TPM and TPM Security Technologies

Slides:



Advertisements
Similar presentations
Creating a Login Process Creating a users table and a login form that denies access to unauthorized users.
Advertisements

Forms Authentication, Users, Roles, Membership Ventsislav Popov Crossroad Ltd.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Chapter 5: Configuring Users and Groups. Types of User Accounts Administrator –Unrestricted access to performing administrative tasks –Use sparingly Standard.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Performed by:Gidi Getter Svetlana Klinovsky Supervised by:Viktor Kulikov 08/03/2009.
Chapter 5 Database Application Security Models
EmpowHR EmpowHR Security Overview. 2 Application Security Administration Permission List Roles User Profiles Row level security Distributed Security Administration.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Microsoft Networking.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Overview What is SQL Server? Creating databases Administration Security Backup.
Delivering Excellence in Software Engineering ® EPAM Systems. All rights reserved. ASP.NET Authentication.
1 ASP.NET SECURITY Presenter: Van Nguyen. 2 Introduction Security is an integral part of any Web-based application. Understanding ASP.NET security will.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Session 11: Security with ASP.NET
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
Forms Authentication, Users, Roles, Membership Svetlin Nakov Telerik Corporation
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
Module 6: Designing Active Directory Security in Windows Server 2008.
1 PHP and MySQL. 2 Topics  Querying Data with PHP  User-Driven Querying  Writing Data with PHP and MySQL PHP and MySQL.
Copyright 2000 eMation SECURITY - Controlling Data Access with
J2EE Structure & Definitions Catie Welsh CSE 432
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Module 9 Authenticating and Authorizing Users. Module Overview Authenticating Connections to SQL Server Authorizing Logins to Access Databases Authorization.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
EE 418 Software Engineering Term Project Objective : Departmental Software Collection Management Software.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Module 11: Securing a Microsoft ASP.NET Web Application.
Module 3 Managing Recipient Objects. Module Overview Managing Mailboxes Managing Other Recipients Configuring Address Policies Configuring Address.
Module 4: Managing Recipients. Overview Introduction to Exchange Recipients Creating, Deleting, and Modifying Users and Contacts Managing Mailboxes Managing.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Role Management in.NET Shree Shalini Pusapati CS /17/20151.
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
GUDURU PRAVEEN REDDY.NET IMPERSONATION. Contents Introduction Impersonation Enabled Impersonation Disabled Impersonation Class Libraries Impersonation.
Module 6: Data Protection. Overview What does Data Protection include? Protecting data from unauthorized users and authorized users who are trying to.
Preface IIntroduction Objectives I-2 Course Overview I-3 1Oracle Application Development Framework Objectives 1-2 J2EE Platform 1-3 Benefits of the J2EE.
® IBM Software Group ©IBM Corporation IBM Information Server Architecture Overview.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
1 Chapter Overview Understanding the Authentication Process Understanding the Authorization Process Creating and Managing Logins.
Autorisierung und rollenbasierte Sicherheit in.NET Anwendungen Jürgen Pfeifer Senior Architect Evangelist Developer & Platform Strategy Group Microsoft.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
6 Copyright © 2007, Oracle. All rights reserved. Managing Security and Metadata.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 Security Aspects of TPM 7.1.
Securely Managing VMS from a Windows Environment 1.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Architecture Review 10/11/2004
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
CollegeSource Security Application &
Module Overview Installing and Configuring a Network Policy Server
Consulting Services JobScheduler Architecture Decision Template
Configuring and Troubleshooting Routing and Remote Access
Radius, LDAP, Radius used in Authenticating Users
Introduction to SQL Server 2000 Security
Security mechanisms and vulnerabilities in .NET
IBM Certified WAS 8.5 Administrator
Database Driven Websites
Security Schedule: Timing Topic 40 minutes Lecture 70 minutes Practice
Intermediate Security Topics in SQL SERver
(Authentication / Authorization)
Designing IIS Security (IIS – Internet Information Service)
Security - Forms Authentication
Presentation transcript:

TPM 7.1.1 and TPM 5.1.1 Security Technologies Lewis Lo – TPM 7.1.1 and TPM 5.1.1 Security Technologies 23 Feb 2011 TPM 7.1.1 and TPM 5.1.1 Security Technologies

TPM 5.1.1.x Security Technologies TPM 5.1.1.x runs on WAS 6.0.x TPM 5.1.1.x adopts the default to denied access security policy. That, user does not have access to resources initially even where there is no restriction defined It offers an OS authentication service so that user for the application can be an OS user (Unix and Windows users) TPM 5.1.1.x uses the Access Group for grouping the resources to be protected LDAP is for role based security for UI security, access to menus and buttons in the UI page Two modes are supported in TPM 5.1.1.x which use LDAP Users and roles are in LDAP, authentication and authorization services obtain information from LDAP directly Only users are in LDAP, authenticating user consults LDAP. Roles information is obtained in TPM database. Support role base security for UI, access control, and workflow security Web service interface entitles to access control and workflow security Permissions for access control are part of the permissions in workflow security Source: If applicable, describe source origin

TPM 7.1.1 Security Technologies TPM 7.1.1.x runs on Maximo which runs on WAS 6.1.0.29 TPM 7.1.1.x is no longer a Web Application on its own It adopts the default to granted access security policy, that is, user has access to all resources if there is no restriction defined It offers a maximo authentication service, it is a proprietary authentication service which have users and user passwords stored in the database. Authentication is performed on Maximo security service, no interface to WAS security required It uses TPM provisioning group for security purpose Static group – members in static groups are managed explicitly Dynamic group – a query is defined for every dynamic group, and membership is determined at run time by running the query (similar to sql query) It supports two modes security services with LDAP Users and roles are in LDAP, authentication and authorization services obtain information from LDAP directly Only users are in LDAP, authenticating user consults LDAP. Roles information is obtained in Maximo database.

