E-SSO 803 ConsoleAdminGuide
E-SSO 803 ConsoleAdminGuide
E-SSO 803 ConsoleAdminGuide
3
Administrator Guide
Enterprise SSO Console
Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED.
This publication contains proprietary information protected by copyright. The software described in this publication is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical or otherwise without the prior written permission of the publisher.
DISCLAIMER
The information in this publication is provided in connection with Quest branded products from Evidian. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this publication. EXCEPT AS OTHERWISE SPECIFIED IN THE END USER LICENSE AGREEMENT FOR THIS PRODUCT, EVIDIAN AND QUEST ASSUME NO LIABILITY WHATSOEVER AND DISCLAIM ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO THIS PRODUCT, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL EVIDIAN OR QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS PUBLICATION, EVEN IF EVIDIAN OR QUEST HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Evidian and Quest make no representations or warranties with respect to the accuracy or completeness of the contents of this publication and reserve the right to make changes to specifications and product descriptions at any time without notice. Evidian and Quest do not make any commitment to update the information contained in this publication. The information and specifications in this publication are subject to change without notice.
Trademarks
Quest, Quest Software, the Quest Software logo, Aelita, AppAssure, Benchmark Factory, Big Brother, DataFactory, DeployDirector, ERDisk, Foglight, Funnel Web, I/Watch, Imceda, InLook, IntelliProfile, InTrust, IT Dad, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, NBSpool, NetBase, Npulse, PerformaSure, PL/Vision, Quest Central, RAPS, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL LiteSpeed, SQL Navigator, SQL Watch, SQLab, Stat, Stat!, StealthCollect, Tag and Follow, Toad, T.O.A.D., Toad World, Vintela, Virtual DBA, Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. The terms Evidian, AccessMaster, SafeKit, OpenMaster, SSOWatch, WiseGuard, Enatel and CertiPass are trademarks registered by Evidian. All other trademarks mentioned in this document are the propriety of their respective owners. World Headquarters, 5 Polaris Way, Aliso Viejo, CA 92656 Website: www.quest.com Please refer to our website for regional and international office information. Quest Enterprise SSO Updated January 2010 Software version 8.0.3
CONTENTS
About This Guide ...................................................................................................... 7
Access Management ......................................................................................................... 7 Conventions ............................................................................................................... 8
1. Overview................................................................................................................. 9
1.1 Enterprise SSO Concepts ........................................................................................... 9 1.2 Enterprise SSO Controllers ....................................................................................... 10 1.2.1 Enterprise SSO Services................................................................................ 10 1.2.2 Domain Controller Selection........................................................................... 12 1.3 A Multi-Domain Architecture...................................................................................... 12 1.4 General Ergonomic Design ....................................................................................... 15 1.4.1 Home Window ................................................................................................ 15 1.4.2 Directory Panel Overview ............................................................................... 17
5.1.5 Deleting Timeslices......................................................................................... 43 5.2 Managing Password Format Control Policies ........................................................... 44 5.2.1 Creating/Modifying Password Format Control Policies.................................. 44 5.2.2 Configuring Password Format Control Policy ................................................ 45 5.2.3 Displaying Password Format Control Policy Event Logs ............................... 46 5.2.4 Renaming Password Format Control Policies................................................ 47 5.2.5 Deleting Password Format Control Policies................................................... 47 5.3 Managing User Security Profiles ............................................................................... 47 5.3.1 Creating/Modifying User Security Profiles...................................................... 48 5.3.2 Configuring User Security Profiles ................................................................. 49 5.3.3 Displaying User Security Profile Event Logs.................................................. 66 5.3.4 Renaming User Security Profiles ................................................................... 66 5.3.5 Deleting User Security Profiles....................................................................... 67 5.4 Managing Access Point Security Profiles.................................................................. 67 5.4.1 Creating/Modifying Access Point Security Profiles ........................................ 68 5.4.2 Configuring Access Point Security Profiles .................................................... 68 5.4.3 Displaying Access Point Security Profile Event Logs .................................... 81 5.4.4 Renaming Access Point Security Profiles ...................................................... 82 5.4.5 Deleting Access Point Security Profiles ......................................................... 82 5.5 Managing Application Security Profiles..................................................................... 83 5.5.1 Managing Password Generation Policies ...................................................... 83 5.5.2 Creating/Modifying Application Security Profiles............................................ 87 5.5.3 Configuring Application Security Profiles ....................................................... 88 5.5.4 Displaying Application Security Profile Event Logs........................................ 94 5.5.5 Renaming Application Security Profiles ......................................................... 94 5.5.6 Deleting Application Security Profiles............................................................. 95 5.6 Defining Security Profiles Default Values.................................................................. 95 5.7 Managing User and Access Point Security Profiles Priorities................................... 97
6.2 Managing Users ...................................................................................................... 121 6.2.1 Displaying User General Information ("Information" Tab)............................ 121 6.2.2 Defining User Connection Parameters ("Connection" Tab) ......................... 122 6.2.3 Assigning a User Security Profile to a User ("Security Profile" Tab) ........... 128 6.2.4 Declaring a User as an Administrator ("Administration" Tab) ........................ 129 6.2.5 Assigning/Forbidding Access Points to a User ("Access Points" Tab) ........ 129 6.2.6 Managing User's Accounts ("Accounts" Tab)............................................... 131 6.2.7 Managing User's Smart Cards ("Smart Card" Tab) ..................................... 133 6.2.8 Displaying Users Biometric Data ("Biometrics" Tab)................................... 134 6.2.9 Assigning Applications to a User ("Application Access" Tab) .......................... 135 6.2.10 Managing User's RFID Tokens ("RFID" Tab)............................................. 136 6.2.11 Managing Data Privacy ("DP" Tab) ............................................................ 136 6.2.12 Displaying User Event Logs ("Event" Tab)................................................. 137 6.3 Managing Access Points ......................................................................................... 137 6.3.1 Displaying Access Point General Information ("Information" Tab) .............. 138 6.3.2 Defining Access Point Configuration Parameters ("Configuration" Tab) ..... 139 6.3.3 Assigning/Forbidding Users to Access Points ("Authorized Users" Tab) .... 141 6.3.4 Assigning/Forbidding Applications to Access Points ("Available Applications" Tab) ............................................................................... 142 6.3.5 Displaying Access Point Event Logs ("Events" Tab) ................................... 144 6.4 Managing Representative Objects .......................................................................... 144 6.4.1 Managing Inbound Representative Objects ................................................. 145 6.4.2 Managing Outbound Representative Objects .............................................. 149 6.4.3 Displaying Representative Event Logs ........................................................ 153 6.4.4 Renaming Representative Objects............................................................... 153 6.4.5 Deleting Representative Objects .................................................................. 154 6.5 Managing Clusters of Access Points....................................................................... 154 6.5.1 Creating and Configuring a Cluster of Access Points .................................. 156 6.5.2 Displaying Cluster Event Logs ("Events" Tab) ............................................. 159 6.5.3 Renaming Clusters ....................................................................................... 159 6.5.4 Deleting Clusters .......................................................................................... 160 6.6 Selecting a Domain Controller................................................................................. 160
7.6 Sending Smart Cards to a Blacklist......................................................................... 175 7.6.1 Sending Smart Cards to a Blacklist from the Smart Card Panel ................. 175 7.6.2 Sending Smart Cards to a Blacklist from the Directory Panel .......................... 176 7.7 Extending the Validity of a Smart Card ................................................................... 176 7.8 Displaying Smart Card Properties ........................................................................... 178 7.9 Displaying the List of Supported Smart Cards ........................................................ 179 7.10 Managing Smart Card Configuration Profiles ....................................................... 180 7.10.1 Creating / Modifying Configuration Profiles................................................ 180 7.10.2 Renaming Configuration Profiles................................................................ 181 7.10.3 Deleting Configuration Profiles ................................................................... 182 7.11 Managing Loan Cards ........................................................................................... 182 7.11.1 Assigning a Loan Card to a User ............................................................... 182 7.11.2 Returning Loan Cards ................................................................................ 183 7.12 Managing Smart Card's Authentication Parameters............................................. 185 7.13 Managing Batches of Smart Cards ....................................................................... 186 7.13.1 Defining a Stock of Tokens......................................................................... 186 7.13.2 Displaying Information on Stocks ............................................................... 188 7.13.3 Forcing the Use of Smart Cards Defined in the Batch ............................... 189
11.2 Renewing Keys...................................................................................................... 220 11.2.1 Renewing Manually a Key .......................................................................... 220 11.2.2 Configuring Automatic Updates of Keys .................................................... 222 11.3 Allowing Users to Refresh their Keys from the Directory ...................................... 223 11.4 Exporting a List of Generated Keys ...................................................................... 225
A. Regular ExpressionsBasic Syntax ............................................................... 257 B. Listing Audit Events and Error Codes............................................................ 259
B.1 Listing Audit Events................................................................................................. 259 B.2 Listing Error Codes ................................................................................................. 261
C. List of Administration Rights .......................................................................... 263 About Quest Software, Inc. .................................................................................. 267
Contacting Quest Software............................................................................................ 267 Contacting Quest Support ............................................................................................. 267
v
Administrator Guide
Conventions
In order to help you get the most out of this guide, we have used specific formatting conventions. These conventions apply to procedures, icons, keystrokes and crossreferences.
ELEMENT CONVENTION
Select Bolded text Italic text Bold Italic text Blue text
This word refers to actions such as choosing or highlighting various interface elements, such as files and radio buttons. Interface elements that appear in Quest products, such as menus and commands. Used for comments. Introduces a series of procedures. Indicates a cross-reference. When viewed in Adobe Acrobat, this format can be used as a hyperlink. Used to highlight additional information pertinent to the process being described. Used to provide Best Practice information. A best practice details the recommended course of action for the best result. Used to highlight processes that should be performed with care.
+ |
A plus sign between two keystrokes means that you must press them at the same time. A pipe sign between elements means that you must select the elements in that particular sequence.
Administrator Guide
1. Overview
This guide describes how to use Enterprise SSO (or E-SSO) Console, the administration tool that allows you to define your company Access Management configuration, from the setting up of the basic security objects to the definition of access rights for users, workstations and applications.
You main administration task consists in implementing the relations between these three types of objects, as shown in the following diagram:
Access
User A
Application
Connection
Availability
Access Point
The term User refers to the user himself, a group of users or an organizational unit that contains users. Likewise, the term Access Point refers to the access point itself (which is a computer), a group of computers or an organizational unit that contains computers.
Each Enterprise SSO controller may offer the set of services or only a part of these services.
10
Administrator Guide
Enterprise SSO Services Management At installation time, Enterprise SSO controllers are not specialized: all the above services are available. The Enterprise SSO Console allows you to dedicate an Enterprise SSO controller to a subset of services. Once specialized, each controller continues to run all the services but only a part of them is used by the workstations. At any time, you can change the Enterprise SSO controller configuration from the Enterprise SSO Console (as explained in Section 6.3.2.2, Managing the Access Point Available Services) without having to install anything on the controller. Workstation Connection to Enterprise SSO controllers All the controllers and their services are registered in the directory. The first time a workstation needs to connect to an Enterprise SSO controller, it obtains the list of existing controllers from the directory and builds in a cache the list of the available services classified by sites. Then the workstation tries to connect to an Enterprise SSO controller that explicitly provides the required Service in its site. If no such controller is available, then the workstation tries to connect to an Enterprise SSO controller that provides all Services in its site. If no such controller is available it tries in the other sites. This list is rebuilt only at the cache expiration, so when you change the services configuration from the Enterprise SSO Console, it needs time before all the workstation use the new services. For this reason and for backward compatibility with the previous version of Enterprise SSO, an Enterprise SSO controller provides all Services. Example To ensure high availability and good performances, it is interesting to install Enterprise SSO on several servers and to dedicate it to specific services. The following figure shows an example of service distribution: one server is dedicated to the audit and another to the administration.
E-SSO Controller Audit Service E-SSO Controller
Administration Service
Audit Server
Audit Collection
Administration Server
User Workstation
Administrator Workstation
11
12
Administrator Guide
Corporate Active Directory with a Multi-Domain Forest Extended for the Quest ESSO Module
DOMAIN 1
DOMAIN 2
E-SSO Controller
(Domain 1)
E-SSO Controller
(Domain 2)
E-SSO
Console
When the Enterprise SSO data is stored in the multi-domain forest AD, the propagation of the data in the other directories of the forest is made by AD, but you have to declare the Enterprise SSO administrators in others domains if they have to manage data stored in theses others domains and you have to declare representatives of users and access points if the users have to connect on the workstations of the others domains.
13
Enterprise SSO data is stored at only one place in an ADAM directory and the administration console makes it possible to see at the same time the data in AD and in ADAM: see the following figure showing a multi-domain architecture with Enterprise SSO data stored in ADAM.
User Computer OU
User Computer OU
AD DOMAIN 1
1 Administration / Audit Data 2 Read / Write data
AD DOMAIN 2
E-SSO Controller
(Domain 2)
1 E-SSO Data
E-SSO Workstation Clients Running Applications (Domain 1)
DOMAIN 1
E-SSO
Console
When the Enterprise SSO data is stored in ADAM, the Enterprise SSO administration is greatly simplified and identical to the mono domain administration Architecture Components The above illustration shows an Enterprise SSO software architecture that allows administrators to manage users that reside in different LDAP domains.
The software architecture depends on the way the Enterprise SSO module is installed. For details on the possible architectures depending on the LDAP directories infrastructures, see Enterprise SSO Advanced Installation and Configuration Guide.
14
Administrator Guide
It consists of the following modules: The corporate LDAP directory, which was a baseline of users of the company, before the implementation of the Enterprise SSO architecture. During the installation of the software suite, the schema of this directory is extended with Enterprise SSO specific classes and attributes. The Enterprise SSO controllers (primary controller, secondary controllers, associated controllers), which provide administration and audit communications between client stations and the LDAP directory. A centralized audit base (called the Master database), which contains all the log entries of every individual Enterprise SSO controller. This concerns both user action log entries and administration action log entries. In that case, the local SQL Server databases of individual servers are only used to store the audit events temporarily, before sending them to the Master base. This audit base can be hosted on other databases than SQL Server. For details on the supported databases, see Quest Enterprise SSO Release Notes. The Enterprise SSO client workstations, which communicate directly with the corporate LDAP directory and the Enterprise SSO controllers (for administration and audit data). They are the user's Access Points to applications The applications of the Enterprise SSO module, which are based on the Enterprise SSO Security Services:
Enterprise SSO Console: centralized administration and audit consultation tool. This administration console can be installed on any client workstations and allows you to manage users that reside in different LDAP domains. SSOWatch and SSOStudio: the Single Sign-On (SSO) tools. Advanced Login: tool for user authentication by password, smart card, RFID or biometrics, and workstation security protection.
15
ICON
DESCRIPTION
Gives access to the Directory panel, which allows you to manage all directory objects. This panel is explained in the following sections of this guide: Section 3, Searching the Directory Tree. Section 4, Managing Administrators. Section 5, Managing Security Profiles. Section 6, Managing Directory Objects.
Gives access to the Smart Card panel, which allows you to manage smart cards. This panel is explained in the following sections of this guide: Section 7, Managing Smart Cards. Section 8, Managing SA Server Devices. Gives access to the Biometrics panel, which allows you to display and export the list of users who have enrolled their biometric data. This panel is explained in Section 10, Managing Biometric Enrolment of this guide. Gives access to the RFID panel, which allows you to manage RFID badges. This panel is explained in Section 9., "Managing RFID Tokens" of this guide. Gives access to the Data Privacy panel, which allows you to manage file encryption. This panel is explained in Section 11, Managing Data Privacy of this guide. Gives access to the Audit panel, which allows you to audit events. This panel is explained in Section 13, Managing Audit Events of this guide.
16
Administrator Guide
AREA
NAME
DESCRIPTION
Menu bar
The menu bar contains 2 types of menus: Static menus (File, View and Help), which are always available and always display the same commands. A dynamic menu (Directory in the above illustration), which displays specific commands depending on the administration panel selected in area 5.
2 3
The tool bar is dynamic. It displays buttons that are shortcuts to the menu bar items. Depending on your administration role and on the selected administration panel, this area displays tabbed panels that allow you to manage and stores access rights and user accounts in the LDAP directory (Directory panel), manage a base of corporate smart carts (Smart Card panel), manage a base of RFID tokens (RFID panel), configure file encryption for some users (Data Privacy panel), display biometry data (Biometrics panel), display Audit information (Audit panel). This area appears in the Directory panel only. It displays your LDAP directory administration perimeter.
17
Directory tree
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console AREA NAME DESCRIPTION
Navigation bar
This area allows you to switch rapidly between the different administration panels. The active panel is shown in a gray circle. Depending on your administration rights, some buttons may be deactivated.
18
Administrator Guide
The protection mode is chosen at installation time, during the primary controller initialization (for more information on installation, see Enterprise SSO Advanced Installation and Configuration Guide).
Upon the first start of Enterprise SSO Console, you authenticate from the Security Module or pass phrase as the super-administrator. Then, depending on your needs, you can define as many administrators as you want, and assign for each one an administration role, with specific administration profiles and for specific organizations of the directory (see Section 4, Managing Administrators).
19
2.
Insert the Security Module or an administration smart card and type your PIN.
The Enterprise SSO Console appears.
Procedure First Start 1. In the Windows task bar, click Start | Programs | Quest Software | Enterprise SSO | Enterprise SSO Console.
The Enterprise SSO Console authentication window appears.
2.
3.
Type the pass-phrase that has been entered at installation time, during the primary controller initialization (see Enterprise SSO Advanced Installation and Configuration Guide) and click OK.
The Enterprise SSO Console appears.
20
Administrator Guide
Everyday Start 1. In the Windows task bar, click Start | Programs | Quest Software | Enterprise SSO | Enterprise SSO Console.
The Enterprise SSO Console authentication window appears.
2.
Click Yes.
The Enterprise SSO Console is closed.
21
Before starting
22
Administrator Guide
Procedure 1. 2. Display the protection mode as explained in Section 2.2.1, Displaying the Current Protection Mode. In the Migration tab, click the Migrate to hardware mode button.
The change protection mode window appears, asking you to insert the Security Module, its associated PIN and the administration pass-phrase.
3. 4.
Click OK.
You are now working in hardware protection mode.
2.2.3 Managing Administrators whose Administration Keys are Protected by Software Encryption
Subject The migration from software to hardware protection mode does not delete all copies of the administration keys from the directory: the directory contains an encrypted copy of one or both of the following administration keys: SSO Recovery: key pair that protects the copy of the owner's recoverable SSO key in the directory. Token Administration: key pair that protects smart card administration data in the directory.
This section explains how to display and manage the administrators who have copies of one or both of these administration keys. Before Starting You must be a primary administrator to delete copies of an administration key.
23
Procedure 1. 2. Display the protection mode as explained in Section 2.2.1, Displaying the Current Protection Mode. Click the Software Mode Keys tab.
The tab lists the names of the administrators who have copies (stored in the directory) of one or both administrative encryption keys.
3.
To delete the copies of the administration keys, select the wanted line and click Delete Keys.
The copies of the administration keys encrypted by the recoverable keys of the selected users are deleted from the directory.
24
Administrator Guide
Before starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator" or "Access administrator" or "Rights administrator" or "Smart card administrator" or "File Encryption administrator". In advanced administration mode, your role must contain the following right: "Directory: Browsing".
2.
In the Search root field, click the Select button to select the organization in which you want to search an object: Use the Browse tab to browse the directory tree structure or use the Search tab to find the organization according to its name In the Object type list, select the type of object you want to search.
