Authentisierung und Rechte-Management in modernen IT Systemen

Slides:



Advertisements
Ähnliche Präsentationen
Kunden Informationen: RUAG Aerospace
Advertisements

E-Commerce Shop System
Was gibt´s neues im Bereich Sicherheit
Semesterarbeit von Dieter Lorenz, Sebastian Galenski, Stephan Bury
Web Storage System - Einrichten, Verwalten und Anwendungsmöglichkeiten
Sichere Anbindung kleiner Netze ans Internet
Webinterface für eingebettete Systeme in Dual-Server-Architektur
Thin Clients und SmartCards an der HU
Neue VPN-Technologien für Remote Access und WLAN
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP Web Jetadmin.
Zusammenarbeit in Office mit den SharePoint Technologien Michael Carpi
Funktionserweiterungen für den ISA Server 2000 mit dem Feature Pack 1 Funktionserweiterungen für den ISA Server 2000 mit dem Feature Pack 1 Christian Thor.
Design- und Entwicklungswerkzeuge
Kommunikation und Zusammenarbeit mit Microsoft Exchange Server 2003
Inhalt – Technische Grundlagen
Systemverwaltung wie es Ihnen gefällt.
Basis-Architekturen für Web-Anwendungen
eBusiness und mCommerce >> ein Überblick <<
Neuerungen in PalmOS® 5 Florian Schulze (SS 2003).
Datenbankzugriff im WWW (Kommerzielle Systeme)
Erweiterung B2B Usermanagement / LDAP-Anbindung
Sicherheit und Personalisierung Internet Portal der Universität München.
Information und Technik Nordrhein-Westfalen Single Sign On mit CAS Düsseldorf, Single Sign On für Webanwendungen am Beispiel von CAS.
Z1 Backbone of Trust Server- und XML-basierte Lösung zentrales Zertifikatsmangement der Königsweg zur anwenderfreundlichen eBusiness-Infrastruktur.
Vertrauen in Identitäten und Transaktionen
M A P K I T Management eines J2EE basierten eCommerce Systems am Beispiel des ATG Dynamo Applikationsservers und BMC Patrol als Managementframework.
Elektronische Signatur
Web Single Sign-On Nutzen eines optimalen Zusammenspiels von Authentisierung und WAF Marc Bütikofer Senior Security Engineer Kryptologie & Security.
Sichere Authentifizierung SSO, Password Management, Biometrie
Federated Identities und SSO mit Windows Azure
Sicherer Zugang zu internen Terminalservern von öffentlichen PCs
Michael Haverbeck System Engineer
Weltweite Kommunikation mit Exchange Server über das Internet
GRAU DataSpace 2.0 – DIE SICHERE KOMMUNIKATIONS- PLATTFORM FÜR UNTERNEHMEN UND ORGANISATIONEN YOUR DATA. YOUR CONTROL.
HOB RD VPN HOB Remote Desktop Virtual Private Network
Citrix MetaFrame Access Suite
WAP = Wireless Application Protocol Protokollstack Ein Protokoll ...
Der führende Anbieter von SecureZIP Lösungen 20. July, 2004.
Sinn GmbH Erdinger Straße Reithofen Endpoint Security Where trust begins … and ends SINN GmbH Andreas Fleischmann.
1 Teil 2 Einblicke in Exchange 2003 (Basis Beta 2)
Das integrierte Lösungsportfolio
ESRI EUROPEAN USER CONFERENCE
Java Server Pages Sergej Keterling
CRM TimeLog… TimeLog … Wie gross ist der Anteil der Lohnkosten in Ihrem Unternehmen?
Application Delivery Citrix Netscaler Vortragender Seite 1 von 18
Windows Server 2012 R2 Upgrade-Potential
Top Features kurz vorgestellt: Workplace Join
© 1 T/bone XML Security Mobile Smart Card Projekt Präsentation Stand
1 Microsoft Windows 2000: Bereitstellen einer Infrastruktur.
Aloaha Software – Martin Wrocklage 05451/943522) Aloaha Software Portfolio.
Aloaha Software Unterstützung des Heilberufsausweises.
Kaseya Virtual System Administrator Produkt Update 7.0 Rocco van der Zwet Copyright ©2014 Kaseya 1.
Online GIS Online GIS – Der Nutzer Matthias Hofschen, ESRI Germany ESRI EUROPEAN USER CONFERENCE.
VPN – Virtual Private Network
Potentiale für den Channel Server-Software aktualisieren Server-Hardware erneuern Migration von Anwendungen Diese Produkte stehen vor dem Ende des Support.
Aloaha Software – Martin Wrocklage 05451/943522) Aloaha Mobile Smartcard Connector (CSP)
Oracle Portal think fast. think simple. think smart. Dieter Lorenz, Christian Witt.
Webserver Apache & Xampp Referenten: Elena, Luziano und Sükran
Einleitung Vergleich Empfehlung PAVONE Portal / WebSphere Portal - was wann? Olaf Hahnl PAVONE AG.
Sicherheitsaspekte in Service Orientierten Architekturen Eike Falkenberg Sommersemester 2006 Anwendungen I.
Lync and Learn mit Manfred Helber Thema heute: Überblick der Leistungserweiterungen von Windows Server 2016 Start: 9.30 Uhr 30 Minuten Vortrag & Demo 30.
© 2010 | magellan netzwerke GmbH Application Delivery und Virtualisierung Referent Dipl.-Ing. Sven Müller.
LugBE Linux User Group Bern PKI – Was soll das? Einleitung Symmetrisch vs. asymmetrisch Trusted Third Party Hierarchisches Modell Web of Trust Links LugBE.
Praktische Anwendung von CAcert. Was macht CAcert? CAcert stellt Zertifikate aus.
Verteilte Anwendungen: J2EE
OAuth 2.0 Ralf Hoffmann 03 / 2017
Erweiterte Azure Dienste
Du kommst hier nicht rein!
Enterprise Search Solution
 Präsentation transkript:

Authentisierung und Rechte-Management in modernen IT Systemen Ingo Schubert, Security Consultant ischubert@rsasecurity.com

Agenda Notwendigkeit der Authentisierung Authentisierung alleine reicht nicht: Authorisierung Formen der Authentisierung Token Mobile Zertifikate Rechtemanagement Transaktionssicherheit

Authentisierung Authentisierung ist die Grundlage für e-business Vertrauen in die gegenseitige Identität ist die Vorraussetzung einer erfolgreichen Transaktion. Ohne das Wissen wer am Ende der Leitung sitzt ist eine Zuteilung von Zugriffs- und Transaktionsrechten nicht möglich Vertrauen in eine digitale Signatur nicht möglich In den meisten Fällen (wenn nicht immer) ist es sinnlos Daten zu verschlüsseln, falls der Empfänger nicht authentisiert ist.

Authorisierung Sobald ein Benutzer authentisiert ist, stellt sich die Frage “Was darf der Benutzer?” Jedem richtigen Benutzer seine Ressource Vergleich von Benutzerprofilen mit definierten Rollen Zugriff wird gestattet oder verwehren basierend auf Statischen Kriterien (z.B. Stellenbeschreibung, Abteilung etc.) Dynamischen Kriterien (z.B. Kontostand, Tageszeit etc.)

Formen der Authentisierung Je nach Art der Authentisierungsmethode kann einem Benutzer mehr oder weniger vertraut werden. Passwörter sind die gebräuchlichsten Formen der Authentisierung haben aber bekannte Nachteile. Stärkere Formen der Authentisierung sind Hardware Tokens Zertifikate (ggf. kombiniert mit Hardware Tokens) Starke Authentisierung benötigt einen Token und eine PIN. Something you have and something you know.

