Download presentation
1
Securing Your OnBase Solution
By Ryan Saunders
2
Who is this guy? Customer Care Team Part-Time Developer
Senior Software Support Engineer Employed at Kiriworks since June of 2012 Part-Time Developer Avid Security Enthusiast Is that really a thing? Customer Care Team Formerly Security Micro Imaging In the past year, I’ve started developing a Performance and Monitoring application for our Managed Service offering. Throughout the process of developing this application, I’ve become somewhat of a security enthusiast. I’ve had to work through some of the main deployment concerns that our customers with OnBase solutions have as well.
3
Topics covered in today’s presentation:
What it means to be secure. Q: My solution isn’t completely secure? Hint: Nope Who should care about the security of your solution. Q: Isn’t that someone else’s job? What can be done to increase the security of your solution. Q: Ok ok, I give. What can I do to fix this? Hint: Follow along with the presentation
4
What it means to be secure
Completely Secure Solution -> Reality: There is no such thing as a completely secure solution. We have to do the best to control security where we are able.
5
What should I be concerned about?
Software Exploits Defects within the OnBase or any other application that unintentionally allow access to protected data Malware Software which infects other files / processes. Phishing Authentic looking , webpages, etc that steal information. 1000s of additional attacks
6
How can I minimize risk? Software Exploits Malware Phishing
Ensure that your OnBase solution stays up to date with the current Service Pack for that version -> Minimize attack surface Malware Lock down and isolate your OnBase files -> Minimize attack surface Phishing Train users to spot phishing attacks. Update spam filters Require encrypted traffic
7
Minimize the attack surface
Principle of Least Privilege Give a user account (or a service account) only those privileges which are necessary to perform the work required. Also known as LUA Least User Access Least-privileged User Account Helps improve system security, even if you can’t prevent the attacks (exploits in OnBase or elsewhere). -Other key point -?
8
Why focus on System Security?
Foundation Security within OnBase means nothing if the data isn’t secure from the outside world Legal Audits Personnel Files HIPAA -All the extra work you put in designing elaborate security systems for OnBase are for naught if your data is accessible by people outside the system. -Audits: You can have confidence that the files were only accessed by those that were supposed to be able to access the files. - Personnel Files -HIPAA: Patient Confidentiality, Workflow solutions that are data centric, etc.
9
Who should care about this?
OnBase Administrators Business Process Owners Confidentiality IT Security Teams Best Practices Exposure End users Personnel files Executives Financial incentives to expand solution
10
So what makes up the ‘OnBase System’?
Application Server(s) AppServer Application Pool * Processing Server (s) Processing (DIP / COLD / SCAN) Workflow Timer Service Web Server(s) Public facing / Web Client / Forwarding AppNet Application Pool * Network Traffic So now that we’ve covered off on who should be concerned with the security of the system, I’d like to take a brief minute to go over what I mean by System. * Default Name
11
What makes up the ‘OnBase System’?
Thick Client / Configuration Database Autofill from external systems – Static or Dynamic OnBase Database Diskgroups Network Attached Storage - NAS Server Shares
12
Poll Time – User Base Who here has a primarily Core-based User Base? (Web Client or Unity Client)
13
Core-Based Modules Unity Client Outlook /Office Integration
App Enabler Workflow Workview Case Manager Many more…..
14
Application Server Does all the heavy lifting within OnBase
SoA Architecture Service Oriented Architecture Controls and provides data to all connected clients and integrations Relies on IIS (Internet Information Services) ‘AppServer’ Application Pool
15
Application Server By default all new Application Pools created in IIS rely on a local account
16
Available Accounts OBAppServer FILES01 Network Service OnBase
DiskGroups
17
Available Accounts NETWORK SERVICE Built-in windows account
Presents itself as the machine the connection is coming from Network Service (On OBAPPSERVER) -> SANDBOX\OBAPPSERVER
18
Network Service as OBAppServer
Available Accounts OBAppServer FILES01 Network Service OnBase DiskGroups OBAppServer FILES01 Network Service as OBAppServer OnBase DiskGroups
19
Network Service as OBAppServer
Available Accounts OBAppServer OnBase FILES01 Network Service as OBAppServer DiskGroups InfoStealer.exe
20
SANDBOX/PrivilegedUser
Available Accounts OBAppServer FILES01 OnBase DiskGroups SANDBOX/PrivilegedUser
21
SANDBOX/PrivilegedUser
Available Accounts OnBase DiskGroups SANDBOX/PrivilegedUser
22
Well that was a tuuuuuuuurrible idea
Do not under any circumstances use a privileged Domain Account to run your OnBase Application Pool. Here is why:
23
Well, what now? Active Directory (PrivilegedUser) Network Service Pros
Built-in account Low Privileges by default Cons Exposes your data to other processes that run as Network Service Active Directory (PrivilegedUser) Pros Used Only for OnBase Cons The account credentials are easily found out.