TPM 7.1.1 Security Technologies - Continued TPM 7.1.1 uses the notion of Security Group which is identified in LDAP Security Group is for UI, access control, and workflow security Web service interface entitles to access control and workflow security Permissions for access control and workflow security are decoupled Access control security uses Maximo security framework Workflow security uses TPM internal security framework FIPS enabled PKCS 12 formatted keystore and truststore are supported TLS is supported

Major differences in TPM 5.1.1 and TPM 7.1.1 Default to denied access Default to granted all access Access Group (static) for protected resources Provisioning groups (static or dynamic) for protected resources. Provisioning groups can be typed LDAP groups are for UI security only. Security for access control and workflow are managed separately LDAP groups are used for all security measures; including UI, access control, and workflow. Users in the same group will obtain the set of permissions granted to the same set of resources Support OS authentication service No OS authentication service No proprietary authentication service supported Support Maximo proprietary authentication service Non-FIPS FIPS supported with TLS protocol

TPM 7.1.1 security overview TPM 7.1.1 security consists of the following components Maximo Security Service : the engine to perform security related tasks, including authentication and authorization of users Data restriction component : defines the data restrictions for accessing the instances of object, read or write access Security Group : Contains the security information for the Maximo Security Service. Information includes user, permission, and resources to be protected. Provisioning Group : A TPM specific group to contain TPM objects, can be used for security purpose.

Role Base Security Maximo Security Service WebSphere Security Service 6 Maximo Security Service 1 7 2 5 WebSphere Security Service Users and Roles info LDAP 3 4

Control Flow of Authentication and Authorization User attempts to access TPM, and a challenge page is presented. User input username and password. Control passes to the Maximo Security Service Maximo Security Service delegates the authentication service to WebSphere WebSphere contacts the LDAP to retrieve user information, including the roles the user is a member of WebSphere performs a LDAP binding operation for the user, LDAP returns a response if the user provides a valid username and password Suppose the user enters a valid username and password, WebSphere returns a successful logon message to Maximo Security Service. Maximo Security Service consults the access control list for the TPM UI, the access control list contains information on what UI the role of the user have access to Maximo Security Service renders the UI pages based on the roles the user has and the access control lists of the UI for the roles

Instance Access Security There are two types of instance permissions Read/Write permission: governs the readonly and write access to an object. User can only write to an object if and only if he has write access to the instance of object. Workflow Security: a workflow is protected when permission is required to run Permissions required for a workflow is declared in the workflow definition User is assigned to a security group A permission group contains permissions A provisioning group contains TPM objects to be protected Example of protected workflow @requirepermission Software.Install clusterId @requirepermission Software.Start clusterId logicaloperation test.test (clusterId) LocaleInsensitive invokeimplementation

Example of running a Device Reboot workflow Provisioning Group (PG1) server1 Security Group (SG1) User 1 Device.Reboot permission User 2 Provisioning Group (PG2) server2 Security Group (SG2) Device reboot Workflow Device.Reboot permission

Example of running a Device Reboot workflow Security Group (SG1) has user members of user1 and user2 Security Group (SG2) has user member of user2 Provisioning group (PG1) contains sever1 which ties to Security Group (SG1) Provisioning group (PG2) contains server2 which ties to Security Group (SG2) Both security groups (SG1 and SG2) consists of the permission Device.Reboot User1 is granted permission Device.Reboot on server server1 User2 is granted permission Device.Reboot on servers server1 and server2, since user2 is a member of both security groups SG1 and SG2 When running a workflow that requires the permission Device.Reboot, User1 can only execute the workflow on target server1 User2 can execute the workflow on both targets, i.e. sever1 and server2

Role Mapping TPM 5.1.1.x to TPM 7.1.1 <?xml version="1.0"?> <Mapping> <Roles> <Role name="SystemAdministrator"> <ITUPRole>TPADMIN</ITUPRole> </Role> <Role name="InventorySpecialist"> <ITUPRole>TPCONFIGURATIONLIBRARIAN</ITUPRole> <Role name="SoftwareOperator"> <ITUPRole>TPCOMPLIANCEANALYST</ITUPRole> <ITUPRole>TPDEPLOYMENTSPECIALIST</ITUPRole> <Role name="ChangeApprover"> <Role name="AutomationPackageDeveloper"> <ITUPRole>TPDEVELOPER</ITUPRole> <Role name="ConfigurationAdministrator"> <Role name="ConfigurationOperator"> </Roles> </Mapping>

Resource Links to security groups and application access rights http://publib.boulder.ibm.com/infocenter/tivihelp/v28r1/topic/com.ibm.tivoli.tpm.scenario.doc/security/rsec_secgroupapp.html http://publib.boulder.ibm.com/infocenter/tivihelp/v28r1/topic/com.ibm.tivoli.tpm.scenario.doc/security/csec_predefinedgroups.html

For more security information, please visit our: TPM DeveloperWorks Wiki – Security and Audit http://www.ibm.com/developerworks/wikis/display/tivoliprovisioningmanager/Security+and+Audit TPM 7.2.0.1 Information Center – Security http://publib.boulder.ibm.com/infocenter/tivihelp/v45r1/topic/com.ibm.tivoli.tpm.scenario.doc/security/csec_security.html