RSA SecurID

RSA SecurID Produkte RSA ACE/Server RSA ACE/Agent RSA SecurID Der Server der alles Verwaltet RSA ACE/Agent Das Sicherheitspersonal In vielen Produkten integriert u.a. Microsoft ISA Server RSA SecurID Hardware Tokens Software Tokens Smart Cards

RSA SecurID Zwei-Faktor Authentisierung RSA ACE/Server Send Session Key Send One Time Passcode RSA ACE/Agent We have talked about the need for strong 2 factor authentication to Secure VPNs--how would it work? As we’ve discussed today, we see a number of companies looking not to support remote access over the dial up lines, as it has been done traditionally, but to do it over the Internet. So how do SecurID and ACE/Server work in this environment using VPN technology? SecurID can be implemented in 2 basic ways with a VPN solution. Either users can first be authenticated and second the encrypted session established OR vice versa. Let’s walk through the first approach as an example: First the remote user requests a network connection Second, the ACE/Server issues a request for the user’s one-time SecurID passcode Next, the user enters the one-time passcode which currently appears on his SecurID token and sends it to ACE/Server. As a further safeguard, RSA Securities’ client-server model employs automatic encryption of the authentication process between ACE/Clients, or AGENTS, and the ACE/Server. This prevents the user’s PIN from being sniffed over the network - whether private or public - during LOGIN and authentication. After receiving a correct passcode, ACE/Server authenticates the user Next - an encrypted session is established which will permit the user to send and receive information through a secure IP “tunnel”. In fact, many VPN vendors, such as Aventail and TimeStep use RSA encryption technology for this purpose! RSA Securities’ strong 2-factor authentication, combined with a VPN product’s session encryption ensure remote access can be conducted safely and securely. RSA SecurID PIN + TOKEN

RSA SecurID Architektur RSA ACE/Agents Web Server RSA ACE/Agent Firewall VPN DMZ Internet RSA ACE/Server (replica) RSA ACE/Server (primary) Intranet Firewall RSA ACE/Agents NT/Unix Sample configuration of an ACE/Server customer Note 3 components of the SecurID solution – authenticator, agent, server Tie this back to Portfolios Notes on the DMZ in this slide: Direct access from the internet is limited to the DMZ segments. Dial-up access (RAS) is limited to the DMZ. The intranet is secured behind a second firewall, limiting damage if the DMZ is compromised. The ACE/Server should be protected behind the second firewall. The same ACE/Server can serve the DMZ and the intranet. Alternatively, you could add another firewall and ACE/Server to support the machines on the DMZ segments. For non-DMZ, remove the inner firewall. Novell RAS

RSA ACE/Server 5.1 Highlights Einfacher, flexibler Database replication LDAP v3 Import und Synchronization Quick Admin Web Help Desk Mehr Performance und Skalierbarkeit Load Balancing und Database Replication Höhere Verfügbarkeit Supports v5.x and legacy RSA ACE/Agents Extensive customer interviews, design reviews and beta testing ACE 5 is addressing top 4 customer requests replication LDAP disaster recovery ease of administration ACE 5 launches product into a whole new category to address customer’s use of the product and requirements for a mission critical system ACE/Server is no longer a point solution – now part of infrastructure that requires uptime and high performance

RSA SecurID Authentication Devices Breites Angebot Key fob Card Pin Pad PC Palm Wireless phones Zero-Footprint Keine Software notwendig (für Hardware Token) Leicht zu bedienen Die am meisten eingesetzte starke Authentisierungsmethode

RSA SecurID Smart Card Solution RSA SecurID Passage Flexible Smartcard Lösung Software Client mit Leser und Karte Key Features: Unterstützt alle gängigen CAs RSA Keon CA, Microsoft, VeriSign, Baltimore, Entrust Natives Windows 2000 Logon PC Logon (Windows NT, 98, 95) Dual CSP (PKCS#11 und CAPI) Ermöglicht sicheres e-mail (S/MIME) und Web access (SSL) Java Card (16K option) PC/SC Leser Unterstützung

RSA Smart Cards Building Access PC Access Proximity Java Platform Mag-Stripe Badging PC Access Java Platform Credential Storage Certificates Key sets Passwords Applet Storage SecurID Seed Storage RSA SecurID Passage Partners HID & MiFare The RSA SecurID Smart Badge solution provides impenetrable two-factor authentication for safeguarding physical assets (such as buildings and inventory), information assets (contained in computer systems and networks) and people (including employees and customers). By insulating your business from both internal and external threats, the RSA SecurID Smart Badge solution supports and extends your total security policy.

