maxecurity Product Suite

Similar documents
Users Guide. Kerio Technologies

How to Configure Authentication and Access Control (AAA)

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions

ROCK-POND REPORTING 2.1

Secure Web Appliance. Basic Usage Guide

scconnect v1.x ADMINISTRATION, INSTALLATION, AND USER GUIDE

4D WebSTAR V User Guide for Mac OS. Copyright (C) D SA / 4D, Inc. All rights reserved.

Xton Access Manager GETTING STARTED GUIDE

enicq 6 Installation Guide

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

EKTRON 101: THE BASICS

Infoblox Authenticated DHCP

Table of Contents Chapter 1: Migrating NIMS to OMS... 3 Index... 17

Firewall Enterprise epolicy Orchestrator

User Guide. Admin Guide. r

NotifySCM Workspace Administration Guide

Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide

Hill s Pet Nutrition Admin Center Guide

Business White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise

Getting Started Reliance Communications, Inc.

DoD Common Access Card Authentication. Feature Description

Administration Guide

Visitor Management Host User Guide

SAML-Based SSO Solution

NETWRIX WINDOWS SERVER CHANGE REPORTER

Resident Portal User Guide

DreamFactory Security Guide

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( )

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team

Welcome To Account Manager 2.0

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

My Account Login System Instructions

AppScaler SSO Active Directory Guide

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

VMware Identity Manager Administration

Hello, and welcome to the Alexicomtech tutorial. I will show you step by step how to set up your interactive pages. Please feel free to ask questions

Managing Users and Configuring Role-Based Access Control

1 Register 2 Take Course 3 Take Test 4 Get Certificate

One of the fundamental kinds of websites that SharePoint 2010 allows

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

OTM-DE Repository User Guide

Online Reporting and Information Management System (ORIMS) Manage Financial Returns User Guide for Banks & Trust Companies

Centrify Infrastructure Services

Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 5. Specifying Home Folders 6

TransUnion Direct Administrator Guide

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition

CA SiteMinder Web Access Manager. Configuring SiteMinder Single Sign On for Microsoft SharePoint 2007 Using Forms-based Authentication

Partner Information. Integration Overview Authentication Methods Supported

WorldSpace Assure 1.4 for System Administrators

NETWRIX GROUP POLICY CHANGE REPORTER

Configuring Request Authentication and Authorization

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide

Password Reset PRO INSTALLATION GUIDE

Real Application Security Administration

WebSphere Application Server V7: Administration Consoles and Commands

Learners Guide. Overview. Introduction. How do I log in to ecooper University? Welcome to the ecooper University Learners Guide!

SharePoint General Instructions

Prophet 21 Middleware Installation Guide. version 12.16

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

Tyler s Versatrans e-link User s and Administrator s Guide

For Volunteers An Elvanto Guide

Centrify Infrastructure Services

Laserfiche Rio 10.3: Deployment Guide. White Paper

REACH Remote Deposit Capture

Getting Started. Opening TM Control Panel. TM Control Panel User Guide Getting Started 1

ControlPoint. Advanced Installation Guide. September 07,

WEBUS Web Updating System Client User s Guide

Roxen Content Provider

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

1. Federation Participant Information DRAFT

Configuring the CSS for Device Management

SAS Metadata Security 201: Security Basics for a New SAS Administrator

ESS Security Enhancements

SAML-Based SSO Solution

WebsitePanel User Guide

SharePoint 2010 Tutorial

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm

Rev X 341. Table 111. Access Levels and Descriptions

If you re on campus and logged in to the university network, then you ll be automatically logged in to MyUCLan too when you open Internet Explorer.

