Appscan Enterprise V9.0.3.X Planning & Installation Guide
Appscan Enterprise V9.0.3.X Planning & Installation Guide
x
Planning & Installation Guide
| Contents | ii
Contents
Product overview...................................................................................................... 5
Application security management........................................................................................................................ 5
®
AppScan Enterprise components........................................................................................................................ 7
AppScan Enterprise Legal Notices.....................................................................................................................10
Trademarks.............................................................................................................................................. 12
Terms and conditions for product documentation..................................................................................12
HCL Online Privacy Statement..............................................................................................................13
Statement of Good Security Practices................................................................................................................13
®
Accessibility features for AppScan Enterprise.................................................................................................13
What's new..........................................................................................................................................................15
Installing...................................................................................................................24
Planning the deployment and installation.......................................................................................................... 24
Planning checklist................................................................................................................................... 25
Installation requirements.........................................................................................................................25
Installation topology examples............................................................................................................... 46
Preinstallation tasks............................................................................................................................................ 49
Preinstallation checklist.......................................................................................................................... 49
®
Configuring the SQL Server database for AppScan Enterprise........................................................... 50
™
Enabling IIS6 compatability with IIS7 on Windows 2008 Server...................................................... 51
™
Disabling Internet Explorer Enhanced Security Configuration on Windows Server 2008, 2008
R2, and 2012..................................................................................................................................... 51
Configuring Flash to work on Windows Server 2012........................................................................... 52
Downloading and extracting the electronic images............................................................................... 52
Using a certificate in your certificate store with Liberty.......................................................................52
Installation tasks..................................................................................................................................................54
Installation checklist............................................................................................................................... 54
Sample installation scenarios..................................................................................................................55
Post installation tasks....................................................................................................................................... 102
Postinstallation checklist.......................................................................................................................102
Verifying the agent service and alerting service installation................................................................102
Configuring a basic user registry for the Liberty profile.....................................................................103
Securing the deployment...................................................................................................................... 103
Support for FIPS 140-2 and NIST SP800-131a security standards..................................................... 110
Authenticating with the Common Access Card (CAC)....................................................................... 112
Advanced installation scenarios....................................................................................................................... 115
Installing multiple instances of the Enterprise Console on a single server..........................................115
Setting up an external scanner for AppScan Enterprise in the DMZ...................................................115
®
Installation roadmap for AppScan Source deployment......................................................................116
Configuring more than one IP address for the host computer............................................................. 116
Uninstalling an instance of the Enterprise Console............................................................................. 117
Un-installing the software.................................................................................................................... 117
Administering........................................................................................................ 133
Managing users, groups, and access permissions............................................................................................ 134
User types and roles............................................................................................................................. 134
Access permissions on folders............................................................................................................. 139
Adding users to AppScan Enterprise................................................................................................... 140
Configuring and downloading log files for Enterprise Console and AppScan Server.....................................143
Monitoring AppScan Enterprise usage.............................................................................................................143
Managing a server............................................................................................................................................ 144
Managing the scan queue................................................................................................................................. 144
Updating security rules.....................................................................................................................................145
Importing user-defined tests from AppScan Standard..................................................................................... 146
Maintaining your SQL Server database........................................................................................................... 146
Upgrading from SQL Server 2005 to SQL Server 2012..................................................................... 146
SQL Server database maintenance strategies.......................................................................................146
SQL server database usage...................................................................................................................148
Preparing for Security Testing..........................................................................................................................149
Creating a server group........................................................................................................................ 149
Enabling and disabling IP addresses to scan....................................................................................... 149
Creating and Importing Security Test Policies.................................................................................... 150
Creating scan templates.................................................................................................................................... 152
Overview of scan configuration differences in v9.0.2 and higher and in previous versions................ 152
Creating a QuickScan template using scan properties from AppScan Standard..................................153
Reference................................................................................................................153
License Server...................................................................................................................................................153
Product and user licenses..................................................................................................................... 154
Server Components...........................................................................................................................................154
Instance Name...................................................................................................................................................155
Database Connection........................................................................................................................................ 155
Database encryption changes............................................................................................................................155
Service Account................................................................................................................................................ 156
Server Certificate.............................................................................................................................................. 157
Server Keystore.................................................................................................................................................157
Authentication Mechanism............................................................................................................................... 157
Product Administrator.......................................................................................................................................157
Server Group Changes......................................................................................................................................157
| HCL AppScan Enterprise 9.0.3.14 documentation | 5
Getting started
Introduction to application security management
System Requirements
What's New
Supported Technologies
Deprecated Features
Product overview
• Pace: Rapid growth in the number of applications and releases to meet business requirements
• Which applications pose the biggest business risk?
• How do you test apps for security in rapid DevOps/Agile shops, without slowing down the process?
