Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5



Similar documents
An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

An Oracle White Paper July Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows

PeopleSoft Enterprise Directory Interface

An Oracle White Paper March Integrating Microsoft SharePoint Server With Oracle Virtual Directory

OpenLDAP Oracle Enterprise Gateway Integration Guide

Oracle Mobile Security

An Oracle White Paper February Oracle Data Integrator 12c Architecture Overview

Microsoft Active Directory Oracle Enterprise Gateway Integration Guide

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

An Oracle White Paper June Security and the Oracle Database Cloud Service

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

An Oracle Communications White Paper December Serialized Asset Lifecycle Management and Property Accountability

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

March Oracle Business Intelligence Discoverer Statement of Direction

An Oracle White Paper November Oracle Business Intelligence Standard Edition One 11g

An Oracle White Paper Dec Oracle Access Management Security Token Service

G Cloud 7 Pricing Document

Oracle Enterprise Manager

Oracle Financial Management Analytics

Oracle JD Edwards EnterpriseOne Mobile Sales Order Entry

G Cloud 7 Pricing Document

An Oracle White Paper January Using Oracle's StorageTek Search Accelerator

Configuring Microsoft Active Directory for Oracle Net Naming. An Oracle White Paper April 2014

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

An Oracle White Paper March Managing Metadata with Oracle Data Integrator

An Oracle White Paper Dec Oracle Access Management OAuth Service

Oracle Enterprise Manager

An Oracle White Paper October BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider

Configuring Microsoft Active Directory 2003 for Net Naming. An Oracle White Paper September 2008

Oracle Primavera Gateway

Advanced Matching and IHE Profiles

Highmark Unifies Identity Data With Oracle Virtual Directory. An Oracle White Paper January 2009

Connect the Contact Center to the Field with Oracle Service Cloud

The Oracle Mobile Security Suite: Secure Adoption of BYOD

Oracle Privileged Account Manager

An Oracle White Paper August Oracle OpenSSO Fedlet

An Oracle White Paper January Integrating Oracle Application Express with Oracle Access Manager. Revision 1

June, 2015 Oracle s Siebel CRM Statement of Direction Client Platform Support

An Oracle White Paper February Integration with Oracle Fusion Financials Cloud Service

Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E

An Oracle White Paper October Oracle Data Integrator 12c New Features Overview

Contract Lifecycle Management for Public Sector A Procure to Pay Management System

Maximizing Profitability with Cloud Collaboration for your Business

Siebel CRM Quote and Order Capture - Product and Catalog Management

ORACLE MANAGED FILE TRANSFER

Oracle Audit Vault Administrator s Guide Oracle Audit Vault Auditor s Guide Oracle Enterprise Manager Cloud Control Administrator s Guide

An Oracle White Paper June Creating an Oracle BI Presentation Layer from Imported Oracle OLAP Cubes

An Oracle White Paper May Distributed Development Using Oracle Secure Global Desktop

An Oracle White Paper April, Effective Account Origination with Siebel Financial Services Customer Order Management for Banking

Field Service Management in the Cloud

PeopleSoft Strategic Sourcing

Siebel CRM Reports. Easy to develop and deploy. Administration

An Oracle White Paper September Advanced Java Diagnostics and Monitoring Without Performance Overhead

Setting up the integration between Oracle Social Engagement & Monitoring Cloud Service and Oracle RightNow Cloud Service

Oracle Hyperion Financial Close Management

An Oracle White Paper May 2011 BETTER INSIGHTS AND ALIGNMENT WITH BUSINESS INTELLIGENCE AND SCORECARDS

An Oracle White Paper September Oracle Database and the Oracle Database Cloud

PeopleSoft HelpDesk. Maximized Operational Efficiency. Usability and Role-Based Access

An Oracle White Paper September Oracle WebLogic Server 12c on Microsoft Windows Azure

Oracle Fusion Middleware. 1 Oracle Identity Management Templates

Oracle Business Intelligence Enterprise Edition Plus and Microsoft Office SharePoint Server. An Oracle White Paper October 2008

