralized Database Users Oracle Directory Services Each person has one username/password for ALL databases. Directory identities are mapped to database schemas. Directory groups are mapped to database roles. 9

10

Managing Enterprise Authentiction User Authentication Stores Active Directory Oracle Internet Directory Oracle Directory Server Enterprise Edition (Sun) Oracle Virtual Directory LDAP V3 Compliant Directory Kerberos (ASO) Radius (ASO) X.509 (ASO) 11

Managing Enterprise User Privileges Enterprise User Security Database Roles System Privileges Object Privileges. 12

Enterprise User Security Centralized Directory Architectural Options There are Five ways to integrate your Oracle Databases with your corporate Directory 1. Synchronization 2. Virtualization 3. Chaining 4. Split-Configuration 5. Kerberos (may be used standalone or combined with any of the above options) Each method has its advantages, each has its disadvantages 13

Centralized Directory Identity Architecture Option 1: Synchronization Database Client (AUTHN) SqlPlus, Java, etc Map Users, Schema, Roles SYNC (DIP) Pros Works with 9i databases as well as current versions No schema changes made to Active Directory No additional data added to Active Directory Cons Must synchronize data between Active Directory and Internet Directory (including passwords). Must maintain that synchronization. Requires AD agent (oidpwdcn.dll) on all domain controllers to capture passwords. 14

Centralized Directory Identity Architecture Option 2: Virtualization Database Client OVD SqlPlus, Java, etc (AUTHN) Map Users, Schema, Roles Hash Pwd Groups Oracle Context Metadata (AD schema change) Pros No need to maintain a separate directory server All data maintained in one place Cons Will not work with Oracle 9i Significant schema changes to Active Directory for metadata Need AD Password agent (oidpwdcn.dll) DBAs seldom have update privileges in Active Directory 15

Centralized Directory Identity Architecture Option 3: Chaining / Leverage External Directory Database Client AuthN OID Hash Pwd Groups SqlPlus, Java, etc Map Users, Schema, Roles Oracle Context Metadata Pros No additional data in AD Minimal schema changes to AD (one attribute: orclcommonattribute) DBAs maintain metadata, AD admins maintain users Roles may be maintained in AD or OID Cons Will not work with 9i DBs Must maintain another directory server Limited to a single Active Directory domain 16

Centralized Directory Identity Architecture Option 4: Split-Configuration Database Client OVD Hashed Pwd Groups AuthN SqlPlus, Java, etc Map Users, Schema, Roles Pros No additional data added to AD Minimal schema changes to AD (one attribute: orclcommonattribute) DBAs maintain metadata, AD admins maintain users Supports multiple AD domains Cons Oracle Context Metadata Will not work with 9i DBs Must maintain another directory server Need AD agent (oidpwdcn.dll) 17

Centralized Directory Identity Architecture Kerberos Authenticated Database Users User obtains Kerberos ticket from Domain Controller Database validates the Kerberos Ticket with the Domain Controller User sends Kerberos ticket to database Enterprise and/or local Users are authenticated by Kerberos tickets issued by MS Domain Controllers instead of passwords. Pros Single Sign-On with Windows desktop No password synchronization requirements Cons May not work with all clients Requires additional client configuration (sqlnet.ora) 18

Centralized Directory Logical Architecture Base Case User Authentication 19

Declare Users in Database Enterprise User EUS Global User Creation SQL (1=1 dedicated schema) CREATE USER username IDENTIFIED GLOBALLY AS <DN of directory user entry> ; When you connect to database you use your Active Directory Credentials to login Eliminates management of passwords for users All privileges and capabilities are still managed in database. 20

Connect With Userid and Password Authentication only Connect : username@database_service_name Enter password: User Info Only 21

Declare Enterprise Global Users in Database Multiple users are mapped to a shared DB schema EUS Global User Creation SQL (N=1 shared schema) CREATE USER username IDENTIFIED GLOBALLY; When you connect to a database you use your Active Directory credentials to login but you are connected to a global user account. Multiple users will be mapped to this same account. Eliminates management of passwords for users All privileges and capabilities are mapped to groups in the directory 22

Connect to Enterprise User Security Authentication and Authorization Connect : username@database_service_name Enter password: User, Role and Privilege Info 23

Current Database Environments without Enterprise User Security Databases DBA s must perform these tasks on every database: Set password policies Create users and passwords Reset passwords Manage roles and privileges Assign roles and privileges to users 24

Impact of using Enterprise User Security and Shared Schemas DBA Work Item Current EUS Password Changes 200 Databases x 200 Users x 4 (quarterly) Create New Users 200 Databases x 20 (10% yearly turnover) Delete Old Users 200 Databases x 20 (10% yearly turnover) Assign Privileges 200 Databases x 20 (10% yearly turnover) 160,000 0 4,000 0 4,000 0 4,000 **800 **** Total **** 172,000 800 ** Each user was in 5 databases 25

Enterprise User Security Assignment of Oracle DB Roles by Directory Groups 26

Enterprise User Security Assignment of Oracle DB Roles by Directory Groups 27

Enterprise User Security Assignment of Oracle DB Roles by Directory Groups 28

Enterprise User Security -Demo Architecture Oracle DB, Oracle Virtual Directory and Active Directory AD used for authentication and group information AD used for metadata - Global Users and Roles EUS used to map database users and roles to user and groups in AD. 29

Enterprise User Security Demo Existing DB Users not affected Flag bad userids/passwords using Active Directory Log into DB based on AD credentials and groups Show user is mapped to a global user in Oracle Show roles assigned to user in Oracle Show audit log to verify external authentication in Oracle Walk through EUS administrative screens Create new EUS enterprise role and map to an AD Group 30

Informational Resources There are a number of resources that are available to gain a better understanding of Oracle's Enterprise User Security. I've included references to them below Oracle Database Enterprise User Security A practical example: http://collaborate10.ioug.org/portals/1/attendee/2009_gordhamer.doc Directory Services Integraion with Database Enterprise User Security: http://www.oracle.com/technetwork/database/focus-areas/security/dirsrv-eusintegration-133371.pdf How to set up Enterprise User Security with Oracle Virtual Directory and Oracle Directory Server Enterprise Edition: http://www.oracle.com/technetwork/middleware/id-mgmt/learnmore/ovd-dsee-eus- 085224.html Oracle's Documentation: Enterprise User Security Administration: http://docs.oracle.com/cd/e11882_01/network.112/e10744.pdf Oracle Documentation: Database: http://www.oracle.com/technetwork/indexes/documentation/index.html 31

32