Ansible Tower Quick Setup Guide

Message Networking 5.2 Administration print guide

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation

NOR-STA. Support for Achieving and Assessing Conformance to NORms and STAndards. Editor 4.3. Manual version 4.3.1

MITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1

Learning and Development. UWE Staff Profiles (USP) User Guide

Comodo LoginPro Software Version 1.0

Novell Identity Manager

Centrify for Dropbox Deployment Guide

Microsoft IIS version 6 Integration

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

WebDirect Configuration Guide

Manage Website Admin Tool

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

IBM InfoSphere Information Server Single Sign-On (SSO) by using SAML 2.0 and Tivoli Federated Identity Manager (TFIM)

5 MANAGING USER ACCOUNTS AND GROUPS

Centrify Infrastructure Services

Getting Started with the Zendesk Enterprise Plan

CSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Transcription:

maxecurity Product Suite Domain Administrator s Manual Firmware v2.2

ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator... 2 Setting up your first authentication... 2 Steps for creating a new subdirectory policy... 4 SETTING POLICIES AND ADMINISTRATORS... 5 Editing the security policy of a subdirectory... 6 Steps for setting up the Basic Policy... 7 Steps for removing the security policy from a subdirectory... 8 Administrators... 8 Steps for adding a new Domain Administrator... 9 Steps for removing a Domain Administrator... 9 Why all the comment boxes?... 9 ADVANCED TECHNIQUES... 10 Authentication sets... 10 Steps for creating a new Authentication Set... 10 User Groups... 11 Steps for creating a new User Group... 12 Trusted Cookies... 13 Steps for creating a new Trusted Cookie... 13 Learning more... 14

iii Typographic conventions used in this manual Bold Button and text box names, as well as Admin types are in bold. Italic Web site addresses (URLs) are italicized. Red Generally used for text and examples you type in. Indicates steps to take for performing a particular function.

1 Basics Companies are increasingly making sensitive data available to employees and customers using web-based applications. The web browser has made online access to personal data incredibly convenient, but it has also rendered security technologies like web access management increasingly important. The maxecurity product suite from P2 Security works with your company s infrastructure to prevent unauthorized access to sensitive data. Understanding how maxecurity products work in your company Because many companies are now subject to Sarbanes-Oxley, PCI, HIPAA and other emerging regulatory requirements, maxecurity products have been designed to segregate web access management into four distinct functions. Instead of one master password, there are four admin types, each with a specific role: - Infrastructure admin Performs the initial setup of domains and permissions. - Security admin Configures encryption algorithms, handles digital certificates, and sets up and maintains the user stores (LDAP servers). - Domain admin Maintains authorizations for web page access. The Domain Administrator s functions are the focus of this manual. - Auditor Creates reports, investigates security breaches, and reviews compliance with Sarbanes-Oxley and other regulatory requirements. Each admin is able to perform the role assigned, but not someone else s. No one can gain access to the whole system, make changes and cover their tracks. This means that maxecurity products are both secure and hassle free in the case of compliance and audit reporting. This is also the reason why you will be asked to write a comment or specify an internal ticket each time you make an important change to the system. Each change is recorded and can be called upon later by the Auditor to review the complete history of web access management changes that have taken place at your company.

2 Getting started as a Domain Administrator This guide was written to help you use maxecurity products as a Domain Administrator. We ll walk through your first tasks in setting up authorization for all of your domains, and provide instructions on the tools available through the Domain Administrator control panel. Much of the work in setting up your maxecurity product should already have been done for you by your Infrastructure and Security admins, or someone in your company familiar with your company s web infrastructure and LDAP directories. In the most basic terms, the purpose of the Domain Administrator is to decide who can see what when accessing your company s web sites. You determine which domains, as well as which subdirectories within your domains, are available to which users. You decide what a particular user (or group of users) has access to, and which subdirectories or domains are off limits. Whenever someone tries to access a protected part of the web site, a login screen will appear. Only users that you have granted access will be able to see these pages. In the most basic terms, the purpose of the Domain Administrator is to decide who can see what. Access Denied. Setting a security policy will keep visitors away from your sensitive data. For authenticated users, the browser will enter a secure SSL mode and create a secure cookie on the user s machine that maintains authorization during the session. Setting up your first authentication The first thing you re going to do as a Domain Administrator is set up authentication for different kinds of users. You might want your customers to see product pages, but