A Comprehensive Solution for API Management

Oracle Service Cloud and Oracle WebRTC Session Controller ORACLE WHITE PAPER FEBRUARY 2015

Migrating Non-Oracle Databases and their Applications to Oracle Database 12c O R A C L E W H I T E P A P E R D E C E M B E R

Oracle Communications Extension Group: Enterprise Application Guide ORACLE WHITE PAPER AUGUST 2015

An Oracle White Paper March Oracle s Single Server Solution for VDI

An Oracle White Paper January, Enterprise Manager Cloud Control 12c: Configuring External User Authentication Using Microsoft Active Directory

Managed Storage Services

ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE

An Oracle White Paper November Upgrade Best Practices - Using the Oracle Upgrade Factory for Siebel Customer Relationship Management

Oracle Whitepaper April Security and the Oracle Database Cloud Service

Oracle Sales For Handhelds

An Oracle White Paper June, Provisioning & Patching Oracle Database using Enterprise Manager 12c.

An Oracle White Paper July Oracle Desktop Virtualization Simplified Client Access for Oracle Applications

The Role of Data Integration in Public, Private, and Hybrid Clouds

The new Manage Requisition Approval task provides a simple and user-friendly interface for approval rules management. This task allows you to:

An Oracle Technical White Paper June Oracle VM Windows Paravirtual (PV) Drivers 2.0: New Features

Configuring Oracle SDN Virtual Network Services on Netra Modular System ORACLE WHITE PAPER SEPTEMBER 2015

An Oracle White Paper January Oracle Database Firewall

An Oracle White Paper June RESTful Web Services for the Oracle Database Cloud - Multitenant Edition

An Oracle White Paper May Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

Centralized Oracle Database Authentication and Authorization in a Directory

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

Oracle Order Management

How To Load Data Into An Org Database Cloud Service - Multitenant Edition

PEOPLESOFT HELPDESK FOR HUMAN RESOURCES

Oracle s BigMachines Solutions. Cloud-Based Configuration, Pricing, and Quoting Solutions for Enterprises and Fast-Growing Midsize Companies

ORACLE CRM ON DEMAND RELEASE 30

An Oracle White Paper June Tackling Fraud and Error

Oracle Fusion Middleware

Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide

An Oracle Strategy Brief May No Limits: Enabling Rating without Constraints

ORACLE PRODUCT DATA HUB

Improve your Customer Experience with High Quality Information

CUSTOMER MASTER DATA MANAGEMENT PROCESS INTEGRATION PACK

An Oracle White Paper May Creating Custom PDF Reports with Oracle Application Express and the APEX Listener

Oracle Mobile Cloud Service. A Complete Strategy for Developing, Deploying, and Monitoring Mobile Apps

Transcription:

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5

Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Table of Contents Introduction 1 Centralizing DB Accounts with OUD 2 DB Accounts Stored in OUD 2 DB Accounts Proxy-ed by OUD into existing Directories 4 Accounts in Microsoft Active Directory 4 Active Directory Integration for Password-based authentication 4 Active Directory Integration with Kerberos Authentication 6 Accounts in ODSEE 7 Accounts in Novell edirectory 8 Centralizing DB Accounts with OID 9 DB Accounts Stored in OID 9 DB Accounts in existing directories referred to via OID 11 Active Directory Integration for Password Authentication 11 AD as the source for password change 11 OID as the source for password change 11 Active Directory Integration for Kerberos Authentication 12 DSEE Integration 13 Conclusion 13 Appendix A: Supported Deployments with minimum version numbers 14 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Introduction IT departments are under consistent pressure to reduce cost, enhance security, and improve compliance to support ever-competitive business. Databases are critical components of enterprise IT infrastructure, so it is key to centralize and integrate database users and privileges into an enterprise identity management framework. However, many enterprises today still manage users and privileges on an individual database basis. From an end-user perspective, this means that each user must remember multiple passwords. From an administration perspective, redundant user management is costly; managing user authorizations in multiple databases is error-prone. From an auditing and compliance perspective, on-time provisioning and de-provisioning of user access and privileges across databases is challenging. Enterprise User Security (EUS), an Oracle Database Enterprise Edition feature, leverages the Oracle Directory Services and gives you the ability to centrally manage database users and role memberships in an LDAP directory. EUS reduces administration costs and increases security. EUS also improves compliance by centralizing database user account management, provisioning and de-provisioning of database users, password management and self-service password reset, and management of authorizations using global database roles. Furthermore, password policies (including account lockout and password expiration settings) defined in the LDAP-compliant directory and stored in user entries can be used by EUS. This paper presents the EUS deployment options available with Oracle Unified Directory (OUD) and Oracle Internet Directory (OID). Both use cases will be covered in this document. The two directories can be used as the central directory repository for database users and privileges as well as be used as a EUS directory virtualization service to leverage existing directory infrastructures based on Microsoft Active Directory (AD), Novell edirectory, or Oracle Directory Server Enterprise Edition (ODSEE) or even OUD. 1 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Centralizing DB Accounts with OUD DB Accounts Stored in OUD OUD works seamlessly with EUS. Database user information, passwords and privileges information for a database or for a database domain can be stored in OUD. EUS can leverage existing user and group information stored in OUD to provide single password authentication and consistent password policy across enterprise applications. User data, database metadata, such as DB registration information, user/role Mappings, and other EUS specific metadata are stored in OUD using a specific, supported, ready-to-use LDAP schema. These metadata are stored in a separate OUD suffix, called Oracle Context, making a clean logical separation between EUS data and user information that can be shared across applications. In addition to providing centralized database user management, Enterprise EUS provides three different methods of user authentication: 1. X.509 certificate authentication (introduced in DB 8i) 2. Password-based authentication (since DB 9i) 3. Authentication via Kerberos (since DB 10g). OUD support for Password-based authentication for EUS was introduced in OUD 11gR2 (11.1.2.0.0). The other authentication methods were introduced in OUD 11gR2PS1 (11.1.2.1). In the password authentication scenario, the database does not perform user authentication via LDAP bind to OUD. Instead the database performs the authentication via reading user credentials, hashing the password, and comparing the password hash value retrieved from OUD. More detailed information about EUS can be found in the Enterprise User Administrator's Guide in the Database documentation section on Oracle technology Network. 2 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Figure 1: EUS Account management with OUD 3 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