RSA Mobile

RSA Mobile Authentisierung (I)

RSA Mobile Authentisierung (II)

RSA Mobile Authentisierung (III) 3-5 seconds

RSA Mobile Authentisierung (III)

RSA Mobile Authentisierung (IV)

RSA Mobile Authentisierung (V)

RSA Mobile - Features Innerhalb von GSM Netzwerken, Übertragung des Accesscode verschlüsselt A5 Accesscode muss innerhalb der selben Browser Instanz eingegeben werden der den Code angefordert hat. RSA Mobile plug-ins ermöglichen Anbindung an Telco Infrastruktur Wireless modem, SMTP, Direkt zum Telko via SMPP Verbindung zu SMS Services via HTTP und SMPP Managed service (Red Message, Dialogue) Zusätzliche Plug-ins können leicht erstellt werden High performance / Availability Basierend auf J2EE BEA WebLogic Application Server SAML / Web Service Unterstützung.

RSA Mobile Steps in using RSA Mobile Web Server Userid + PIN RSA Mobile Agent Userid + PIN Web Browser RSA Mobile Server Userid + PIN Access code + Phone # Access code 294836 Steps in using RSA Mobile Not shown: User attempts to access a web page that is protected with RSA Mobile. Agent intercepts the request and requests user authentication. User enters Userid and PIN RSA Mobile Server looks up user’s phone number, calculates his access code and forwards it to the SMS Gateway SMS Gateway forwards SMS message to telco (NOTE: Mention how this would work in email option) Telco sends SMS message through the air to user’s phone User enters access code and is granted access to the protected web page Upon accepting a userID and PIN, RSA Mobile Server sends a challenge string back to the user’s browser. The challenge string is stored in browser and is completely hidden from the user. It is passed back to RSA Mobile when the user enters his access code. This provides security as a user must enter his access code into the same browser from which he requested it. Leverage existing infrastructure: LDAP internally, GSM network externally If out of coverage, can use Temporary Access Password Can be set in advance of a trip for a specified validity period Can be set by a) calling help desk or b) customer can implement user self service using Admin APIs SMS or Email Server Mobile Network Access code 294836 Access code 294836 SMS or Text Message

RSA Keon

Certificate Management Solutions RSA Keon Certificate Authority Stellt Zertifikate aus und verwaltet diese Zertifiziert nach CC EAL 4 Unterstützt Web browser, Smartcard und RSA Keon Web PassPort Credential Storage RSA Keon Root Signing Service SubCA bei Kunden unterhalb der RSA Public Root CA Ermöglicht Vertrauen in SSL Zertifikate, E-mail etc. RSA Keon Web PassPort Software Container, Virtual Smartcard Roaming credentials

RSA Keon Certificate Management Components Root Signing Service RSA Keon Key Recovery Module RSA Keon WebPassport Web Server User RSA Keon Certificate Authority & Registration Authority (RA can be distributed)

RSA Keon Certificate Authority Die Certificate Authority stellt Zertifikate aus, verwaltet und validiert diese. Verwaltet Trust Relationships Getestet mit bis zu 8 Millionen Zertifikaten Features u.a.: Keon OneStep Real-time OCSP RSA Keon CA RSA Keon CA is an Internet-based Certificate Authority solution that provides the core functionality for issuing, managing and validating digital certificates thereby delivering online digital identities for customers, partners, suppliers and/or employees, allowing users to identify themselves and establish trusted relationships. It includes a secure web server and a powerful signing engine for digitally signing end-user certificates and system events; and an integrated data repository for storing certificates, system data, and certificate status information. RSA KCA enables you to do e-business securely: users securely gain access to information, interact with other users, and conduct secure transactions. RSA KCA permits you to define who else you and your users are willing to trust by allowing you to automatically trust digital certificates issued by your business partners or customers. RSA KCA has been architected to allow you to design and deploy your PKI to mirror your organization’s structure, with the flexibility to change the system as the organization changes. For example, you can set-up any number of CAs and administrators and physically locate them where convenient. In addition, the user interface can be customized and branded with your organization’s logo so that users are immediately familiar with who they are interacting with. Since RSA KCA is built using open industry standards, it can interoperate out-of-box with other standards-based applications. This means that your RSA KCA can be leveraged across others applications like web-browsers, email, and VPN clients to ensure maximum return-on-investment.