24
Well, what now? These are concerns every web-based solution faces.
Solution -> Identity Impersonation Think LUA! OBAppServer OnBase FILES01 DiskGroups PrivilegedUser
25
Impersonation – How? Best Scenario Next Best Scenario
Use it for all new deployments. The account setup and encryption is handled by the Server Side Installer. Next Best Scenario Consult the Application Server Module Reference Guide & MSDN for additional instructions
26
Poll Time - Impersonation
If you have a Core-based userbase, are you using Impersonation currently?
27
Impersonation Do It. Use It. The End.
28
So what makes up the ‘ OnBase System’?
Application Server(s) AppServer Application Pool Processing Server (s) Processing (DIP / COLD / SCAN) Workflow Timer Service Web Server(s) Public facing / Web Client / Forwarding AppNet Application Pool Network Traffic
29
Processing Server Scheduled Scan Processes Document Import Processor
Barcodes / Advanced Capture Document Import Processor Imported ‘As-Is’ with an import file & keywords COLD Text only Workflow Timer Service Moves documents throughout workflow
30
Processing Server Scheduled Scan Processes Document Import Processor
Docs on another file server / share? Document Import Processor Docs on another file server/ share? COLD Docs on another file server / share? (Ok you’ve said that enough)
31
Impersonation & Service Account Guidelines
Preferably separate accounts, but more important that: Do not nest account within non OnBase AD User Groups Do use domain account ONLY intended for OnBase usage Do not make the account on administrator on ANY server Do think LUA!
32
Impersonation & Service Account Guidelines
Do not nest account within non OnBase usergroups Ideally grant OnBase account permissions explicitly Do use domain account ONLY intended for OnBase usage
33
Impersonation & Service Account Guidelines
Do not make the account an administrator on ANY server There is no OnBase service or process that requires administrative privileges on a server. Exposes other systems to additional risk for compromise
34
Impersonation & Service Account Guidelines
Do not make the account on administrator on ANY server
35
Impersonation & Service Account Guidelines
Do not nest account within non OnBase User Groups Do use domain account ONLY intended for OnBase usage Do not make the account on administrator on ANY server Do think LUA!
36
So what makes up the ‘ OnBase System’?
Application Server(s) Processing Server (s) Workflow (NT Service) Processing (DIP / COLD / SCAN) Workflow Timer Service Web Server(s) Public facing / Web Client / Forwarding Network Traffic
37
Web Server ‘AppNet’ Application Pool Web Client -> DocPop PDFPop
E-Forms DocPop PDFPop Public Access Viewer Pass-through to Application Server
38
Network Traffic HTTP – Hypertext Transfer Protocol
Backbone of most internet traffic Not encrypted Can be snooped on by anyone listening in between the origin and destination This is a problem ^
39
Network Traffic Solution -> HTTPS Two Main Standards
SSL (3.0) – Secure Sockets Layer Older Broken TLS (1.2) – Transport Layer Security Newer Data security is important for all systems
40
Network Traffic Blue = Not enabled by default
41
Poll Time - HTTPS Are you using HTTPS on your Web Server?
Are you using HTTPS on your Application Server?
42
Web & Application Server Data Security
Upgrade those Web & App Servers Use HTTPS OnBase To ensure the data you’re receiving is authentic & private. System To protect account credentials & password hashes
43
Web & Application Server Data Security
Solutions with DocPop “The HTTP logon method should not be used in production environments because it passes the username and password in clear text on the query string” Source: SecurityBestPractices MRG So again, please use HTTPS on Web Servers
44
Web & Application Server Data Security
Use HTTPS on Application Servers as well If you’re concerned about load and are virtualized.. Setup more Application Servers Use a Load balancer if you have one available Extremely efficient at decrypting connections
45
So what makes up the ‘ OnBase System’?