25
3.
4.
In the Filter field, type the wanted search request, as explained in the tab instructions and click Search.
The search result appears in a new node in the Directory panel, under the Search request node. The following example window shows the result of two search requests.
Search Configuration Tab - Description Search root field The container in which is performed the search. If you leave this field empty, the search is performed in all the directory organizations to which you are authorized to access.
Select button Opens the organization selection window, which allows you to browse the directory tree structure (Browse tab) or filter the directory tree (Search tab) to find the organization. Remove button Removes the organization from the field. An empty field means all organizations.
Object type list List of directory objects you can search for in the directory.
For performance reasons, you cannot search for an organization in the directory. Objects designated with a CN are the only one that can be found.
Filter field Name of the object (or part of the name, using the * character) you want to search for.
Search button Performs the search. Clear all button Deletes all search requests from the directory tree.
26
Administrator Guide
2.
Deleting All Search Requests 1. 2. In the directory tree, select the Search request node.
The search configuration tab appears.
27
4. Managing Administrators
Subject This section describes how to delegate, transfer and delete administration profiles to manage the users declared in your LDAP directory who are allowed to administer the Quest Enterprise SSO solution though the Enterprise SSO Console. An administration role is made up of the following elements: The administration role scope: the objects of the directory on which the administration role applies. One or several administration profile(s): the administration rights allocated to the administration role. A parent administrator (optional). An audit filter that indicates what administrator actions should be audited.
Enterprise SSO Console allows you to assign administration profiles to users so that they can perform the corresponding administration tasks.
28
Administrator Guide
To migrate from the classic administration mode to the advanced administration mode, see Enterprise SSO Advanced Installation and Configuration Guide.
The list of existing administration profiles and their corresponding administration rights (available in advanced administration mode) is given in Appendix C. List of Administration Rights). Delivered Administration Profiles Quest delivers the following administration profiles:
ADMINISTRATION PROFILE NAME DESCRIPTION
This role allows the administrator to manage tokens' inventory and change the following security objects: Time slices. Password Format Control Policies (PFCP). Password Generation Policies (PGP). User Security Profiles. Access Point Security Profiles. Application Security Profiles
This role allows the administrator to authorize applications and users on access points. This role allows the administrator to authorize a user to use an application. This right also requires administration rights on the application. This role allows the administrator to manage smart cards. This role allows the administrator to manage the Data Privacy feature. This role allows the administrator to manage the audit. This role allows the administrator to reassign recoverable accounts to the user and to change the user's means of authentication without the user losing his SSO data. This option allows the administrator to delegate his/her administration rights. This delegation is restricted to the administrator's rights and visibility.
"Smart card administrator" "File Encryption administrator" "Auditor" "SSO Data Recoverer"
29
IT Security Manager
(Security Module or Pass phrase)
Super Administrator
Admin 1
Admin 2
Admin 3
Admin 4
Admin 5
The tree structure root is the IT Security Manager (or primary administrator which corresponds to a specific user created in the LDAP directory during the installation of the solution. The IT Security Manager administration keys are encrypted with a Security Module or a pass phrase (for more information on the protection modes, see Section 2, Authenticating to E-SSO Console and Managing Protection Modes). Upon the first start of Enterprise SSO Console, you authenticate from the Security Module or pass phrase as the super-administrator. Then, depending on your needs, you can define as many administrators as you want, and assign for each one an administration profile, with specific administration roles and for specific organizations of the directory.
30
Administrator Guide
Administration role is inherited in the following ways: Delegate: the current administrator copies his/her administrator role to the selected user. Transfer: the administration role of the selected user is transferred to another user (who must not have administration rights yet). This new user replaces the previous administrator. Delete: the administration role of the selected user is deleted. The parent of these child items in the administration tree structure is now the parent of the child item whose rights were removed.
In advanced administration mode, the "User administration profile: administration rights manager" administration right allows an administrator to delegate his administration rights or to delete rights to/from an administrator for whom he/she is not the parent administrator.
Before Starting Check that you meet the following requirements: The user for which you want to delegate administration profiles must be created in the directory. You must have at least the following administration role:
In classic administration mode: "Authorize propagation of administration rights" and one of the following profiles: "Security object administrator", or "Access administrator" or "Rights administrator". In advanced administration mode, you role must contains the following rights: "User administration profile: Delegation" and "Directory: Browsing".
In software protection mode, the user for which you want to delegate administration profiles must have authenticated to the Enterprise SSO Console at least once.
Restriction You cannot delegate Organizational Units that are outside your administration perimeter.
31
Procedure 1. 2. In the Directory panel, select the user for which you want to delegate your administration profile. In the Administration tab, click Delegate.
The tab is automatically filled in with your administration profile attributes and the selected user has an administration profile. Classic Administration Mode
3.
If you want to modify the delegated administration profile, modify this tab as follows: a) Advanced organization(s) area: In this area, modify the administration perimeter, by adding or removing Organizational Units (OU) using the Add and Remove buttons.
For a complete visibility, select the directory root. You can add as organizations as required.
b)
Managed users area By default, this area is empty. It means the administrator can manage all the people registered in the administered organizations. To restrict the number of users to administer, define in this area the groups and organizational units of the administration perimeter containing the users to administer.
32
Administrator Guide
c)
d)
Set Parent Administrator button: By default, the parent administrator is the administrator who delegates his administration rights. If you want set another parent administrator, click Set Parent Administrator. For more details, see Section 4.7, Modifying the Parent Administrator. Audit area (advanced administration mode only): Assign an audit filter to the selected administrator, as explained in Section 13.2.2, Assigning an Audit Filter to Specific Objects.
e)
4. 5.
Click Apply. Assign an authentication token with administrator rights to the user. For more details, see Section 7.1.2, Assigning a Smart Card to a User.
33
Procedure 1. In the Administration profile tab, in the Administration role area, click the Add button.
The administration profile selection window appears.
2.
3. 4.
In the Administration profile name field, type a name for the administration profile you are creating or modifying. Set the scope of the administration profile (optional) and use the Add and Remove buttons to select the administration rights you want to be contained in the profile, as explained in the following Administration Profile Window Description section.
34
Administrator Guide
Administration Profile Window Description This section describes the administration profile edition window.
INTERFACE ELEMENT
DESCRIPTION
Name of the administration profile you are creating or modifying. Scope of the administration profile: all the objects on which the administration profile applies. This field allows you to define the organizations that must be assigned to the administrator at the same time as the administration profile. The button allows you to select in the directory the perimeter of the administration profile, by browsing the directory or by executing a search request. The Clear button removes the organization from the field.
Administration rights
List of all available Enterprise SSO administration rights that you can add in the administration profile. All rights are written in the following format: <object or authorization name>:<right name>
List of administration rights that will be assigned to the administrator. You cannot add to the profile an administration right that you do not already own.
Adds the selected administration rights to the administration profile. Removes the selected administration rights from the administration profile.
35
2.
Before Starting Check that you meet the following requirements: The user for which you want to transfer administration role must be created in the directory. Make sure you have at least the following administration role:
In classic administration mode: "Authorize propagation of administration rights" and one of the following profiles: "Security object administrator", or "Access administrator" or "Rights administrator". In advanced administration mode, you role must contains the following administration right: "User administration profile: Delegation".
Procedure 1. 2. 3. In the Directory panel, select the administrator for which you want to transfer the administration role. In the Administration tab, click Transfer.
The User selection window appears.
Select the user for which you want to transfer the administration role of the selected administrator and click OK.
The administration role of the administrator is deleted and transferred to the selected user.
36
Administrator Guide
Before Starting To perform this task, you must be a parent administrator. Procedure 1. 2. In the Directory panel, select the user for which you want to delete his administration profile. In the Administration Profile tab, click Delete.
The administration profile of the user is deleted.
37
2.
From this window, click the wanted tab to display the following information:
The Current profile tab displays: You parent administrator (not defined if this involves the security module or pass-phrase). Your LDAP directory administration perimeter. Your administration profiles. In advanced administration mode, the Show rights button allows you to displays the administration rights corresponding to the displayed profiles.
Profile propagation tree tab displays the administration rights propagation tree to indicate all the administrators of the LDAP directory and their links (parent/child/no link). Administered applications tab displays the list of applications for which you have administration rights. Administered users tab displays the list of u for which you have administration rights.
In the Directory panel, select the user for which you want to modify the parent administrator. In the Administration Profile tab, click Set Parent Administrator.
The User selection window appears.
Administrator Guide
Procedure 1. In the File menu, click Configuration and select the Primary administrators tab.
The Primary Administrator tab appears.
2.
Use the Add and Remove buttons to define auxiliary primary administrators.
All Policy Manager administrators are Enterprise SSO super administrators. Do not remove them.
39
Administrator Guide
Procedures Creating Timeslices 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your Timeslice and select New | Timeslice.
The Timeslice configuration tab appears.
2.
Fill in this window as described Configuring Timeslices section below and click Apply.
The Timeslice appears in the directory tree structure.
Modifying Timeslices
If you modify a Timeslice already used by target objects, your modifications apply to all the target objects associated with this security object.
1. 2.
In the tree structure of the Directory panel, select the Timeslice to modify.
The Timeslice configuration tab appears.
Fill in this window as described in Section 5.1.2, Configuring Timeslices and click Apply.
The Timeslice is modified.
41
Window Example
Procedure 1. 2. Type the Timeslice name. Define the time slot periods during the days of the week hour by hour, by clicking to validate a time or not.
Red: time slot not valid. Blue: time slot valid.
3.
Define a validity period by selecting start and/or end dates. If not selected, the object validity is permanent.
42
Administrator Guide
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted Timeslice. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs see Section 13.2.1, Filtering Audit Records).
Procedure 1. 2. In the tree structure of the Directory panel, right-click the Timeslice to rename and select Rename. Type the new name of the object and press Enter.
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Schedule: Deletion".
Procedure In the tree structure of the Directory panel, right-click the Timeslice to delete and select Delete. The Timeslice is deleted from the directory tree structure.
43
Procedures Creating Password Format Control Policies 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your PFCP and select New | Password Control Policy.
The PFCP configuration tab appears.
2.
Fill in this window as described in Section 5.2.2, Configuring Password Format Control Policy and click Apply.
The PFCP appears in the directory tree structure.
1. 2.
In the tree structure of the Directory panel, select the PFCP to modify.
The PFCP configuration tab appears.
Fill in this window as described in Section 5.2.2, Configuring Password Format Control Policy and click Apply.
The PFCP is modified.
44
Administrator Guide
Windows Example
Procedure 1. 2. Type the PFCP name. Define the minimum and the maximum number of characters, the maximum number of the same character allowed in passwords and if you want to prevent the use of successive occurrences of the same character (Password Format area).
45
3.
Define the number of lower case, upper case, digits and special characters allowed in passwords and their position (Allowed characters area).
The following special characters are permissible:
~ , | ] ?
" ` = ;
# + .
' _ } :
{ \ $ /
( @ % !
[ ) *
Accented characters are not permissible. For each type of character, the check boxes located in the right hand side of the dialog box allow you to define the position of the character as follows: The first check box corresponds to the first character. The second check box corresponds to the middle characters. The third check box corresponds to the final character.
4. 5.
Define a list of forbidden characters (Forbidden characters area). Click the Test password generation button to check if the generated passwords correspond to your requirements.
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted PFCP. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs see Section 13.2.1, Filtering Audit Records).
46
Administrator Guide
Procedure 1. 2. In the tree structure of the Directory panel, right-click the PFCP to rename and select Rename. Type the new name of the object and press Enter.
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Password format control policy: Deletion".
Procedure In the Directory panel, right-click the PFCP to delete and select Delete. The PFCP is deleted from the directory tree structure.
47
The Timeslice that will be used by the User Security Profile must be created.
Procedures Creating User Security Profiles 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your User Security Profile and select New | User Security Profile.
The User Security Profile configuration tab appears.
2.
Fill in this window as described in Section 5.3.2, Configuring User Security Profiles and click Apply.
The User Security Profile appears in the directory tree structure.
1.
In the tree structure of the Directory panel, select the User Security Profile to modify.
The User Security Profile configuration tab appears.
2.
Fill in this window as described in Section 5.3.2, Configuring User Security Profiles and click Apply.
The User Security Profile is modified.
48
Administrator Guide
Windows Example
Procedure 1. 2. Type the User security profile name. In the Authentication tab, select the authentication methods available for the Users that will be associated with the User Security Profile, and define the authentication parameters of the User Security Profile, as described in Section 5.3.2.1, Authentication Parameters Configuration ("Authentication" Tab). In the Security tab, define the single sign-on parameters of the User Security Profile, as described in Section 5.3.2.2, Security Parameters Configuration ("Security" Tab).
3.
49
4.
5.
6. 7.
8.
In the Unlocking tab, activate and use the Fast User Switching feature, define the unlocking parameters of the User Security Profile, as described in Section 5.3.2.3, Fast User Switching Parameters Configuration ("Unlocking" Tab). In the Emergency Access tab, activate and use the Emergency Access feature, define the password and PIN reset parameters of the User Security Profile, as described in Section 5.3.2.4, Emergency Access Parameters Configuration ("Emergency Access" Tab). In the Biometrics tab, define the biometrics policy, as described in Section 5.3.2.5, Biometrics Parameters Configuration ("Biometrics" Tab). In the Data Privacy tab, configure some aspects of the Data Privacy feature as described in Section 5.3.2.6, Data Privacy Parameters Configuration ("Data Privacy" Tab). In the Audit tab, assign an audit filter to user security profile to generate only relevant audit events, as described in Section 5.3.2.7, Audit Parameters Configuration ("Audit" Tab).
50
Administrator Guide
User authentication methods area The selected Authentication methods must be consistent with the authentication methods defined in the Access Point Security Profiles associated with the Users (for more details, see Section 5.4.2.1, Security Services Configuration ("Security Services" Tab)).
Authentication methods can only be used if they are activated on the Users' workstations, through the Access Point Security Profile, as described in Section 5.4.2, Configuring Access Point Security Profiles. The Session authentication method works only with Active Directory. For smart card authentication methods (as Cryptoflex smart card, CyberFlex PKCS#11 or Rainbow iKey3000 for example), you can assign a specific configuration using the Select Configuration button. These configurations are defined in the Smart Card panel. For more details, see Section 7.10, Managing Smart Card Configuration Profiles. The "Store-On-Server" and "Store-On-PC" biometric methods cannot be used simultaneously. You must only select one of them. For more information on available biometric methods, see Section 10, Managing Biometric Enrolment.
TAB ELEMENT
Timeslice
The default Timeslice is selected by default. Click the to select another existing Timeslice.
button
Click the button to display and if necessary modify the selected time slice, as described in Section 5.1.1, Creating/Modifying Timeslices. Use cache and Cache data validity Select Use Cache to use a cache upon session activation. This allows you to ensure user service continuity, by supporting network interruptions, and to manage Nomad users. It is recommended to indicate a greater time value than the Session Duration, so that the cache is refreshed during authentication and is thus automatically valid again for a specified time. The "0" value means infinite time: the cache data validity will not refresh. The cache can only be used if it is active on the workstation. This option is set upon the definition of Access Point Security Profiles, as described in Section 5.4.2, Configuring Access Point Security Profiles. Session duration (h) Session activation time before re-authentication is required. The "0" value means infinite time: re-authentication will never be required. Allow temporary password access for Duration of the validity of the temporary password, when granted to a user (for more information on TPA, see Section 6.2.2.3, Forcing a New User's Primary Password ("Password" Tab). When the duration is over, the user cannot log on anymore.
51
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console TAB ELEMENT DESCRIPTION
Authorizes the Users associated with this security profile to unlock a workstation locked by another user. In "access-point-management" mode, authorizes the Users associated with this security profile to authenticate on all Access Points of their domain (Default). In "no-access-point-management" mode, a user can open an Enterprise SSO session on an access point of his/her domain only if the Allow on all access points field is selected. To authorize the Users to log on Access Points registered in external domains, see Section 6.4, Managing Representative Objects. This option is taken into account when you assign or forbid Access Points to a User: see Section 6.2.5, Assigning/Forbidding Access Points to a User ("Access Points" Tab).
This function is only available if the "Session" authentication method is selected. This function stores the user primary password as an SSO account: each time the user authenticates, his/her primary password is saved or updated if necessary. SSOWatch accesses this stored account for each SSO using the primary account. If the user authenticates with smart card logon, a registry key must be positioned so that SSOWatch can run in Session mode (see Enterprise SSO Advanced Installation and Configuration Guide for details on the registry key). The drop-down list allows you to select the way the primary account should be ciphered and deciphered: User: only the user can decipher his primary account. This is the most secure option. If the user forgets his/her primary password or loses his/her smart card, it is impossible to recover his/her account. User and administrators: you can also decipher the user's accounts. Thus, if you force a new primary password or assign a new smart card using Token Manager, the user's primary account is also recovered. User, administrators and external key: allows an external application to decipher the user's account using a public key. For example, you must select this entry if you want to use Enterprise SSO with Web Access Manager (WAM). By selecting this entry, you allow WAM to decipher the Enterprise SSO primary account of the user so that it can perform SSO with this account.
52
Administrator Guide
TAB ELEMENT
Allows the user to manually change his/her primary password (whatever the authentication method used) every "n" days using the default password format control policy (PFCP) displayed in the "User PFCP" field. If the manual password change policy detects expiration date of the password when the user authenticates offline, the user is not asked to change his/her password. In this case, you can force the user to authenticate when the directory is available again, so that he/she can manually change his directory password, by setting the following registry key to 1: "ManualPwdChangeMandatory" (DWORD), which is located in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Enatel\WiseGuard\Framework\Authentication. If you also select the "Change password on token every <n> days" check box, the present option is disabled for users whose authentication method does not require to provide the primary password (smart cards, biometrics).
53
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console TAB ELEMENT DESCRIPTION
User PFCP
The default password format control policy (PFCP) is selected by default. This PFCP applies when the user types his/her password. Click the button to select another existing PFCP.
Click the button to display and if necessary modify the selected PFCP, as described in Section 5.2.1, Creating/Modifying Password Format Control Policies. Change password on token every <n> days This option is available only if: The directory used is an AD or AD/ADAM. The user smart card stores the password. Select this check box to enable the automatic change of the smart card or USB token password every "n" days. This operation has no consequence on the user authentication tasks (the user still uses his/her PIN to authenticate). Automatic PFCP The default password format control policy (PFCP) is selected by default. This PFCP applies when password change is performed automatically, without user intervention (e.g.: the password is stored on smart card and changes every x days). Click the button to select another existing PFCP.
Click the button to display and if necessary modify the selected PFCP, as described in Section 5.2.1, Creating/Modifying Password Format Control Policies. Allow external access Select this check box to specify that the Users associated with this security profile can share their accounts with external applications. You must select this check box to enable the Mobile E-SSO feature. For more information, see Mobile E-SSO Installation and Configuration Guide. Select this check box to specify that the SSO data protected by token can be used even if the User authenticates by password (RFID and PKA authentication methods only). The grace period is the period of time during which the workstation automatically unlocks when the user reenters the unlocking area with the RFID token. After this period, the user must provide his/her password in addition to the RFID token to log on. User must provide emergency access answers Forces the user to provide emergency access answers when he/she wants to reset his/her password.
SSO data protected by token is also available on password authentication Grace period
54
A roaming session allows users to open a session on a computer with their physical authentication token, without having to type a secret. Select this check box to authorize the roaming session mode for users associated with the user profile, during a period of time. The roaming session is created as soon as the user authenticates on an authorized access point, and the session duration time starts from that moment. If you change the duration time in the Roaming session duration field once the roaming session has started, the new value will only be taken into account once the session in progress has expired. To authorize roaming sessions on an Advanced Login computer, see Section 5.4.2.2, Advanced Login Parameters Configuration ("Advanced Login" Tab).