Easy of Use RSA Keon OneStep RSA Keon Certificate Authority OneStep CGI YourAuth.dll Authenticate User Populate Certificate Fields External Authentication Database RSA Keon OneStep, a component of the RSA Keon Certificate Authority, provides a flexible framework organizations can use to automatically authenticate, approve, issue and install digital certificates by taking advantage of their existing authentication technologies and other data sources. Once operational, the entire enrollment, authentication and installation process can be accomplished in a single operation without manual intervention by a certificate administrator for approval. With Keon OneStep, users perform the enrollment function themselves. The automated approval process decreases the potential for human error, and ensures data accuracy and consistency. It is also much faster and easier for the certificate administrator than performing manual authentication, and much simpler and easier for the user than entering all the required information into a form, and fetching and installing a certificate. Let me give you and example of how Keon OneStep can work for you. The OneStep framework allows you to build an extension to the Keon Certificate Authority that will pass on registration requests to an external authentication database which can be anything from an HR database to an RSA ACE/Server.. A user goes to the certificate registration page and enters their name and some identifying information, such as their Window NT login password, their employee number, or account number and they submit their request. Keon OneStep uses the supplied information name to lookup user info in the external authentication database. If the authentication is successful, Keon OneStep instructs the RSA Keon Certificate Authority to generate a certificate. You can also extract database information to be used to populate the certificate, as opposed to making users enter lots of data during their request which opens you up to user errors and invalid requests or certificates. The Keon Certificate Authority then pushes the certificate to the user’s browser. To the user, they simply authenticated to a web page and presto! Their certificate appeared. Administrators only have to respond to rejected requests. You can also develop a Keon OneStep framework that uses a SecurID token for authentication purposes and upon success, pass the certificate request to the external database for certificate population and then pass the process back to the Certificate Authority for processing. Using SecurID provides two factor authentication of the request to ensure it is the person requesting the certificate is who they claim to be, thus preventing people from requesting certificates in someone else’s name. So you get ease of use for the administrator, the end user and enhanced security, all in one which will reduce your time and your cost to deployment . Authentication Successful: Certificate Granted Authentication Denied: Certificate Rejected

RSA Keon Web PassPort Roaming Credentials ermöglichen Benutzern jederzeit den Zugriff auf ihre Schlüssel Zertifikate und Private Schlüssel können jederzeit über die MS-CAPI und Netscape benützt werden: Browsers Mail Clients (S/MIME) VPNs … Benutzer Schlüssel sind in einem LDAP Verzeichnis Active Directory gespeichert Unobtrusive Software Small footprint Keine Treiber Einfache Installation Kein Reboot

RSA Keon Web PassPort Security Infrastructure Applications Authentication Engines Certificate Authorities Maintained Directories Security Infrastructure Forms Signing Online Payments ID Applications The RSA Keon Web PassPort system includes several components. The user authenticates to a Web page that is protected by the Web PassPort server. The Web PassPort server authenticates the user, retrieves the user’s digital credentials from an LDAP-compliant directory, and securely delivers them along with the Web PassPort plug-in. The Web PassPort plug-in is a small, downloaded plug-in that enables the transparent use of certificates with Web browsers, mail clients and other applications, simplifying the environment for the end user. The user’s credentials are initially created by the RSA Keon Web PassPort virtual card manager and securely stored in an LDAP-compliant directory. When used with the RSA Keon Certificate Server, the optional Web PassPort OneStep module enables the auto-enrollment and pickup of certificates. Mobile Credentials: The virtual smart cards are securely downloaded over the Internet to users. The download occurs over http sockets, so there is no need to loosen firewall policies. Users can download their virtual smart cards from different B2B sites using the same plug-in software, maximizing network bandwidth and user productivity. Users can download their credentials for a site from any PC browser — at home or the office — allowing them to do business where it is convenient for them. Flexible Authentication: For maximum authentication flexibility, RSA Keon Web PassPort software supports both RSA SecurID two-factor user authentication and passwords. Once users have authenticated, they have immediate access to their credentials. Storage of Digital Certificates and Keys in a Virtual Smart Card: At the heart of RSA Keon Web PassPort is the virtual smart card, a secure container with the user’s X.509 encrypting and signing certificates and associated private keys. Sensitive components of the container are encrypted with 112 bit 3DES (Data Encryption Standard) and the container itself is encrypted with a 256 bit RC5 ® symmetric key. For enhanced security, the user’s virtual smart cards are never written to the user’s local file system. RSA Keon Web PassPort software supports multiple virtual smart cards per user, which enables the user to access different B2B environments that do not trust each other. User receives encrypted virtual cards RSA Keon Web PassPort Browser Plug-in downloads and immediately activates