Application Server(s) Processing Server (s) Workflow (NT Service) Processing (DIP / COLD / SCAN) Workflow Timer Service Web Server(s) Public facing / Web Client / Forwarding Network Traffic
46
What makes up the ‘OnBase System’?
Thick Client / Configuration Diskgroups Network Attached Storage - NAS Server Shares Database Autofill from external systems – Static or Dynamic OnBase Database
47
Thick Client Security Security Concerns
Clients require direct access to files End users responsible for data processing can browse/delete through windows explorer Administration nightmare
48
Message of Doom
49
Poll Time – Thick Client Security
If you have a primarily Thick Client userbase, are you using DDS? If you aren’t, do you know what DDS is?
50
Thick Client Security– Solution!
DDS – Distributed Disk Services A secure port employs a single access point for OnBase file retrieval File servers can be kept behind a firewall. The firewall only needs access to a secure port, No UNC traffic. Minimal/No administration needed to control file access ONLY one account is used to grab documents within OnBase
51
Diskgroup Security++ Encrypted Disk Groups
Ensures that even if your OnBase AD Account is compromised, the attacker won’t have easy access to your data. 128 or 256 bit AES encryption. Separate license Talk to your Account Manager if you have questions regarding pricing
52
What makes up the ‘OnBase System’?
Thick Client / Configuration Diskgroups Network Attached Storage - NAS Server Shares Database Autofill from External Systems – Static or Dynamic OnBase Database
53
Database Security OnBase relies on a connection the database to function These database password are hard-coded into the software HSI, HSINET, HSICORE & VIEWER. This can also be a problem ^
54
Database Security When necessary, OnBase can be configured to use non default database account passwords throughout the solution. However, this is not a simple task and requires significant changes in an already deployed solution, especially in a large environment. If you have additional questions about this procedure, please come see the Customer Care Team or us .
55
Database Security Best Practices
When creating a new ODBC connection – always use the VIEWER account (rather than HSI) to create it.
56
Database Security Best Practices
Check -> Use Strong Encryption for Data Ensures that data is protected while in transit from the OnBase database and the Application Server or OnBase Client.
57
Database Security Best Practices
Disable Workstation Account Creation Users -> Global Client Settings -> Security in OnBase Config Allows DBAs to remove the Security Admin role from HSI.
58
What makes up the ‘OnBase System’?
Thick Client / Configuration Diskgroups Network Attached Storage - NAS Server Shares Database Autofill from External Systems – Static or Dynamic OnBase Database
59
Fast forward a year…. In the beginning, you applied the principle of LUA to your userbase. But over time, you didn’t audit your privileges. Time for a story. On a Friday, Kyle’s boss burst into his office demanding his case reports. Kyle the case worker used to be Kyle the data entry guy. As kyle started to fill out the the data for his reports, he noticed that one of the documents had been scanned in as landscape instead of portrait. Not wanting to upset his boss (who was extra feisty) he used his old rights as a data entry guy to purge the document out and re-scan it. Only he didn’t have the paper copy, and neither did the person who was responsible for scanning it. Now instead of getting an ugly report, his boss was going to get a report with missing documents. If the company had continued to employ the principle of LUA and audit his privileges, he would never have been able to make that hasty mistake.
60
Reports Available in OnBase
OnBase Configuration -> Reports User Accounts User Groups & Rights Active Directory Security Stored in SYS – Configuration Reports
61
Summary Think LUA – Least User Access
Every module (process / user / program / etc) must be able to access only the information and resources that are necessary for its legitimate purpose Create AD accounts to run the OnBase infrastructure, but only use them for that. Do not repurpose highly privileged accounts. Use Impersonation on the Application Pools. DDS and Encrypted Disk Groups are available for those that require more control over file access Use HTTPS whenever and wherever possible. HSI should only be used by the OnBase application itself, you don’t need to enter its password anywhere else If you have any questions, please ask!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.