Microsoft Active Directory and Windows Security Integration with Oracle Database



Similar documents
What s New with Oracle Database 12c on Windows On-Premises and in the Cloud

Kerberos on z/os. Active Directory On Windows Server William Mosley z/os NAS Development. December Interaction with.

Centralized Oracle Database Authentication and Authorization in a Directory

Integrating OID with Active Directory and WNA

Guide to SASL, GSSAPI & Kerberos v.6.0

White Paper. Fabasoft on Linux - Preparation Guide for Community ENTerprise Operating System. Fabasoft Folio 2015 Update Rollup 2

Step- by- Step guide to Configure Single sign- on for HTTP requests using SPNEGO web authentication

Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications

Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory

TIBCO Spotfire Platform IT Brief

Integration with Active Directory. Jeremy Allison Samba Team

Configuring Microsoft Active Directory 2003 for Net Naming. An Oracle White Paper September 2008

Oracle Net Service Name Resolution

Single Sign-On for Kerberized Linux and UNIX Applications

Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications

Introductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP

The following process allows you to configure exacqvision permissions and privileges for accounts that exist on an Active Directory server:

Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0

Configuring Microsoft Active Directory for Oracle Net Naming. An Oracle White Paper April 2014

Active Directory 2008 Implementation. Version 6.410

Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

Kerberos and Windows SSO Guide Jahia EE v6.1

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

Configuring Integrated Windows Authentication for Oracle WebLogic with SAS 9.2 Web Applications

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

WirelessOffice Administrator LDAP/Active Directory Support

SQL and PL/SQL Development and Leveraging Oracle Multitenant in Visual Studio. Christian Shay Product Manager, NET Technologies Oracle

Click Studios. Passwordstate. Installation Instructions

Single Sign On. Configuration Checklist for Single Sign On CHAPTER

Single Sign-on (SSO) technologies for the Domino Web Server

Netop Remote Control Security Server

User Source and Authentication Reference

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

Oracle 1Z0-528 Exam Questions & Answers

Dell Compellent Storage Center

Enabling single sign-on for Cognos 8/10 with Active Directory

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release E

Xerox DocuShare Security Features. Security White Paper

Kerberos -Based Active Directory Authentication to Support Smart Card and Single Sign-On Login to DRAC5

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications

Kerberos: Single Sign On for BS2000

PingFederate. IWA Integration Kit. User Guide. Version 3.0

How To Secure Your Data Center From Hackers

How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365

Kerberos authentication made easy on OpenVMS

Securing Your Oracle Database to Protect your Data

IceWarp Server - SSO (Single Sign-On)

Embedded Web Server Security

Implementing Oracle Enterprise User Security

CA Performance Center

Querying Databases Using the DB Query and JDBC Query Nodes

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

Thick Client Application Security

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

RoomWizard Synchronization Software Manual Installation Instructions

SUSE Manager 1.2.x ADS Authentication

Click Studios. Passwordstate. Installation Instructions

Websense Support Webinar: Questions and Answers

KERBEROS ENVIRONMENT SETUP FOR EMC DOCUMENTUM CENTERSTAGE

September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence

Windows Server 2008/2012 Server Hardening

How to monitor AD security with MOM

UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON. Chad Watson Sr. Business Intelligence Developer

Active Directory 2008 Implementation Guide Version 6.3

Configuring Single Sign-On for Application Launch in OpenManage Essentials

Configuring Sponsor Authentication

Security IIS Service Lesson 6

Oracle Enterprise Manager 12c

Oracle Database Security and Audit

Single Sign On. Configuration Checklist for Single Sign On CHAPTER

FreeIPA 3.3 Trust features

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Administering the Web Server (IIS) Role of Windows Server

Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

TopEase Single Sign On Windows AD

AD Integration options for Linux Systems

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Integrating Linux systems with Active Directory

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008

Oracle Easy Connect Naming. An Oracle White Paper October 2007

Basic principles of infrastracture security Impersonation, delegation and code injection

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2

JapanCert 専 門 IT 認 証 試 験 問 題 集 提 供 者

Embedded Web Server Security

Ensure that your environment meets the requirements. Provision the OpenAM server in Active Directory, then generate keytab files.

Security and Kerberos Authentication with K2 Servers

Configure the Application Server User Account on the Domain Server

NSi Mobile Installation Guide. Version 6.2

SSSD Active Directory Improvements

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

Web. Security Options Comparison

LAB: Implementing Single Sign-on!!!Setup!!!

ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software

Transcription:

Microsoft Active Directory and Windows Security Integration with Oracle Database Santanu Datta Vice President Server Technologies Christian Shay Principal Product Manager Server Technologies

Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.