RSA ClearTrust

Was ist RSA ClearTrust? RSA ClearTrust ist eine Access Management Lösung die sich in bestehende Infrastrukturen einbinden läßt. RSA ClearTrust ermöglicht die Absicherung von Applikationen, Web sites, und anderen Web-basierenden Ressourcen via Intranets, Extranets, B2B und B2C Infrastrukturen RSA ClearTrust unterstützt SAML und wird die Liberty Alliance Spezifikationen unterstützen. RSA ClearTrust is a unified privilege management solution that provides an umbrella infrastructure layer that can be abstracted as well as plug and play with your existing IT infrastructure and applications providing the following centralized services: -user and policy administration-user sso -user authentication -user authorization -auditing of all activities

Problem Angestellte Kunden Partner Wie verwaltet man die Identitäten einer wachsenden Benutzerbasis… Angestellte Kunden Partner Elevator pitch slide 1 of 4 Because the internet strongly promotes the concept of “self-service” and because security principles are not more about setting up an infrastructure that securely lets users into your environment in order to access proprietary resources and is no longer about just keeping bad people out, the number of users that an organization has to administer has grown exponentially. It not only includes employees, but also includes customers and partner. So how do you manage the identity f a growing number of users…

Access Channels: Intranet, Extranet, Portal, Wireless Problem …und deren sicheren Zugriff auf Web Resourcen? Customers Partners Employees Access Channels: Intranet, Extranet, Portal, Wireless “Silo” Access Mgmt. “Silo” Access Mgmt. “Silo” Access Mgmt. “Silo” Access Mgmt. “Silo” Access Mgmt. Elevator pitch slide 2 of 4 …and their secure access to enterprise Web resources in a scalable, cost-efficient manner …. This is the way you may do things today. Controlled access to disparate applications results in poor productivity and negative user experience. You’ll also experience administration and scalability issues trying to manage all these “silos”. Just think each user in each silo has its own data “file” and its own password. HR, Financial Mgmt. e-CRM e-Commerce Supply Chain Mgmt. Industry Specific

Access Channels: Intranet, Extranet, Portal, Wireless Lösung Customers Partners Employees Access Channels: Intranet, Extranet, Portal, Wireless Web Access Management Solution Elevator pitch slide 4 of 4 So what does RSA ClearTrust do? Broadly defined, RSA ClearTrust allows an organization to achieve unified identity and access management across an enterprise. Enterprise applications have all evolved over time with their own identity access management infrastructure and user data repositories. RSA ClearTrust’s identity and access management solution is a framework for application level security that not only provides a centralized layer of authentication and authorization to one’s applications but also provides integration to an organizations existing and dynamically changing infrastructure, be it web servers, application servers, portal servers, etc. RSA ClearTrust, acts as the security middleware or glue, allowing you to leverage the investment in these other technologies while at the same time reducing the cost of administering identity and web access management in each individual silo system. In addition, it provides the user single sign-on access to multiple web-based apps. This results in a positive user experience and greater productivity. SSO HR, Financial Mgmt. e-CRM e-Commerce Supply Chain Mgmt. Industry Specific

Authentisierung Jeder Ressource die passende Authentisierung… Flexible Unterstützung von mehreren Verfahren out-of-the-box ID/password X.509 (z.B: RSA Keon) RSA SecurID Windows NT Logon LDAP Authentication APIs zur Einbindung weiterer Authentisierungsverfahren Verkettung möglich

Web Access Management “Was ist erlaubt?” Zugriff basierend auf Benutzer Rollen und dynamischen Regeln (SmartRules) SmartRules ermöglichen Entscheidungen basierend auf externen Daten (z.B. Kontostand) zu treffen und ensprechend den Zugriff zu ermöglichen oder zu verweigern. Business Benefit: Risk mitigation with protection of your existing web-based resources based on business policy RSA ClearTrust also provides fine-grained access control so that an organization can not only protect access to applications but can also control what users do once they have access to applications. Integration to application servers provides method level protection.

