Encryption of Global Properties Richard McKnight Principal Consultant at Alfresco.

Slides:



Advertisements
Similar presentations
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Advertisements

28 March 2003e-MapScholar: content management system The e-MapScholar Content Management System (CMS) David Medyckyj-Scott Project Director.
Chapter 5: Hiding implementation ● Two viewpoints regarding classes: – Implementor of a class: knows everything about class – User of a class: Only wants.
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Unveiling ProjectWise V8 XM Edition. ProjectWise V8 XM Edition An integrated system of collaboration servers that enable your AEC project teams, your.
Information Security Policies Larry Conrad September 29, 2009.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
MITP 458 Application Layer Security By Techjocks.
CONTENT: A model for collaborative database building Trevor Bond Alan Cornish Washington State University Libraries.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Access control and user management in Apache 1WUCM1.
SiS Technical Training Development Track Day 7. Agenda  Understand Component Interface  Understand Excel to CI  Practice Data Loading using ECI (Instructor.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
GyanSys Contact: Phone: Simplified Document Management Faster, Better, Stronger Search Integration - Site Mailbox.
1 © 2001, Cisco Systems, Inc. All rights reserved. Voice Connector Features Voic Interoperability – 4.0(5) Voice Connector features Rahul Singh.
Talend 5.4 Architecture Adam Pemble Talend Professional Services.
WorkPad 4 Quick Start WorkPad 4 Quick Start  Business Optix brings the rigor and discipline of business modelling and design into.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Interoperability with CMIS and Apache Chemistry
OCLC Online Computer Library Center CONTENTdm ® Digital Collection Management Software Ron Gardner, OCLC Digital Services Consultant ICOLC Meeting April.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
COMP-14: Automating your deployments using ANT Gary S Clink Business Consultant.
Enticy GROUP THE A Framework for Web and WinForms (Client-Server) Applications “Enterprise Software Architecture”
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Configuring Encryption and Advanced Auditing
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Accelerating Development Using Open Source Software Black Duck Software Company Presentation.
Module 9 Configuring Messaging Policy and Compliance.
153 Brooks Road, Rome, NY | | 153 Brooks Road, Rome, NY | |
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP Library Encryption - LTO4 Key.
1 Windows 2008 Configuring Server Roles and Services.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
Experts Workshop on the IPT, v. 2, Copenhagen, Denmark The Pathway to the Integrated Publishing Toolkit version 2 Tim Robertson Systems Architect Global.
JCR Content Management Jukka Zitting
Technical Overview. Project Overview Document Library Document List Index TransmittalsPlanning.
Austin Java Users Group 2005-Feb-22 Presented by Matt Albrecht.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
How to Set Up a System for Teaching Files, Conferences, and Clinical Trials Medical Imaging Resource Center.
Passw3rd Neil oreoshake. What is it? Cross-platform, cross-language password management for applications Keeps passwords out of.
GOSS iCM Gary Ratcliffe. 2 Agenda Webinar Programme V10 Overview Version Information Supported Browsers Architectural Changes New Features.
1 FESA architecture v.1.0 Framework Configuration & Data-entry Tool 5 th December 2003.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Business Data Integration with MOSS 2007 Naveedullah Khan PMP, MCAD.NET Senior Consultant.
© Ciena Confidential and Proprietary Keycode Manager Welcome Kit - MEN Network Management Licenses Elisabeth Roy January 31st, 2011 V1.0.
Maven. Introduction Using Maven (I) – Installing the Maven plugin for Eclipse – Creating a Maven Project – Building the Project Understanding the POM.
Audit API : Hints and Tricks Mehdi BELMEKKI, Consultancy Team Alfresco.
Best Practices for Alfresco Replication, Backup and Disaster Recovery Richard McKnight Principal Consultant Brian Long Principal Consultant.
MasterCard Global Marketing Center An Alfresco Case Study Jay Mandel, MasterCard International Mike Vertal, Rivet Logic Corporation 15 November 2012.
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
#SummitNow Dynamic Data List Driven Constraints in Share November 14 th, 2013 Tony Parzgnat – Technology Services Group.
Computing in High Energy and Nuclear Physics 2012 May 21-25, 2012 New York United States The version control service for ATLAS data acquisition configuration.
Chapter 7. Identifying Assets and Activities to Be Protected
Product Training Program
CollegeSource Security Application &
Visit for more Learning Resources
Document & Web Content Management
EPIC INFOTECH CONSULTING GROUP
Lesson 1: Introduction to HIPAA
Chapter 9: Managing Groups, Folders, Files, and Object Security
Designing IIS Security (IIS – Internet Information Service)
SDMX IT Tools SDMX Registry
Presentation transcript:

Encryption of Global Properties Richard McKnight Principal Consultant at Alfresco

What we will cover Why encrypt global properties? A look the technical implementation details. How to configure it. Where to get it.

Why Encrypt The biggest threat to data security comes from within Many organizations have policies to limit access to critical data and content sources

How Do Encrypted Properties Protect Data Limit access to back end components. Remember that the Alfresco repository has the following components Metadata which lives in the Database Content which lives in the file system Search indexes which also live on the file system.

How Do Encrypted Properties Protect Data A rogue employee with R/W access to both the database and the file system could Gain access to restricted content. Modify the state of the repository. Bypass auditing when doing all of the above without being detected

How Do Encrypted Properties Protect Data Without access to all the back end components. All access and updates to content must go through the Alfresco repository server Access through the repository server will trigger auditing Many organizations do not let developers access production systems.

Who Asks for this? Organizations that typically ask for this are: Government Agencies Financial Institutions Health Care Organizations This is useful for any organization that must safeguard sensitive information.

How We Did it Jasypt (Java Simplified Encryption) Library Public key to encrypt the sensitive properties Private key to decrypt the sensitive properties Encrypted properties exposed via an extension of PropertyPlaceholderConfigurer

Configuration Tools Public/private key generation utility Property encryption utility Special properties file to include the encrypted property values.

Runtime Support Repository Properties Shared Properties Property Placeholder Configurers Repository Properties Shared Properties Global Properties

Runtime Support Repository Properties Shared Properties Encrypted Properties Property Placeholder Configurers Public Private Key Encryptor Encrypted Properties Private Key Repository Properties Shared Properties Global Properties

We Do Not Use the Keystore The location of the keystore is defined in the properties files This information is not available at the time that access to the private key is needed. The private key is located in a specific location under $ALFRESCO_HOME

How to Configure it Generate the Public and Private Keys Protect the Private Key Generate the encrypted values for your sensitive properties Add these properties to the encrypted properties files Use the properties in alfresco- global.properties

Process Key Generation Public Key Plain text property Encryption Private Key Encrypted Property chmod Encrypted Properties File Global Properties File Create Encrypted Properties File Use Encrypted Properties

Process Key Generation Public Key Plain text property Encryption Private Key Encrypted Property chmod Encrypted Properties File Global Properties File Create Encrypted Properties File Use Encrypted Properties

Process Key Generation Public Key Plain text property Encryption Private Key Encrypted Property chmod Encrypted Properties File Global Properties File Create Encrypted Properties File Use Encrypted Properties

Sample alfresco-encrypted.properties db.password.enc=ENC(QcAf1Lr81meuP2p6Lu9ZQqFY1AsCfoWd)

Process Key Generation Public Key Plain text property Encryption Private Key Encrypted Property chmod Encrypted Properties File Global Properties File Create Encrypted Properties File Use Encrypted Properties

Sample alfresco-global.properties db.password=${db.password.enc}

How Can I Get This? This will be part of Alfresco Version 5-0

What if I Can’t Wait? Please consult support regarding availability of a 4.x version of this.

Thank You! Rich McKnight