2014 IBM Corporation



Similar documents
Using etoken for SSL Web Authentication. SSL V3.0 Overview

Web Security: Encryption & Authentication

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Apache Security with SSL Using Ubuntu

IBM i Version 7.3. Security Digital Certificate Manager IBM

Secure Managed File Transfer with Connect:Direct

Overview. SSL Cryptography Overview CHAPTER 1

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Angel Dichev RIG, SAP Labs

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Cisco SSL Encryption Utility

Setting Up SSL on IIS6 for MEGA Advisor

SSL/TLS: The Ugly Truth

NIST Test Personal Identity Verification (PIV) Cards

SBClient SSL. Ehab AbuShmais

Apache, SSL and Digital Signatures Using FreeBSD

White Paper. Enhancing Website Security with Algorithm Agility

Apache Security with SSL Using Linux

DRAFT Standard Statement Encryption

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Implementing SSL Security on a PowerExchange Network

Clearswift Information Governance

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

CA DLP. Release Notes for Advanced Encryption. r12.0

Security Digital Certificate Manager

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

Security Digital Certificate Manager

ERserver. iseries. Securing applications with SSL

SSL BEST PRACTICES OVERVIEW

National Security Agency Perspective on Key Management

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

SSL Server Rating Guide

Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

[SMO-SFO-ICO-PE-046-GU-

McAfee Firewall Enterprise 8.2.1

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Configuring Security Features of Session Recording

Security Policy Revision Date: 23 April 2009

TELNET CLIENT 5.0 SSL/TLS SUPPORT

An Introduction to Cryptography as Applied to the Smart Grid

Strong Authentication for Future Web Applications

Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows

Integration Guide. Microsoft Internet Information Services (IIS) 7.0 and ncipher Modules. Windows Server 2008 (32-bit and 64-bit)

Properties of Secure Network Communication

Security. Learning Objectives. This module will help you...

More on SHA-1 deprecation:

Enabling SSL and Client Certificates on the SAP J2EE Engine

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

FileCloud Security FAQ

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

Understanding Digital Certificates and Secure Sockets Layer (SSL)

(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING

Chapter 7 Managing Users, Authentication, and Certificates

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

ERserver. iseries. Secure Sockets Layer (SSL)

Is Your SSL Website and Mobile App Really Secure?

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

USING SSL/TLS WITH TERMINAL EMULATION

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

How to configure SSL proxying in Zorp 3 F5

Generating a Certificate Signing Request (CSR) from LoadMaster

WebSphere DataPower Release FIPS and NIST SP a support.

Administration Guide Certificate Server May 2013

Domino and Internet. Security. IBM Collaboration Solutions. Ask the Experts 12/16/2014

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

McAfee Firewall Enterprise 8.3.1

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

ADFS Integration Guidelines

Chapter 17. Transport-Level Security

C O N F I G U R I N G O P E N L D A P F O R S S L / T L S C O M M U N I C A T I O N

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Agenda. How to configure

X.509 Certificate Generator User Manual

Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014

HTTPS is Fast and Hassle-free with CloudFlare

ATSC Standard: ATSC Security and Service Protection Standard

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.7+

How To Understand And Understand The Security Of A Key Infrastructure

Lecture 9: Application of Cryptography

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

An Overview of the Secure Sockets Layer (SSL)

Junio SSL WebLogic Oracle. Guía de Instalación. Junio, SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19

What in the heck am I getting myself into! Capitalware's MQ Technical Conference v

CHAPTER 7 SSL CONFIGURATION AND TESTING

Chapter 7 Transport-Level Security

Secure IIS Web Server with SSL

WebLogic Server 6.1: How to configure SSL for PeopleSoft Application

FIPS Security Policy LogRhythm Log Manager

Transcription:

2014 IBM Corporation

This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session also applies to Software Use Analysis (SUA) in version 9.x The session is for all ILMT users IBMers, Business Partners and Customers The teleconference is set to mute. Use the web conference chat to communicate with the ILMT subject matter experts The presentation is recorded and will be available to watch on the ILMT YouTube channel as well as to download from the ILMT Wiki soon 2

LMTHelp@us.ibm.com https://ibm.biz/ilmt_forum https://ibm.biz/ilmt_wiki https://ibm.biz/ilmt_youtube https://ibm.biz/ilmt_twitter https://ibm.biz/ilmt_linkedin 3

Flow of data Configuring secure communication Federal Information Processing Standard (FIPS) Standard 140-2 Recommendation SP 800-131 Managing a certificate Existing certificate authority (CA) Private certificate authority Authenticating users with Lightweight Directory Access Protocol (LDAP) Demo Questions & Answers Survey 4

5

6

7

8

Security Requirements http://www-01.ibm.com/support/knowledgecenter/sskllw_9.1.0/com.ibm.tivoli.tem.doc_9.1/platform/adm/c_security_requirements.html Security Configuration Scenarios http://www- 01.ibm.com/support/knowledgecenter/SSKLLW_9.1.0/com.ibm.tivoli.tem.doc_9.1/Platform/Adm/c_scenarios_sha2_installation.html Client Authentication http://www- 01.ibm.com/support/knowledgecenter/SSKLLW_9.1.0/com.ibm.tivoli.tem.doc_9.1/Platform/Console/ClientAuthentication.html%23ClientAuthe ntication Managing Client Encryption http://www- 01.ibm.com/support/knowledgecenter/SSKLLW_9.1.0/com.ibm.tivoli.tem.doc_9.1/Platform/Config/c_managing_client_encryption.html 9