3 maintain administrative pages that allow your sales staff to do things like set prices or check inventory. By way of example, we re going to set up authentication for an online music store at http://www.myrecordstore.com. Learn by example. You can find tutorials to help you learn the basic and advanced functions of maxecurity products online at http://www.maxecurity.com. Once you have a maxecurity product installed, you can edit the security settings for any domain simply by adding /_p2 to the URL in the address bar, as long as a policy has been defined for that URL (top-level domains always have a policy defined). You ll see the login screen and, once your name and password are verified, you ll be directed to the Domain Administration control panel.

4 Home screen. Take a moment to review the Domain Administration control panel. With the left column you can navigate through your site and have access to all the security policy functions. Click the Logout option when you re finished. If you re ever unclear about something, note the help box on the right. The security settings you create for a domain is called its Basic Policy. Any subdirectory under that domain will inherit the same security policy unless you specify otherwise. In our example, we want to let the whole world see our main site at www.myrecordstore.com, but the /admin pages of the web site are restricted to just our sales staff. Let s walk through how we protected the admin subdirectory and set its initial security policy. Steps for creating a new subdirectory policy 1. Click on Protect a Subdirectory.

5 2. Make sure that the Enable this policy box is checked and enter the name of your subdirectory. It should be the same as the URL after the forward slash (/) for the subdirectory you want to protect. For example, to secure http://www.myrecordstore.com/admin, type in admin. 3. Select the Authentication (login page) and Access Denied page users will see when trying to access this subdirectory. The choices presented here were already created by other administrators, but you can also create your own. 4. Next, select the users who are authorized to view this subdirectory by clicking on the Add/Remove button next to the User Groups box. Again, the choices available are based on the user stores that have already been set up for your company. Check the boxes next to the groups you authorize and click OK. 5. Finally, click Create Subdirectory Policy. You ll be asked to enter a comment or ticket number that describes what you have done. This information will be available to the Auditor for later review. Testing your changes. Once the security policy has been saved successfully, make sure it works by visiting the URL. In our example, we navigated to http://www.myrecordstore.com/admin/ and have been redirected automatically to the login page we chose. If we enter in an invalid username or password, we should be redirected to the Access Denied page. To review or make further changes to the security policy for this subdirectory, navigate to the URL by adding /_p2: http://www.myrecordstore.com/admin/_p2. Setting Policies and Administrators If you navigate to http://www.mydomain.com/_p2 you ll review and set the basic policy for the top level of your domain www.mydomain.com as well as all the subdirectories contained within it. In the Domain Administration control panel, this is represented by the word ROOT:

6 Editing the security policy of a subdirectory Sometimes you ll want the ROOT of your domain to be accessible to all internet users so that they can browse your web site as usual. For your sensitive data, or for any part of your web site that is restricted to employees or specific groups of users, you ll want to set up a security policy. To add a new security policy to any directory on your web site, follow the same procedure we used above in the section: Steps for creating a new subdirectory policy. With maxecurity, you edit security policies on a directory-by-directory basis. Each directory below the top level ( Root ) is referred to as a subdirectory. To edit the existing security policy for any subdirectory on your web site, all you have to do is add /_p2 to the URL. Example: To edit the security policy to the subdirectory /secure, simply navigate to the URL: http://www.mydomain.com/secure/_p2 Note: If you haven t previously set up a security policy for a subdirectory, you must first create it by going to the parent directory and clicking Protect a Subdirectory.