TAB ELEMENT
Inactivation duration
Defines the time of inactivity of the SSOWatch Engine before its state switches to locked. The "0" value means infinite time: the SSOWatch engine never locks.
Allow SSOEngine control (pause/restart) Allow SSOEngine refresh Allow SSOEngine stop Show SSOEngine-launcher in foreground
Allows you to define if the Users associated with this User Security Profile can pause, refresh, stop and restart SSOEngine.
When SSOWatch is started, this check box allows you to define if the SSOEngine desktop can be opened on the application launcher. Allows you to define if the Users associated with this User Security Profile can use SSOStudio personal and SSOStudio Enterprise Allows you to define if the Users associated with this User Security Profile can select different roles in SSOEngine. Select this check box to specify that a token is necessary to start the SSO. SSO behavior on next card insertion.
55
TAB ELEMENT
DESCRIPTION
User level User can unlock sessions of users below level User can close sessions of users below level
Enter a User hierarchy level (0 is the lowest level, and 50000 is the highest). Select this check box to allow a User to unlock a session locked by another User whose level is below the specified level. Select this check box to allow a User to close a session opened by another User whose level is below the specified level.
Example Consider the following situation: you want that user 1, who is a User associated with User Security Profile 1 can unlock or close sessions of other Users associated with User Security Profile 1. To do so, you must configure the Unlocking tab as follows: User level: X (5 for example). May unlock user sessions below level: >X (7 for example). May close user sessions below level: >X (7 for example).
56
Administrator Guide
To check that this example works: 1. 2. 3. Use Advanced Login to log on as User 1. Lock the session. Unlock the session with another user associated with User Security Profile 1 (User 2 for example). a) SSO Watch is restarted with the SSO data of User 2, and the Session Information window of Advanced Login displays the following:
E-SSO User: User 2. Windows User: User 1.
Configuration Parameters
57
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console TAB ELEMENT DESCRIPTION
Availability
With Password Reset server only (connected mode) to enable the Emergency Access feature only when the Password Reset server, which is a component of the Enterprise SSO controller, is available. In this case, you must define the list of Password Reset servers: see the Emergency Access tab in Section 5.4.2, Configuring Access Point Security Profiles. When a user accesses the Emergency Access feature, his/her account is automatically unlocked by the Password Reset server. Always available (disconnected mode) to enable the Emergency Access features even if the Password Reset server is unavailable. For the Password Reset feature, a cache is used (see the "Activate cache and Cache properties button" parameter in Section 5.4.2, Configuring Access Point Security Profiles). If the directory is not available, the new password given by the user in "With Password Reset server only" mode is temporary: the directory is never updated with this password. When the directory is available again, the user is prompted to re-authenticate and to change his password (which will then be changed in the directory). If the directory is available, the password is changed in the directory. If a user can access the disconnected mode, this automatically implies that he/she can access the connected mode. Selecting this check box enables the User must contact the helpdesk to gain password access parameter, which allows you to define whether the user must call the help desk to reset its password.
Availability (continuation)
For PIN reset, the check box is ignored because the help desk call is mandatory. Check box cleared: the user answers to Emergency Access questions (set with SSOWatch); he is then automatically prompted to reset his password on his own (correct answers to questions are sufficient to decrypt the password stored in the cache). Check box selected: the user answers to Emergency Access questions (set with SSOWatch), which allows him to obtain a challenge (unlock code). He/she is then prompted to give this challenge to the Help Desk, which will have to give him a challenge in exchange (see Section 6.2.2.4, Managing User Emergency Access ("Emergency Access" Tab)) that will allows him to reset his password or PIN. Not available if you do not want to activate the Emergency Access feature.
58
Questions area
This area allows you to define the number of questions to ask to the end-user and to manage a list of available questions. These questions will be displayed by the Emergency Access wizard (through the SSOWatch engine) to your end users. For details, see Question List Management Procedure, below.
Security area
This area allows you to define your Emergency Access security policy, by defining the number of questions to which the end-user must answer and the minimum number of correct answers that the end-user must enter to reset his/her password. The Advanced button allows you to define other security parameters, as explained in the following table:
To force the user to populate his/her questions and answers before being able to use SSOWatch on his/her workstation. To force the user to change his/her answers to question at a defined frequency. To prevent the user from giving the same answer to different questions. To prevent the user from using the words used in the questions in his/her answers. To set the maximum number of attempts to answer questions. To set the answers of questions as case-insensitive. To allow the user to connect by password (if he/she is only allowed to connect by smart card) during a defined period of time.
59
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console TAB ELEMENT DESCRIPTION
To allow the help desk to set the validity of the temporary password, when he provides a challenge to a user. (This parameter is only available if you have selected the "disconnected mode") To force the user to use his/her own password and not his/her temporary password when he/her reconnects to the network. (This parameter is only available if you have selected the "disconnected mode"). To set the maximum number of attempts to use the Emergency Access feature in disconnected mode. (This parameter is only available if you have selected the "disconnected mode"). To try the use of the Password Reset server before using the disconnected mode.
Question List Management Procedure To manage the list of available questions, do the following: 1. In the Questions area, click the Select button, and in the displayed window, click Manage questions.
The Emergency Access question management window appears.
60
Administrator Guide
2.
Fill in this area with the following guidelines: Set the Question Type: select either Predefined Question to specify a question that cannot be modified by the end user or User-supplied question to allow the end user to define his/her own question. Set the Question text. Translate the question in a foreign language (optional).
Click Translations. Select the language in the drop down list. Fill in the translation Click Add. The translation appears in the available translations area.
d) e)
f)
g) 3.
Click Apply.
The question appears in the Existing Questions area.
61
4.
Set a question number to an available question to define a list of available questions for each Question field of the Emergency Access wizard (SSOWatch engine): a) In the list of questions drop down list, select the Question number, click the Add button.
The question selection window appears.
b)
c)
Click OK.
62
Administrator Guide
Enrolment procedure area This area allows you to make the user biometric data enrolment supervised by an administrator or another user.
Approval not required: the user biometric data enrolment does not need the authentication of anyone. An E-SSO administrator: the user biometric data enrolment requires the authentication of an administrator who has at least the following administration right: "Bio: Is enable to allow biometrics pattern enrolment" (advanced administration mode only).
63
Another E-SSO user: the user biometric data enrolment requires the authentication of another user of the directory.
Policy area
User must enrol between x and x finger(s): number of fingers you want the user to enrol. Allow user to abort the enrolment process: if this check box is selected, the user is allowed to cancel the enrolment process by closing the enrolment window.
TAB ELEMENT
DESCRIPTION
Select this check box to allow the users associated with the Security Profile to use the File Encryption software module. By default, File Encryption ignores files with specific extensions (.exe, .dll for example). You can modify these values using the Configuration button.
64
User can refresh his keys from his desktop Generate user's personal keys automatically Automatically update key in warning period File Encryption key properties area
Select this check box to enable the Refresh command of the File Encryption software module. Select this check box to enable the automatic generation of a key upon the user's logon. Select this check box to enable the automatic update of the user's key. This area allows you to define the properties of the keys that will be generated.
To assign an audit filter, see Section 13.2.2, Assigning an Audit Filter to Specific Objects.
65
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted User Security profile. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs see Section 13.2.1, Filtering Audit Records).
Procedure 1. 2. In the tree structure of the Directory panel, right-click the User Security Profile to rename and select Rename. Type the new name of the object and press Enter.
66
Administrator Guide
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "User security profile: Deletion".
Procedure In the tree structure of the Directory panel, right-click the User Security Profile to delete and select Delete. The User Security Profile is deleted from the directory tree structure.
67
The Timeslice that will be used by the Access Point Security Profile must be created. If you are working in "no-access-point-management" mode, you cannot create Access Point security profiles.
Procedures Creating Access Point Security Profiles 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your Access Point Security Profile and select New | Access Point Security Profile.
The Access Point Security Profile configuration tab appears.
2.
Fill in this window as described in Section 5.4.2, Configuring Access Point Security Profiles and click Apply.
The Access Point Security Profile appears in the directory tree structure.
1.
In the tree structure of the Directory panel, select the Access Point Security Profile to modify.
The Access Point Security Profile configuration tab appears.
2.
Fill in this window as described in Section 5.4.2, Configuring Access Point Security Profiles and click Apply.
The Access Point Security Profile is modified.
Administrator Guide
Window Example
Procedure 1. 2. Type the Access Point security profile name. If you want to select another existing Timeslice, click the button.
Click the button to display and if necessary modify the selected Timeslice configuration, as described in Section 1.1.1, "Creating/Modifying Timeslices".
3.
Configure the parameters of the Access Point Security Profile, according to your needs:
To configure Security Services parameters, see Section 5.4.2.1, Security Services Configuration ("Security Services" Tab). To configure Advanced Login parameters, see Section 5.4.2.2, Advanced Login Parameters Configuration ("Advanced Login" Tab). To configure Unlocking parameters, see Section 5.4.2.3, SSOWatch, SSOStudio, E-SSO Console, and Data Privacy Parameters Configuration. To configure SSOWatch parameters, see Section 5.4.2.3, SSOWatch, SSOStudio, E-SSO Console, and Data Privacy Parameters Configuration. To configure SSOStudio parameters, see Section 5.4.2.3, SSOWatch, SSOStudio, E-SSO Console, and Data Privacy Parameters Configuration. To configure E-SSO Console parameters, see Section 5.4.2.3, SSOWatch, SSOStudio, E-SSO Console, and Data Privacy Parameters Configuration. To configure Data Privacy parameters, see Section 5.4.2.3, SSOWatch, SSOStudio, E-SSO Console, and Data Privacy Parameters Configuration.
69
To configure Biometrics parameters, see Section 5.4.2.4, Biometrics Parameters ("Biometrics" Tab). To configure Emergency Access parameters, see Section 5.4.2.5, Password Reset Servers Declaration ("Emergency Access" Tab) To configure RFID parameters, see Section 5.4.2.6, RFID Detection Area Configuration ("RFID" Tab)" To configure Audit parameters, see Section 5.4.2.7, Audit Parameters Configuration ("Audit" Tab)
FIELD NAME
DESCRIPTION
Definition of the check frequency of the Access Points to retrieve the list of the installed software clients (SSOWatch, Advanced Login). The starting time point is the starting of the Enterprise SSO controller. If this check box is not selected, the User cannot authenticate to the workstation if it is not connected to the LDAP directory. This check box can only be used if the User can use a cache, as described in Section 5.3.2, Configuring User Security Profiles. The Cache properties button allows you to configure the cache of the workstations associated with this security profile. For details, see "Cache properties" Window Description, below.
70
Frequency at which the Enterprise SSO controller checks that the connection to the LDAP directory works. Set 0 if you don't want to test the connection to the directory (not recommended because the waiting time will be increased to recover the connection). TCP/IP connection parameters. This parameter must not be changed. Select the Authentication methods available for the Access Points that will be associated with this Security Profile. The selected Authentication methods must be consistent with the authentication methods defined in the User Security Profiles. For more details, see Section 5.3.2.1, Authentication Parameters Configuration ("Authentication" Tab).
The Cache properties window is divided into the following areas: User Data: allows you to configure the validity period of the cache containing the authentication data of the user. Application data (Primary domain) and Application data (External domains): these areas allow you to configure:
The validity period of the cache containing application data.
71
The asynchronous update of the cache containing application data, which avoids the update of the cache when the end user logs on his/her workstation. Thus the network and the directory are not massively loaded at critical hours (mornings at 9 for instance), and the authentication duration decreases. The Application data (External domains) area is functional only with Active Directory repositories, as it concerns only inter domain and multi domain infrastructures.
To configure the cache of the workstations associated with this security profile, fill in this window as follows: Performance cache validity period: this parameter allows you to configure the period of time during which the data is valid in the cache. When this period of time is over, the data in the cache expires. This means that at the next user log on, the workstation sends a request to the LDAP directory to refresh the cache.
The validity period of the user data cache is expressed in seconds, whereas the validity period of the application data cache is expressed in hours.
Refresh automatically on expiration: (Application data areas only) select this check box to enable the automatic refresh of the cache containing application data when the validity period expires. This option allows you to configure the frequency, in hours, of the asynchronous update of the cache Synchronize data every <days> between <hour1> and <hour2> (Application data areas only): this check box also allows you to configure the asynchronous update of the cache, but in days, using a time slice. In this case, the workstations schedule the update at a random time in the interval.
You can configure only the day, and enter null values for hour1 and hour2. In this case, the update is scheduled at a random time in the day. The workstations must be switched on to perform the update. If a workstation is switched off, the asynchronous update may have been by passed when the workstation is switched on again. In this case, if the cache data is not up to date: If time slices are defined, and if the current time is in the defined interval, the update is done. If the current time is not in the interval, the update will be performed the next period defined by the time slice. If there is no time slice, the update is done.
72
Administrator Guide
The following table details only the drop-down lists and check boxes that require additional description.
For more details about the Advanced Login application, see Enterprise SSO Advanced Login for Windows User Guide. Configuration Parameters
FIELD NAME DESCRIPTION
Workstation behavior at authentication token removal. Time elapsed before Advanced Login applies the action defined in the Default action when token removed drop-down list. Time interval before automatic locking of the Windows session. Select this check box to allow the user connecting to the access point to use the local computer account, which is not part of the Enterprise SSO architecture. Select this check box to allow Users associated with this Access Point to unlock their smart cards directly on the workstation using the unlocking secret code given by the "Smart card administrator".
73
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console FIELD NAME DESCRIPTION
Select this check box to allow SSOEngine to use the last selected Role upon restart of the workstations associated with this Security Profile. If you select this check box, the workstations that use this Security Profile can only be unlocked by the users who have locked their sessions. These check boxes allow you to show or hide password change or PIN change buttons of the Advanced Login Session Information window. Select this check box to prompt the user to type his PIN if a smart card is detected when he presses Ctrl+Alt+Del. Clear this check box to prompt the user to type his password even if a smart card is detected when he presses Ctrl+Alt+Del. When the architecture is not based on Active Directory environment, Advanced Login allows authentication on the security directory and, if allowed, locally. Select this check box to allow the authentication on the Windows domain to which the computer belongs, in case the dedicated directory is not available or there are some troubles (cache corruptions ). The Windows domain to which the computer belongs will be added to the domain list displayed to the user.
Only allow unlocking with the same windows credential Allow password change Allow PIN change Enable smart card detection on Ctrl-Alt-Del
Allow windows domain connection (only for non Active Directory configurations)
A roaming session allows users to open a session on a computer with their physical authentication token, without having to type a secret. When a user authorized to access roaming sessions (see Section 5.3.2.2, Security Parameters Configuration ("Security" Tab)) authenticates on the computer, a roaming session is automatically created for the user. Select this check box to authorize the roaming session mode on the computer. For performance reason, we recommend to allow the roaming session mode only on access point that will actually use it.
Specifies the administrators grace period. You can define the maximum time between the users smart card withdrawal while the SHIFT key is pressed and the completion of another user authentication. The default value is 60 seconds.
74
Allows you to exclude accounts from the Enterprise SSO solution. It means that the account authentication is performed by Windows and not by Enterprise SSO. An excluded account can only be used with the password authentication method, not with tokens. For details, see Setting Excluded Account List below.
Setting Excluded Account List 1. To set an excluded account list, click Excluded accounts .
The excluded account window appears.
2.
75
5.4.2.3 SSOWatch, SSOStudio, E-SSO Console, and Data Privacy Parameters Configuration
The SSOWatch Tab
76
Administrator Guide
The following table details only the drop-down lists and check boxes that require additional description.
TAB FIELD NAME DESCRIPTION
SSOWatch
SSOWatch module is authorized on this workstation Show splash screen Show SSOWatch icon in the task bar Time between two window detection sequences Do not lock SSOWatch on smart card withdrawal
All the Access Points associated with this Security Profile can run the SSOWatch software module if installed. This combo box allows you to define the frequency (in ms) used by SSOWatch to scan the workstation Windows desktop to detect the presence of authentication windows. -
SSOStudio
SSOStudio module is authorized on this workstation E-SSO Console is authorized on this workstation File Encryption is authorized on this workstation
All the Access Points associated with this Security Profile can run the SSOStudio software module if installed. All the Access Points associated with this Security Profile can run the E-SSO Console software module if installed. All the Access Points associated with this Security Profile can run the File Encryption software module if installed.
77
Sensitivity area False accepted rate (read the instructions displayed in the area).
78
Administrator Guide
Policy area a) Remove unused cached patterns on the workstation after x days check box
Check box selected: local cache biometric data will be deleted if it has not been used after a defined number of days. Check box cleared: local cache biometric data is never deleted.
b)
TAB ELEMENT
DESCRIPTION
This area displays the list of Password Reset servers you want to use. The position of servers in the list corresponds to the working order (if the first server does not respond, the second one is tested, and so on). This button removes the selected server from the list. Type a server address in the field and click this button to add it to the server list.
79
This tab allows you to modify the detection areas of RFID tokens. For details, see Section 9.4, Modifying the Detection Areas and the Grace Period.
80
Administrator Guide
To assign an audit filter, see Section 13.2.2, Assigning an Audit Filter to Specific Objects.
81
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted Access Point Security Profile. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs see Section 13.2.1, Filtering Audit Records).
Procedure 1. 2. In the tree structure of the Directory panel, right-click the Access Point Security Profile to rename and select Rename. Type the new name of the object and press Enter.
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Access point security profile: Deletion".
Procedure In the Directory panel, right-click the Access Point Security Profile to delete and select Delete. The Access Point Security Profile is deleted from the directory tree structure.
82
Administrator Guide
Object Definition Application Security Profiles are security objects that define a set of rights and properties that are applied generically for one or more applications. Target Objects Application Security Profiles applies to Applications.
83
Procedures Creating Password Generation Policies 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your PGP and select New | Password Generation Policy.
The PGP configuration tab appears.
2.
Fill in this window as described in Section 5.5.1.2, Configuring the Password Generation Policy and click Apply.
The PGP appears in the directory tree structure.
1. 2.
In the tree structure of the Directory panel, select the PGP to modify.
The PGP configuration tab appears.
Fill in this window as described in Section 5.5.1.2, Configuring the Password Generation Policy and click Apply.
The PGP is modified.
84
Administrator Guide
Window Example
Procedure 1. 2. Type the PGP name. Define the behavior of the Applications associated with this PGP during a password change request (request the User to generate a password compatible with the PFCP or automatic generation of a new password). Define the frequency with which the Application can force the modification of the authentication password upon a session start and the number of old passwords that cannot be reused, to prevent users replacing their passwords by a password that is too recent. Define a list of forbidden passwords, using the Add and Remove buttons.
The Add button is activated when you type a forbidden password in the field located in the left hand side of the button.
3.
4.
85
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted Password generation policy. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs see Section 13.2.1, Filtering Audit Records).
Procedure 1. 2. In the tree structure of the Directory panel, right-click the PGP to rename and select Rename. Type the new name of the object and press Enter.
86
Administrator Guide
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Password generation policy: Deletion".
Procedure In the Directory panel, right-click the PGP to delete and select Delete. The PGP is deleted from the directory tree structure.
The Password Generation Policy that will be used by the Application Security Profile must be created.
Procedures Creating Application Security Profiles 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your Application Security Profile and select New | Application Profile.
The Application Security Profile configuration tab appears.
2.
Fill in this window as described in Section 5.5.3, Configuring Application Security Profiles and click Apply.