Authorisierung Sicherer Zugriff auf Ressourcen Web Servers Web Pages, CGIs, Directories, GIF & JPG files, etc. J2EE Application Servers EJBs, JSPs, Java Servlets Method-Level Schutz Andere Applikationen Mit Hilfe von APIs können Applikationen eingebunden werden die nicht direkt von ClearTrust unterstützt werden.

Delegated Administration Super User Intranet Extranet Business Unit Business Unit Customer Partner Group Administrators VBU Delegated Administration capabilities allows for distributing user and policy management responsibilities out to the individuals best suited to administer their group of users. This dramatically reduces the burden on a centralized administrative group. VBU VBU VBU Users

Delegated Administration Verhindert die umständliche zentrale Administration grosser Benutzerbestände Delegation von Benutzer und Rechteverwaltung Eingeteilt in Virtual Business Units (VBUs) Abgestufte Zuteilung von Rechten Business Benefit: Reduce cost burden of centralized administration Using RSA ClearTrust’s Delegated Administration capability, departments, business partners, and customers can be grouped into logical administrative units, called Virtual Business Units (VBUs), for distributing user and policy management responsibilities out to the individuals best suited to administer their group of users. This dramatically reduces the burden on a centralized administrative group. Virtual Business Units can be set up as either public or private. If private, only the administrator of that specific business unit can view the user and policy information associated with that business unit. Additionally, administrators can be granted roles that delegate to them only a subset of administrative responsibilities. For example, help desk personnel can be granted password reset capabilities only. An example might include an auto exchange portal. Because there are multiple competing organizations involved, it is imperative that each company maintain control over their own user bases. Please note that an organization can retain centralized administration of users and policies if they so choose.

RSA ClearTrust Runtime Architecture Web & App Servers Encrypted Session Cookie ClearTrust Agents Entitlements Data Store DCOM RT API Client Any Web Browser C RT API Client Java RT API Client ClearTrust Authorization Servers

Skalierbarkeit Web Server Farm ClearTrust Authorization Servers Replicated LDAP Directories Lineare Performance-Steigerung durch zusätzliche Authorisation Servers Cache Mehr RAM für mehr Leistung Breite Palette and Möglichkeiten zur weiteren Optimierung

RSA ClearTrust Skalierbarkeit Verteilte Authorization Server Verteilt auf mehrere Server “Round robin” fail-over Webserver plug-in benützt Pool von Authorization Servern Minimale Network Latency Redundante Dispatcher/Key Servers Redundante Entitlement Servers

Cross-Domain SSO (SAML) www.partner-1.com Ticket encoded in redirect URL and set on response 4 – Process Ticket 1 – Request Access www.mycompany.com 2 – Request Ticket 3 – Authenticate 6 – Request Ticket 5 – Request Access 7 – Process Ticket Authentication Authority Web Browser Simplified illustration – does not show responses and all redirects. The driving issue here is that privacy constraints imposed by browsers prevent web-sites from easily tracking users. Unfortunately, this doesn’t distinguish between good-tracking (SSO) and bad-tracking (profiling), so authorization solutions have resorted to some clever hacks to work around the problem. Having multiple cookies representing the session for each domain may lead to an inconsistent user experience, particularly in regards to idle timeouts. For example, while browsing on partner-2.com, my session on partner-1.com may expire, even though the user believes he’s been active the entire time. There are several solutions for this problem: Don’t use idle-expiration, just rely on re-authentication on fixed intervals. This is certainly simple, but weakens security. Use web-bugs to constantly touch cookie on authentication authority. Yields consistent behavior and maintains security, but slows performance (each page results in a hit to authentication authority). Cookie Cache www.partner-2.com