Program Agenda 1 2 3 4 5 6 Active Directory for Name Resolution Single Sign on Windows Native Authentication Kerberos Web Applications: Security Integration Q&A

Active Directory for Name Resolution Overview Store and resolve Net names through Active Directory Active Directory is used instead of tnsnames.ora Authenticated connection to Active Directory (11g and later) Anonymous connection for older clients Enhanced tools support for Net naming Oracle Net Configuration Assistant Configures Active Directory Configures local ldap.ora Oracle DB Configuration Assistant and Net Manager Registers Database names/net Service names in Active Directory AD Users and Computers Centralize Configuration Reduce Administration (Eliminate TNSNAMES.ORA)

Active Directory for Name Resolution Directory Structure acme.com Create Schema Create Naming Context sales. acme.com dev. acme.com Create Naming Context Register DB/Net Service Names Oracle Context Oracle Context Register DB/Net Service Names DB1.sales. acme.com DB3.dev. acme.com netsvc1.sales. acme.com netsvc2.dev. acme.com

Active Directory for Name Resolution Configuration/Administration 1 Ensure that Administrator can modify Schema in Active Directory 2 Register Schema using NetCA Windows System 5 - Configure Directory Naming and Directory Usage (AD) using NetCA 3 - Create Naming Context using NetCA 4 - Register database in AD using DBCA or Net Manager Active Directory/KDC Repository of Database Names and Connect Descriptors Database Client Systems on Windows

Active Directory for Name Resolution Run-time 1 User signs on to Desktop 3 - Retrieves Connect Descriptor Repository (Database Names and Connect Descriptors) Active Directory/KDC Oracle Database 2 User issues Connect Request 4 - Connect to Database using Connect Descriptor (Any Platform)

Active Directory for Name Resolution Demo Environment Machine Name: W7Client.rtdom.netdev User: Oracle Database Server (12cR1): SID: orcl PDB: pdborcl OS installed: Windows 7 Windows 7 Machine Name: W2K8Server.rtdom.netdev Domain: rtdom.netdev OS installed: Windows Server 2008 R2 with SP1 Windows Server 2008 R2 with SP1 (Domain Controller)

D E M O N S T R A T I O N Active Directory for Name Resolution

Active Directory for Name Resolution Configuration Steps: Summary 1. Ensure that Administrator can modify Schema in AD 2. Register Schema using NetCA (once for the entire AD forest) 3. Create Naming Context using NetCA (once per domain) 4. Register Database in AD using DBCA or Net Manager 5. Configure Directory Naming and Directory Usage (AD) using NetCA (on systems that want to use AD) 6. Set NAMES.LDAP_AUTHENTICATE_BIND=Yes in SQLNET.ORA (11g and later clients) To support pre-11g Clients 1. Enable anonymous bind in AD 2. Change ACLs for Oracle Naming Context and Database/Net Services objects to allow anonymous access Please refer to the white paper Configuring Microsoft Active Directory for Net Naming for detailed information

Active Directory for Name Resolution OID and Active Directory Client OS Server OS AD OID Comments Windows Windows Yes Yes Windows Any Yes Yes Linux/Unix Any No Yes Tools for registering Net Service in AD must be run on Windows AD Integration solutions can be used

Program Agenda 1 2 3 4 5 6 Active Directory for Name Resolution Single Sign on Windows Native Authentication Kerberos Web Applications: Security Integration Q&A

Single Sign On Windows Native Authentication or OS Authentication (NTS) Kerberos SSL Independent of Active Directory for Name Resolution feature

Program Agenda 1 2 3 4 5 6 Active Directory for Name Resolution Single Sign on Windows Native Authentication Kerberos Web Applications: Security Integration Q&A

Windows Native Authentication Enabled by default and works across Windows systems Windows user logon credentials used for database authentication Optional Client-side sqlnet.ora parameter (new feature in 12.1) "no_ntlm, which can be set to "true to disable NTLM. (Note: this only works for Domain Users) For using Windows users as Database Administrative Users (e.g. / as SYSDBA) Do not need to create corresponding users in Database Authorization granted through Windows group membership For using Windows users as Database Regular Users (e.g. / ) Corresponding users must be created in Database Authorization mostly granted through Database Roles assigned to the Database User Optionally, authorization can be granted through Windows group membership (os_roles=true)

Windows Native Authentication SYSDBA and SYSOPER Privileges ORA_DBA All members get SYSDBA privileges for all Oracle Databases on the system ORA_OPER All members get SYSOPER privileges for all Oracle Databases on the system ORA_<HomeName>_DBA (12c) All members get SYSDBA privileges for Oracle Databases on a specific Oracle Home ORA_<HomeName>_OPER (12c) All members get SYSOPER privileges for Oracle Databases on a specific Oracle Home All the groups are on the server system

