Mobile Security for QlikView

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Microsoft Windows 8.1 Enterprise: A brief overview of Microsoft Windows 8 Enhancements. Welcome!
Session 11: Security with ASP.NET
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Microsoft DirectAccess & Work Folders NICHOLAS A. HAY MONROE COUNTY ISD
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Building Security into Your System Bill Major Gregory Ponto.
Module 11: Securing a Microsoft ASP.NET Web Application.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Integrating and Troubleshooting Citrix Access Gateway.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Information Systems Design and Development Security Precautions Computing Science.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
ArcGIS for Server Security: Advanced
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
MaaS360 MDM for iOS, Android & Windows Phone 7
Mobile Security for QlikView
Chapter 5 Electronic Commerce | Security Threats - Solution
Data Virtualization Tutorial… SSL with CIS Web Data Sources
DATA SECURITY FOR MEDICAL RESEARCH
Module Overview Installing and Configuring a Network Policy Server
Chapter 5 : Designing Windows Server-Level Security Processes
Securing the Network Perimeter with ISA 2004
Radius, LDAP, Radius used in Authenticating Users
Chapter 5 Electronic Commerce | Security Threats - Solution
Module 8: Securing Network Traffic by Using IPSec and Certificates
FTP - File Transfer Protocol
IBM Certified WAS 8.5 Administrator
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Public Key Infrastructure from the Most Trusted Name in e-Security
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
Chapter 10: Advanced Cisco Adaptive Security Appliance
Building Security into Your System
Designing IIS Security (IIS – Internet Information Service)
Tyler Technologies presents: What you need to know about upcoming changes to your New World ERP technical environment in Scott Alan Miller MCP,
Presentation transcript:

Mobile Security for QlikView June 2011

Common misconceptions about iPad/iPhone security They’re not as secure as Blackberry Data on the device is not secure They are easily ‘jailbroken’ Data protection doesn’t exist It’s easy to hack into the data stream over WiFi or 3G There is no support for VPN They don’t support existing IT security infrastructures There’s no support for Digital Certificates, SSL, SSO There is no central management capability No remote data wipe No integration with MS Exchange ActiveSync

QlikView Mobile: Security QlikView on iPad is a highly secure environment for deploying Business Discovery solutions There are three principle aspects to understand when approaching mobile security Device & Data Security Transmission Security QlikView native Security

QlikView Mobile: Security Device and Data Security iPad supports the following device-level protection Strong Password enforcement Local and over-the-air password enforcement RSA keyfob support Password retry limit Local wipe capability on limit exceeded Device (hardware) encryption 256-bit AES encryption Data Protection API’s Over-the-air remote wipe/kill capability Uses Exchange ActiveSync Encrypted iTunes backups QlikView for iPad does not cache or store data locally on the device. It uses a browser-based AJAX interface

QlikView Mobile: Security Transmission Security iPad supports the following secure communication methods VPN iPad has built-in CISCO IPSec, L2TP and PPTP support SSL/TLS WPA/WPA2 128-bit AES encryption Digital Certificates X.509 with RSA keys

QlikView Mobile: Security QlikView native Security QlikView integrates with existing SSO and LDAP solutions Perimeter authentication via AD & other SSO solutions HTTP headers, Ticketing Multi-tiered approach to deployment security Firewalled back end/front end QlikView Server handles user authorization Integrates with existing LDAP for group resolution

Typical Laptop security vs iPad security Strong alphanumeric password enforcement Centralized management Password retry limit Hardware-level data encryption VPN support Digital Certificate support Open USB ports? Easily removable harddrive? Local file and application structure Strong alphanumeric password enforcement Centralized management Password retry limit Hardware-level data encryption VPN support Digital Certificate support Open USB ports? Easily removable harddrive? Local file and application structure

Typical Blackberry security vs iPad/iPhone security Strong alphanumeric password enforcement Centralized management Password retry limit Hardware-level data encryption VPN support Digital Certificate support BES Communications logging Regulatory compliance Auto ‘push’ of policy updates FIPS 140-2 data encryption Strong alphanumeric password enforcement Centralized management Password retry limit Hardware-level data encryption VPN support Digital Certificate support No BES equivalent for logging Auto ‘push’ of updates through ActiveSync AES 256-bit encryption FIPS 140-2 at ‘Test’ stage of certification

Does any of this impact QlikView on iPad? In short: NO Why? QlikView for iPad does not store data on the device All questions about FIPS 140-2 encryption are irrelevant FIPS 140-2 is an extremely aggressive policy, used only by Governments/Military and some Financial Services institutions Logging of all mobile activity is usually only mandated by high-security environments like Govt/Military and some Fin Svcs QlikView Server will still log all activity to QlikView files