10

A digital certificate is a signed public key that is accompanied by information about the key owner The public key always has a private key that is associated with it The License Metric Tool server can use SSL if the server possesses both the certificate and the private key that is associated with it Security of your access to the web console of License Metric Tool depends on the security of the digital certificate, and its private key, that the server uses for protecting the communication By default, SSL is enabled on the server, however, the initial configuration is based on a temporary self-signed certificate and is not intended to be used in the production environment The initial certificate should be replaced with a server certificate that is signed by a certificate authority (CA) that you trust 11

12

Federal Information Processing Standards (FIPS) are standards and guidelines that are issued by the National Institute of Standards and Technology (NIST) for federal government computer systems You can configure License Metric Tool to be compliant with the Federal Information Processing Standard requirements that are related to encryption http://csrc.nist.gov/ 13

FIPS 140-2 is the standard that defines the security requirements for cryptographic modules that are used within a system that handles sensitive but unclassified information Compliance with the FIPS 140-2 has two aspects that affect ILMT the algorithms that are used to manage sensitive data must be FIPS-approved FIPS-approved implementation must be used when data is transmitted with the SSL/TLS http://csrc.nist.gov/publications/pubsfips.html 14

IBM License Metric Tool 9.0 uses the FIPS 140-2 approved cryptographic providers for cryptography: IBMJCEFIPS (certificate 376) IBMJSSEFIPS (certificate 409) IBM Crypto for C (ICC) (certificate 384) http://csrc.nist.gov/publications/pubsfips.html 15

At the start of the 21 st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algorithms that adequately protect sensitive information, and planning ahead for possible changes in the use of cryptography because of algorithm breaks or the availability of more powerful computing techniques NIST Special Publication (SP) 800-57, Part 1 was the first document produced in this effort, and includes a general approach for transitioning from one algorithm or key length to another This Recommendation (SP 800-131A) provides more specific guidance for transitions to the use of stronger cryptographic keys and more robust algorithms http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf http://csrc.nist.gov/publications/nistpubs/800-131a/sp800-131a.pdf 16

SP 800-131 requires longer key lengths and stronger cryptography The SP 800-131 specification also provides a transition configuration to enable users to move to a strict enforcement of SP 800-131 The transition configuration also enables users to run with a mixture of settings from both FIPS140-2 and SP 800-131 SP 800-131 can be run in two modes transition strict The transition mode is offered to give you a setting to move your environment to SP 800-131 strict mode In transition mode, it is optional to use the SP800-131 required certificates and to set the protocol to SP 800-131 17

The following requirements must be fulfilled to allow for the strict enforcement of SP 800-131: The use of the TLS version 1.2 protocol for the Secure Sockets Layer (SSL) context Certificates must have a minimum length of 2048 bytes. An Elliptic Curve (EC) certificate requires a minimum size of 244-bit curves Certificates must be signed with a signature algorithm of SHA256, SHA384, or SHA512 Valid signature algorithms include: SHA256 with RSA SHA384 with RSA SHA512 with RSA SHA256 with ECDSA SHA384 with ECDSA SHA512 with ECDSA SP 800-131 approved cipher suites 18

IBM License Metric Tool profile gives setup possibility to meet the SP 800-131 requirement that is originated by the National Institute of Standards and Technology You can configure License Metric Tool to run in SP 800-131 strict or transition mode 19

When you configure security settings, ensure that the combination of security modes that you set up on the side of Endpoint Manager and License Metric Tool is supported Legend: - the mode is enabled ANY - the mode is either enabled or disabled 20

21

The self-signed certificate that is provided with License Metric Tool is not intended to be used in the production environment Replace it with a certificate that is signed by a certificate authority (CA) of your choice To have a certificate, you need to generate a private key, a public key, and a certificate signing request (CSR) that is associated with the public key Next, a certificate authority must sign this request and there are two ways to get a certificate signing request signed: send it to an existing certificate authority, e.g. Entrust Verisign CA of your organization create a private CA 22

Existing certificate authority (CA) You can use an existing CA to sign your certificate signing request (CSR) The root certificates of popular CAs are imported into new web browsers by default Private certificate authority You can create a private CA and use it for signing the CSR A private CA can be created on any computer with an operating system that supports openssl 23

24

Lightweight Directory Access Protocol (LDAP) is a set of client/server protocols for accessing and managing information directories LDAP supports TCP/IP protocol for communication and uses simple string formats for data transfer LDAP is cross-platform and standards-based, therefore applications do not need to worry about the type of server hosting the directory LDAP is a simplified variation of X.500 Directory Access Protocol 25

IBM License Metric Tool (ILMT) 9.0 supports authentication through a Lightweight Directory Access Protocol (LDAP) server ILMT server configuration consists of a few steps: Creation of a directory that the application would link to Creation a user that would link to the created directory Users integration with ILMT using the LDAP protocol Integrating users with Web Reports 26

27

28

2014 IBM Corporation