The Application Security Profile appears in the directory tree structure.
87
1.
In the tree structure of the Directory panel, select the Application Security Profile to modify.
The Application Security Profile configuration tab appears.
2.
Fill in this window as described Section 5.5.3, Configuring Application Security Profiles and click Apply.
The Application Security Profile is modified.
Window Example
88
Administrator Guide
Procedure 1. 2. Type the Application Profile name. Define the rules for accessing SSO accounts using the following tabs:
General tab: see Section 5.5.3.1, General Parameters Configuration ("General" Tab). Account tab: see Section 5.5.3.2, Account Parameters Configuration ("Account" Tab). Authentication method tab: see Section 5.5.3.3, Authentication Method Definition ("Authentication method" Tab). Delegation tab: see Section 5.5.3.4, Delegation Parameters Configuration ("Delegation" Tab).
FIELD NAME
DESCRIPTION
Select this check box to select a PFCP for the security profile. If you do not select any PFCP, the application PFCP is used. Click the button to display and if necessary modify the selected PFCP, as described in Section 5.2, Managing Password Format Control Policies.
The default PGP is selected by default. Click the select another existing PGP.
button to
Click the button to display and if necessary modify the selected PGP, as described in Section 5.5.1.1, Creating/Modifying Password Generation Policies.
89
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console FIELD NAME DESCRIPTION
Select this option if the Applications associated with the Security Profile need systematically a User's primary authentication to start. Select this check box to start the Application associated with the Security Profile when SSOWatch starts. In this case, the Application starting parameters must be defined at the SSOStudio level. Select this check box to display the SSO data of the Applications associated with the Security Profile on the SSOEngine desktop. If you want to use a different user level than the one specified in the User Security Profile, as described in Section 5.3.2, Configuring User Security Profiles, select this check box and define the new level of the user for the Applications associated with this Security Profile.
Show application on user's SSOWatch desktop When application is used, set user's 'unlocking level' to
FIELD NAME
DESCRIPTION
Storage location of the user accounts used by Applications associated with the Security Profile. Select this check box to make the password expire just after having been collected. The password is then changed according to the password policy (see Section 5.5.1.2, Configuring the Password Generation Policy).
90
Select this check box to allow users to modify their passwords with SSOWatch. This option ensures that SSO data are only managed centrally. Select this check box to allow users to display their passwords with SSOWatch. This drop-down list allows you to select the way the Accounts are ciphered and deciphered. Select one of the following entries: User: if you select this entry, only the user can decipher his account. This is the most secure option. If the user forgets his/her primary password or loses his/her smart card, it is impossible to recover his/her secondary accounts. User and administrators: you can also decipher the user's accounts. Thus, if you force a new primary password or assign a new smart card using Token Manager, the user's secondary accounts are also recovered. User, administrators and external key: select this entry to allow an external application to decipher the user's secondary accounts using a public key. For example, you must select this entry if you want to use E-SSO with Web Access Manager. By selecting this entry, you allow Web Access Manager to decipher the E-SSO secondary accounts of the user so that Web Access Manager can perform SSO with these accounts.
Select this check box to allow users to cancel the SSO authentication process with the Applications associated with the Security Profile: For the current session only : The user can cancel the SSO authentication process for the whole current session. For the application (until reset) : The user can cancel the SSO authentication process for the current application. For the current window only : The user can cancel the SSO windows, but SSOWatch continues to detect windows associated with the application.
91
This tab allows you to: Select the necessary authentication methods to perform SSO. Authorize access to application (SSO) in case the roaming session mode is activated (see roaming session activation parameters in Section 5.4.2.2, Advanced Login Parameters Configuration ("Advanced Login" Tab) and Section 51.3.2.2, Security Parameters Configuration ("Security" Tab)).
92
Administrator Guide
The Delegation tab allows you to define delegation permissions, which authorize users to delegate their SSO account so that it can be used by other users. Limit delegation duration to x days check box Allows you to set the maximum number of days of application delegation. Authorize delegation to all users check box Authorizes delegation to all users of the application. Authorize delegation to members of the same group check box Authorizes delegation to all users of the same group. Authorize delegation to members of the same organization entity check box Authorizes delegation to all users of the same organization. Advanced mode, list users/groups/organizational entities authorized for delegation check box Authorizes delegation to a selection of users, groups, organization units. Authorize delegated user to generate new password check box Authorizes the delegated user(s) to modify the delegated SSO account password.
A user can delegate its SSO account from the SSOWatch Engine (for details, see Enterprise SSO - SSOWatch Administrator Guide).
93
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted Application Security profile. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs see Section 13.2.1, Filtering Audit Records).
Procedure In the tree structure of the Directory panel, right-click the Application Security Profile to rename and select Rename. Type the new name of the object and press Enter.
94
Administrator Guide
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Application profile: Deletion".
Procedure In the Directory panel, right-click the Application Security Profile to delete and select Delete. The Application Security Profile is deleted from the directory tree structure.
The Security objects that you want to define as default Security objects must be created.
Procedure 1. 2. In the File menu, select Configuration. In the displayed window, click the Default Values tab.
3.
In the Default Values tab, define the Security objects applied by default during the creation of target objects as follows:
Click the Select button. Browse the directory tree structure or use the Search tab to find your Security object. Click OK.
4.
Click OK.
96
Administrator Guide
Group
Group
User
Before Starting Check that you meet the following requirements: To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "User security profile: Creation/Modification" or "Access point security profile: Creation/Modification".
The Security objects that you want to define as default Security objects must be created. If you are working in "no-access-point-management" mode, you cannot manage Access Point security profiles priorities.
Procedure 1. In the File menu, select either Manage User Security Profile Priority or Manage Access Point Security Profile Priority.
The Manage Access Point Security Profile Priority functionality is only available if Enterprise SSO manages Access Points. The User Profile priority window appears.
97
The User Security Profile priority management window and the Access Point Security Profile management priority window are exactly the same.
2.
Select a User Security Profile/Access Point Security Profile and use the Increase and Decrease buttons to define its priority. You can also use the Default button to define the default priority value. This value is used if a user/workstation is not associated with a User/Access Point Security Profile. The Reset button allows you to re-order the User/Access Point Security Profiles in a random way.
The lowest level profile has the highest priority.
3.
98
Administrator Guide
To optimize network traffic, you can use the update management feature. By default, the Enterprise SSO workstations retrieve the whole SSO configuration periodically. The update management feature allows you to post an update, which generates a unique identifier. The workstations retrieve the application data and this identifier. As long as the identifier is unchanged between the directory and the cache of the workstations, the workstations do not update their SSO configurations.
To Enable/Disable the update management feature, in the File menu of Enterprise SSO Console select Manage updates. When a workstation runs an update, it retrieves the entire configuration (and not only the configuration corresponding to the last posted update). So this feature does not avoid workstations retrieving the applications configured by administrators after the last posted update if the data on the workstation is older than the last posted update.
99
Before Starting Before reading the following sub-sections, check that the following steps are carried out: 1. 2. 3. Make the inventory of the applications for which you want to control the access using Enterprise SSO Console. For each application, list all the authentication windows (login, new password, incorrect password, etc.). For each application, create the corresponding technical reference using SSOStudio Enterprise.
The technical reference is a technical description of an application. This allows you to configure the accesses to this application, and particularly to enable the single sign-on. The creation of technical references is described in Enterprise SSO - SSOWatch Administrator Guide. To manage technical references, you must have at least the following administration role: In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Technical reference: Creation/Modification" and "Technical reference: Deletion".
100
Administrator Guide
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Application: Creation/Modification".
Procedure 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your Application and select New | Application.
The Information tab appears.
2.
Template applications are managed in the same way as Application objects. They enable the SSO function for specific authentication procedures. A template application has a number of predefined parameters. The following procedure explains how to create a new Windows or SAP Application object using existing templates. Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator" In advanced administration mode, your role must contain the following right: "Application: Creation/Modification".
101
Procedures Creating a Windows Application 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your Application and select New | Template-based Application | Windows.
The Windows Application window appears.
2. 3.
Fill in the window with the Application and Application domain names. Click OK.
The Application object is created with pre-defined parameters for a Windows Application. You can configure or modify it, as described in the following sections.
Creating an SAP Application 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your Application and select New | Template-base Application | SAP.
The SAP Application window appears.
2. 3.
102
Administrator Guide
Before Starting Check that you meet the following requirements: The Application access Timeslice object must be created. For more details, see Section 5.1, Managing Timeslices. To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Application: Creation/Modification".
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Application. In the Configuration tab, click the General tab.
The General tab appears.
3.
103
Properties area: You cannot change the authentication type authorized (only the password method is supported for the time being). Audit area: You can assign an audit filter to the application to generate only relevant audit events: see Section 13.2.2, Assigning an Audit Filter to Specific Objects. Click Apply.
104
Administrator Guide
3. 4.
Read carefully the information note and the following section to fill in this tab. Click Apply. The application uses primary accounts check box a) Check box cleared: The application standard account is used to perform SSO on the selected application. Check box selected: The primary account (the user name and password that the user types to open his Windows session) is used to perform SSO on the selected application. The Windows username can be used in the following formats:
Short name: username only. Windows 2000 (and later): username including the Windows domain, for instance: [email protected]. NT 4: username preceded by NETBIOS domain, for instance: QUEST\jsmith.
b)
Share Account Base with Another Application button This button allows you to share the account base of the selected application (application A) with another application (application B). Application B will then only use the accounts of application A. If users have already collected accounts for application B, these accounts will not be visible anymore; the only visible accounts will be those of application A. Once you have shared the account base of the selected application, the accounts are displayed from both applications (in the Accounts tab, see Displaying Accounts Associated With the Application ("Accounts" Tab)), but you can only stop the sharing from application A (see below). If you try to stop the sharing from application B, the operation will not be taken into account.
105
Stop Sharing Account Base with Another Application button This button allows you to stop sharing the account base of the selected application (application A) with another application (application B). Application B recovers the accounts that had been collected for it.
3. 4.
Fill in the Login, Password and Parameters tabs with the instructions given in the following "Accounts" Tab Description" section. Click Apply.
106
Administrator Guide
Login creation rule area This area allows you to define the rule for the application login value, on the basis of the information read from the user object. a) Rule field: Between parentheses, type the exact name of the user LDAP attribute(s) that you want to be displayed to the user in the Application Login field. Example: (mail) indicates that the login is the user's mail address. If you want to add several LDAP attributes, they must be separated by a comma inside the parentheses. Example: (mail,dn)
To get the exact LDAP attribute name, use an LDAP browser.
You can be more specific about the login value by using the following rules:
To keep only the first n characters of the LDAP value, use the syntax (attLDAP,n). Three functions are used to handle LDAP values: UPPER, LOWER and CAPITALIZED. Example: UPPER(mail,10) will return the first 10 characters of the user's mail address in upper case.
b)
107
a) b)
Length area: set the minimum and maximum number of characters of the login by using the up and down arrows. Forbidden characters area: one after another, type the character(s) that you want to forbid to the user.
Password Tab
The password is checked using a PFCP object, which must be created. For more details, see Section 5.2, Managing Password Format Control Policies. Click the Click the button to choose the PFCP used by the Application. button to display the selected PFCP parameters.
Parameters Tab
108
Administrator Guide
The Parameters tab allows you to add a list of additional authentication parameters (as Windows Domains or Languages for example). These parameters will enable you to define other fields than the user name/password fields of the target application authentication window. If you are defining a Linux application, you must add in this tab the Unix Host Identifier parameter (Default type), which is aimed to contain the name of the Linux machine on which the authentication will be performed by the user.
Do not forget to check the consistency between the list of authentication parameters for the application and the parameters defined at the technical reference level, which is done using SSOStudio Enterprise. For details, see Enterprise SSO - SSOWatch Administrator Guide.
Add button: click this button to add a parameter. The Add Parameter window appears.
To add an existing parameter, select it and click OK. To create a new parameter, type its name in the Name field and click New. To delete or rename an existing parameter, select it and click Delete or Rename. To define an External Name for a parameter, select the wanted parameter, click External Name and fill in the displayed window. External names for parameters allow you to define a mapping between the parameter that you are configuring within Enterprise SSO Console and the name of an external parameter (created using another SSO tool). This option is particularly useful to integrate User Provisioning or Web Access Manager with the Enterprise SSO module. For more details, see Section 6.1.6, Assigning Users to an Application.
109
Properties button: Select a parameter then click this button to define the properties of the selected parameter.
a)
Parameter type:
Default: The value of the parameter is collected for each SSO account and can be modified by the user. Global: The parameter is the same for all SSO accounts and is not proposed to the user. Rule: The value is dynamically defined as a user data function, and cannot be changed.
b)
Value: This is the default value assigned to the parameter. If nothing is entered here, it will be requested at first authentication (data collection) as a function of the parameter type defined previously. If you have selected Rule in the Parameter type area, between parentheses, get the exact LDAP attribute name (using an LDAP browser) and type it in the Value field. For example, type (mail) to indicate that the parameter value is the user's mail address.
If you want to add several LDAP attributes, they must be separated by a comma inside the parentheses. Example: (mail,dn). You can be more specific about the parameter value by using the following rules: - To keep only the first n characters of the LDAP value, use the syntax (attLDAP,n). - Three functions are used to handle LDAP values: UPPER, LOWER and CAPITALIZED. Example: UPPER(mail,10) will return the first 10 characters of the user's mail address in upper case.
The application's authentication method. The Application Security Profiles (access strategies) defined for the application.
Administrator Guide
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator" and you must be manager of the application. In advanced administration mode, your role must contain the following right: "Application: Creation/Modification", and you must be manager of the application or possess the "Application: Manage all applications" right.
For more information on administration roles, see Section 4, Managing Administrators. For more information on application management rights, see Section 6.1.8, Generating/Importing Accounts for an Application.
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Application. In the Configuration tab, click the SSO tab.
The SSO tab appears.
3.
Fill in the Methods, Access Strategies and OLE/Automation tabs with the following guidelines: a) Methods tab: The following authentication methods are available:
SSO: this authentication method stipulates that authentication will be done through a technical reference. The technical reference is stipulated during the authorization of the application on an access point. At the Application level, the default technical reference to be used can be defined (not mandatory). For information on how to create technical references, see Enterprise SSO SSOWatch Administrators Guide.
111
Windows authentication: this authentication method defines the SSO accounts that can be used by the GINA. This allows several Windows accounts to be used. If you are defining a Linux application, you must select this propagation method. OLE/Automation: this method stipulates that the application can be accessed through the OLE. The secret code allowing the connection to be established must be defined in the OLE Automation tab.
b)
Access Strategies tab: The Access strategies tab defines the list of Application Security profiles that the application can use. The profile to be used is selected at the time the application is assigned to the user. If only one profile is available, it is automatically selected. OLE/Automation tab: this tab allows you to define the secret code used to access the application if the OLE/Automation method is selected in the Methods tab.
c)
4.
Click Apply.
This tab allows you to define a mapping between an application that you are configuring using Enterprise SSO Console and the name of an external application (created using another SSO tool) for which you want to configure an access. This option is particularly useful to integrate User Provisioning or Web Access Manager with Enterprise SSO. For example, if you are defining an application called MyHTMLApplication that already uses Web Access Manager Account Bases, enter the names of the Web Access Manager Account Bases defined for this application. By this way, the Enterprise SSO controller will be able to use these Web Access Manager Account Bases to perform SSO with this application.
112
Administrator Guide
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Application. Click the Administrators tab.
The Administrators tab appears.
3.
113
For each added administrator, you can define his/her administration level on the Application using the Modify button. You can define the following levels:
CONTROL LEVEL DESCRIPTION
Administration rights are removed. The administrator can change the SSO data of users. The administrator can change the application access strategies.
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Application. Click the Account Generation tab.
The account generation tab appears.
114
Administrator Guide
3.
Fill in this tab as follows: a) Fill in the Credentials area. This area allows you to define the Account creation rules. Enter the following information:
In the Login field, enter a login creation rule. For example, type (cn) to define the Common Name as the name used as the Account login. For more details on the login creation rule syntax, see Section 6.1.3, Creating the Account Properties of an Application, Step 3 of the Defining Account Rules procedure. Then: Either select Random password generation to define a random password for each Account. This password is created depending on the defined PFCP (for more details, see Section 5.2, Managing Password Format Control Policies). Or if you want a single password for all the Accounts, clear Random password generation and enter a password in the Password field.
b)
The Parameters area is optional. It allows you to add additional authentication parameters if needed (as Windows Domains or Languages for example). Fill in the Generate accounts for only these users area. This area allows you to select the users who must have Accounts. Depending on your needs, do one of the following:
If you want to create Accounts for all the users who have access to the Application (that is who are listed in the User Access tab), but who do not have any Account created, check that Do not modify existing accounts is selected. If you want to create Accounts for all the users who have access to the Application, including the users who have already an Account (that is, if you want to renew their Accounts), clear Do not modify existing accounts.
c)
115
If you want to create Accounts for some users who have access to the Application, use the Add and Remove buttons to select the wanted users and select or clear Do not modify existing accounts.
d)
e)
f)
This section describes how to authorize an Application to run on an Access Point. Before Starting The software corresponding to the Application object must be installed on the Access Point.
116
Administrator Guide
To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Security object administrator" or "Access administrator". In advanced administration mode, your role must contain the following right: "Authorization for application on access point: Creation/Modification" and "Authorization for application on access point: Deletion".
If you are working in "no-access-point-management" mode, the Access Point tab is not displayed.
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Application. Click the Access Points tab.
The access point tab appears.
3.
If you do not select Allow access from all access points declared in the local directory, do the following: a) Click the Add/Remove buttons to select the Access Points that you want to be accessible to the selected Application.
117
b)
To be more specific about the list of accessible Access Points, use the following buttons:
Allow/Forbid If you have added a group of Access Points and you want to forbid one or more Access Point(s) of this group, use the Allow and Forbid buttons. Propagation method If you want to specify a specific Access Point, and if your Application uses the SSO propagation method, you must indicate a technical reference. By default, the technical reference specified on the Application is used, as described in Section 6.1.4, Defining the Single Sign-On Properties of an Application ("Configuration"/"SSO" Tab).
3.
In the Filter list, select the filter you want to apply to the Accounts associated with the selected application and click Apply.
Display all accounts without access Shows all Accounts that have been collected from users for the selected Application, but that are not associated with the Application anymore.
118
Administrator Guide
Display all unregistered accounts Shows all Users that are authorized to access the selected Application, and for that have not registered their Account for this Application (the Account is not collected). Display all registered accounts Shows all Users that are authorized to access the selected Application, and that have registered their Account for this Application (the Account is collected). Display all accounts Shows all Users that are authorized to access the selected Application (unregistered and registered accounts). The area displays the list of selected Accounts.
4.
In the Export area, select the element of the displayed list you want to export as a .csv file and click Export.
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted Application. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs, see Section 13.2.1, Filtering Audit Records).
119
Procedure In the tree structure of the Directory panel, right-click the Application to delete and select Delete. The Application and all its related objects are deleted.
120
Administrator Guide
Before Starting Before reading the following sub-sections, check that the following steps are carried out: 1. 2. Your LDAP directory perimeter contains all the users that you will manage using Enterprise SSO Console. Organizational Units, groups and users are sorted according to the organizations in which they are to be placed.
All these tasks must be carried out with the appropriate LDAP tools, as for example Microsoft Users and Computers for Active Directory.
121
If you have defined specific data to add in this tab, you can click the Other button to display it. For more details, see Section 14.2, Adding User Attribute Information.
122
Administrator Guide
3. 4.
