Kyle Brokaw – LDS Church Russ Lowenthal – Oracle Corp. Session #102 Enterprise User Security – One Companies Experience.

Slides:



Advertisements
Similar presentations
The following is intended to outline our general product direction
Advertisements

ASGC Site Update Yi-Ping Wu Jeng-Hsueh Wu. Two Significant Researches 1.Oracle Security issues and Studies for 3D 2.Streams Replications Study Report.
Self-Validation Tech Guide
Futures – Alpha Cloud Deployment and Application Management.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Making Identity and Access Management Real – The Early Days Brian Lauge Pedersen Senior Technology Specialist.
Understanding Active Directory
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Enterprise Reporting with Reporting Services SQL Server 2005 Donald Farmer Group Program Manager Microsoft Corporation.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Bonus Features Available Paid Add-ons in CSO Sam & Chris.
QC 9.2 Prepared By  Sriraman K. 2 Objectives Test Management Tool – What, Why, Benefits etc To make participants aware of Test Process and controlling.
Overview of Active Directory Domain Services Lesson 1.
Overview of Active Directory Domain Services Lesson 1.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Copyright © 2007, SAS Institute Inc. All rights reserved. SAS Activity-Based Management Survey Kit (ASK): User Management & Security.
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Global Customer Partnership Council Forum | 2008 | November 18 1IBM - GCPC MeetingIBM - GCPC Meeting IBM Lotus® Sametime® Meeting Server Deployment and.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Chapter 7: WORKING WITH GROUPS
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
INTRODUCTION What is a Web-Enabled Database? Problem and its Importance Two-tier Architecture Three-tier Architecture Need for a compatible centralized.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Deploying Oracle Names Jeff D’Abate Sr. Database Administrator Enterprise Application Services November 19, 2004.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Module 6: Configuring User Environments Using Group Policy.
Sudha Iyer Principal Product Manager Oracle Corporation.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
Oracle 10g Database Administrator: Implementation and Administration Chapter 2 Tools and Architecture.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
By Rashid Khan Lesson 6-Building a Directory Service.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 7: Implementing Security Using Group Policy.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
1 Active Directory Administration Tasks And Tools Active Directory Administration Tasks Active Directory Administrative Tools Using Microsoft Management.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Oracle HFM Implementation Boot Camp
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
15 Copyright © 2004, Oracle. All rights reserved. Adding JAAS Security to the Client.
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
Log Shipping, Mirroring, Replication and Clustering Which should I use? That depends on a few questions we must ask the user. We will go over these questions.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Step 1 Lead Notifications Dear Partner, New leads have been assigned to your organization based on customer preference and are available for you.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
Overview of Active Directory Domain Services Lesson 1.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Project Management: Messages
Using E-Business Suite Attachments
Implementing Active Directory Domain Services
Overview of Active Directory Domain Services
Active Directory Administration
SERVICENOW ADMIN & ADVANCED ONLINE TRAINING
To Join the Teleconference
Unit 3 NT1330 Client-Server Networking II Date: 1/6/2016
PSC Group, LLc Office 365/SharePoint Online Migration traps and tricks
Implementing Database Roles in the Enterprise Geodatababse
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Kyle Brokaw – LDS Church Russ Lowenthal – Oracle Corp. Session #102 Enterprise User Security – One Companies Experience

Speaker Qualifications Kyle Brokaw (OCP) – Core Technology Manager at the LDS Church. Russ Lowenthal (CISSP, CISM, CISA, OCM) - Oracle’s Protected Enterprise group. Kyle Brokaw implemented Enterprise User Security in February of Russ Lowenthal works with Oracle customers and often presents on Oracle’s security related products.

Before Implementation Decide what you need.

Licensing Must have Oracle 8i and higher Enterprise Edition Database. Oracle no longer considers Enterprise User Security a separately licensable database option (in Oracle 8i and Oracle 9i Release 1 EUS was part of the Advanced Security Option. Starting with Oracle 9iRelease 2 EUS moves under the umbrella of the Enterprise Edition database and the only thing that requires a license is the Oracle Directory Service (this includes both Oracle Internet Directory and Oracle Virtual Directory). As always, contact your customer service rep. to verify all of this information.

What is Enterprise User Security? EUS Allows Centralized User Management May be used with any application or tool that uses an Oracle Database login Integrates with other vendors products (Active Directory, OpenLDAP, etc.) Extensible – API’s to replicate data out of and into Oracle’s Internet Directory Single Sign-on is also possible with EUS

How does EUS work? Databases and Applications authenticate their users through Oracle’s Directory Services. Oracle Internet Directory

How does EUS work? Oracle 8i introduced the capability to store user information in a centralized directory. At logon the database checks DBA_USERS If the user name DOES NOT exist in the local data store, the database checks to see if EUS is enabled If the user name DOES exist within the directory, the database verifies that a valid mapping exists between the user name and a database schema. If one does, the database retrives a password verifier from the directory and compares it with the password submitted by the user.

How does EUS work? Multiple OID users can be mapped to one database schema.