ClearTrust APIs Administrative API (Java, C, DCOM) Erzeugt/Ändert Benutzer Accounts und setzt Zugriffsregeln Runtime API (Java, C, DCOM) Authentisierung und Authorisierung für Applikationen die nicht direkt von ClearTrust unterstützt werden. Plug-in Extension (C only) Erlaubt die Erweiterung existierender Webserver Plug-ins Custom Authentication Adapters Für neue Authentisierungsverfahren (Biometrie, RACF/ACF2, etc…)

RSA eSign

Absichern von Transaktionen SSL alleine genügt oft nicht Die Daten einer Transaktion sind nur während der Übertragung geschützt. Auf dem Server angekommen fehlt die Möglichkeit die Transaktion später zu verifizieren. Wird die Transaktion dagegen auf dem Client signiert, kann jederzeit überprüft werden ob z.B. die Daten verändert wurden. eSign ermöglicht es HTML Forms auf dem Client zu signieren, verifizieren und optional zu verschlüsseln. Der Server überprüft vor dem weiteren Verarbeiten die Signatur

Die Technik Client Applet Server Kompatibel mit Netscape 6, 7 und IE 5 – 6 Zugriff auf internen Key/Certificate Store des Browsers (Netscape) bzw. von Windows (IE) Unterstützung von SmartCards (via CSP) Einmaliger Download (ca. 300k) Server Java Klassen via ASP, JSP oder Servlets ansprechbar Verifizieren von Signaturen möglich OCSP, CRL werden unterstützt

RSA Keon e-Sign in Action

RSA Keon e-Sign in Action

RSA Keon e-Sign in Action

Beispiel Describe a cash transfer scenario in this slide. Steps Sam Smith, the controller at Alliance Aviation Corporation, needs to transfer cash to a supplier. Sam logs onto Liberty Bank’s portal and fills out the cash transfer form. (2) Sam Smith has KWP on his client and is able to download the certificate from KCA. Alternately, Sam may already have a certificate in his browser certificate store. (3) Sam Smith’s certificate is validated by the RSA e-Sign at the server side. Joe must review the document before signing. He then digitally signs the form. The form is uploaded to the webserver. At the server side, the signed document can be verified for integrity and the cert can be validated again. (5) Janet Jones, Sam’s boss and the controller of Alliance, then downloads and reviews the form. Before signing, Janet verifies That the document has not been modified. In addition, she requests validation of the cert used to sign (validation occurs on the server side). (6) Janet then signs the form. The form is uploaded to the webserver and the transaction is sent to the clearinghouse for processing. Background on Components KWP Mobile credentials for users (Enabled through KWP) User credentials follow the user no matter where they are as users authenticate to the web server agent, have the RSA Keon Web PassPort virtual smart card downloaded then have their digital credentials securely downloaded not matter what PC they are sitting at, at home, the office or the road Secure credential store. Allows organizations to enforce tight control of private keys. Very important in terms of “Data Integrity” KCA Keon OneStep RSA Keon Key Recovery Module This optional module is used for securely storing and retrieving lost or damaged end-user encryption keys; providing access to the keys while maintaining the highest standards for security and without compromising non-repudiation. Real-time Certificate Status Checks. RSA Keon CA can be configured to use the Online Certificate Status Protocol (OCSP) to provide relying applications up-to-the-second status information on the validity of a certificate. OCSP simplifies the status checking process by providing a central location for CRLs rather than having CRLs distributed to multiple applications.   RSA Keon CA’s real-time implementation of OCSP is unique in that it pulls fresh status information from the CA repository rather than stale information from a pre-published CRL. This real-time status information is a necessity for organizations that can’t accept the potential time-delay risks inherent with CRLs. This eliminates the possibility of a user with a revoked certificate gaining access to sensitive company data or applications.

RSA BSAFE Entwicklertools Einfachere Bereitstellung sicherer Lösungen Broadband SSL-J SSL-C WTLS-C IPSec-C SSL Micro Edition Algorithms, Math Libraries Crypto-C Crypto-J Crypto-C Micro Edition Cert-C Cert-J Cert Micro Edition

RSA BSAFE Anwendungsbeispiele integriert in Internet Explorer, Siemens Handy, etc. RSA Enterprise Produkten RSA Sure File Verschlüsselung Signierung Komprimierung (PKZIP)

Fragen?

The Most Trusted Name in e-Security