28
Cross Platform Security using IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist [email protected] Acknowledgement Daniel TumSuden - IBM/Tivoli Systems

Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Embed Size (px)

Citation preview

Page 1: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Cross Platform Security using IBM's Websphere;

take the Security Challenge !Paul de Graaff

IBM Field Technical Sales Specialist

[email protected]

Acknowledgement

Daniel TumSuden - IBM/Tivoli Systems

Page 2: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Agenda

Introduction

Authentication

Websphere Authentication

Websphere Single Signon

Websphere Authorizations

Websphere Application Security

Introduction

Page 3: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

What is Security ?

measures taken to guard against espionage or sabotage, crime attack or escape

freedom from danger

freedom from fear or anxiety

Note: Merriam-Webster's Collegiate Dictionary

protection from unwanted attacks !

Note:W. Kou Networking Security and Standards

Should we care about Security ?

Computer World Article 01/03/2001

CIOs not worried about Security !!!!!!!!

Page 4: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Elements of Websphere Security

Operating System Security

JVM

Java Security Classes

CORBA Security

EJB Security

Websphere Security

Platform Security

JAVA Security

Websphere Security

htmlCGIServlet/JSPsEJBs

Websphere Resources

access control

AdministrativeServer

Websphere Security Architecture

Web ServerWeb ServerWeb ServerWeb ServerHTTP

Web client

stand-alone orjava client or applet

IIOP

Security Plug-in

Security Collaborator

Web ServerWeb ServerApplication Application ServerServer

Web ServerWeb ServerWeb ServerWeb Server

SecurityApplication

WebServerResources

HTMLCGIs

Images

access controlaccess control

access control

WebSphereResources

EJBsJSPs

Servlets

Page 5: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Authentication

Architecture Choices for Web Security

Where to authenticate: On a multipurpose web server, or a hardened gateway?

Where to place web servers: in a DMZ, or in a trusted zone?

How many entry points to your secured network - many or few?

How many software distribution points - many or few?

Entry-point security only, or End-to-End security?

Page 6: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Where to Authenticate: on a multipurpose web server, or on a hardened gateway? (scenario 1)

Customers PartnersHackers

(if authenticating users on a

multipurpose web server)

Note: These Web servers have access

to sensitive data

Enterprise Data

Some security designs run authentication checks only once a user reaches your web servers. Hackers and others without credentials will reach…

…a non-hardened box having access to sensitive data, leaving little or no margin for error with any security weakness.

Firewall Layer(s) let thru http traffic

Hackers are not challenged until they

reach web servers. The web servers are not hardened, and they have access to sensitive data.

Architecture Choice 1:

Customers PartnersHackers

(if authenticatingon a hardened

gateway)Firewall Layer(2)

Note: These Web servers have access

to sensitive data

Users without credentials are stopped here at the hardened gateway

Security checks stop hackers here at the hardened gateway

TrustedZone

Firewall Layer(1) lets thru http traffic

Hackers don’t reach the web servers

DMZ

InternetZone

Best security practices recommend defense in depth: Stopping unauthenticated users in the DMZ (above) ……

……and securing machines with access to sensitive data in a more trusted layer (here).

Enterprise Data

Where to Authenticate: on a multipurpose web server, or on a hardened gateway? (scenario 2)

Architecture Choice 1:

Page 7: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Customers PartnersHackers

(if placing webservers in the DMZ)

Firewall Layer(2)

Note: These Web servers have access

to sensitive data

Enterprise Data

Some security tools can only authenticate at your web servers. To keep unauthenticated users out of the trusted zone, you must move your web servers into the DMZ ……

……This does not offer protection as strong as placing your web servers in the trusted zone.

Firewall Layer(1) lets thru http traffic

TrustedZone

DMZ

InternetZone

Where to place web servers: in a DMZ, or in a trusted layer? (scenario 1)

Architecture Choice 2:

Customers PartnersHackers

(if placing web servers in a trusted layer)

Firewall Layer(2)Note: These Web

servers have access to sensitive data

Users without proper credentials are stopped

here in the DMZ

Security checks stop hackers here in

the DMZ

TrustedZone

Firewall Layer(1) lets thru http traffic

DMZ

InternetZone

Best security practices recommend defense in depth: Stopping unauthenticated users on a hardened machine in the DMZ (above) ……

Enterprise Data

Where to place web servers: in a DMZ, or in a trusted layer? (scenario 2)

Architecture Choice 2:

Page 8: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Customers PartnersHackers

1 2 3 4 ………….. “N”

Firewall Layer(s)

………

(if using many entry points)

WEB SERVERS

How many entry points to your secured network: many or few? (scenario with "many")

Architecture Choice 3:

Customers PartnersHackers

1 2 3

Firewall Layer(s)

(if using few entry points)

……While other security designs let you open only a few entry points into your secured network, regardless of the number of web servers you are protecting.