From this panel, you can lock/unlock the User and set an Acceptance date and an Expiry date to limit temporarily the User access. Click Apply to validate your modifications.
6.2.2.2 Displaying User Authentication Information and Administering Roaming Sessions ("Authentication" Tab)
Subject The User Authentication tab allows you to: Check if a User's account is still being used. Manage roaming sessions by displaying their duration, and delete them if necessary.
Before Starting To be able to delete roaming session, you must work in advanced administration mode, and your role must contain the following right: "Roaming: Delete users sessions".
For more information on administration modes, see Section 4, Managing Administrators.
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted User. In the Connection tab, click Authentication.
The Authentication tab appears.
123
This tab displays: The last successful and unsuccessful authentication dates. The roaming session duration. The Delete roaming session button allows you to delete the current roaming session to force the user to authenticate again at next session opening. It also allows you to disable the roaming session in case the user has lost his/her physical token.
Moreover, this tab allows you to authorize a user to temporarily use the password authentication method. This feature can be useful if you want to force the use of tokens within the company: in this case, you disable the password authentication for all users, and activate temporary password access (TPA) in the Password tab for users who do not have their smart card. Before Starting To carry out this task, you must have recovery rights, that is: In classic administration mode:
The "SSO Data Recoverer" administration role. The SSO data recoverer right on your administration smart card.
In advanced administration mode, you administration role must contains the following rights: "User: Password modification", "Temporary password access: Creation" and "Temporary password access: Deletion".
Procedure 1. In the tree structure of the Directory panel, right-click the wanted User and select Force Password.
The Password tab appears.
124
Administrator Guide
2.
3.
To active temporary password access for the user, do the following: a) b) Fill-in the New password and Confirmation fields. Select the User can connect using password authentication check box and click Apply.
The TPA duration cannot be modified from this tab: the value is read from the user security profile associated with the user (see Section 5.3.2, Configuring User Security Profiles").
The tab shows the TPA expiration date. If the user connects with a token, the TPA is automatically deleted. c) 4. To extend the TPA duration, clear the User can connect using password authentication check box and create a new one.
To avoid site replication problems if you use Active Directory: in the User is logged on computer field, type the name of the user's computer so that the password reset operation be done on a domain controller located on the same site as the computer (and not on the domain controller on which you are connected) and click Apply.
For more information on domain controller selection, see Section 6.6, Selecting a Domain Controller.
The whole password reset operation will be done on this server. The administration connection will switch back to the previous domain controller once the password reset operation is performed.
125
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator" or "Rights administrator" or "SSO Data Recoverer". In advanced administration mode, your role must contain the following rights: "Emergency access: Answer deletion" and "Emergency access: Challenge generation" and "Emergency access: Reset attempt counter".
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted User. In the Connection tab, click Emergency Access.
The Emergency Access tab appears.
This tab displays the dates of the last user use of the Emergency Access feature.
126
Administrator Guide
3.
a)
Follow the instructions displayed on screen and in User challenge, type the challenge the user gave you.
If a temporary password access (TPA) has been given to the user, the Temporary password access duration field displays the number of days left during which the user will be able to use a password to connect (for more information, see Forcing a New User's Primary Password ("Password" Tab)).
b)
127
Procedure 1. 2. 3. 4. In the tree structure of the Directory panel, select the wanted User. Click the Connection tab. In the Audit identifier area, modify the identifier. Click Apply when done.
Before Starting
Procedure 1. In the tree structure of the Directory panel, select the wanted User.
You can also select a group of users by selecting a folder containing the wanted users. Note that this is not possible if the Enterprise SSO data is separate from other data (Fedora Directory server in cooperative mode, or Active Directory + ADAM infrastructure for example).
128
Administrator Guide
2.
By default, the default User Security Profile is selected (for details on how to configure the default security profiles objects, see Section 5.6, Defining Security Profiles Default Values).
3.
button.
4.
Click Apply.
129
This section describes how to authorize a User to log-on an Access Point, from the User object. This access is checked by Advanced Login or by the GINA of the workstation client. A User not authorized attempting to logon a workstation will obtain the following message "You are not authorized to log in on this access point".
You can also authorize a User to log on an Access Point from the Access Point object, as described in Section 6.3.3, Assigning/Forbidding Users to Access Points. ("Authorized Users" Tab).
Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Security object administrator" or "Access administrator". In advanced administration mode, your role must contain the following right: "Authorization for user on access point: Creation/Modification" and "Authorization for user on access point: Deletion".
If you are working in "no-access-point-management" mode, it is not possible to configure user access to individual Access Points or to objects representing sets of Access Points (groups, organizations and so on). A User is authorized to connect to an Access Point of his/her domain only if his/her User Security Profile indicates "Allow on all Access Points".
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted User. Click the Access Points tab.
The Access Points tab appears.
3.
If the Allow on all Access Points parameter of the User Security Profile associated with this user is selected (for details see Section 5.3.2, "Configuring User Security Profiles), you can let this tab blank to authorize all the Access Points of the directory domain for the selected Users. If you want to define authorized/forbidden Access Points, do the following: a) Click the Add/Remove buttons to select the Access Points that you want to be accessible to the selected Application.
130
Administrator Guide
b)
To be more specific about the list of accessible Access Points, use the following buttons:
Allow/Forbid If you have added a group of Access Points and you want to forbid one or more Access Point(s) of this group, use the Allow and Forbid buttons. Modules To prevent the User from accessing some of the software modules installed on the Access Point (Advanced Login, E-SSO Console, SSOWatch or SSOStudio), use the Modules button. The Enterprise SSO controller uses the following algorithm to assign or forbid Access Points to Users: 1. Checks whether the user is authorized or denied. 2. Checks whether a user primary group is authorized or denied. 3. Checks whether a user group is authorized or denied. 4. Checks whether a parent organizational unit grants or denies access.
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted User. Click the Accounts tab.
The Accounts tab appears.
Select the account you want to manage and perform the wanted action using the available buttons, as explained in the following Accounts Tab Description section.
131
Export button Exports the Users account list in a .csv file. Lock/Unlock button Locks/Unlocks the account. If the account is locked, the user is not able to connect to the application anymore. Properties button Displays the account properties window, which allows you to manage the selected account SSO Data and delegation properties
132
Administrator Guide
a)
b)
Delegation Tab This tab displays the list of user(s) to whom the user has delegated his/her account, using SSOWatch.
New button Displays the personal account creation window, which allows you to create another user account for the same application.
Delete button Deletes the selected account. Clear all accounts button Deletes all the user accounts.
133
Window Description
Provider field Name of the biometric reader provider that you want to be used. Clear all Patterns button Removes enrolled biometric data from the controller. Enrolled patterns Displays the enrolment pattern quality for each finger. Last enrolment field Last user enrolment date and time. Enrolment approved by field Name of the user or administrator who has authenticated at enrolment time to validate the user enrolment.
134
Administrator Guide
This section describes how to authorize a User to run an Application, from the User object. Before Starting 1. 2. To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator" or "Access administrator".
In advanced administration mode, your role must contain the following right: "Authorization to use application: Creation/Modification" and "Authorization to use application: Deletion".
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted User. Click the Application Access tab.
The Application Access tab appears.
3.
Click Add to select Applications to assign to the selected User, then fill in the Access properties area and click Apply. The Application appears in the Access list. For more details on the Access properties area, see the sub-section just below. At any time, you can click the Edit and Remove buttons to modify or delete entries of the Access list.
The Access Properties Area The Access properties area allows you to define how Users access the application using the following parameters: Account Type: this drop-down list allows you to select between the following entries the Account type used by the User:
Shared: account shared between several users who belong to the same group of users. Primary: account allowing the user's connection data to be used to produce an SSO. This account is only available if the user password is authenticated. Standard: account type that is automatically associated with the application when it is added to the user. Specified on the Application: account type defined in the account base of the application (Primary account or Standard account).
Format: If you select the primary account type, select in this drop-down list the format of the Windows user name (user name preceded by NETBIOS domain or including Windows domain for example). Application profile: if you have defined several Application Security profiles at application level, you can specify the profile to be used for this access.
To enable the Mobile E-SSO feature, you must select an Application Profile that allows external accesses.
Role: if the User has access to various accounts for the selected Application, you must assign different roles to these accounts using the Manage button. Users can create additional accounts: select this option to authorize the User to create as many accounts as he/she wants.
136
Administrator Guide
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted User. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs, see Section 13, Managing Audit Events).
Before Starting Access Points are only included in the Enterprise SSO administration domain if the following conditions are met:
The workstation is included in the Enterprise SSO operating environment in the reference LDAP directory domain. If you want to assign different Access Point profiles, sort your workstations according to the organizations (Organization unit) in which they are to be placed. If necessary, use the tree structure to define specific parameters for them in the security policy. These tasks must be carried out directly in your LDAP directory, with the appropriate tools.
137
The Enterprise SSO client must be installed on the workstations included in the Enterprise SSO administration domain. Only the workstations on which the Enterprise SSO client is deployed appear in the tree structure (Directory panel).
If you are working in "no-access-point-management" mode, client Access Points do not appear in the directory tree.
If you are using Active Directory, Access Points appear in the tree but cannot be modified.
138
Administrator Guide
Before Starting The Access Point Security Profile to assign must be created, as described in Section 5.4, Managing Access Point Security Profiles. To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Access point security profile: Assignment".
If you are working in "no-access-point-management" mode, Access Point security profiles cannot be applied on Access points.
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Access Point. Click the Configuration tab.
The Configuration tab appears.
139
By default, the default Access Point Security Profile is selected (for details on how to configure the default security profiles objects, see Section 5.6, Defining Security Profiles Default Values).
3.
button.
button to search, display and if necessary modify the selected Click the Access Point Security Profile.
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Access Point. Click the Configuration tab.
The Configuration tab appears.
The Available E-SSO services area display the port number used by the Enterprise SSO controller (for information) and the list of available services.
3.
Select the check boxes corresponding to the Services you want to be provided by the Enterprise SSO controller installed on this computer. Changing the list of available Services has not impact on the Enterprise SSO controller itself.
Any change is taken into account by workstations at cache refresh time.
140
Administrator Guide
This section describes how to authorize a User to logon an Access Point, from the Access Point object. This access is checked by Advanced Login or by the GINA of the workstation client. A User not authorized who is attempting to log on a workstation will obtain the following message "You are not authorized to log in on this access point".
You can also authorize a User to logon an Access Point from the User object, as described in section 6.5.2, Assigning/Forbidding Access Points to a User ("Access Points" Tab).
Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Security object administrator" or "Access administrator". In advanced administration mode, your role must contain the following right: "Authorization for user on access point: Creation/Modification" and "Authorization for user on access point: Deletion".
If you are working in "no-access-point-management" mode, it is not possible to configure user access to individual Access Points or to objects representing sets of Access Points (groups, organizations and so on). The User Access tab is not displayed. A User is authorized to connect to an Access Point of his/her domain only if his/her User Security Profile indicates "Allow on all Access Points".
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Access Point. Click the Authorized Users tab.
The Authorized Users tab appears.
141
3.
If the Allow on all Access Points parameter of the User Security Profile associated with this user is selected (for details see Section 5.3.2, Configuring User Security Profiles), you can let this tab blank to authorize all the Access Points of the directory domain for the selected Users. If you want to define authorized/forbidden Users, do the following:
Allow/Forbid If you have added a group of Users and you want to forbid one or more User(s) of this group, use the Allow and Forbid buttons. Modules To prevent Users from accessing some of the software modules installed on the Access Point (Advanced Login, E-SSO Console, SSOWatch or SSOStudio), use the Modules button. The Enterprise SSO controller uses the following algorithm to assign or forbid Access Points to Users: Check whether the user is authorized or denied. Check whether a user primary group is authorized or denied. Check whether a user group is authorized or denied. Check whether a parent organizational unit grants or denies access.
142
Administrator Guide
Before Starting The software corresponding to the Application object must be installed on the Access Point.
The Enterprise SSO controller uses the following algorithm to assign or forbid Applications to Access Points: Check whether the Access Point authorizes the application. Check whether an Access Point primary group authorizes or prohibits the Application. Check whether an Access Point group authorizes or prohibits the application. Check whether an Access Point parent Organizational Unit grants or denies access.
To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Security object administrator" or "Access administrator". In advanced administration mode, your role must contain the following right: "Authorization for application on access point: Creation/Modification" and "Authorization for application on access point: Deletion"
If you are working in "no-access-point-management" mode, it is not possible to make applications available on individual Access Points or on objects representing sets of Access Points (groups, organizations and so on) other than "outbound representatives". The Application Available tab is not displayed.
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Access Point. Click the Available Applications tab.
The Available Applications tab appears.
3.
Click the Add/Remove buttons to select the Applications that you want to be accessible to the selected Access Point.
143
4.
To be more specific about the list of accessible Applications, use the following buttons:
Allow/Forbid If you have added a group of Applications and you want to forbid one or more Application(s) of this group, use the Allow and Forbid buttons. Propagation method If you want to specify a specific Application, and if your Application uses the SSO propagation method, you must indicate a technical reference. By default, the technical reference specified on the Application is used, as described in Section 6.1.4, Defining the Single Sign-On Properties of an Application ("Configuration"/"SSO" Tab).
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted Access Point. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs, see Section 13, Managing Audit Events).
144
Administrator Guide
Object Definition A representative object represents objects (Users or Access points) that are not part of its local domain. These objects are of two types: Inbound type: the object represents a set of external users. Outbound type: the object represents a set of external access points
By default, two Representative objects are created: they represent all external domains. In "no-access-point-management" mode, The inbound representative object must have a security profile allowing it to authenticate on all access points. The outbound representative object represents a domain of the computers.
The User Security Profile that you want to assign to the external users must be created, as described in Section 5.3, Managing User Security Profiles. In "no-access-point-management" mode, a user can open an Enterprise SSO session on an access point of a foreign domain only if the representative of the user is authorized to authenticate on all access points. In the security profile of the representative, the Allow on all Access Points field must be selected, as described in Section 5.3.2.1, Authentication Parameters Configuration ("Authentication" Tab).
145
2. 3. 4.
In the Configuration tab, in the Representative area, type the name of the Representative you are creating. Configure the Representative object, as described in the following sections:
Define the set of Users to represent: see Section 6.4.1.2, Defining the Set of Users to Represent ("Configuration" Tab). Assign a User Security Profile to the Representative: see Section 6.4.1.3, Assigning a User Security Profile to the Inbound Representative Object ("Security Profile" Tab). Choose the Access Points that the Representative will be authorize to access: see Section 6.4.1.4, Selecting the Access Points Available to the Representative ("Access Points" Tab).
5.
Click Apply.
The Inbound Object appears in the directory tree structure.
Modifying an Inbound Object 1. In the tree structure of the Directory panel, select the Inbound Object to modify.
The Inbound Object configuration tab appears.
2.
Modify the configuration of the Representative object, as described in the following sections:
To modify the set of Users to represent: see Section 6.4.1.2, Defining the Set of Users to Represent ("Configuration" Tab). To modify the User Security Profile assigned to the Representative: Section 6.4.1.3, Assigning a User Security Profile to the Inbound Representative Object ("Security Profile" Tab).
146
Administrator Guide
To modify the selection of Access Points that the Representative is authorized to access: see Section 6.4.1.4, Selecting the Access Points Available to the Representative ("Access Points" Tab).
3.
Click Apply.
The Inbound Object is modified.
147
6.4.1.3 Assigning a User Security Profile to the Inbound Representative Object ("Security Profile" Tab)
Subject You must assign a User Security Profile to the Representative object. When a represented user will authenticate on an access point which is not part of his/her domain, his/her profile will be half part of his/her domain, and half part of domain to which belong the access point. The Security and Emergency Access tabs are used to compose the part of the profile belonging to the domain of the user. The Authentication and Unlocking tabs are used to compose the part of the profile belonging to the domain welcoming the user.
Before Starting The User Security Profile to assign must be created, as described in Section 5.3, Managing User Security Profiles. Procedure 1. Click the Security Profiles tab.
The security profile tab appears.
By default, the default User Security Profile is selected (for details on how to configure the default security profiles objects, see Section 5.6, Defining Security Profiles Default Values).
2.
button.
3.
Click Apply.
6.4.1.4 Selecting the Access Points Available to the Representative ("Access Points" Tab)
Subject
The Access Points tab is only available if Enterprise SSO manages Access Points.
This section describes how to authorize the represented Users to logon Access Points which are not part of their domain.
148
Administrator Guide
2.
Click the Add/Remove buttons to select the Access Points that you want to be accessible to the selected Representative.
The Allow on all Access Points parameter of the User Security Profile associated with the Representative has no effect on the accessibility of Access Points to the selected Representative.
3.
To be more specific about the list of accessible Access Points, use the following buttons:
Allow/Forbid If you have added a group of Access Points and you want to forbid one or more Access Point(s) of this group, use the Authorize and Forbid buttons. Modules To prevent the Representative from accessing some of the software modules installed on the Access Point (Advanced Login, E-SSO Console, SSOWatch or SSOStudio), use the Restriction button.
149
Before Starting Before starting, check that you meet the following requirements: You must be allowed to access the external domains in which reside the Access points to be represented (see Section 4, Managing Administrators). To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Security object administrator". In advanced administration mode, your role must contain the following right: "Representative: Creation/Modification".
2. 3. 4.
In the Configuration tab, in the Representative area, type the name of the Representative you are creating. Configure the Representative object, as described in the following sections:
Define the set of Access Points to represent: see Section 6.4.2.2, Defining the Set of Access Points to Represent ("Configuration" Tab). Choose the Applications that the Representative will be authorize to access: see Section 6.4.2.3, Selecting the Applications Available to the Representative ("Available Applications" Tab).
5.
Click Apply.
The Outbound Object appears in the directory tree structure.
150
Administrator Guide
Modifying an Outbound Object 1. In the tree structure of the Directory panel, select the Outbound Object to modify. The Outbound Object configuration tab appears. Modify the configuration of the Representative object, as described in the following sections:
To modify the set of Access Points to represent: see Section 6.4.1.2, Defining the Set of Users to Represent ("Configuration" Tab). To modify the selection of Applications that the Representative is authorized to access: see Section 6.4.1.4, Selecting the Access Points Available to the Representative ("Access Points" Tab).
2.
151
6.4.2.3 Selecting the Applications Available to the Representative ("Available Applications" Tab)
Subject This section describes how to authorize the represented Access Point to access Applications which are not part of their domain. Before Starting The software corresponding to the Application object must be installed on the Access Point. Procedure 1. Click the Available Applications tab.
The Available Applications tab appears.
2. 3.
Click the Add/Remove buttons to select the Application that you want to be accessible from external Access Points. To be more specific about the list of accessible Applications, use the following buttons:
Allow/Forbid If you have added a group of Applications and you want to forbid one or more Application(s) of this group, use the Authorize and Forbid buttons. Propagation method If you want to specify an Application that uses the SSO propagation method, you must indicate a technical reference. The technical reference specified on the Application is used by default, described in Section 6.1.4, Defining the Single Sign-On Properties of an Application ("Configuration"/"SSO.
152
Administrator Guide
Procedure 1. 2. In the tree structure of the Directory panel, select the wanted Representative. Click the Events tab.
The Events tab appears.
3.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs see Section 13.2.1, Filtering Audit Records).
Procedure 1. 2. In the tree structure of the Directory panel, right-click the Representative object to rename and select Rename. Type the new name of the object and press Enter.
Procedure In the Directory panel, right-click the Representative Object to delete and select Delete. The Representative Object is deleted from the directory tree structure.