Windows Native Authentication Administrative Privileges for ASM Instance ORA_ASMADMIN (12c) All members get SYSASM administration privileges on the computer ORA_ASMDBA (12c) All members get SYSDBA privileges for ASM Instance on the computer ORA_ASMOPER (12c) All members get SYSOPER privileges for ASM Instance on the computer Note: ORA_DBA and ORA_OPER group members get SYSDBA and SYSOPER privileges for ASM instance in 11g and older releases only All the groups are on the server system

Windows Native Authentication Separation of Privileges ORA_<HomeName>_ SYSBACKUP (12c) All members get Backup privileges (SYSBACKUP) for databases on a specific Oracle Home ORA_<HomeName>_SYSDG (12c) All members get Data Guard Privileges (SYSDG) for databases on a specific Oracle Home ORA_<HomeName>_ SYSKM (12c) All members get Encryption Key Management privileges (SYSKM) for databases on a specific Oracle Home All the groups are on the server system

Windows Native Authentication Database Administrative Users 3 Negotiate security protocol and exchange security tokens Active Directory/ KDC MS Active Directory/KDC 1 - User signs on to desktop 2 - User attempts to sign on to Oracle Oracle Database 4 Find Windows identity of the user 5 Find Windows Group memberships for the user in predefined group(s) 6 Allow logon if the Windows user is a member of the required group(s)

Windows Native Authentication Database Administrative Users Ensure that sqlnet.authentication_services is set to NTS on both client and server in sqlnet.ora (default set up)

Windows Native Authentication Database Regular Users An external user needs to be created in Oracle DB e.g. create user SALES\FRANK identified externally; Role assignment based on Database Roles (default and most flexible) To enable role assignment based on Windows groups Set os_roles to true Create external role e.g. create role sales identified externally; Create corresponding Windows group and add members to that group e.g. Corresponding Windows group for a database with SID orcl: ORA_orcl_sales_d if this should be a default role.

Windows Native Authentication Database Regular Users 3 Negotiate security protocol and exchange security tokens Active Directory/ KDC MS Active Directory/KDC 1 - User signs on to desktop 2 - User attempts to sign on to Oracle Oracle Database 4 Use Windows identity to identify as a specific External User 5 Find Windows Group memberships (if os_roles is true) 6 Assign roles based on database roles or group memberships (based on os_roles)

Windows Native Authentication Configuration for Database Regular Users Ensure that sqlnet.authentication_services is set to NTS on both client and server in sqlnet.ora (default set up) Set os_authent_prefix to in init.ora Set os_roles to true in init.ora if you want to use Windows Group Membership for role authorization

D E M O N S T R A T I O N Windows Native Authentication

Program Agenda 1 2 3 4 5 6 Active Directory for Name Resolution Single Sign on Windows Native Authentication Kerberos Web Applications: Security Integration Q&A

Oracle Advanced Security Licensing Changes Network encryption (native network encryption and SSL/TLS) and strong authentication services (Kerberos, PKI, and RADIUS) are no longer part of Oracle Advanced Security and are available in all licensed editions of the Oracle database Please consult Database Licensing Guide for latest information

Kerberos Authentication Integrated with Microsoft Key Distribution Center (MSKDC) Supports heterogeneous systems A Windows client can connect to a non-windows server and vice versa Uses External User mechanisms in Database Supported with all Database Editions Can also be supported with Enterprise User Security

Kerberos Enhancements (11g) IPv6 Support Constrained Delegation support Supports Windows Server constrained delegation feature Middle tier applications can use Kerberos adapter and authenticate to Oracle DB on behalf of the Windows user (uses MS Credentials Cache) Connected User dblink support over Kerberos

Kerberos Enhancements (11g) Stronger encryption algorithms (AES) Support default encryption type supported by MS KDC Encryption type configuration no longer needed in Registry Use DNS Domain Name as Kerberos REALM name by default Mapping between DNS Domain Name and Kerberos REALM name no longer needed in kerberos config file Kerberos authentication to Oracle database in a MS crossdomain setup Removal of 30 character limit of the Kerberos user name (new limit is 1024 characters)

Kerberos Enhancements (12c) Security enhancements that were introduced in the MIT Kerberos Release 1.8 distribution In sqlnet.ora, set SQLNET.KERBEROS5_CC_NAME = MSLSA: (instead of OSMSFT:)

Kerberos Authentication Server configuration Create an user in Active Directory for Database Server (e.g. w7client.rtdom.netdev) On the Domain Controller Use ktpass utility (available from Microsoft) to create Kerberos "keytab" file ktpass -princ oracle/w7client.rtdom.netdev@rtdom.netdev -crypto all - pass Welcome1 -mapuser w7client.rtdom.netdev@rtdom.netdev -out v5srvtab Copy keytab file to DB server node Set os_authent_prefix to in init.ora Create Kerberos and sqlnet configuration files on the sever using Oracle Net Manager

