This section provides detailed descriptions of new security features.
The admin.cfg file contains the users and groups registered for the internal server security (PTH). To encrypt this file, do the following.
When the server restarts, admin.cfg will be encrypted.
The user interface for configuring an LDAP security provider has been redesigned. The configuration parameters have been grouped into categories, and there are new buttons for retrieving sample lists of users and groups.
The following LDAP Security Provider Configuration page opens on which you configure the provider name and connection parameters.
Specifies a name for this provider.
Is a host identifier consisting of a host name or an IPv4 dotted string representing the IP address of a host running the LDAP server to connect to.
Alternatively, it may contain a list of space-delimited host identifiers. Each host identifier may include a trailing colon and port number. In the case where more than one host identifier is specified, each host identifier in turn will be contacted until a connection can be established. For example:
directory.example.com 192.0.2.0 directory.example.com:1050 people.catalog.com 192.0.2.0
Specifies whether the server uses a Secure Socket Layer (SSL) session with the LDAP server. Select No or Yes. The server default is No.
An LDAP (Lightweight Directory Access Protocol) security provider supports Secure Sockets Layer (SSL) API calls to establish an SSL/TLS connection. Using server authentication only, the Reporting Server initiates API calls to verify that the LDAP server being connected to is the same server that provided certification.
You can set the LDAP secure connection from the Web Console:
If you have selected IBM, Sun, or Novell as the your ldap_lib_vendor, when you select Yes in the ldap_secure_conection field, additional options are added to the Connection tab:
ldap_ssl_certificate. Enter the name of the LDAP attribute used by the API to establish the SSL/TLS connection. The server employs server authentication only, checking through API calls that the LDAP server you are connecting to is the one that provided the certificate. Values depend on the LDAP vendor, as follows:
ldap_ssl_certificate_encoding. For Novell, select the standard used to encode the certificate from the drop-down list. Encryption and file format depend on API vendor specifications. The options are B64 and DER.
Is a positive integer that defines the TCP port number used to connect to the LDAP server. Note that ldap_port is ignored for any host identifier which includes a colon and port number. The server default port is 389 or 636 (for SSL connection).
Determines the type of bind used. Can be one of the following.
The bind is performed using no credentials. This is the internal default value.
The reporting server authentication is performed against Active Directory utilizing a Windows-specific API.
The bind is done under the Windows account that started the server.
The windows machine that hosts the reporting server should be in the same domain as Active Directory.
The bind is performed under the account that is defined by configuration parameters ldap_principal and ldap_credentials.
Note: When connecting to Active Directory using Explicit or NEGOTIATE, ldap_user_attribute should have the value sAMAccountName or userPrincipalName.
Specifies the timeout in seconds for ldap_search. The server default value is 60 seconds.
The User Search category of parameters opens, as shown in the following image. The common parameters for User Search and Group Search are automatically populated.
User properties
Specifies the DN of the entry that serves as the starting point for the search. Consists of attribute=value pairs, separated by commas. The server default is dc=ibi,dc=com.
Specifies the scope with which the LDAP realm should search for users. Select Subtree, Onelevel, or Base:
Subtree scope indicates that the LDAP realm should search everything under the base DN.
Onelevel scope tells the LDAP server to only search entries one level down from the base DN.
Base indicates that the search should be done at the search base only.
The server default is Subtree.
Specifies the object class used when searching for user entries. The server default is person.
Specifies the LDAP attribute used when searching for user entries. uid is the default value for LDAP and sAMAccountName is the suggested value for Active Directory. One possible reason to change the default value would be to allow users to logon with an email address instead of a user ID. In this case, you might change the value to mail or userPrincipalName (if this corresponds with the name of the appropriate attribute in your directory).
Specifies the LDAP attribute used to identify a group in a user object.
The Active Directory standard is Memberof.
Optional. Specifies the name of the attribute whose value contains description of an object (user, group). The server default is description.
Optional. Specifies the name of the attribute whose value contains the user email address. The server default is mail.
Note: ldap_user_class, ldap_user_attribute, ldap_group_class, ldap_group_attribute are parameters that form a search filter.
The search filter standard syntax conforms to the following structure:
(&(Property_Name=Property_Value)(Property_Name=Property_Value))
If you change value of the ldap_user_class and ldap_group_class parameters to an asterisk (*), the search filter syntax can be reduced to the following simplified form (although group support will not work properly):
(Property_Name=Property_Value)
By specifying an asterisk for these parameters, you achieve simplified search filter syntax, but in effect, disable group support.
Group properties
Specifies the DN of the entry that serves as the starting point for the search. The server default is the ldap_user_base value.
Specifies the scope with which the LDAP realm should search for groups. Select Subtree, Onelevel, or Base:
Subtree scope indicates that the LDAP realm should search everything under the base DN.
Onelevel scope tells the LDAP server to only search entries one level down from the base DN.
Base indicates that the search should be done at the search base only.
The server default is Subtree.
Specifies the object class used when searching for group entries. The server default is groupofuniquenames. The Active Directory standard is group.
Specifies the LDAP attribute used to identify the name of the group. The server default is cn.
Specifies the LDAP attribute used to identify users in a group. The server default is uniqueMember. The Active Directory standard is Member.
Disables or enables LDAP nested groups support. Select No or Yes. The server default is No, which disables nested group support.
Optional. Specifies the name of the attribute whose value contains description of an object (user, group). The server default is description.
Specifies whether the server should accept trusted client connections. If there are multiple security providers, some may allow trusted connections and some may not. In these cases, if the trusted connection is made using a provider without the ability to accept trusted connections, the user will get an authentication error. The server default is n.