154
Administrator Guide
Mechanism Description When a user performs an operation (opening, closing, locking, unlocking) on a computer, this computer becomes the master computer and periodically informs the slave computers of the operation performed. This allows the management of slave computer behaviors. Session Opening When a user opens a session on a computer of the cluster, all the sessions of other computers of the cluster open with the same user account.
If a slave computer is not reachable at session opening on the master computer, the session opening operation on this slave computer will be performed as soon as the network is restored. If a slave computer restarts, and if the last operation performed on the master computer is a session opening, a session will be opened on this slave computer as soon as it is available. If the session of a slave computer is locked by another user, the session is unlocked only if the Fast User Switching (FUS) option is activated for this computer (see Section 5.3.2.3, Fast User Switching Parameters Configuration ("Unlocking" Tab). If a user performs a FUS on a computer, all the other computers of the cluster perform the FUS. If an "Excluded Account" opens a session on a computer that is part of the cluster, this computer is automatically excluded from the cluster. For more information on excluded accounts, see the Excluded accounts button in Section 5.4.2.2, Advanced Login Parameters Configuration ("Advanced Login" Tab).
Session Locking
When a computer is locked, all the other computers are locked according to their defined lock mode (see Section 6.5.1, Creating and Configuring a Cluster of Access Points). If a slave computer with an open session does not receive any information from the master for a period of 30 seconds, it is automatically locked according to its defined lock mode (see Section 6.5.1, Creating and Configuring a Cluster of Access Points).
Session Closing When the user closes a computer, all the other computers of the cluster are closed.
A slave computer can only accept orders from the master computer if they are compatible with its current session. For example, if a user locks a computer session while all the other cluster computer sessions are closed, these sessions will remain closed.
Screensaver When a computer screensaver is activated, the computer is not locked. It becomes locked at the end of the screensaver period: it then becomes the master and locks all computers of the cluster. You must configure the screensaver according to the wanted computer behavior.
155
Before Starting
Make sure that none of the computer you want to place in the cluster is an Enterprise SSO Controller. Make sure all the computers you want to gather in a cluster are connected to each other, and configured according to your needs (automatic screen-saver launching, locking). DNS resolution must work properly so that orders sent from the master can be easily transmitted to slaves. Port 3644 must be open on all computers you want to gather in a cluster. Enterprise SSO must be configured in "manage-access-point" mode. The following license keys must be installed on the Enterprise SSO Controller and Clients: "Cluster mode" and "Audit and advanced security".
Procedure 1. In the tree structure of the Directory panel, right-click the Organizational Unit that must contain your Cluster of access points and select New | Cluster of access points.
The Configuration tab appears.
156
Administrator Guide
2. 3.
4. 5.
Fill in the Name field. Click the Add button to select the access points you want to add to the cluster. Use the Browse tab to browse the directory tree structure or use the Search tab to find the access point by typing its name. Define the cluster properties as explained in the following "Configuration" Tab Description" section. Click Apply.
The Cluster object is created and configured.
157
Allow users to temporarily withdraw a computer from the cluster check box If this check box is selected, users allowed to access one of the cluster computer will be able to temporarily exclude a computer from the cluster, from the SSOWatch application module. Option button Gives access to the Cluster Lock Mode window.
For each computer of the cluster, this window allows you to define its behavior as a slave in the following cases:
When it receives a locking order from the master computer. When it does not receive any order from the master for more than 30 seconds.
The behavior selected here only applies when the computer is a slave.
Do nothing The selected computer is not locked. Lock keyboard and mouse The selected computer is not locked, but keyboard and mouse are disabled. Pressing Ctrl+Alt+Del on this computer unlocks it. Lock session (default value) The selected computer is locked.
Remove button Removes the selected computer from the cluster. Add button Allows you to select the access points you want to add to the cluster. The Browse tab allows you to browse the directory tree structure and the Search tab allows you to find the access point by typing its name.
158
Administrator Guide
Procedure 1. 2. 3. In the tree structure of the Directory panel, select the wanted Cluster. Click the Events tab.
The Events tab appears.
In the Filter area, define a period of time to filter the log entries and click Apply (for more information on event logs, see Section 13, Managing Audit Events).
Procedure 1. 2. In the tree structure of the Directory panel, right-click the Cluster and select Rename. In the Configuration tab, type the new name of the object and press Enter.
159
Procedure In the tree structure of the Directory panel, right-click the Cluster to delete and select Delete. The Cluster is deleted.
160
Administrator Guide
2.
To add another domain controller, read the displayed instructions and click the Search button.
If you have enter a computer or server name in the Server or computer name text box, all the domain controllers matching the search criteria are listed. If a computer name is matching the search, all the domain controllers of the computer site are listed.
3.
Select the domain controller you want to work on and click the Select button.
The new domain controller will then be used for all the administration tasks, until you close the Enterprise SSO Console, or select another controller.
161
Formatting
Assignment
Blacklisting
Formatting
Before Starting If you use a smart card to perform your administration tasks, all tasks described in this section require to be "Smart card manager" (this right is granted at card assignation time, in the Administration tab).
162
Administrator Guide
Interface Design Depending on your administration profile, you can manage smart cards through the following panels of Enterprise SSO Console interface:
For more information on administration modes, see Section 4, Managing Administrators.
Depending on the panel used to manage smart cards, procedures are different. Moreover, you can carry out some tasks from one of these two panels, as described in the following table:
IF YOU WANT TO USE THE
Assign a smart card to a specific user Assign smart card to many users Format smart cards Unlock smart cards Disable/Enable smart cards of a user Send smart cards to a blacklist Force a new PIN Extend the validity of a smart card Lend a smart card Return a lending card Find the owner of a smart card Display the list of supported smart cards Manage smart cards configuration profiles Manage smart card's authentication parameter Managing smart card batch
Directory panel Smart Card panel Smart Card panel Directory or Smart Card panel Directory or Smart Card panel Directory or Smart Card panel Smart Card panel Smart Card panel Directory panel Smart Card or Directory panel Smart Card panel Smart Card panel Smart Card panel Directory panel Directory panel
163
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section. You must have as much as blank smart cards as the number of users requiring smart cards and at least two smart card readers.
Procedure 1. In the Smart Card panel, click the button located in the toolbar.
164
Administrator Guide
2.
Click the Add button and in the displayed window, select the wanted users.
You can select an Organizational Unit to add all the users registered in this OU. The users are listed in the Selected users area.
3.
Click Assign.
The smart card assignment window appears.
4.
Insert the smart card of the corresponding user in a smart card reader, fill in this window as follows, and then click OK: a) b) In the Smart card area, select the smart card to assign. In the Configuration area, select a card model:
Advanced Login and Advanced LoginSmart card Storage: these models generate a card which can be used with the Enterprise SSO software modules. It is mandatory to select this card model if you want to store user's authentication data on token. For more information, see Section 7.1.3, Assigning a new Smart Card Allowing a User to log on a Workstation which is Disconnected from the Directory. It is recommended to select this card model if the card is only used with Enterprise SSO software modules, and if certificates are not used. Windows Smartlogon Compatible: (you cannot apply this model using Windows Remote Desktop). This model generates a card which can be used with standard Windows authentication. It manages a single certificate, which is the smart card authentication certificate. It is not compatible with the two Advanced Login models. Cryptoflex IK Compatible: (you cannot apply this model using Windows Remote Desktop). This configuration generates a card which can be used with standard Windows authentication, in conjunction with IK software from Schlumberger/Axalto. This configuration loads the authentication certificate and allows two further certificates to be imported from PFX/PKCS#12 files. Cards generated using this model cannot be used on workstations which do not have the IK software. It is also possible to create customized smart card models if you have specific requirements. Contact your Quest representative for further information.
165
c)
5.
6.
166
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section. You must have at least one blank smart card and two smart card readers.
Administrator Guide
Procedure 1. 2. In the tree structure of the Directory panel, click the user for which you want to assign a smart card. In the Smart Card tab, click the Assign button.
The smart card assignment window appears.
3.
Insert the smart card of the corresponding user in a smart card reader, fill in this window as follows then click OK. a) b) In the Smart card area, select the smart card to assign. In the Configuration area, select a card model:
Advanced Login and Advanced LoginSmart card Storage: these models generate a card that can be used with the Enterprise SSO software modules. It is mandatory to select this card model if you want to store user's authentication data on token. For more information, see Section 7.1.3, Assigning a new Smart Card Allowing a User to log on a Workstation which is Disconnected from the Directory. It is recommended to select this card model if the card is only used with Enterprise SSO software modules, and if certificates are not used. Windows Smartlogon Compatible: (you cannot apply this model using Windows Remote Desktop). This model generates a card which can be used with standard Windows authentication. It manages a single certificate, which is the smart card authentication certificate. It is not compatible with the two Advanced Login models. Cryptoflex IK Compatible: (you cannot apply this model using Windows Remote Desktop). This configuration generates a card which can be used with standard Windows authentication, in conjunction with IK software from Schlumberger/Axalto. This configuration loads the authentication certificate and allows two further certificates to be imported from PFX/PKCS#12 files. Cards generated using this model cannot be used on workstations which do not have the IK software. It is also possible to create customized smart card models if you have specific requirements. Contact your Quest representative for further information.
167
c)
4.
7.1.3 Assigning a new Smart Card Allowing a User to log on a Workstation which is Disconnected from the Directory
Subject The following procedure describes how to allow a user who uses his/her smart card for the first time to log on a workstation that is disconnected from the LDAP directory. Procedure 1. 2. You must apply the Advanced LoginSmart Card Storage model when you assign the smart card. (Optional) Depending on your security policy, check that Application Security Profiles associated with applications used by this user have the option Credential storage: on Token selected.
168
Administrator Guide
Restriction If you want to format a blacklisted smart card, you can only do it with Cryptoflex cards. It is impossible to format a blacklisted card used in PKCS#11. Before Starting Check that you meet the following requirements: To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following right: "Token: Formatting".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section. You must have at least two smart card readers.
Procedure 1. In the Smart Card panel, click the button located in the toolbar.
2.
If necessary, insert the smart card to format in the smart card reader and click Format.
A confirmation window appears.
3.
Validate.
The smart card is formatted.
169
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section. You must have at least two smart card readers.
2. 3. 4.
If necessary, insert the wanted smart card in the smart card reader. Either click Generate to create a random new PIN, or enter it manually in the New PIN Code field. Click Force.
The PIN is changed.
170
Administrator Guide
7.4.1 Disabling Temporarily Smart Cards from the Smart Card Panel
Subject This section describes how enable/disable smart cards from the Smart Card panel. For information on how to enable/disable smart cards from the Directory panel, see Section 7.4.2, Disabling Smart Cards of a User from the Directory Panel. Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following right: "Token: Modification".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. 2. 3. In the Smart Card panel, click the Reports tab. In the displayed window, filter if needed the smart cards to display and click Apply. Select the wanted smart card and click Disable.
The smart card is disabled.
171
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. 2. In the tree structure of the Directory panel, click the user for which you want to unlock a smart card. In the Smart Card tab, click the Disable button.
The smart card is disabled.
T he us e r us e s the un lo c kin g s e c re t c o de
The following sections describe the two ways to unlock smart cards: from the Directory panel and from the Smart Card panel.
172
Administrator Guide
Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following right: "Token: Modification".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
2. 3.
In the Management of locked smart cards area, to check that the number of locked smart card is up to date, click Refresh. Click Manage.
The blocked smart card management window appears.
173
4. 5.
Select the wanted smart card and click Unblock. In the displayed window, enter the secret code that you will give to the user and validate.
The secret code appears in the Unblocking Secret column.
6.
You can now give this secret code to the user so that he/she can use it to unlock his/her smart card.
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. 2. 3. 4. In the tree structure of the Directory panel, click the user for which you want to unlock a smart card. In the Smart Card tab, click the Unblock button. In the displayed window, enter the secret code that you will give to the user and validate. You can now give this secret code to the user so that he/she can use it to unlock his/her smart card.
174
Administrator Guide
Fill in the General tab with any contact information useful to the end user (as the name, phone number or e-mail address of the administrator). Click OK.
The information message is completed with the following line: "Your contact is <information you entered in the General tab>".
7.6.1 Sending Smart Cards to a Blacklist from the Smart Card Panel
Subject This section describes how to blacklist smart cards from the Smart Card panel. For information on how to blacklist smart cards from the Directory panel, see Section 7.6.2, Sending Smart Cards to a Blacklist from the Directory Panel. Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following right: "Token: Blacklist".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure In the Smart Card panel, click the Reports tab. In the displayed window, filter if needed the smart cards to display and click Apply. Select the wanted smart card and click Blacklist. A confirmation window appears. Validate
The smart card is blacklisted.
175
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. 2. 3. In the tree structure of the Directory panel, click the user for which you want to blacklist a smart card. Select the smart card to blacklist and click the Blacklist button.
A confirmation window appears.
Validate.
The smart card is revoked. You can click the Revocation tab to display more information on the date and the administrator who performed this operation.
Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following right: "Token: Modification".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
176
Administrator Guide
2. 3.
In the Management of expired smart cards area, to check that the number of locked smart card is up to date, click Refresh. Click Manage.
The expired smart card management window appears.
4. 5.
Select the wanted smart card and click Change. In the displayed window, select the new validity date of the smart card and validate.
The new expiry date appears in the Expiry Date column.
6.
Contact the smart card owner to inform him/her that his/her smart card is active again.
177
Before Starting Check that you meet the following requirements: To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must at least contain the following right: "Token: Modification".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section. You must have the smart card to identify and at least two smart card readers.
Procedure 1. 2. In the Smart Card panel, click the button located in the toolbar.
If necessary, insert the smart card in the smart card reader, and select the corresponding smart card reader in the list box.
The properties of the smart card appears, as in the following example:
178
Administrator Guide
button to display If you have sufficient administration rights, you can click the the Smart Card tab of the corresponding user in the Directory panel.
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Smart card administrator". In advanced administration mode, if you use a smart card to perform your administration tasks you only need to be "Smart card manager" (this right is granted at card assignation time, in the Administration tab).
179
Procedure In the Smart Card panel, click the Information tab. The smart card information tab appears.
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedures Creating Configuration Profiles 1. 2. In the Smart Card panel, click the Configuration tab. In the Smart card type drop-down list box, select a type of smart card.
The existing smart card configuration profiles appear in the Configurations area.
180
Administrator Guide
3. 4.
Click New.
A new entry appears in the Configurations area.
Type a name for this new profile, and fill in the Global, Personalization, Temporary Card and PIN Format tabs.
These tabs allow you to set: The PIN renewal period (default value 300 days): once this time has elapsed, the user must enter a new PIN number for authentication purposes. Default PIN number: this value will be used when assigning the token. PIN number change on next login: this value is the default value used when the token is assigned with this profile. The number attempts to enter the correct PIN before the card is locked: this value is used during the customizing of the card. It cannot be changed subsequently without reformatting the token. An expiry date (number of days after the assignment) for the token: this expiry date can be changed after customization. The default values used during the assignment of a loan card (number of days before the loan card expires, behavior of the main card if it is handed over when the user has a loan card). A PIN format policy, which defines requirements. The default PIN number must comply with these requirements.
5.
Click Apply.
The new configuration profile is created.
Modifying Configuration Profiles 1. 2. In the Smart Card panel, click the Configuration tab. In the Smart card type drop-down list box, select a type of smart card.
The existing smart card configuration profiles appear in the Configurations area.
3. 4.
Select a configuration profile, and fill in the Global, Personalization, Temporary Card and PIN Format tabs. Click Apply.
The default values proposed upon the allocation of a smart card using this configuration profile are modified.
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
181
Procedure 1. 2. 3. 4. In the Smart Card panel, click the Configuration tab. In the Smart card type drop-down list box, select a type of smart card.
The existing smart card configuration profiles appear in the Configurations area.
Select a configuration profile and click Rename. Type the new name of the object and press Enter.
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. 2. 3. In the Smart Card panel, click the Configuration tab. In the Smart card type drop-down list box, select a type of smart card.
The existing smart card configuration profiles appear in the Configurations area.
Before Starting Check that you meet the following requirements: To perform the task described in this section, you must have at least the following administration roles:
In classic administration mode: "Smart card administrator" and at least, one of the following roles: "Security object administrator" or "Access administrator" or "Rights administrator".
182
Administrator Guide
In advanced administration mode, you role must contain the following rights: "Token: Lending" and "Directory: Browsing".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section. You must have at least one blank smart card and two smart card readers.
Procedure 1. 2. 3. In the tree structure of the Directory panel, click the user for which you want to loan a smart card. In the Smart Card tab, click Lend.
The smart card allocation window appears.
Fill in this window as described in Section 7.1.2, Assigning a Smart Card to a User.
The loan card appears as Enabled and the principal card state changes to Temporary replaced.
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. In the tree structure of the Directory panel, click the user for which you want to return a loan card.
In the Smart Card tab, select the loan card to return and click Return.
2. 3.
Fill in the format window as described in Section 7.2, Formatting Smart Cards.
Once the smart card is formatted, the loan card state switches to Old card and the principal card becomes Enabled. The user can authenticate using his/her principal card again.
183
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
2. 3. 4.
Fill in the format window as described in Section 7.2, Formatting Smart Cards.
Once the smart card is formatted, the loan card state switches to Old card and the principal card becomes Enabled. The user can authenticate using his/her principal card again.
184
Administrator Guide
Before Starting
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. 2. 3. In the tree structure of the Directory panel, click the user for which you want to change smart cards authentication parameters. In the Smart Card tab, select the wanted smart card. In the Management area of the Information tab, select/clear the check boxes depending on your requirements, to change the PIN on next connection, to change the smart card expiry date, and to enable/disable the automatic unlocking of principal smart cards when the user authenticates using a loan card, as in the following example:
185
The Automatically re-enable main card when next presented check box is available only if you have selected a loan card.
186
Administrator Guide
Before Starting To be able to define a stock of tokens, you must have at least the following administration role:
In classic administration mode: "Security object administrator" role. In advanced administration mode, you role must contain the following rights: "Batch of cards: Creation/Modification", "Batch of cards: Deletion" and "Directory: Browsing".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section. A smart card can be assigned to one stock only.
Procedure 1. In the directory tree, select the tree or the container for which you want to define a stock, and click the Batches of cards tab.
The Batches of cards tab appears.
2.
3.
187
First/Last serial number: the identification of the smart card stock. If you do not know the serial numbers, type 0000000000000000 for the first number and FFFFFFFFFFFFFFFF for the last number: in this case, there is one token stock by token type. Administrators allowed to assign tokens from this batch area: an empty list means that all the administrators are allowed to assign tokens from the batch.
Procedure 1. In the directory tree, select the tree or the container for which you want to define a stock, and click the Batches of Cards tab:
The Batches of Cards tab appears.
This window lists stocks of smart cards that have already been already defined.
188
Administrator Guide
2.
If you are authorized to administer several domains: in the Domain list, select the domain for which you want to display the defined stocks.
The list of stocks for the selected domain is displayed.
3.
Click the smart card stock(s) for which you want to see the state and click State.
The state window appears and displays information about the selected stock(s).
3.
Select the Administrator can assign tokens only from authorized batches check box to force the use of smart cards defined in the batch.
189
Authentication Mechanism The Gemalto Strong Authentication requires two independent ways to establish identity: A static password, which is associated with a user ID. An OTP (One-Time Password), which is obtained from the OATH device.
In SA Server, the user ID and the device are linked together for a specified user, and both are required to authenticate. From Enterprise SSO console this link between User ID and device is managed, and does not need the use of the SA Server administration portal. To each Enterprise SSO user corresponds a specified User ID, and only one device may be assigned to this user. The SA Server can be accessible using HTTPS as a security measure.
