Information Security and WebFOCUS Penny J Lester SVP Delivery Services August 22, 2008
Authentication “Authentication (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the thing are true. “
Authorization “Authorization (deciding whether to grant access) is a separate concept to authentication (verifying identity), and usually dependent on it.”
Google surveyed 575 IT professionals
Information Security A layered approach to authentication and authorization (auth/auth) –Physical –Network –Operating System (OS) –RDBMS –Application
Physical Security Secure the hardware –Active Reports Secure the server room Secure your passwords –Do not share it –Do not write it down
Network Security
Implement a single sign on (SSO) in a Windows network –Update the client odin.cfg
Network Security Implement a single sign on (SSO) in a Windows network –Update site.wfs
Network Security Implement a single sign on (SSO) in a Windows network –site.wfs (cont.)
Network Security Implement a single sign on (SSO) in a Windows network –site.wfs (cont.)
Operating System Security
Five authentication options –OPSYS –PTH –DBMS –LDAP –OFF
Operating System Security OPSYS –Authentication against OS –Authorization based on OS IDs Administrators have full access to web console OS ID impersonated to run reports
Operating System Security OPSYS – PLester57 is not an Administrator
Operating System Security OPSYS – Penny is the Administrator
Operating System Security OPSYS – authenticate ID to OS, not an Administrator
Operating System Security OPSYS – authenticate ID to OS, not an Administrator
Operating System Security OPSYS – authenticate ID to OS, is an Administrator
Operating System Security OPSYS – authenticate ID to OS, is an Administrator
Operating System Security OPSYS – authenticate ID to OS, is invalid
Operating System Security OPSYS – authenticate ID to OS, is invalid
Operating System Security PTH –Authentication against admin.cfg –Authorization if ID is in admin.cfg can access WebFOCUS Web Console and run reports if not can only run reports
Operating System Security PTH – Configured 1 administrator
Operating System Security PTH – Penny is administrator ID
Operating System Security PTH – ID “admin” is not administrator
Operating System Security PTH – ID “Penny” unrestricted access PTH – ID “admin” restricted access
Operating System Security DBMS –Authentication against Database vs. the OS –Authorization if ID is in the DBMS can run reports if ID is not in the DBMS cannot run reports Note: the ID’s must be set up in the DBMS to use SQL authentication vs. Windows authentication
Operating System Security DBMS – RDBMS must be up!
Operating System Security DBMS – Notice no IWA
Operating System Security DBMS Authentication –Penny Windows
Operating System Security DBMS Penny IWA
Operating System Security DBMS Authentication –SQLUser SQL Server
Operating System Security DBMS SQLUser SQL Server
Operating System Security LDAP –Authentication against LDAP file –Authorization if ID is in the LDAP file(s) can run reports if ID is not in the LDAP file(s) cannot run reports
Operating System Security LDAP
Operating System Security LDAP – Microsoft Active Directory
Operating System Security OFF – Danger!! “badID” can do anything the administrator ID that started the server can do!!
Database Security DBMS can be used for Authentication
Database Security Data Adapter – Explicit
Database Security Data Adapter – Explicit, invalid ID/pwd
Database Security Data Adapter – Password Passthru
Database Security Data Adapter – Trusted
Application Security Managed Reporting Environment
Application Security Managed Reporting Environment –Authentication
Application Security Managed Reporting Environment –Authorization
Application Security Managed Reporting Environment –Analytical User
Application Security Managed Reporting Environment –Content Manager
Summary A layered approach to authentication and authorization (auth/auth) –Physical –Network –Operating System (OS) –RDBMS –Application WebFOCUS hits four out of five!
Questions? Thank you!!