DB Accounts Proxy-ed by OUD into existing Directories As most enterprises already have existing corporate directories in place, via EUS customers do have choice to also leverage the existing directory infrastructure and user information base without putting in place synchronization between directories. In this way, OUD acts as a real-time interpreter for Oracle database information requests to user data. Using OUD enables the database to interact with third-party directories. OUD leverages existing user and group information in the existing third-party directory infrastructure by forwarding LDAP requests and responses back and forth to the third-party directory holding user data. Database metadata such as DB registration information, user/role Mappings, and other EUS specific metadata are stored locally in OUD, without requiring any schema changes to store EUS configuration in the existing third-party directory. As of release 11gR2PS1, OUD is certified with EUS to support Active Directory, Oracle Directory Server Enterprise Edition, and Novell edirectory. Working with these products, OUD eliminates user data duplication and synchronization and consequently lowers total cost of ownership (TCO). Accounts in Microsoft Active Directory You can integrate Active Directory for password-based authentication or integrate Active Directory with Kerberos authentication. Active Directory Integration for Password-based authentication Such a scenario requires deployment of an additional component: the OUD Password Change Notification plug-in (oidpwdcn.dll). Microsoft uses a proprietary implementation to hash passwords in Active Directory that is incompatible with the Oracle DB requirements. The OUD Password Change Notification plug-in is notified when a password change occurs, and stores hashes in Active Directory. The oidpwdcn dll must be installed on every Active Directory domain controller. Active Directory Schema extension is required to store the hashed passwords. The database establishes a connection to OUD. OUD retrieves user data (users and groups) from Active Directory. User passwords are retrieved from the hashed password stored by the OUD Password Change Notification plug-in. EUS metadata are stored and retrieved from OUD. The database version must be 10.1 or later as earlier versions use a different and incompatible password format. 4 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Figure 2: EUS Account management with Active Directory 5 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Active Directory Integration with Kerberos Authentication In this scenario, Kerberos is used for DB authentication. EUS with DB Kerberos authentication does not require any changes to the database beyond standard EUS configuration. The database establishes a connection to OUD. OUD looks up the requested DB information in Active Directory. All database clients must be Kerberos-enabled to use this option. This capability is only supported with DB version 10.1 or higher. The database establishes a connection to OUD. OUD retrieves user data (users and groups) from Active Directory. EUS metadata are stored and retrieved from OUD. Access to the hashed user password is not required, so no schema extensions and no Password Change Notification dll have to be deployed on Active Directory. Figure 3: EUS Account management with Kerberos and Active Directory 6 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Accounts in ODSEE The database establishes a connection to OUD. OUD retrieves user data (users and groups) from Oracle Directory Server Enterprise Edition (ODSEE). EUS metadata are stored and retrieved from OUD. This integration does not require any changes in the database nor for database clients that use password authentication. Figure 4: EUS Account management with ODSEE 7 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Accounts in Novell edirectory The database establishes a connection to OUD. OUD retrieves user data (users and groups) from Novell edirectory. EUS metadata are retrieved from OUD. This integration does not require any changes in the database beyond what is usually required for EUS, nor for database clients that use username/password authentication. Using Novell edirectory doesn t require an Oracle password filter. You have to enable Universal Password in edirectory, and allow the administrator to retrieve the user password. Refer to Novell's edirectory documentation on Password Management for more information. This configuration can only be used with DB versions 10.1 or higher due to incompatible password formats in earlier DB versions. Figure 5: EUS Account management with edirectory 8 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Centralizing DB Accounts with OID DB Accounts Stored in OID EUS deployment can use OID with the database instances registered in OID together with the user authentication and authorization information. Figure 6: EUS Account management with OID The communication between the databases can be secured via SSL (which requires the Database Advanced Security Option). The SSL connection is used for OID/Database mutual authentication, not for user authentication. The database uses multiple LDAP search operations to lookup user and password information. OID is actually NOT doing the user authentication through LDAP bind operation, but is only used as data storage for the database, while the database is still authenticating the user. User information typically will be stored in the default OID user Directory Information Tree (DIT). Database metadata like DB registration information, user/role mappings etc is stored in the OracleContext, a separate container within OID. EUS supports different methods of authentication: 1. Certificate (X.509) introduced in DB 8i 2. Password introduced in DB 9i 3. Kerberos introduced in DB 10g 9 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

It s important to distinguish them from the authentication mechanism provided by the Oracle Database (without EUS) and the Advanced Security Option. The implementation of EUS requires a user footprint in OID including the user password. Besides storing the OracleContext OID is used to enforce access control to protect EUS related data. More detailed information about EUS can be found in the Enterprise User Administrator's Guide in the Database documentation section on Oracle technology Network. 10 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