7 You ll immediately be presented with the Domain Administrator s login screen. Once your credentials are verified, you ll be able to edit the Basic Policy for the directory. Steps for editing the Basic Policy 1. From the Domain Administration panel, click on Basic Policy. Check the address bar. Remember, you are editing the security policy for URL you see in your web browser s address bar. 2. Make sure the Enable this policy box is checked. 3. Select the Authentication (login page) and Access Denied * page users will see when trying to access this subdirectory. 4. Next, select the users who are authorized to view this subdirectory by clicking on the Add/Remove button next to the User Groups box. Check the boxes next to the groups you authorize and click OK. 5. Finally, click Save Policy. You ll be asked to enter a comment or ticket number that describes what you have done. Always test your changes. Once the security policy has been saved successfully, make sure it works by visiting the URL. If you have enabled the policy, you should be directed to the login screen. You may have noticed that the Basic Policy screen allows you to set some advanced options as well. These include trusted cookies, inactivity timeouts, IP restrictions, and other features. Do not change these settings unless you are familiar with their functions. Consult the Advanced Techniques section of this guide or speak with your web programmer and Security admin for more information. * IMPORTANT. The Access Denied page must be located on an unprotected part of your domain, or anywhere on the internet. If the page were protected, you would need to log in to find out that you aren t allowed to log in!

8 Steps for removing the security policy from a subdirectory If you ever wish to remove the security policy from a subdirectory, you can do that as well. 1. From the Domain Administration panel, click on Basic Policy. Keep in mind that you are editing the security policy for URL you see in your web browser s address bar. 2. To disable security for this subdirectory, uncheck the box next to Enable this policy. 3. Click Save Policy. You ll be asked to enter a comment or ticket number that describes what you have done. Remember, when you disable the security policy for a domain or subdirectory, all users on the internet will have unrestricted access to it. Administrators Domain Administrators are those who have administrative access to this domain (or subdirectory). By default, they have permission to edit the security policies for this part of your web site tree, and any branches below. Remember, you can restrict access to any specific subdirectory by choosing Protect a Subdirectory and setting its Basic Policy.

9 Steps for adding a new Domain Administrator 1. From the Domain Administration panel, click on Administrators. 2. On the left you ll see a box of Registered Administrators that have already been registered. If you don t see the admin you are looking for, click on the Register Additional Admins button. In the dialog that appears, search for the name of the person you would like to add. Be sure to click on Register User to add this person to the list of Registered Administrators. 3. Select a name and click on the Add button. Steps for removing a Domain Administrator 1. From the Domain Administration panel, click on Administrators. 2. On the right you ll see a box of Configured Domain Administrators. Select a name and click on the Remove button. Why all the comment boxes? Government regulations like Sarbanes-Oxley require companies to provide an auditable trail for all administrative activity. Entering a descriptive comment about what you are doing will allow the Auditor to trace back any changes to the system in the case of a security breach or government audit.

10 Advanced Techniques Up until this point, we have discussed the basics of the Domain Administrator s role. You should be comfortable with setting security policies for domains and subdirectories, and managing administrator access. The remainder of this guide will walk you through advanced techniques for setting authentication sets, reusable user groups, and trusted cookies that can be used by your company s web programmer. These settings often rely on an in-depth knowledge of your companies LDAP setup. Refer to your Security admin for information about the specifics of your own company s infrastructure. Authentication sets With maxecurity products, you have the flexibility to set up as many web sites as you need, as well as the ability to give each a different look, feel and security process. To make your job easier, you may want to group common authentication configurations and reuse them across all your domains. For instance, you can create an Authentication Set that includes a specific repository of users along with a matching login page, access denied page, and so on. An authentication set is a collection of web pages and user login configurations that you can reuse. Steps for creating a new Authentication Set