Common misconceptions about iPad/iPhone security They’re not as secure as Blackberry At the very highest levels, no. But for almost all organizations’ needs, this is false Data on the device is not secure: False They are easily ‘jailbroken’: Irrelevant: Data Protection API’s Data protection doesn’t exist: False: 256bit encryption; Data Protection API’s It’s easy to hack into the data stream over WiFi or 3G: False There is no support for VPN: False. CISCO VPN with iOS4 They don’t support existing IT security infrastructures: False There’s no support for Digital Certificates, SSL, SSO: False There is no central management capability: False. iPhone Configuration Utility permits this No remote data wipe: False. ActiveSync allows this No integration with MS Exchange ActiveSync: False

Summary There are have no worries proposing the QlikView for iPad solution when it comes to enterprise security!!

QlikView Mobile: Security Apple and QlikTech have a range of documents covering Mobile Security iPad Security Overview.pdf iPad Enterprise Deployment Guide.pdf iPad Deployment Scenarios.pdf QlikView Security Overview White Paper QlikView Development and Deployment Tech Brief

iPad Implementation Example Security requirements: Apply user certificate on iPad to authenticate the user on the mobile device Provide second authentication against active directory Authorize the QV document to the authenticated users Technical Details: QVS 10 SR2 Windows 2003 IIS 6, Safari User certificates on iPads for the users in PKCS#12 format along with certificate chain User certificates installed on the iPad using IPCU tool from Apple HTTP/SSL with tunneling enabled

iPad User Certificate A digital certificate is composed of a public and private key pair, along with other information about the user and the certificate authority that issued the certificate Certificates for the users in PKCS#12 format along with certificate chain Certificates are installed on the iPad using IPCU tool from Apple iPad profiles are signed and encrypted iPad profiles can not be used except with the assigned iPad Users are not able to remove profile unless they have the administrative password Certificates should not exceed 1024 bit encryption and need to be in RSA algorithm Microsoft public key certification authority (CA) is used to request user certificates. A CA is a service that issues and manages electronic credentials or certificates in a public key infrastructure (PKI)

User Certificate Setup Details Configure IIS Setup one to one mapping for user certificates on the IIS server. This provides IIS server with the authorize access to intended users only. Client certificate is used to authenticate the user. IIS website should already have a SSL certificate. Here are two scenarios for this configuration: IIS Server is not in domain ISS server is either in DMZ network or in Public domain. Creating a user account on the IIS server. This user is a local user on the IIS (QVUser). All certificate mapping is done against this local user account and then Qlikview application requests for active directory user name and password to authenticate users on the application. IIS Server is part of domain Authenticating users is done against local server using one local account and certificate is mapped to the local account

How is the user authenticated with a certificate? User iPad has the certificate which is issued by the internal CA. This user certificate has one public key and one private key. To prove the identity of the user, user need private key on the client side. Web server will validate the certificate submitted by the client and then allow access to this user   In case we want to remove access for application for any user, we need to remove the certificate map which we established on the IIS server Certificate map name plays an important role as the user certificate based is identified based on certificate map name and not the local account

Second Authentication Provide basic authentication against Active Directory How? Configure IIS security Necessary step to disable “Windows Integrated Security” as we want to authenticate the users not through IIS but by using QV code authenticate.aspx Enable “Anonymous Authentication” for the “QvAjaxZfc” and “QVClients” folder. Make sure that the username and password are valid. Modify authentication file Modify authenticate.aspx to get the end user prompted for username and password and to authenticate the user against the active directory. This is the second step on achieving double authentication. * Refer to “How to achieve double authentication on iPad with Safari” technical paper  

How does the solution work? Because of the one to one mapping and certificates applied on the 2nd IIS web server, when the user tries to open QV application URL from a desktop or from a mobile device that does not have user certificate, they see this page:

How does the solution work? The user connects to the IIS site and IIS requests for user certificate which is already created on iPad. User is prompted for certificate and submits its public key to the IIS server. Considering user has the correct certificate and IIS recognizes this certificate, then IIS encrypts the contents using user public key and sends back to the user. As user has both of the keys, user decrypts the contents sent by IIS using own private key and starts communication with the IIS server. The next step is the second authentication. User gets prompted for the username and password to get authenticated against the active directory. The final step in the process is to give the authenticated user access to the authorized documents.

Thank You Q&A