How many entry points to your secured network: many or few? (scenario with "few")

Architecture Choice 3:

Page 9: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Customers PartnersHackers

1 2 3 4 ………….. “N”

Firewall Layer(s)

………

(if using many entry points-an example)

“oops…we forgot about one of our many entry points, and forgot to apply a needed fix there. That’s

how they initially broke in.”

If using a high number of entry points, it is more likely that one will be mis-configured or forgotten……

WEB SERVERS

“N+1”

How many entry points to your secured network: many or few? (potential exposure with "many")

Architecture Choice 3:

Customers PartnersHackers

1 2 3 4 ………….. “N”

Firewall Layer(s)

………

(if using many entry points -an example)

……and with some designs, a break-in at the weakest point means that all your resources are now compromised.

How many entry points to your secured network: many or few? (potential exposure with "many")

Architecture Choice 3:

Page 10: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

1 2 3 “N”

Firewall Layer(s)

……

(if security code is distributed to many points)

Software distribution server

Some security designs require platform-specific security code to be distributed & QA’d for each

unique combination of OS, OS release, web server, and web server release………

Netscape on Solaris

2.6

Web-Sphere on

OS/390

IIS 3 on NT

Netscape on Solaris

2.7

Netscape on NT

IIS on 2000

Apache on HP

Netscape on AIX

IIS 4 on NT

Number of software distribution points: many or few? (scenario 1)

Architecture Choice 4:

1 2 3 “N”

Firewall Layer(s)

……

(if security code isdistributed to few points)SW dist.

server

IIS on NT

Netscape on NT

IIS on 2000

Apache on HP

Netscape on AIX

……while other security designs require security code be deployed only to a smaller number of boxes – even if you are securing many servers (as

shown below)

Number of software distribution points: many or few? (scenario 2)

Architecture Choice 4:

Page 11: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Do you want Entry-point security only, or End-to-End security?

Customers PartnersHackers

Firewall Layer(2)

TrustedZone

Firewall Layer(1)

DMZ

InternetZone

If using only entry-point security, systems and flows in blue are secured………

……and systems and flows in red are not secured (not by your web security tool).

Enterprise Data

WebMQ MQWeb

JavaWebhttp

WebCORBA

(if using entry-

point security only)

Architecture Choice 5:

Do you want Entry-point security only, or End-to-End security?

Customers PartnersHackers

Firewall Layer(2)

TrustedZone

Firewall Layer(1)

DMZ

InternetZone

End-to-end security means securing not just the “front door”, but also securing……

… internal flows & data stores under a single framework, avoiding “islands of security”.

Enterprise Data

WebMQ MQWeb

JavaWebhttp

(if using End-to-

End security)

Web CORBA

Architecture Choice 5:

Page 12: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Websphere Authentication

Authentication Options

LDAP OSregistry

passwordfile database

Web Server orWeb Security Tool

PKI

Page 13: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Authentication Options

Where do you want the authentication to occur:

HTTP Server choicesIBM HTTP ServerApache Other

Websphere Application Server

Proxy or other ?

IBM HTTP Server powered by Apache

NoneBasic (encoded userid/pw)

User defined authentication File(s)Group authentication File(s)

LDAPForm based - rdirect to a login URL

HTTP Server Authentication

Page 14: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

HTTP Server Administration (apache)

Requires AuthFile

LDAP.PROP

HTTP Server Authentication

IBM HTTP Server for OS/390 (IHS)

None (public access)

Basic

UNIX password fileExternal Security Manager (RACF,ACF2 etc.)LDAP

SSL Client Authentication - digital certificates

Page 15: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Websphere Authentication Options

Authentication Options set here

Websphere Authentication Options

check to enable Security !

Page 16: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Websphere Authentication Options

Websphere Authentication Options

Page 17: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Websphere Authentication Options

Note: the application should run under a privileged identity. In the case of AIX or Solaris, it is typicallythe “root” user. In the case of Windows NT, the system administrator needs to assign the user ID associated with the WebSphere AdminServer service the “Act as operating system” privilege.

