BSA Best Practices Webinars Role Based Access Control Sean Berry Customer Engineering



Similar documents
App Orchestration 2.5

Websense Support Webinar: Questions and Answers

App Orchestration 2.0

Centrify Cloud Connector Deployment Guide

Active Directory Integration

Managing User Accounts

Camilyo APS package by Techno Mango Service Provide Deployment Guide Version 1.0

Setup Guide for AD FS 3.0 on the Apprenda Platform

AVG Business SSO Connecting to Active Directory

PRiSM Security. Configuration and considerations

Apache Sentry. Prasad Mujumdar

User Management Guide

CA Performance Center

Secure Messaging Server Console... 2

WatchDox Administrator's Guide. Application Version 3.7.5

AVG Business Secure Sign On Active Directory Quick Start Guide

CNS Implementing NetScaler 11.0 For App and Desktop Solutions

Charles Firth Managing Macs in a Windows World

VMware Identity Manager Connector Installation and Configuration

Deployment Guide: Unidesk and Hyper- V

Active Directory Requirements and Setup

Managing User Accounts

Introductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP

Getting Started Guide: Getting the most out of your Windows Intune cloud

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

How To - Implement Single Sign On Authentication with Active Directory

Migrating to vcloud Automation Center 6.1

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

CliQr CloudCenter. Multi-Tenancy

User Guide. Version R91. English

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

Best Practices: BSA Patching

Active Directory Management. Agent Deployment Guide

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions

Oracle Communications WebRTC Session Controller: Basic Admin. Student Guide

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

CA Unified Infrastructure Management Server

BlackBerry Enterprise Service 10. Version: Configuration Guide

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

MEGA Web Application Architecture Overview MEGA 2009 SP4

Eylean server deployment guide

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

CLEO NED Active Directory Integration. Version 1.2.0

Avatier Identity Management Suite

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

ITAR Compliant Data Exchange

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Role Based Access Control for Industrial Automation and Control Systems

For Active Directory Installation Guide

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Setting Up Jive for SharePoint Online and Office 365. Introduction 2

Setting Up Resources in VMware Identity Manager

DeployStudio Server Quick Install

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Configuration Guide. BES12 Cloud

Creating a DUO MFA Service in AWS

Metastorm BPM Interwoven Integration. Process Mapping solutions. Metastorm BPM Interwoven Integration. Introduction. The solution

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

FileMaker Server 11. FileMaker Server Help

Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds

AvePoint Meetings for SharePoint On-Premises. Installation and Configuration Guide

IBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT

VMware Identity Manager Administration

Agenda. Federation using ADFS and Extensibility options. Office 365 Identity overview. Federation and Synchronization

Cloudwork Dashboard User Manual

Clustered Data ONTAP 8.2

Okta/Dropbox Active Directory Integration Guide

This module explains how to configure and troubleshoot DNS, including DNS replication and caching.

Server & Workstation Installation of Client Profiles for Windows

FileMaker Security Guide The Key to Securing Your Apps

Auto-Answer Configuration for Polycom HDX Systems

Configuring EPM System for SAML2-based Federation Services SSO

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Amazon WorkDocs. Administration Guide Version 1.0

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

FTP Service Reference

Getting Started with Clearlogin A Guide for Administrators V1.01

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net (Net 2) On A Gmaalto.Com Web Server

LDAP User Guide PowerSchool Premier 5.1 Student Information System

NETASQ SSO Agent Installation and deployment

Active Directory Manager Pro New Features

Delegated Administration Quick Start

FileMaker Server 12. FileMaker Server Help

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Filr 2.0 Administration Guide. April 2016

SQL Server AlwaysOn. Michal Tinthofer 11. Praha What to avoid and how to optimize, deploy and operate.

Administrator s Guide

System Administration Training Guide. S100 Installation and Site Management

Pearl Echo Installation Checklist

Netop Remote Control Security Server

Advanced Administration

Application Note 116: Gauntlet System High Availability Using Replication

Administration Guide ActivClient for Windows 6.2

RSA Authentication Manager 7.1 Basic Exercises

RSA Security Analytics

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Transcription:

BSA Best Practices Webinars Role Based Access Control Sean Berry Customer Engineering

Agenda Overview RBAC Objects Implementation Use Cases - Basic - Advanced - Multi Tenancy GUI Tour Copyright 6/14/2013 BMC Software, Inc 2

Overview

Access Control Quick Glossary Authentication: How you know that I am who I say I am Authorization: What I m allowed to do Accounting/Audit Trail: What you did Copyright 6/14/2013 BMC Software, Inc 4