Kerberos Authentication Windows Client Configuration Create Kerberos and sqlnet configuration files using Oracle Net Manager Set sqlnet.kerberos5_cc_name to OSMSFT: (Pre-12.1) or MSLSA: (12.1+) in sqlnet.ora so that the credential is retrieved from Microsoft Credential Cache [ On Linux/Unix Database Clients, use okinit <username> since Microsoft Credential Cache can not be used]

Kerberos Configuration Files krb5.conf files (Client and Server): [libdefaults] default_realm = RTDOM.NETDEV [realms] RTDOM.NETDEV = { kdc = W2k8Server.rtdom.netdev } [domain_realm].rtdom.netdev = RTDOM.NETDEV rtdom.netdev = RTDOM.NETDEV

Kerberos Configuration Files Sqlnet.ora (Server): SQLNET.AUTHENTICATION_SERVICES= (KERBEROS5) SQLNET.AUTHENTICATION_KERBEROS5_SERVICE = oracle SQLNET.KERBEROS5_CONF = C:\Temp\kerberos\krb5.conf SQLNET.KERBEROS5_CONF_MIT = TRUE SQLNET.KERBEROS5_KEYTAB = C:\Temp\kerberos\v5srvtab Sqlnet.ora (Client): SQLNET.AUTHENTICATION_SERVICES= (KERBEROS5) SQLNET.AUTHENTICATION_KERBEROS5_SERVICE = oracle SQLNET.KERBEROS5_CONF = C:\Temp\clientAdmin\kerberos\krb5.conf SQLNET.KERBEROS5_CONF_MIT = TRUE SQLNET.KERBEROS5_CC_NAME = MSLSA:

Kerberos Authentication User Creation An external user needs to be created in Oracle DB e.g. CREATE USER RTDOM\KRBUSER IDENTIFIED EXTERNALLY AS krbuser@rtdom.netdev ; Role assignment based on Database Roles Enterprise User Security can be used for role assignment based on group memberships (Optional)

Kerberos Authentication Active Directory/ KDC 3 Exchange security tokens to identify the Kerberos user MS Active Directory/KDC 1 - User signs on to desktop 2 - User attempts to sign on to Oracle Oracle Database 4 Identify as a specific External User and assign roles based on database roles Example: SQL> CREATE USER RTDOM\KRBUSER IDENTIFIED EXTERNALLY AS krbuser@rtdom.netdev ; SQL> Grant connect, resource to RTDOM\KRBUSER ;

Enterprise User Security Each person has one username/password (or identity) for ALL databases. Directory identities are mapped to database schemas. Directory groups are mapped to database roles. Oracle Directory Services

Program Agenda 1 2 3 4 5 6 Active Directory for Name Resolution Single Sign on Windows Native Authentication Kerberos Web Applications: Security Integration Q&A

Web Applications on Windows User Communities Active Directory/KDC Web Applications On Windows (IIS) MS MS KDC KDC Oracle Database Web User Authentication Web Application to DB Authentication Recommend the use of Application Context/Client ID for end-to-end auditing and security

Web User Authentication Solutions ASP.NET Membership and Role Provider for Oracle Validate and manage user and authorization information for your ASP.NET web applications in Oracle Database Oracle Database can be on any platform Oracle Identity Management solutions Integrated with Active Directory Supports heterogeneous environments Check http://www.oracle.com/technology/products/id_mgmt/index.htm These are Oracle provided solutions which can be used in addition to the solutions provided by Microsoft

Web User Authentication on Windows User Communities Active Directory/KDC MS KDC Web Applications On Windows (IIS) 2 2 Oracle Identity Management 2 ASP.NET Providers 1 Web User Authentication 1 ASP.NET Providers 2 Oracle Identity Management and AD integration Oracle Database

Web Applications to Database Authentication User ID/Password If you must use it, use Secure External Password Store (in Oracle Wallet) to store the password securely Database can be on any platform Windows Native Authentication or Kerberos Run Web Applications as Windows Services (specific Windows user) or use IIS mechanisms for mapping Web users to Windows users Use OS authenticated connection pool for performance Windows Native Authentication Database must be on Windows Kerberos authentication Set up Kerberos to use MS Credentials cache, i.e. "OSMSFT:" (or MSLSA;) Database can be on any platform

Web Applications on Windows User Communities Active Directory/KDC MS KDC 3 2 3 Oracle Identity Management 3 Web Applications On Windows (IIS) 1 2 3 Web Application to DB Authentication 1 User id and Password 2 Windows Native Authentication or Kerberos (no EUS) 3 Kerberos (with EUS) Oracle Database

Summary Oracle Database fully Integrated with Active Directory and Windows Security Name Resolution Single Sign On Security Integration for Web Applications

For More Information Windows Server System Center Oracle.NET Developer Center Identity Management

Questions and Answers