Websphere Single Signon

Page 18: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Multiple Webservers - Authentication

users users usersusersusers

Multiple Webservers - Single SignonCookie based Solution

UserRegistry

plugin plugin plugin plugin plugin

cookie

Page 19: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Multiple Webservers - Single SignonProxy based solutions

Security Challenge

credentialscr

eden

tials

credentialsLDAP

SecureWay Policy Director: Web Component

Browser Browser running SSLrunning SSL

Central Authentication service Central Authentication service that that maintains statemaintains state

Provides Web Single Sign-OnProvides Web Single Sign-OnOffloads SSL & security logic from web serversOffloads SSL & security logic from web serversEstablishes secure path to browserEstablishes secure path to browserSecures connections to protected web serversSecures connections to protected web serversCaches policy for high performanceCaches policy for high performance

Security Security ServerServer

HTTPSHTTPS

Fine-Grained access control to Fine-Grained access control to Web resourcesWeb resources

Replicated servers with failover Replicated servers with failover management for fault tolerance management for fault tolerance and high availabilityand high availability

ProtectedProtectedWeb Web

ServersServers

Management Management ConsoleConsole

Proxy Server Proxy Server Array - can use Array - can use 1 to N proxies1 to N proxies

Page 20: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Network Dispatcher

add more as needed

App ServerLevel

Hot Backup

Connectors

PD Sec. Mgr.(WEBSeal)

Firewall

T2

T4

Firewall

Firewall

DB2 CICS MQ Domino

add more as needed

Web Traffic Express

(Perf Pack)

Employees

LDAP

T3

WAS

HTTP

HTTP---------------

WAS

HTTP---------------

WASWAS

LDAP

PD Security Server

----------------Users/Groups

(LDAP)---------------

PD Sec. Mgr.(WEBSeal)

PD Sec. Mgr.(WEBSeal)

replicated

PD Management

Server----------------

ACLs

ACLsACLsACLs

Legacy Systems

WCS 4.1

servlets EJBsservletsEJBs

WCS 4.1

Http or Https

Dispatched to the most available PD Security Server Authentication

ACLsAuthorization

---------------Connection Pooling--------------

Authenticated User

HTTP Header carries credentials

JSP generated

CustomersPartners Sample Architecture and Request Flow

Tivoli

Permissions framework for e-businessDefine and enforce permissions (authentication + access control) policy

TCP/IP AppsTelnetPOP3

MQSeriesStore-and- forward transactions

Custom AppsVia use of the Open Group aznAPI

Web/URLHTMLDynamic HTMLCGIServletsWAP

Coming soon

J2EETransparent J2EE Security

Privacy MgrEnforce Corporate Privacy Policy

New Wireless support via WAP

WML/MIME protocol

CORBAIona ORBIXInprise Visibroker

Tivoli SecureWay Policy Director Scope

Page 21: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Websphere Single Signon - LTPAAllows delegation - passing of users identity around the distributed network

More Problems ? Crossing boundaries !

INTERNETWebsphere

DB2 CONNECT

DB2 UDB

Windows/NT

OS/390OS/390 does not understandwhat a Windows/NT User is ??

So how do I securely access my db2 data ?

New Kerberos support in WAS 4 and DB2 V7

Page 22: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Websphere Authorizations

Websphere Authorization

EJBs

HTML

Who is authorized to accesswhat page or execute whatEJB or JSP etc ?

Page 23: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

IBM HTTP Server - Protection

Protect & Protection directives in Websphere (all platforms):Protection internal_only {

Authtype Basic

PasswdFile /pw.file

Mask [email protected].*.*

}

Protect /intonlydata/* internal_only

Pass /* /html/*

IBM HTTP Server powered by apache

AuthUserFile /otherdir/.htpasswd

AuthGroupFile /dev/null

AuthName SomeRealm

AuthType Basic

<Limit GET>

require user john

</Limit>

Directives in HTTPD.CONF or HTAccess file

Page 24: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Websphere Application Server

Websphere Application Server

Page 25: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Websphere Application Server

Who is going to run this bean !

Multiple Webservers - AuthorizationCookie based Solution

AuthEngine

plugin plugin plugin plugin plugin

cookie

Page 26: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

Multiple Webservers - Authorization Proxy based solutions

Security Challenge

credentialscr

eden

tials

credentialsLDAP

Websphere Application Security

Page 27: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

What about your application - what security is needed within the application ?

Is she allowed to buy stocks for this account, at this time of day, from a given network location etc. etc. ??????

"Entitlements" Engine

WASWAS

"entitlements"

What API can I code to ?

Page 28: Cross Platform Security using IBM's Websphere; … IBM's Websphere; take the Security Challenge ! Paul de Graaff IBM Field Technical Sales Specialist ... Websphere Application Server

"Entitlements" Engine .....

Like to use JAVA (JAAS) ? You can with PD !

Use pdpermisson class for example ! or use opengroup aznAPI !

WASWAS

"entitlements"

J2EE

J2EE

NY Times Website Hacked on 98/09/13