A Testing LDAP Security sign-in window opens.
Enter a valid user ID and password for this LDAP security provider and click Continue.
If your configuration and credentials are valid, a window opens telling you that you were successfully authenticated.
If they are not valid, you will get a corresponding message.
A partial list of users with their descriptions and group memberships opens.
A partial list of groups with their descriptions and a partial list of members opens.
The following parameters are now supported in the edaserve.cfg configuration file to support OpenSSL ciphers and Diffie-Hellman (DH) and Elliptic Curve Diffie-Hellman (ECDH) key exchange.
Configures the list of supported cipher strings. For example, the following is the default.
ALL:!ADH:!LOW:!EXP:@STRENGTH
Specifies the full path to the Diffie-Hellman (DH) parameters file. To create a DH key exchange with key size 1024 bits, issue the following command.
'openssl dhparam -outform PEM -out dHParam.pem 1024'
Specifies a curve name for a specific Elliptic Curve Diffie-Hellman key exchange. To list all available curves, issue the following command.
'openssl ecparam -list_curves'
Topics: |
Connections to a Hive server with Kerberos enabled can be run in one of two ways:
To setup connections to a Kerberos enabled Hive instance:
/hive_home/lib/hive-jdbc-standalone.jar /hadoop_home/hadoop-common.jar /hadoop_home/client/hadoop-auth.jar
In this configuration, all connections to the Hive instance will be done with the same Kerberos user ID derived from the Kerberos ticket that is created before the server starts.
kerbid01
where:
Is a Kerberos ID.
jdbc:hive2://server:10000/default;principal=hive/server@REALM.COM
Set to Trusted.
-Djavax.security.auth.useSubjectCredsOnly=false
Once these steps are completed, the adapter can be used to access a Kerberos-enabled Hive instance.
In this configuration, each connected user has a Hive Adapter connection with Kerberos credentials in the user profile.
ENGINE SQLHIV SET ENABLE_KERBEROS ON
jdbc:hive2://server:10000/default;principal=hive/server@REALM.COM; auth=kerberos;kerberosAuthType=fromSubject
Set to Explicit
Enter your Kerberos user ID and password. The server will use those credentials to create a Kerberos ticket and connect to a Kerberos-enabled Hive instance.
Note that the user ID that you use to connect to the server does not have to be the same as the Kerberos ID you use to connect to a Kerberos enabled Hive instance.
Select your profile or enter a new profile name consisting of the security provider, an underscore and the user ID. For example, ldap01_pgmxxx.
A server started with security provider OPSYS can be configured for Kerberos connections.
To implement the single sign on Kerberos security:
The OPSYS Security Configuration page opens.
The edaserve.cfg file is updated with this attribute.
The odin.cfg file is updated with this attribute.
When the server is started, a user can connect to the Web Console from Internet Explorer without a prompt for user ID and password. The Login Info shows connection type Kerberos. The connection is done using the Kerberos ticket from the browser. The connected user ID is derived from this ticket.
Connection to the server requires that there is a local OPSYS user ID with the same name as the Kerberos user ID on the operating system running the server. This user ID is used for tscom3 process impersonation.
If a user signs off from the Kerberos connection, the user can make explicit connections with the local Unix user ID and password. Connection with another Kerberos user ID as an explicit connection will not work.
You can configure uploads to operate on a specific list of file extensions.
By default, the upload_allowed entry field contains a comma-separated list of all file extensions that the server can upload.
After the server has restarted, the Upload Wizard will not show files with unsupported extensions if you click Select Upload File. If you try to drag a file with an unsupported file extension to the Upload Wizard, a message will be displayed that it is an invalid type of file.
You can configure Custom Provider authentication to encode passwords so that they cannot be viewed when they are passed as parameters to the authentication procedure.
The CUSTOM Security Provider Configuration page opens.
When a user is authenticated, the server will send SHA-256 hashed passwords to the authentication procedure. This means that the passwords will be transformed into values that will be unusable for signing in to the Web Console and server. The hashed values have to be stored as passwords in the SQL database being used for authentication. As an alternative, you can create a utility called from the CUSTOM provider authentication procedure that decodes hashed passwords before sending a request to the SQL database for authentication.
The server administrator can choose whether to register users and groups for the primary security provider with one-part or two-part names. With two-part names, the user ID or group name is prepended with the provider name and a backslash. For example:
OPSYS\user1
or
LDAP01\user2
By default, all users and groups are registered using two-part names. To configure one-part registrations:
The prepend_provider_name=n attribute is added to the edaserve.cfg file.
The server administrator can now access Directory/File Privileges as a right-click menu option from any security subject (role, user, or group) on the Access Control tree.
The new Directory/File Privileges page enables the server administrator to configure privileges for all directories and files in those directories from a single page.
The new page has individual check boxes for Read, Write, and Execute privileges that can be changed on this page. The page is refreshed to update privileges for all inherited locations.
Each directory on the page has a right-click option to Show All Directories/Files. If this option is chosen, all nested folders and files are listed with their privileges.
The new Directory/File Privileges page is shown in the following image.
From the Access Control page, the server administrator can now register users and groups in server roles for a security provider that is not currently activated. These registrations will be available when the server is started with security ON and with that provider activated.
In addition, a server running with security OFF now has an Access Control page that a server administrator can use to register users and groups and to activate and deactivate providers.
One use for this feature is to register a Server Administrator for a Provider that will be active after the next server restart.
WebFOCUS | |
Feedback |