DB Accounts in existing directories referred to via OID Often, EUS will be deployed in customer environment where third-party directories are in use, and OID integration with other directories is required to ensure consistent user information. The following use cases describe the integration with Active Directory and ODSEE. Active Directory Integration for Password Authentication In this case of using password authentication, database user accounts, including passwords and enterprise roles MUST be stored in OID. AD as the source for password change, integration using DIP and AD Password Filter Figure 7: EUS Account management with OID and AD, AD being the source for password change Synchronization of Active Directory users and groups to OID is handled using the Directory Integration Platform (DIP). This could be done via one time bootstrap using the Directory Integration Platform (e.g. dipassistant). In case the user population doesn t change in Active Directory the DIP server doesn t need to be up and running all the time. Active Directory Password Filter is used and needs to be installed on each Domain Controller. The filter hooks into the Active Directory LSA to capture password changes via a publish Microsoft API and send them via SSL to OID. In case the password change cannot be pushed into OID (e.g. no connection to OID) the password will be stored encrypted in Active Directory until the connection to OID can be established. However, the filter has to be stored on all domain controllers. The global catalog server cannot be used together with the password filter, since the passwords are encrypted using a proprietary Microsoft schema. OID as the source for password change, integration using DIP 11 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Figure 8: EUS Account management with OID and AD, OID being the source for password change Enables password based authentication using the Active Directory username by synchronizing the Active Directory user footprint (consisting of Active Directory attributes like samaccountname, krbuserprincaplname and others) to OID as well as AD group information. Password changes can be synched from OID via SSL to Active Directory, i.e. password will be stored twice. This model assumes OID to be the central source in the deployment. Initial user passwords have to be generated in OID and the user has to change his password in OID. Active Directory Integration for Kerberos Authentication Figure 9: EUS Account management with OID chaining to AD The usage of Kerberos and OID server chaining eliminates the need to use either DIP synchronization to create the user footprint in OID or install the Active Directory Password Filter to capture password changes in Active Directory. Important to notice, OID is not Kerberos enabled. OID server chaining is used to lookup user and group information in Active Directory on behalf of the DB. 12 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Please note: Kerberos is difficult to install and configure. OID server chaining might expose a performance impact. Only DB versions 10.1+ are supported with EUS Kerberos. OID server chaining can only be used with one Active Directory servers. DSEE Integration Figure 10 EUS Account management with OID chaining to DSEE The usage of OID server chaining eliminates the need to install DIP to create the user footprint in OID. Passwords will only be managed in DSEE. OID server chaining is used to lookup password, user and group information in DSEE/OUD. The password is stored in DSEE only. Please note that server chaining might expose a performance impact. Only DB versions 10.1+ can be used since DB 9i versions expect the DB password to be stored in the user orclpassword attribute using an Oracle specific password verifier. This password verifier is not available in DSEE directory, hence DB version 9i are not supported in this scenario. User and group changes in DSEE are not propagated back to OID. These kinds of mapping are stored in OID and are not updated. Conclusion Centralized management of database user accounts and role memberships using Oracle Database Enterprise User Security (EUS) ensures strong security, reduces administration costs, and improves compliance. OUD provides options for customers to support EUS natively, or to leverage their existing ODSEE, Active Directory, or Novell edirectory to lower total cost of ownership (TCO). 13 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Appendix A: Supported Deployments with minimum version numbers Authentication Type 3 rd Party Directory DB OID OUD Certificate 8i+ 8i+ Certificate 10g,11g+ 11.1.2.1 Certificate 11g+ 11.1.2.2+ Password 9i+ 9i+ Password 10g, 11g 11.1.2.0, 11.1.2.1 Password 11g+ 11.1.2.2+ Kerberos 10g, 11g 10g+ 11.1.2.1 Kerberos 11g+ 10g+ 11.1.2.2+ Password AD + DIP + OIM 9.2.0.3+ 10g+ Password AD + DIP + Password Filter 10.1+ 10.1.4 Password ODSEE 10.1+ 10.1.4 Password ODSEE + OID Server Chaining 10.1+ 10.1.4 Kerberos AD + OID Server Chaining 10.1+ 10.1.4 Kerberos AD + OUD 10.1+ 11.1.2.1+ Password AD + OUD 10.1+ 11.1.2.1+ Password DSEE + OUD 10.1+ 11.1.2.1+ Password edir + OUD 10.1+ 11.1.2.1+ 14 ORACLE DIRECTORY SERVICES INTEGRATION WITH DB ENTERPRISE USER SECURITY

Oracle Corporation, World Headquarters Worldwide Inquiries 500 Oracle Parkway Phone: +1.650.506.7000 Redwood Shores, CA 94065, USA Fax: +1.650.506.7200 C O N N E C T W I T H U S blogs.oracle.com/oracle facebook.com/oracle twitter.com/oracle oracle.com Copyright 2015, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only, and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document, and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. 0215