Use Cases Simple environment setup (start with OOTB blcontent) Basic shared access content - Anyone within a role has full access - Anyone else has read access Basic exclusive access - Anyone within a role has full access - No access from other roles (by default) Multi tenancy / multi service - Few shared roles, some sharing within tenant/service Accountability: Who did what, where? AD integration Copyright 6/14/2013 BMC Software, Inc 5

RBAC Challenges ARM like use cases: - Content (software, policies, scripts) created/packaged by those without full production access Testing Promotion/Handoff - Content to be deployed should be tested, but probably not changed inflight - Content deployed in production shouldn t be changed after validation Trust levels vary: - Some have full access to most servers (sysadmin type roles) - Some have full access to limited subset of servers (app specific roles, devs) - Some have limited access to most servers (IT Security / infrastructure app admins) - Some have limited access to a few servers (app admins, devs, chrooted or config audit) Copyright 6/14/2013 BMC Software, Inc 6

Quick Architecture Review! Requests: GUI > Appserver > Agent Incoming connections go via: CONFIG/NSH_PROXY appservers - GUI traffic: CONFIG/ALL type appservers - NSH only traffic: NSH_PROXY - Authentication (user/password etc.) is done at this level Agents hold access controls - Who can connect - Who they map to - At what privilege level (root/admin, nobody, connection refused) Copyright 6/14/2013 BMC Software, Inc 7

RBAC Objects

RBAC Overview Roles A grouping of Authorizations and Users. Defines the maximum amount of permissions that Users within that Role can perform. (The Authorizations defined on each object in BladeLogic determines whether or not an action is actually allowed. How big is my world?» vs. Copyright 6/14/2013 BMC Software, Inc 9

RBAC Overview Users Typically represent an actual person logging into BladeLogic, and can be associated with one or more Roles. Authorizations - Commands Network Shell (NSH) commands that can be used to limit Users within a Role to specific NSH commands. - System Authorizations Represents a specific action within the Server Automation Console, such as the ability to read, modify, or update a specific type of object. - Server.Read, BLPackage.Delete Copyright 6/14/2013 BMC Software, Inc 10

RBAC Object Overview Authorization Profiles A group of Authorizations - Execute Shell Scripts = DepotObject.Read + Job.Execute + ACL Templates A group of Authorizations that can be applied to one or more objects, but in a non persistent manner. Updating the ACL Template does not affect any objects that ACL Template may have been applied to previously. - ACL Templates can also be used to define default permissions to objects created by Users within a Role. - stencil, pattern ACL Policy A group of Authorizations that is directly tied to one or more objects. Updating the Policy automatically updates the permissions on each object the Policy is tied to. - pointers, set and forget ACL Templates/Policies = AuthProfiles + Role information Copyright 6/14/2013 BMC Software, Inc 11

RBAC Object Overview Object Permissions: "who's allowed to access this object? - Everyone has keys, but only my family has keys to my house - Everyone at our company may have a badge that lets them in to shared office space Where can I see some sample RBAC content configurations? - Run blcontent! Copyright 6/14/2013 BMC Software, Inc 12

Implementation

Roles in Detail Who do I map to on managed servers? (Admin/root/oracle/wsadmin) Prefer Auth Templates over individual authorizations Default Permissions Template Meta roles: "read only", "packager", "deployer", "sysadmin/full admin", RBACAdmin Service/Tenancy: 2 3 meta roles for each application / service Details: - May replace local user accounts on many systems - Chroot capability - Time windows! Copyright 6/14/2013 BMC Software, Inc 14

Users Typical auth: SRP LDAP Sync to sync LDAP containers > Roles AD Authentication integration: authenticate to AD GUI tools for the end user: - Reconnect - Switch Role - Change Password Copyright 6/14/2013 BMC Software, Inc 15

Agent ACLs Exports - * ro allows all clients to connect (unless nouser + no users/users.local entries) - 192.168.1.30 ro IP based entries will restrict connections to those IPs Users.local - Static, not updated by PushACLs job - Usually used for failsafe configurations - BLAdmins:* or equivalent for failsafe Users - Updated by PushAcls - nouser configuration: If nouser exists in the users file then you are not allowed access unless you are explicitly mentioned in the users or users.local file. If it does not exist and you are not listed, you will be mapped to Anonymous or nobody access. See documentation for detailss Do not push ACLs to the file server! Copyright 6/14/2013 BMC Software, Inc 16

BMC Server Automation (BladeLogic) Logical Architecture C O N S O L E M I D T I E R N O D E S Copyright 6/14/2013 BMC Software, Inc 17