How does EUS work? EUS Roles must be mapped to database roles. Example role 1 Example role 2 Example role 3 OID Roles

How Does EUS Work? In OID, databases can be placed within realms. (ie. dc=mycompany,dc=com) Each Realm can contain multiple domains. This is useful for: –Having a production, test, and dev realms with the same roles and users but with different privileges. –Manage different sets of users for different domains within the same company (ie. manufacturing is separated from HR) Roles are unique within a domain Database user to OID user mapping is also unique within a domain as well.

Enterprise User Events With the ability to subscribe to events within the directory, applications can automatically provision users. Subscribe to events Applications Event notification callback Oracle Internet Directory – Provisioning and Integration Server

Tools you need. Database Version Enterprise Security Manager Oracle Directory ManagerDBCA Oracle Wallet Manager 9i Server or client $ORACLE_HOMEVery UsefulRequired 10g Client $ORACLE_HOME onlyVery UsefulRequired 11g Part of Database ControlVery UsefulRequired

Before Implementation Decide on your roles To simplify administration in our usecase we created three global roles. –DBA –Application Support –Developer Each database also had a create_session role in OID. By default all users are mapped to all databases and given the role of their job (DBA, Application Support, or Developer) When someone needs access to a database they are simply granted the create session role. This simplifies and automates 90% of user setup when a new database is created.

LDS Church Implementation Setup and install issues –Separating the database from the application server (undocumented ports). –Moved to an appliance model. This allowed us to convince architecture to put a database in the application zone. –Wallets 9i requires type-3 SSL (requires SSL certs. on both sides). Make sure you have access to a certificate authority or have your boss buy off on creating your own. 10g uses type-1 SSL (no SSL certificates required). 11g wallet creation is broken in DBCA. See metalink note

Password Policies and on allow password policies to be set at any level within the directory. Prior to only realms can have password policies (this presents a problem). Password policies apply to databases as well as users. For older OID installations you may wish to register databases in a different realm than users to avoid this issue Policies within OID are not enforced on users when they logon to the database. The database logs on to OID using its password and then only verifies the password for the user.

After OID is installed Create a new configuration set. This can save you from invalid changes.

Adding Users and DBs to OID Default interface to oiddas is User roles within OIDDAS are not the same as EUS roles. DBCA will register the database within OID. This adds all of the OID entries required for EUS.

Using OIDDAS to Add Users

Adding Databases to OID DBCA Registration Using ESM to Assign a Domain (10g,11g) Create Groups Within a Domain

Using Enterprise Security Manager to Map OID users to DB Users

Examples of Events Availible for Applications to Subscribe. User Add User Delete User Changed

Steps to subscribing to events For PL/SQL –Create a package that contains the following Functions: FUNCTION user_exists ( user_name IN VARCHAR2, user_guid IN VARCHAR2, user_dn IN VARCHAR2) return NUMBER; FUNCTION group_exists ( group_name IN VARCHAR2, group_guid IN VARCHAR2, group_dn IN VARCHAR2) RETURN NUMBER; FUNCTION event_ntfy ( event_type IN VARCHAR2, event_id IN VARCHAR2, event_src IN VARCHAR2, event_time IN VARCHAR2, object_name IN VARCHAR2, object_guid IN VARCHAR2, object_dn IN VARCHAR2, profile_id IN VARCHAR2, attr_list IN LDAP_ATTR_LIST ) RETURN NUMBER;

Steps to subscribing to events Use oidprovtool to setup a application subscription Start the odisrv process to begin the subscription oidprovtool operation=create ldap_host=localhost ldap_port=389 ldap_user_dn="cn=orcladmin“ ldap_user_password=iougtest0 application_dn="cn=portal,cn=Products,cn=OracleContext,dc=localdomain,dc=com“ organization_dn="dc=localdomain,dc=com" interface_name=userprov.oid_event interface_type=PLSQL interface_connect_info=localhost:1521:oid03:userprov:iougtest0 schedule=60 event_subscription="USER:dc=localdomain,dc=com:DELETE" event_subscription="GROUP:dc=localdomain,dc=com:DELETE“ event_subscription="USER:dc=localdomain,dc=com:MODIFY(orclDefaultProfileGroup, userpassword)" event_subscription="GROUP:dc=localdomain,dc=com:MODIFY(uniqueMember)" oidctl connect=oid03 server=odisrv instance=1 configset=0 start

Integration with Other LDAP Compliant Directories

Integration Server Setup Step by Step setup guide for Active Directory guide can be found in metalink note Uses the same server (odisrv) as event subscription Automated configuration is available by using scripts that reside in $ORACLE_HOME/ldap/odi/admin

Oracle Virtual Directory What is OVD? How does it compare to OID? When should you use it?

Items Learned in this Session Today we covered: –How Enterprise User can benefit you. –How to setup Enterprise User –Things to look out for when setting up your environment –How you can integrate Enterprise User Security into you environment

Questions?

LAB

Thank You Thank you for attending our session “Enterprise User Security – One Companies Experience” Session #102 –Please fill out your evaluation forms –If you have further questions you can contact: Kyle Brokaw at “Without education we are in a horrible and deadly danger of taking educated people seriously.” G. K. Chesterton