The SA Server must be installed on a machine (to know how to install SA Server, refer to Gemalto documentation) You must have the Enterprise SSO SA Server license (SASRV).
Administrator Guide
Hosts area This area displays the SA Server hosts that are connected to Enterprise SSO.
Up/Down buttons These buttons allow you to define the host connection order. If the first host does not respond, Enterprise SSO connects to the following one Edit button Edits the selected hosts for modification in the Host description area. Remove button Removes the selected host.
191
192
Administrator Guide
Administrator parameters area User ID and password of an SA Server administrator who is allowed to manage devices and users.
This user must be created in SA Server (at installation time for example). This user must have an "admin" role.
Security questions to answer in case of loss of device area The two questions required here are asked in case a user looses his device. Correct answers provide a list of OTP. SA Server mode area The mode in which SA Server has been installed (see Gemalto SA Server documentation for more details). Action on device formatting area Action to perform on SA Server devices when they are formatted from Enterprise SSO Console:
Initialize: the device can be used again. Revoke: the device cannot be used anymore (irreversible).
193
User ID rule field Each user to whom is assigned a SA Server device has his own user ID in SA Server. This rule allows you to choose the User ID syntax, according to the chosen LDAP parameters. Example: if the User ID rule is (givenName).(sn), the user whose givenName is "John" and whose sn is "Smith" will get "John.Smith" as associated User ID. The default rule is "displayName". It is applied even if no rule is set.
Action on device blacklisting area Action to perform on SA Server devices when they are blacklisted from Enterprise SSO Console:
Initialize: the device can be used again. Revoke: the device cannot be used anymore (irreversible).
Administrator Guide
In advanced administration mode, your role must contain the following rights: "Token: Assignment" and "Directory: Browsing".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section. The device you want to assign must have a device ID, and have previously been provisioned in SA Server. Its state must be "Initialized" in SA Server.
Procedure 1. 2. Follow the smart card assignation procedure explained in Section 7.1.2, Assigning a Smart Card to a User. Fill-in the SA Server tab with the instruction given in the following "SA Server" Tab Description section. This tab allows you to register the device as a SA Server device and to link the selected user to this device. Click OK.
A window asks you to enter the PIN.
3. 4.
Associated user area The User ID field is automatically fill-in according to the User ID rule defined while configuring the SA Server device management (see Section 8.1.2, Configuring the SA Server Device Management).
If the SA Server is configured in "Full DB", you must fill-in the Password and Confirm password fields for the selected user. If the SA Server is configured in "Mixed mode", the Password field is not available.
195
Answer to security questions area The questions displayed here are the one chosen while configuring the SA Server device management (see Section 8.1.2, Configuring the SA Server Device Management). You must answer these questions with the user, so that he can get OTP in case he looses his device.
In case the User ID already exists in SA Server and the answers already recorded, the fields are empty. If you fill-in again these fields, the corresponding answers will be updated in SA Server. If you let these fields empty, the answers will not be updated in SA Server.
Device ID field The device ID is read from the device. Validate check box
Check box selected: the SA Server is updated with the information entered in the tab when you click the OK button, the link between the device and the user is established in SA Server. Check box cleared: the SA Server is not updated with the information entered in the tab when you click the OK button, no link is established between the device and the user in SA Server. You can do the assignation later on: see Link User/Remove User button in Section 8.2.4, Managing the Link between User and SA Server Device.
196
Administrator Guide
When a SA Server device is blacklisted, the action performed on the device depends on the configuration set while configuring the SA Server device management, in the Action on device blacklisting area (see Section 8.1.2, Configuring the SA Server Device Management): If the Revoke option is set, the device state becomes "Revoked" and cannot be used anymore. If the Initialize option is set: the device state becomes "Initialized". If a user was linked to this device, the link is removed.
User Information area User ID/User State: information fields. Block/Unblock button:
The Block button allows you to prevent the user from authenticating. The user cannot authenticate when his state is "Block". In this case, the button becomes Unblock. The Unblock button allows you to authorize a blocked user to authenticate again.
197
Revoke button: This button allows you to revoke the user by definitively cancelling his user ID. This action is irreversible. Unlock button: This button is only available if the user is locked, which means he has reached the maximum number of allowed password attempts (this number is defined in Gemalto SA Server user settings). This button allows you to unlock the user by resetting the user password attempts.
Associated device area Device ID/Device state: information fields retrieved from the device. Device expiration check box: This check box makes available the device expiration field and allows you to update the device expiration date. OTP attempts field: This field displays the OTP attempts counter as follows: <number of OTP attempts>/<maximum attempts before lock> The maximum number of OTP attempts is defined in Gemalto SA Server OATH policy. Reset OTP attempts button: This button allows you to unlock the device in case it has reach the maximum number of OTP attempts. Block/Unblock button:
The Block button allows you to prevent the device from being used. The device cannot be used to authenticate when his state is "Block". In this case, the button becomes Unblock. The Unblock button allows you to allow a blocked device to authenticate again.
Revoke button: This button allows you to revoke the device by definitively cancelling it. This action is irreversible, the device cannot be used again. Link User/Remove User button a) b) The Link User button is displayed in the following cases: If the device-user link is not established in SA Server. In this case, this button allows you to link the device to the user in SA Server with the following window.
198
Administrator Guide
This window allows you to update in the SA Server the information entered while assigning the device to the user. The information already entered at assignment time (see Section 8.2.1, Assigning an SA Server Device to a User) is not displayed in the window:
If you fill-in again these fields, the corresponding answers will be replaced in SA Server. If you let these fields empty, the SA Server will not be updated.
c)
If the user does not exist in SA Server yet. In this case, this button allows you to create the user and link the device to the user in SA Server, with the following window:
This window allows you to enter the necessary information to link the device to the user, as described in Section 8.2.1, Assigning an SA Server Device to a User. d) The Remove User button allows you to remove the device-user link. If you remove a device-user link, you will be able to link them again later on without having to re-enter the necessary information, with the Link User button.
199
RFID Definition RFID, which is the acronym of Radio Frequency IDentification is a technology used anywhere that a unique identification system is needed. In information systems, RFID can be used to secure equipped workstations. An RFID system consists of an antenna and a transceiver (short for transmitter-receiver), which read the radio frequency and transfer the information to an RFID token, which contains the information to be transmitted. Enterprise SSO can handle active and passive RFID tokens. For more information on supported RFID technologies, see Quest Enterprise SSO Release Notes Possible States of an RFID Token
Assignment
Blacklisting
Deletion
200
Administrator Guide
Interface Design To manage RFID tokens, you will use the following administration panels: The RFID panel, which gives you an overview of the RFID tokens used in the company. You may use the intuitive filter area, useful when managing many and many tokens.
The Directory panel, which allows you to manage the RFID tokens of a specific User and to configure RFID parameters:
201
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. Make sure that the following security profiles have one of the RFID authentication method selected:
The Access Point Security Profile associated with the Access Point equipped with an RFID hardware system (for details, see Section 5.4.2, Configuring Access Point Security Profiles). The User Security Profile associated with the User for whom you want to assign the token (for details, see Section 5.3.2, Configuring User Security Profiles).
2.
In the directory tree (Directory panel), select the User for whom you want to assign an RFID token and click the RFID tab.
The RFID tab appears.
202
Administrator Guide
3.
Click Assign.
The RFID token selection window appears.
If your workstation is not equipped with RFID hardware, the Select a present RFID option is disabled.
4.
Define the RFID token to assign using one of the following methods:
If you have the RFID token to assign, select it in the drop-down list. Else, enter its serial number.
5.
(Optional): select Expiry date to define the day and hour of the RFID token expiration.
You can change at any time this option through the RFID tab of the selected user.
6.
Click OK.
9.2.1 Locking and Unlocking an RFID Token from the Directory Panel
Subject This section explains how to lock and unlock an RFID token from the Directory panel. Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following rights: "Token: Modification" and "Directory: Browsing".
203
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. 2. Browse the directory tree to select the wanted user and click the RFID tab.
The list of RFID tokens assigned to this user appears.
Select the RFID token to lock and click the Lock button.
The state of the token changes to Locked.
3.
9.2.2 Locking and Unlocking an RFID Token from the RFID Panel
Subject This section explains how to lock and unlock an RFID token from the RFID panel. Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following right: "Token: Modification".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
204
Administrator Guide
Procedure 1. 2. Modify the RFID filter (optional) and click the Apply button.
A list of RFID tokens appears.
Select in the list the token to lock and click the Lock button.
The state of the token changes to Locked.
3.
9.3.1 Blacklisting and Deleting an RFID Token From the Directory Panel
Subject This section explains how to blacklist and delete an RFID token from the Directory panel.
205
Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following rights: "Token: Blacklist" and "Directory: Browsing".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. 2. Browse the directory tree to select the wanted user and click the RFID tab.
The list of RFID tokens assigned to this user appears.
Select the RFID token to blacklist and click the Blacklist button.
The state of the token changes to History.
3.
206
Administrator Guide
9.3.2 Blacklisting and Deleting an RFID Token from the RFID Panel
Subject This section explains how to blacklist and delete an RFID token from the RFID panel. Before Starting To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following right: "Token: Blacklist".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
Procedure 1. 2. Modify the RFID filter (optional) and click the Apply button.
A list of RFID tokens appears.
Select in the list the token to blacklist and click the Blacklist button.
The state of the token changes to Blacklisted.
3.
207
Unlock Area
c unlo nge k ra
Sensor/ Antenna
Visibility Area
ge ran k loc
Lock Area
The Grace Period For convenience purposes, you can define a Grace Period, in which the workstation will unlock thanks to the RFID token only. After this period, the user must provide his/her password in addition to the RFID token to log on. Before Starting To perform the tasks described in this section, you must have at least the following administration role:
In classic administration mode: "Smart card administrator". In advanced administration mode, your role must contain the following right: "Token: Modification" and "Directory: Browsing".
If you have authenticated with a smart card, you must be a "Smart card manager" (this right is granted at card assignation time, in the Administration tab) to perform the task described in this section.
208
Administrator Guide
Procedures Modifying the Detection Areas 1. In the Directory panel, select the Access Point Security Profile associated with the Access Points for which you want to modify the detection areas, and click the RFID tab.
The RFID tab appears.
2.
Move the sliders to modify the values depending on your needs and click Apply.
The upper slider allows you to define the unlock range. The lower slider defines the lock range. It is not possible to set the second value lower than the first one. It is a normal behavior.
Modifying the Grace Period 1. In the Directory panel, select the User Security Profile associated with the users for whom you want to modify the grace period, and click the Security tab.
The Security tab appears.
209
2.
3.
Click Apply.
Procedure 1. 2. In the RFID panel, filter the entries that you want to export and click Apply.
The list of tokens appears.
Click the Export button, and select in the displayed window the save location of the file.
210
Administrator Guide
Subject Enterprise SSO Console allows you to manage biometric enrolment of users. Biometric Modes Enterprise SSO can work in three modes to authenticate users with their biometric data. You select the biometric mode from the two following directory objects: In the Access Point security profile: see Section 5.4.2.1, Security Services Configuration ("Security Services" Tab). In the User security profile configuration: see Section 5.3.2.1, Authentication Parameters Configuration ("Authentication" Tab).
Store On PC mode User biometric data and LDAP password are stored in their workstation local cache, and are protected by the Enterprise SSO Client and the administration rights set on the workstation. Users must enrol their biometric data on every workstation they use. Store On Card mode User biometric data and smart card PIN are stored on their smart card (public area), and are protected by the Enterprise SSO Client. Users enrol their biometric data once and this data is stored in their smart card.
211
Store On Server mode User biometric data enrolment is centralized by the Enterprise SSO Controller and stored in the directory. In this mode, an Enterprise SSO Controller must be available for authentication. Users enrol their biometric data once by typing their name and password before placing their finger on the biometric scanner. Then they can connect to every workstation of the Enterprise SSO forest without having to enrol their biometric data on each workstation they use. On every workstation on which the user authenticates, a local cache is created, as in the "Store on PC" mode, and the Enterprise SSO Controller retrieves biometric data from the directory to store it in this cache. Interface Design To manage biometric enrolment, you will use the following administration panels: The Biometrics panel, which displays the list of users having enrolled biometric patterns, and allows you to export it.
212
Administrator Guide
The Directory panel, which allows you to manage biometric enrolment in the user security profile, and for a specific user, you can also configure biometric parameters on computers in the access point security profile.
213
2.
To export the list in a .csv file, click the Export button and fill-in the Save As window.
The list displayed is saved in a .csv file.
214
Administrator Guide
Interface To manage the Data Privacy feature, you will use the following administration panels: The Data Privacy panel, which gives you an overview of the encryption keys used in the company. You may use the intuitive filter area, useful when managing many keys.
215
The Directory panel, which allows you to manage the key of a specific User and to configure Data Privacy parameters:
Key States: key icons have different aspects depending on their states as described in the following table:
DESCRIPTION
KEY ICON
Key active. Key in the warning period. Key expired. The key will be active upon user's log on. Waiting user's logon: key in the warning period. Waiting user's logon: key will expire.
216
Administrator Guide
2.
In the directory tree (Directory panel), select the wanted user or group and click the Data Privacy tab.
The Data Privacy tab appears.
217
3.
Click Generate:
4.
Administrator Guide
2.
In the Data Privacy panel, click Data Privacy | Generate keys for multiple users (menu bar).
The File Encryption key generation window appears.
3. 4.
Use the Add and Remove buttons to the wanted users and if necessary, modify the File Encryption key properties area. Then click Next. A window displaying all the selected users appears. Click Start.
Procedure 1. Make sure that the Access Point Security Profile associated with the Access Point of the wanted user has the options File Encryption is authorized on this workstation selected (for details, see Section 5.4.2, Configuring Access Point Security Profiles). In the User Security Profile associated with the user for whom you want to enable Key automatic generation, click the Data Privacy tab.
219
2.
3.
4.
Click Apply.
220
Administrator Guide
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: the "File Encryption administrator" role. In advanced administration mode, your role must contain the following rights: "File Encryption Key: Generation" and "Directory: Browsing".
For more details on administration roles, see Section 4, Managing Administrators.
Procedure 1. In the directory tree (Directory panel), select the wanted user or group and click the Data Privacy tab.
The Data Privacy tab appears.
2.
3.
221
Procedure 1. 2. Modify the Data Privacy filter (optional), and click the Apply button.
A list of keys appears.
Select in the list the key to renew and click either the Edit or the Renew button.
If you want to update the expiration date, the name of the key and the warning time, use the Edit button. If you want in addition to modify the encryption algorithm, use the Renew button.
3.
222
Administrator Guide
Procedure 1. In the User Security Profile associated with the user for whom you want to enable Key automatic generation, click the Data Privacy tab.
The Data Privacy tab appears.
2.
3.
Click Apply.
The following procedure describes how to allow users to refresh their keys.
223
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: the "File Encryption administrator" role. In advanced administration mode, your role must contain the following rights: "File Encryption Key: Generation", "Directory: Browsing" and "User security profile: Creation/Modification".
For more details on administration roles, see Section 4, Managing Administrators.
Procedure 1. Make sure that the Access Point Security Profile associated with the Access Point of the wanted user has the options File Encryption is authorized on this workstation selected (for details, see Section 5.4.2, Configuring Access Point Security Profiles). In the User Security Profile associated with the user for whom you want to enable Key automatic generation, click the Data Privacy tab.
The Data Privacy tab appears.
2.
3.
Note that this option relates to all the users associated with this security profile.
4.
Click Apply.
224
Administrator Guide
Procedure 1. In the Data Privacy panel, filter the entries that you want to export and click Apply.
The list of keys appears.
2.
Click the Export button, and select in the displayed window the save location of the file.
225
3. 4. 5.
Administrator Guide
If these credentials grant access to the LDAP directory, Enterprise SSO encrypts them using the users public key certificate. Enterprise SSO then creates an LDAP object where the users encrypted LDAP credentials are stored. Access to this LDAP object is restricted to that user; moreover, that user must authenticate using that certificate to gain access to his LDAP credentials.
6. 7. 8.
Retrieving encrypted LDAP credentials from the Enterprise SSO directory. Decrypting the LDAP credentials using the users private key stored on the smart card. Using the decrypted LDAP credentials to retrieve Enterprise SSO data from the LDAP directory.
Revocation The Enterprise SSO PKA authentication process relies on a public key certificate to identify the incoming user. It is therefore necessary to ensure that any public key certificate used to authenticate a user is valid and properly trusted. This requires external PKI material such as a set of public key certificates for each Certification Authority and an access to an On-line Certificate Status Protocol responder or to a set of Certificate Revocation Lists (CRL). During the certificate enrollment, the users public key certificate is validated as follows: Its issuing Certification Authority must be identified as a trusted authority for the purpose of Enterprise SSO PKA. If a CRL or OCSP responder is defined for that issuing Certification Authority (or defined in the certificate itself), the revocation status is checked.
The revocation engine is included in the Enterprise SSO controller. Its job is to maintain the accuracy of the revocation status of all public key certificates used for Enterprise SSO PKA. For each CRL distribution point or OCSP responder defined, the revocation engine: Computes the time for next revocation update. Collects the revocation information. Checks the revocation status of all enrolled public key certificates. Checks the revocation status of the public key certificate of all trusted Certification Authority.
Anytime a users public key certificate is revoked, its status is updated in the Enterprise SSO directory and the users smart card is automatically blacklisted.
227
12.1 Configuring User and Access Point Security Profiles to Support the PKA Authentication Method
Before Starting A smart card XML description file must exist and it must contain the description of the specific type(s) of smart card that will be used for PKA authentication. Several reserved keywords are used in the XML file to specify to Enterprise SSO that this smart card will be used for that purpose. To perform the task described in this section, you must have at least the following administration role:
In classic administration mode: Security Object administrator. In advanced administration mode, your role must contain the following rights: "User security profile: Creation/Modification", "Access point security profile: Creation/Modification".
Procedure 1. 2. Import a smart card XML description file, which is properly configured, see Section 14, Customizing Configuration Files. Create (or modify) a User Security Profile with the following mandatory requirements:
The authentication method which is PKA compliant must be selected. The Password authentication method must also be selected. For more details, see Section 5.3.2, Configuring User Security Profiles.
3.
Create (or modify) an Access Point Security Profile with exactly the same mandatory requirements. For more details, see Section 5.4.2, Configuring Access Point Security Profiles.
12.2 Activating the PKA Authentication Method and Defining the Set of Authorized Certification Authorities
To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator" In advanced administration mode, your role must contain the following right: "PKA authority: Creation/Modification", "PKA authority: Deletion".
228
Administrator Guide
The Public Key Authentication tab only appears upon a successful extension of the Enterprise SSO directory and a successful creation of the default objects. For more information, see Enterprise SSO Advanced Installation and Configuration Guide.
2.
Select the first check box: Users can authenticate using a public key Certificate. Any valid certificate () to authenticate users.
This check box enables all the other options of the tab.
3.
Select the second check box: Users can enroll their public key Certificate. Any valid certificate () may be enrolled.
It is mandatory to select this check box with this version of Enterprise SSO.
4.
You must then configure the set of authorized certification authorities by filling in the Certification Authorities area, as described below.
229
2.
230
Administrator Guide
3.
To confirm the activation of the Certification Authority as a permitted emitter of users public key certificate for Enterprise SSO PKA, click the Import button
The imported Certification Authority appears.
If the imported CA certificate contains the URL of a point of distribution of certification revocation information (available in the form of a CRL or an OCSP responder), the creation of the Certification Authority in the E-SSO directory also creates an object corresponding to each point of distribution (this is the case in our example).
231
2.