BMC Server Automation (BladeLogic) Client Access With NSH Proxy C O N S O L E M I D T I E R N O D E S Copyright 6/14/2013 BMC Software, Inc 18

BMC Server Automation (BladeLogic) Service Provider Network Model C O N S O L E M I D T I E R N O D E S Copyright 6/14/2013 BMC Software, Inc 19

Out of the Box What's the default behavior of the RBAC "out of the box", at a high level? - (Run blcontent to build out sample roles after install) - Objects are generally visible to others - By default, only the roles that create or own an object will be able to modify it Great for basic installations, but most customers will need a bit more. Copyright 6/14/2013 BMC Software, Inc 20

Auth Types and Automation Principals Authentication types (SRP, AD, RSA, LDAP etc.) - https://docs.bmc.com/docs/display/public/bsa82/implementing+authenti cation - Integration setup - AD >Role sync Automation Principals - When do I want to use Automation Principals and how do I set them up? - https://docs.bmc.com/docs/display/bsa83/creating+automation+principal s - Agent installs / bundles - SQL Server software install, anything that requires a "real" local user, anything that needs to run as a domain user Copyright 6/14/2013 BMC Software, Inc 21

Use Cases

Basic Use Cases How does content get created: what permissions are on it? - Default ACL Template How do I set and propagate permissions down to folders and objects in those folders? - Apply Permissions (with recurse) Who needs to share content with others? - Include the others roles in the Default ACL Template Who needs to keep their content private? - Remove Everyone.Read from their templates Accountability: who accessed what, when, from where? (rscd.log, NSH Proxy) Copyright 6/14/2013 BMC Software, Inc 23

Basic Use Cases Content development & promotion ( classic ARM) - Developer creates, promotes - QA tests (deploy), promotes or demotes - Production deploys to prod LDAP/AD Synchronization How do Authorizations work when importing or exporting an object? - RBAC doesn t go with an object, dropped on export and re set on import Map many users in a role to one application id with accountability Copyright 6/14/2013 BMC Software, Inc 24

Basic Use Cases Multi customer within one enterprise: - Access to servers by "service": email admins vs. web apps groups, see only their server smart groups & servers. Permissions at the Group/SmartGroup and Server level (otherwise can just build a new SSG and "find" the other servers.) Copyright 6/14/2013 BMC Software, Inc 25

Advanced Use Cases Access to one or few objects Access to dev servers (full access) for dev/engineers Readonly access as root (app owners) Copyright 6/14/2013 BMC Software, Inc 26

Advanced Use Cases Multi tenant within a service provider Multiple roles per customer (CUSTOMER property) How roles can share access to some objects Different admin accounts Two different "admin" roles when transitioning/aligning Administrator accounts Parameterized "admin" accounts - When there are many (or even one for every server) local admin accounts Copyright 6/14/2013 BMC Software, Inc 27

Advanced Use Cases Chrooted access (partial access to sensitive servers, only one directory, no nexec?) Limited NSH remote access How do I limit the specific commands which a user can execute on an agent in the users file? Map many users in a role to one application id with accountability Copyright 6/14/2013 BMC Software, Inc 28

Advanced Use Cases Permission mapping on imports Time window based access Temporary access: add, use, remove access (CLI?) BLCLI & SSO caching (for Orchestration: 9999 hour cred) Timeouts (10 hrs for GUI, sometimes longer for automation engines) Copyright 6/14/2013 BMC Software, Inc 29

Known issues / risks Older agents: reverse resolution of hosts in exports file (use IPs when possible, remote resolution is not reliable) ACLs are read every new connection: keep them reasonable in size. BSA ACL Policy performance prior to 8.2 GA Don t push ACLs to the file server! Will result in unpredictable performance. Copyright 6/14/2013 BMC Software, Inc 30

Reporting OOTB RBAC Reports: https://docs.bmc.com/docs/display/public/bdssa83/builtin+rbac+reports GUI: "Show Effective Permissions" Copyright 6/14/2013 BMC Software, Inc 31

Where do I find RBAC in the GUI? Top of screen: Role, User, appserver Authentication Profile setup screen Permissions pane RBAC workspace Automation principals Unified Installer Reconnect Switch Role Change Password Copyright 6/14/2013 BMC Software, Inc 32

Next time! Shorter call! (30 min) Several videos available ahead of the call Highlights / best of during the live call More time for Q&A Copyright 6/14/2013 BMC Software, Inc 33

RBAC Manager Workspace Copyright 6/14/2013 BMC Software, Inc 34