11 1. From the Domain Administration panel, click on Authentications. 2. Click New to create a new authentication set, or select one from the menu to edit. 3. Choose a Set name that is unique and descriptive across all applications in your company. 4. Enter the authentication details, including the authorization type (Basic, Form, or Cert Auth) and the User Store of authorized users. This information is usually set up by your Security admin. 5. You can configure a Login Page by clicking on the New button. Enter the complete URL * into the dialog box and click Save. You ll be prompted to enter a comment or ticket number that describes what you have done. 6. Repeat the process for any of the exception pages * you wish to add, including Authentication denied, Change password, and Account locked. If you do not add specific pages for Change password and Account locked, the user will be sent to the Authentication denied page. 7. When you have finished, click Save. Once again, you ll be asked to enter a comment or ticket number. The authentication set is now ready to use anywhere across your company infrastructure. Whenever you enable a security policy for a particular domain (or subdomain) you ll be able to reuse this authentication set. User Groups Just like authentication sets, maxecurity products let you reuse common user group configurations. For instance, you can create an User Group such as NY admins that will specify admins from your New York office. Whenever you want to give these individuals User Groups include reusable information about groups of users across your company s infrastructure. * IMPORTANT. Keep in mind that all the pages in your authentication set (login, authentication denied, change password, account locked) must be unprotected. These pages should be accessible to everyone and can reside on your domain, a different domain, web server, or anywhere on the internet. If the page were protected, you would need to log in just to find out that you aren t allowed to log in!

12 access to part of your web site, NY admins will be ready to select on the Basic Policy page. Steps for creating a new User Group 1. From the Domain Administration panel, click on User Groups. 2. Click New to create a new user group, or select one from the menu to edit. 3. Choose a User Group name that is unique and descriptive across all applications in your company. 4. Enter the User Store information, including the group type (Static, Dynamic or Branch) and the authentication and user group stores. This information is usually set up by your Security admin. 5. Enter the User Group Details. This information is company-specific, and usually your Security admin or someone familiar with your LDAP configuration can help you. 6. When you have finished, click Save. As always, you ll be asked to enter a comment or ticket number. The user group is now ready to use anywhere across your company infrastructure. Whenever you enable a security policy for a particular domain (or subdirectory) it will be available in the User Groups menu for you to select.

13 Trusted Cookies Trusted cookies allow you to personalize what a particular user sees or does when logging in to a secure part of your web site. Working with your company s web programmer, you can have the main screen display the user s name ( Welcome back, Ken! ) or utilize the information from the user store to personalize the visitor s session. Trusted cookies also allow you to apply fine-grained authorization to your web sites, such as only showing data from a database that correlates with an attribute such as office location. Trusted cookies are sent securely to the web server (not the browser), making it both simple and secure for the web programmer/developer to retrieve useful information from your company s LDAP directories. Using trusted cookies will require some knowledge of the user store, so if you have questions you ll need to consult your LDAP or Security admin. Trusted cookies help your web programmer personalize the user experience. Steps for creating a new Trusted Cookie 1. From the Domain Administration panel, click on Trusted Cookies.

14 2. Click New to create a new trusted cookie, or select one from the menu to edit. 3. Choose a Trusted Cookie name that is unique and descriptive across all applications in your company. 4. Choose the User Store. Usually the user store is same as the authentication store or user group store. 5. Enter the Attribute Lifetime. This is the amount of time (in minutes) that the attribute will be cached on the server before being refreshed. If you are working with a sensitive application, you may want the cookie to be refreshed more often. 6. Enter the Attribute Mapping information. This maps an attribute from your user store to a cookie name that your web programmer can use. For example, your user store may identify personnel by the variable cn ( common name ) and your web programmer will want to assign this information to a Cookie Name called User. Consult your LDAP or Security admin for help with the information available in the user store. 7. To add multiple cookies, click the More button. 8. When you have finished, click Save. As always, you ll be asked to enter a comment or ticket number. The trusted cookie is now ready to use anywhere across your company infrastructure. Your web programmer will be able to access the cookie you created when designing web pages on this domain. Learning more There are separate manuals available for the Infrastructure admin, Security admin, and the Auditor. Feel free to consult those guides if you are interested in specific issues that remain outside the realm of this manual. You can also visit http://www.maxecurity.com and click on Support. If your company has a support contract with P2 Security, you can receive access to a dedicated support representative who is familiar with your web infrastructure and the use of maxecurity products. Support is available 24/7.