Denodo Security Overview 20160211
Denodo Security Overview 20160211
Denodo Security Overview 20160211
Revision 20160211
NOTE
This document is confidential and proprietary of Denodo Technologies.
No part of this document may be reproduced in any form by any means without prior
written authorization of Denodo Technologies.
Copyright 2017
Denodo Technologies Proprietary and Confidential
CONTENTS
1 SECURITY ARCHITECTURE & PROTOCOLS..............................3
2 USER & ROLE MANAGEMENT................................................5
3 HIERARCHICAL ROLES.........................................................6
4 AUTHENTICATION THROUGH LDAP/AD..................................7
5 ROW AND COLUMN LEVEL SECURITY AND DATA MASKING......9
6 SINGLE SIGN-ON...............................................................10
7 CACHE..............................................................................11
8 POLICY BASED SECURITY...................................................12
9 ENCRYPTION.....................................................................14
3 HIERARCHICAL ROLES
Roles can be hierarchical. Once a baseline role is established, another role can be
created which inherits and refines it. These role hierarchies can be built to any depth
within Denodo.
6 SINGLE SIGN-ON
Denodo supports delegating authentication / authorization to LDAP, Active Directory. It
also supports pass-through of user credentials to data sources for principal propagation,
therefore allowing to leverage existing authentication infrastructures. Also it supports
sources with OAuth authorization. Denodo also includes support for SSO of client
applications using Kerberos.
7 CACHE
When accessing cached data, the same security restrictions of the user/role on a given
database, view, columns and/or rows are taken into account.
9 ENCRYPTION
Denodos hybrid approach to data integration, allows different data access & delivery
modes, all of which may involve securely accessing sensitive data: real-time from the
data sources; from the Denodo cache; or from a staging area (i.e. ETL-like process where
data is moved from its original data source to an external repository).
In order to cover all possible scenarios, Denodo supports the application of strategies on
a per view basis to guarantee secured access to sensitive data through
encryption/decryption at different levels.
Data at rest (secured caching of sensitive data or storage in staging area)
When working in cached mode, Denodo will transparently leverage any
encryption mechanism available in the selected Cache System. For example,
Oracle Transparent Data Encryption (TDE) allows sensitive data to be encrypted
within the data files to prevent access to it from the operating system.
Denodo can access encrypted data files with the algorithm Password-Based
Encryption with MD5 and DES (PBE with MD5 and DES). This encryption method
is described in the Java Cryptography Architecture Reference Guide
(http://download.oracle.com/javase/6/docs/technotes/guides/security/crypto/Crypt
oSpec.html). In addition, the Denodo Platform can be extended with others
standard/customer tailored encryption algorithms.
The Denodo Scheduler can also export encrypted CVS or SQL files using the same
algorithm.
When security at the dataset level is not required, its possible to selectively
apply encryption/decryption only to sensitive fields using Denodos built-in
functions. These functions support any encryption algorithm supported by the
default JCE of the Denodo Platform JRE, or by any additional provider registered as
part of the Denodo Platform JRE.
Data in motion (securely accessing and delivering data):
All communication between the Denodo Platform and the Data Consumers/Data
Sources, as well as between the different modules within the Denodo Platform,
can be secured through SSL at the connection level.
If security at the connection level is not required, Denodos built-in functions for
encryption/decryption can be selectively applied to sensitive fields prevent
unauthorized accesses.