Authentication Proxy for the VistA Hospital Information System William Majurski Information Technology Laboratory.

Slides:



Advertisements
Similar presentations
automated single login access to Novell storage resources
Advertisements

The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
FI-WARE Testbed Access Control temporary solution.
The VeriTrak Enterprise Application Created for The Verification Company By CTO Source, Inc. This presentation provides an overview of the system and links.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Securing Insecure Prabath Siriwardena, WSO2 Twitter
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
Technical Architectures
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Ch 12 Distributed Systems Architectures
Introduction To Windows NT ® Server And Internet Information Server.
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California Building Secure Applications.
Client/Server Computing. Information processing is distributed among several workstations and servers on a network, with each function being assigned.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
HalFILE 3.0 Active Directory Integration. halFILE 3.0 AD – What is it? Centralized organization of network objects and security – servers, computers,
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Copyright © 2007, SAS Institute Inc. All rights reserved. SAS Activity-Based Management Survey Kit (ASK): User Management & Security.
The Design Discipline.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server 2008
User Manager for Domains.  Manages the user accounts in a domain  It is located in the PDC  While User Manager exists in each NT machine, but it is.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Using Novell eDirectory™ to Unify Cross-Platform Authentication at Florida Hospital Stephen Lynch Project Manager Florida Hospital
Designing Group Security Designing security groups Designing user rights.
DCE (distributed computing environment) DCE (distributed computing environment)
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
Windows XP. History Windows XP is based on the NT kernel developed in 1988 Windows XP is based on the NT kernel developed in 1988 XP was originally sold.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Netprog: Corba Object Services1 CORBA 2.0 Object Services Ref: The Essential Distributed Objects Survival Guide: Orfali, Harky & Edwards.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Cloud federation Are we there yet? Marek Denis CERN openlab Major Review Geneva, Switzerland › October
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 6 Rutgers University Center for Applied Computer Technologies Instructor: Chris Uriarte.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
ARCH-5: Service Interfaces in Practice Christian Stiller Technical Architect.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Network Access Control
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
SYSTEMSDESIGNANALYSIS 1 Chapter 21 Implementation Jerry Post Copyright © 1997.
Module 3 l Objectives –Identify the security risks associated with specific NT Services –Understand the risk introduced by specific protocols –Identify.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
1 Example security systems n Kerberos n Secure shell.
Lesson 6: Configuring Servers for Remote Management
Data and Applications Security Developments and Directions
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
EA C451 Vishal Gupta.
EMV® 3-D Secure - High Level Overview
Network Services.
Networks Software.
An Introduction to Computer Networking
Mobile Agents.
(Authentication / Authorization)
Presentation transcript:

Authentication Proxy for the VistA Hospital Information System William Majurski Information Technology Laboratory

RDOH’98 Department of Veterans Affairs Hospital System Serves medical needs of veterans 170+ medical centers 400+ outpatient locations Organized by region

RDOH’98 VistA Veterans Health Information Systems and Technology Architecture DHCP (Decentralized Hospital Computer Program) Server written in M (MUMPS) –Timesharing –Client/Server Administration - site/region

RDOH’98 Installed NT Network Currently supports administrative functions Uses NT Domain Model –Domain Controller –Centralized administration

RDOH’98 Basic Client/Server Client WS M Server Native ORB

RDOH’98 Problem Statement User population more mobile –Providers & patients dealing with more than one site VistA network of computing services becoming more tightly integrated. Current authentication scheme (userid/password) poses problems.

RDOH’98 Problem Statement (cont.) Each user must have account on each system associated with his patients. Must remember account names & passwords. Repeated authentication is time consuming and distracting.

RDOH’98 Approach Authentication Proxy –Network service that bridges security environments of Underlying network environment (NT) Hospital information system Solves –Multiple account –Repeated Authentication problems.

RDOH’98 Approach Specifics Authentication Proxy that translates NT authentication into VistA authentication Map NT user identity -> VistA user identity Automatically creating map Event log

RDOH’98 NT Authentication NT Domain –Collection of workstations and servers –Identified by domain name –managed from single administrator’s account User login –To domain –Servers trust domain controller –Servers can identify user account

RDOH’98 Critical Technology Security Support Provider Interface (SSPI) API to integrated security services Accessibility: –direct calls to API –RPC –Distributed Common Object Model (DCOM)

RDOH’98 Authentication Proxy Runs on server running NT Talk SSPI to client via DCOM Tightly coupled with M Server

RDOH’98 Architecture Client WS Authentication Proxy M Server DCOM NT NT (maybe) NT

RDOH’98 Userid/Password Client WS M Server NT (maybe) Setup => <= Challenge Userid/password => <= Valid

RDOH’98 Authenticate with Proxy Client WS Authentication Proxy M Server 1. Auth[user] => 2. Auth(NT user, Token) NT User -> M User 3. <= Token 4. Token => DCOM Token, NT user, expiration

RDOH’98 User Map Initialization NT identity from Authentication Proxy M Server identity from login/password

RDOH’98 Proxy Initialization M Server administrator must trust proxy On M Server –Special account with password –Security key (controls access to map object) On proxy –Install account/password

RDOH’98 Multiple M Servers Authentication Proxy can handle multiple M Servers M Server can trust multiple Authentication Proxies

RDOH’98 Event Logging Each authentication attempt is logged Information: –NT user –M user –Application context (application object) –Patient

RDOH’98 Object Technology + All the detail protocol handling –Provided by vendors –Managed by objects. Very small amount of code to be maintained –200 lines M Server –300 lines Proxy. Value of objects - packaging for reuse.

RDOH’98 Object Technology - Must understand many aspects of object –methods, initialization, interactions New uses for old objects –Documentation from “wrong angle” Comes with much integration (context) –Good as long as it is the right integration. Reuse battle has just begun

RDOH’98 Thank You.