Select the certificate from the list. To display the detailed contents of the certificate, click the View Certificate button. Then, click OK button to resume the import of the certificate.
To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Security object administrator" In advanced administration mode, your role must contain the following right: "PKA authority: Creation/Modification", "PKA authority: Deletion".
232
Administrator Guide
2.
3.
Once a CRL has been taken into account, you may perform its explicit update. For that purpose, select the CRL in the available list and click the Update button. The CRL is then immediately downloaded and verified.
233
Procedure 1. In the Revocation Information area, select the Supports OCSP check box and click the Import button.
The OCSP importation window appears.
2.
Enter in the URL or filename field the URL of the OCSP responder and select the Import URL as an OCSP responder check box.
The Certificate file field becomes available.
3. 4.
Enter the path name of a valid public key certificate used by the OCSP responder server and click OK. Once an OCSP responder has been taken into account, you may need to update its public key certificate. For that purpose, select the OCSP responder in the list, click the Certificate button and select the DER-encoded or PEMencoded file that contains the public key certificate used by the OCSP responder to sign its responses.
234
Administrator Guide
Audit Collection
E-SSO Security Services
Audit Consolidation
E-SSO Audit Service
Audit Analysis
E-SSO Administration Service E-SSO Security Services
Audit Cache
Audit Cache
Audit Cache
User Workstation
E-SSO
Audit Server
E-SSO
Administration Server
Administrator Workstation
Audit events are created on users workstations and stored locally in audit cache files. Events are then collected (on a regular basis) by an Enterprise SSO controller that provides the Enterprise SSO Audit Services. The controller stores the collected audit events in a local audit database. The Enterprise SSO Audit Services servers should then be configured to upload collected events into a consolidation central audit SQL database. Administrators using the Enterprise SSO Console retrieve the audit events stored in the central audit database. Audit Cache Mechanism All the audit events are registered in a centralized SQL database, managed by the Enterprise SSO controllers.
235
An audit cache mechanism is located on: The client workstations enabling the storage of the audit events if the workstation is disconnected from the network. The Enterprise SSO controllers enabling the storage of the audit events if the server is disconnected from the SQL database.
The Enterprise SSO controller compiles all the events associated with user authentication and administration actions in all LDAP domains, and it provides a consistent overview of the history of the accesses to all your applications.
By administration actions, we mean any operation that modifies the directory content: creation, modification, deletion and renaming of any directory object.
If the audit cache file is deleted, Enterprise SSO sends an audit event to the Enterprise SSO controller. The event indicates the name of the workstation and when the file deletion was detected. Enterprise SSO Audit Servers The Enterprise SSO audit servers: Ensure the stream of audit events by detecting audit cache file deletion. Make sure an Enterprise SSO controller is always available to Enterprise SSO Administrators. Do not generate audit events that are not relevant to the customers security policy. The administrator can apply an audit filter to an application, a computer, a user or an administration profile
The following procedure focuses on how to display globally audit events. For details on how to display the audit records of a specific object, see Section 5.5.1.3, Displaying Password Generation Policy Event Logs and Section 6, Managing Directory Objects.
236
Administrator Guide
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Auditor". In advanced administration mode, your role must contain the following right: "Audit: Visualization".
For more information on administration role, see Section 4, Managing Administrators. Procedure 1. In the Audit panel, select the time range corresponding to the events you want to display, and click Apply.
By default, the audit report displays all the audit events of the last two days. All the audit events corresponding to the time range selected are displayed.
2.
3.
This criterion is used to filter certain Access Points. This criterion filters the events only concerning one or more applications. This criterion can be used to select audit events only concerning certain audit identifiers. This criterion can be used to choose the family of audit events required: SSO audit events. Authentication audit events. Access point audit events. Administration audit events.
Event code
The event code defines the audit events that must be included in the audit report.
The OR logic operator applies to the conditions of a given category and the AND logic operator applies between categories.
2. 3. 4. 5.
To add a condition on the category to display, click the Add a Condition window.
Depending on the category chosen, an audit filter selection window appears.
Follow the guidelines given in the window to choose the condition you want to apply, and click OK. In the Audit Database Search Filter window, click Apply.
The filter is instantly taken into account.
Click Close to display in the Audit panel the event records corresponding to the selected filter. To interpret audit events, see Section 13.3, Interpreting Audit Events.
238
Administrator Guide
Before Starting To perform the task described in this section, you must have at least the following administration role: In classic administration mode: "Auditor". In advanced administration mode, your role must contain the following rights: "Application: Audit filter assignment" and/or "Access Point security profile: Audit filter assignment" and/or "User security profile: Audit filter assignment" and/or "Administration profile: Audit filter assignment".
For more information on administration roles, see Section 4, Managing Administrators. Procedure 1. 2. 3. Select the object from the tree view of the Directory panel. Access the Audit area as explained in the appropriate section of the present guide. Assign an audit filter as explained in the following Audit Filtering Area Description section.
All events To log all the events related to the object. No events To log none events related to the object.
239
Events matching filter To only log events that match an audit filter. The Select button allows you to select an existing audit filter or to create a new one.
FIELD
DESCRIPTION
List of available audit filters. To delete an audit filter. To edit the audit filter selected in the list. To add a new audit filter: see the following Filter Creation Window section.
240
Administrator Guide
Name Description
Filter name. Filter description. Free text item that allows administrator to have more information about the content of the audit filter
Category
Category of the event, which can be: File Encryption: encryption events Admin: administration event SSO: event concerning User accounts Authentication: event concerning User authentication on Access Points and Applications System: action performed automatically by the system.
Audit successes Audit failures Events not audited Audited events Add button Remove button
Select this option to audit only successful events. Select this option to audit only failed events. List of not audited events. List of audited events. To add the selected event to the list of audited events. To remove the selected event from the list of audited events.
241
The Advanced Filter button allows you to filter audit records (see Section 13.2.1, Filtering Audit Records. The Export button allows you to export audit events to a formatted file (see Section 13.4, Exporting Audit Events.
Timestamp
Date and time of the event. The color of the icon indicates the event type: (green icon): normal event. (red icon): error event.
242
Category
Category of the event, which can be: Admin: administration events. SSO: events concerning User accounts. Authentication: events concerning User authentication on Access Points and Applications. System: actions performed automatically by the system.
Event Code
The event code is built using the following values: Type of the audited object. Operation performed on this object. For a complete description on how the Event code of administration audits is generated , see Section 13.3.3, Detailed Information on Administration Audit Events.
ID of the user who has performed the event. Name of the Application object associated with the event (blank if the Application is not concerned). Name of the Access Point associated with the event. (Administration events only). Distinguished Name of the object associated with the Admin event: For modification, renaming and deletion operations, the DN displayed is the DN of the object. For creation operations, the DN displayed is the object parent DN.
243
Description The Events Details window gives you more information on a selected event. Compared with the audit main window, it contains two pieces of additional information: The error code (Error code field). The description of the event (Description field).
The other fields display the same information as the main audit window.
The User's audit ID field corresponds to the Audit ID column of the audit main window. The Event type field corresponds to the Event code column of the audit main window.
FIELD DESCRIPTION
This field informs you on the cause of the error This area gives more information on the event (for a detailed description of this field for Admin events, see Section 13.3.3, Detailed Information on Administration Audit Events.
244
Administrator Guide
The Event Type Field The Event Type field (or Event Code in the main audit window) is built using the type of the audited object and the administration action on this object. Just combine one entry of the Object Type column with one entry of the Administration Operation column below to get the list of possible values that can appear in the Event type field of an Admin event:
The aim of the following table is to show you as many combinations as possible, but it does not pretend to be exhaustive.
Examples: The creation of a PFCP object has the following value: PFCPCreation. Account modifications have the following value: AccountModification.
The Description Field The Description field of administration audit events displays two groups of information: An optional description giving you detailed information on the audited object, as shown in the following example:
For a detailed description, per object, of the displayed information, see the table below.
245
The values of the implied LDAP attributes, as shown in the following example:
Token
Token class. Token serial number. Token state. Owner (owner name and DN).
Application (name and DN). User (list of the authorized users). Application (name and DN). Access Point (name and DN). Name (name and DN of the account's parameter. User (name and DN). Login. AccountBaseID. Application (name and DN). User (name and DN). Login. AccountBaseID. Application (name and DN).
Account
User (name and DN). Application (name and DN). User (name and DN). Access Point (name and DN).
246
Administrator Guide
2. 3. 4.
Select the format and the path name of the export file. Click Export.
A message confirms the completion of the export operation. Exported audit events remain in the audit database.
For more information on administration roles, see Section 4, Managing Administrators. Procedure 1. 2. In the Audit menu, click Archive.
The Audit database export tool appears.
Follow the instructions displayed by the wizard to perform the following operations:
Step 1: select the time range of the audit records to export. Step 2: select the file that will receive the audit records.
247
Step 3: delete the exported records from the Audit database. If you do not want to delete the exported audit records from the Audit database, click Cancel at Step 3.
2. 3.
Type the Audit ID to solve in the field and click the Add button.
The Audit ID is added in the Audit ID list.
Select the Audit ID line in the Audit ID list and click Solve.
If you click Solve without selecting an Audit ID, the entire list of Audit ID is solved. The corresponding User name appears in the User Name column.
4.
248
Administrator Guide
249
3. 4. 5.
Click the Select button, and in the displayed window, browse to the new XML configuration file. Click OK. Restart Enterprise SSO controllers and workstations to take into account the new XML file.
250
Administrator Guide
3.
4.
Click OK.
251
2. 3. 4.
252
If you are working with several domains, select in the Domain drop-down list the domain where the script will be applied. Type the script (for details, see Section 15.2, Script Commands), or import a script file (for details, see Section 15.3, Importing Script Files). Click Apply to run the script.
Administrator Guide
Example CREATE_ROLE(Vendor)
15.2.2 CREATE_ACCESS
Definition This command creates an access, which allows a user to access an application. Syntax
CREATE_ACCESS(appName,userName,userType,accountType, appProfile_Name,roleName,dynamicAccount)
Where:
ARGUMENT NAME DESCRIPTION
appName userName
Application name as it is declared in E-SSO Console. User name as it appears in E-SSO Console. The term User refers to the user himself, a group of users or an Organization Unit.
userType
User type. This argument takes one of the following values (in uppercase letters): ALL: all the users of the directory. In this case, the argument userName is not taken into account. USER: userName refers to a single user. GROUP: userName refers to a group of users. UO: userName refers to an Organization Unit.
253
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console ARGUMENT NAME DESCRIPTION
accountType
Account type. This argument takes one of the following values (in uppercase letters): UNDEFINED: enter this value if the account is defined in the account base of the application. STANDARD: standard account. SHARED: account shared with several users who belong to the same group of users. PRIMARY_SHORT: primary account using a short naming format (example: jSmith). PRIMARY_NT: primary account using an NT naming format (example: DOMAIN\Smith). PRIMARY_ADSI: primary account using an ADSI naming format (example: [email protected]).
appProfile_Name
Name of the Application Profile associated with the application. Enter DEFAULT (in uppercase letters) to use the default Application Profile of the application. If the user may use several accounts to log on the application, enter the name of the Role associated with the wanted account. If the user has only one account, enter NOROLE. Enter TRUE to authorize the user to create as many accounts as he/she wants for the application. Else, enter FALSE.
roleName
dynamicAccount
Examples In a simple configuration, you may type the following command to allow the user jSmith to access the acmeApp application: If you want to allow jSmith to access acmeApp with the Vendor role, type: The following command allows the group of users tinyGroup who uses a shared account to access acmeApp:
CREATE_ACCESS(acmeApp,jSmith,USER,STANDARD,DEFAULT,NOROLE,FALSE)
CREATE_ACCESS(acmeApp,jSmith,USER,STANDARD,DEFAULT,Vendor,FALSE)
CREATE_ACCESS(acmeApp,tinyGroup,USER,SHARED,DEFAULT,NOROLE,FALSE)
15.2.3 CREATE_ACCOUNT
Definition This command allows you to create an account, which enables a user to log on an application. Syntax
CREATE_ACCOUNT(accountType,userName,appName,roleName, accountOwner,loginName,Password)
254
Administrator Guide
Where:
ARGUMENT NAME DESCRIPTION
accountType
Account type. This argument takes one of the following values (in uppercase letters): STANDARD: standard account. SHARED: account shared with several users who belong to the same group of users.
userName
Depending on the accountType value, userName must not refer to the same object: If accountType = STANDARD, enter the name of a user as it appears in E-SSO Console. If accountType = SHARED, enter the name of a group of users.
appName roleName
Application name as it is declared in E-SSO Console. If the user may use several accounts to log on the application, enter the name of the Role associated with the wanted account. If the user has only one account, enter NOROLE. If accountType = SHARED, enter the name of the account owner. If accountType = STANDARD, enter NOVALUE. Login name value. Password value.
Example To create a standard account for jSmith and the acmeApp application, use the following command: To create a shared account for the group of users tinyGroup (which is owned by user admin) and the acmeApp application, enter the following:
CREATE_ACCOUNT(STANDARD,jSmith,acmeApp,NOROLE,NOVALUE,LoginName,Password)
CREATE_ACCOUNT(SHARED,tinyGroup,acmeApp,NOROLE,admin,LoginName,Password)
255
256
Administrator Guide
. [] ^
Matches any single character. Indicates a character class. Matches any character inside the brackets (for example, [abc] matches "a", "b" or "c"). If this metacharacter occurs at the start of a character class, it negates the character class. A negated character class matches any character except those inside the brackets (for example, [^abc] matches all characters except "a", "b", and "c"). If ^ is at the beginning of the regular expression, it matches the beginning of the input (for example, ^[abc] will only match input that begins with "a", "b", or "c").
? + * ??, +?, *?
In a character class, indicates a range of characters (for example, [0-9] matches any of the digits "0" through "9"). Indicates that the preceding expression is optional: it matches once or not at all (for example, [0-9][0-9]? matches "2" and "12"). Indicates that the preceding expression matches one or more times (for example, [0-9]+ matches "1", "13", "666", and so on). Indicates that the preceding expression matches zero or more times. Non-greedy versions of ?, +, and *. This match as little as possible, unlike the greedy versions which match as much as possible. Example: given the input "<abc><def>", <.*?> matches "<abc>" while <.*> matches "<abc><def>". Grouping operator. Example: (\d+,)*\d+ matches a list of numbers separated by commas (such as "1" or "1,23,456"). Indicates a match group (for example, abc{2.} matches "ab" followed by two or more "c").
() {}
257
Escape character: interpret the next character literally (for example, [0-9]+ matches one or more digits, but [0-9]\+ matches a digit followed by a plus character). Also used for abbreviations (such as \a for any alphanumeric character). If \ is followed by a number n, it matches the nth match group (starting from 0). Example: <{.*?}>.*?</\0> matches "<head>Contents</head>". Note that in C++ string literals, two backslashes must be used: "\\+", "\\a", "<{.*?}>.*?</\\0>".
$ | !
At the end of a regular expression, this character matches the end of the input. Example: [0-9]$ matches a digit at the end of the input. Alternation operator: separates two expressions, exactly one of which matches (for example, T|the matches "The" or "the"). Negation operator: the expression following ! does not match the input. Example: a!b matches "a" not followed by "b".
258
Administrator Guide
The list of audit events and error messages can be exported in a CVS or XML file. You can export the entire list or some selected lines of the list.
2.
259
Window Description The Audit Events window displays the following information:
INTERFACE ELEMENT DESCRIPTION
Cat. Category
Category code. Category of the event, which can be: Admin: administration event. SSO: event related to User accounts. Authentication: event related to User authentication on Access Points and Applications. System: action performed automatically by the system. File Encryption: action performed by the File Encryption software module.
Event code. Event description. Format of the file in which audit events will be exported (Comma Separated Values). Field separator for CSV file. Default: #
XML
260
Syntax
Syntax of the generated XML file. You can not modify the XML syntax.
File path
Output file path name. button allows you to select in a directory an existing file or a The default file (ESSO-AuditEvents-en.csv or ESSO-AuditEvents-en.xml).
Export button
To export all the list or only selected lines of the list to the chosen formatted file.
2.
261
Window Description The Error Codes window displays the following information:
INTERFACE ELEMENT DESCRIPTION
Error code. Error description. Format of the file in which error codes will be exported (Comma Separated Values). Field separator for CSV file. Default: #
XML Syntax
Format of the file in which error codes will be exported. Syntax of the generated XML file. You can not modify the XML syntax.
File path
Output file path name. button allows you to select in a directory an existing file or The a default file (ESSO-Errors-en.csv or ESSO-Errors-en.xml).
To export all the list or only selected lines of the list to the chosen formatted file. Specific error code you want to find. To retrieve the error message from the Windows operating system.
262
Administrator Guide
Access point security profile: Assignment Access Point security profile: Audit filter assignment Access point security profile: Creation/Modification Access point security profile: Deletion Account: Creation/Modification Account: Deletion Account: Manage parameters Administration profile: Audit filter assignment Administration profile: Creation/Modification Administration profile: Deletion Application profile: Creation/Modification
X X X X X X X X X X
AUDITOR
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console CLASSIC ADMINISTRATION MODE PROFILE NAME ACCESS ADMINISTRATOR RIGHTS ADMINISTRATOR
Application profile: Deletion Application: Audit filter assignment Application: Creation/Modification Application: Deletion Application: Manage all applications Audit database: Management Audit filter: Creation/Modification Audit filter: Deletion Audit: Visualization Authorization for application on access point: Creation/Modification Authorization for application on access point: Deletion Authorization for user on access point: Creation/Modification Authorization for user on access point: Deletion Authorization to use application: Creation/Modification Authorization to use application: Deletion Batch of cards: Creation/Modification Batch of cards: Deletion Bio: Is enable to allow biometrics pattern enrolment Cluster: Creation/Modification Cluster: Deletion
264
X X X X
X X X X X X X X X X X X X X X X X X
AUDITOR
Administrator Guide CLASSIC ADMINISTRATION MODE PROFILE NAME ACCESS ADMINISTRATOR RIGHTS ADMINISTRATOR
Directory: Browsing Emergency access: Answer deletion Emergency access: Challenge generation Emergency access: Reset attempt counter File Encryption Key: Generation Parameter: Creation/Modification Parameter: Deletion Password format control policy: Creation/Modification Password format control policy: Deletion Password generation policy: Creation/Modification Password generation policy: Deletion PKA authority: Creation/Modification PKA authority: Deletion Representative: Creation/Modification Representative: Deletion Roaming: Delete users sessions Schedule: Creation/Modification Schedule: Deletion Technical reference: Creation/Modification Technical reference: Deletion
X X X X
X X X
X X X X
X X X
X X X X X X X X X X
X X X X X X X X X X
X X
X X X X
AUDITOR
Quest Enterprise SSO 8.0.3 - Enterprise SSO Console CLASSIC ADMINISTRATION MODE PROFILE NAME ACCESS ADMINISTRATOR RIGHTS ADMINISTRATOR
Temporary password access: Change duration Temporary password access: Creation Temporary password access: Deletion Token configuration: Creation/Modification Token configuration: Deletion Token: Assignment Token: Blacklist Token: Force PIN Token: Formatting Token: Lending Token: Modification User administration profile: Delegation User administration profile: administration rights manager User role: Creation/Modification User role: Deletion User security profile: Assignment User security profile: Audit filter assignment User security profile: Creation/Modification User security profile: Deletion User: Modification User: Password modification X X X X X X X X X X X X X X X X X X X X X
266
AUDITOR
Administrator Guide
Web site
Please refer to our Web site for regional and international office information.
View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at: http://support.quest.com.
267