• How do you reduce costs and catch security problems earlier in the lifecycle before they get into production?
• Resources: Resource and awareness challenges
• Where do you start? How do you prioritize the work?
• What do you test, and how do you test it?
• How do you staff and improve skills and awareness?
To manage the challenge of addressing application security at the enterprise level, security teams must take a risk-
based approach. This risk-based approach means that the team must prioritize assets, focus on identifying areas of
highest risk, and then mitigate the risk. Addressing application security at an enterprise level goes beyond scanning
applications for vulnerabilities. Large organizations might have thousands of applications that serve various purposes.
The responsibility to assess and address application security typically belongs to a small security team.
The Dashboard tab provides a holistic view of your business portfolio. In the lower section of the dashboard, select a
chart to further investigate:
• Security Risk Rating (trend): Track application risk over time. Select the category check boxes to display the
content you want to see. Hover over chart sections for details.
• Security Risk Rating by Business Unit: Prioritize application risk management by business unit. Hover over
chart sections for details. Click through to the Portfolio tab to continue your triage process.
• Testing Status (trend): Track testing status. Select the category check boxes to display the content you want to
see. Hover over chart sections for details.
• Open Issues (trend): Shows the number of open issues. Hover over chart sections for details.
• Applications with Open Issues (trend): Track the number of applications with open issues. Hover over chart
sections for details.
• Top Issue Types: Shows the top issue types across all of your applications in the portfolio. For example, if there
are many SQL injection issues, you can plan training for your developers. Hover over chart sections for details.
• Issue Severity (Max): Identifies applications by their highest level of issue severity. Hover over chart sections for
details. Click through to the Portfolio tab to continue your triage process.
• Issue Severity (Max) by Business Unit: Identifies applications by business unit, by their highest level of issue
severity. Hover over chart sections for details. Click through to the Portfolio tab to continue your triage process.
HCL® may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing,
to:
For license inquiries regarding double-byte character set (DBCS) information, contact the HCL® Intellectual Property
Department in your country or send inquiries, in writing, to:
Statements regarding HCL's future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
All HCL® prices shown are HCL's suggested retail prices, are current and are subject to change without notice. Dealer
prices may vary.
This information is for planning purposes only. The information herein is subject to change before the products
described become available.
This information contains examples of data and reports used in daily business operations. To illustrate them as
completely as possible, the examples include the names of individuals, companies, brands, and products. All of these
names are fictitious and any similarity to actual people or business enterprises is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming techniques
on various operating platforms. You may copy, modify, and distribute these sample programs in any form without
payment to HCL®, for the purposes of developing, using, marketing or distributing application programs conforming
to the application programming interface for the operating platform for which the sample programs are written. These
examples have not been thoroughly tested under all conditions. HCL®, therefore, cannot guarantee or imply reliability,
serviceability, or function of these programs. The sample programs are provided "AS IS", without warranty of any
kind. HCL® shall not be liable for any damages arising out of your use of the sample programs.
© (your company name) (year).
Portions of this code are derived from HCL Corp. Sample Programs.
© Copyright HCL Technologies Ltd. _insert years here_.
Trademarks
HCL®, the HCL® logo, and HCL.com® are trademarks or registered trademarks of International Business Machines
Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of HCL® or
other companies. A current list of HCL® trademarks is available on the web at "Copyright and trademark information"
at www.ibm.com/legal/copytrade.shtml.
Applicability
These terms and conditions are in addition to any terms of use for the HCL® website.
Personal use
You may reproduce these publications for your personal, noncommercial use provided that all proprietary notices
are preserved. You may not distribute, display or make derivative work of these publications, or any portion thereof,
without the express consent of HCL®.
Commercial use
You may reproduce, distribute and display these publications solely within your enterprise provided that all
proprietary notices are preserved. You may not make derivative works of these publications, or reproduce, distribute
or display these publications or any portion thereof outside your enterprise, without the express consent of HCL®.
Rights
Except as expressly granted in this permission, no other permissions, licenses or rights are granted, either express or
implied, to the publications or any information, data, software or other intellectual property contained therein.
| Product overview | 13
HCL® reserves the right to withdraw the permissions granted herein whenever, in its discretion, the use of the
publications is detrimental to its interest or, as determined by HCL, the above instructions are not being properly
followed.
You may not download, export or re-export this information except in full compliance with all applicable laws and
regulations, including all United States export laws and regulations.
HCL® MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE PUBLICATIONS. THE PUBLICATIONS
ARE PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR
IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, NON-
INFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE.
Accessibility features
HCL® AppScan® Enterprise includes the following major accessibility features:
• User interface keyboard navigation
• Screen reader navigation
• Tooltip help for links, buttons, messages, and other selections
| Product overview | 14
• Non-text content that is presented to the user has a text alternative that serves the equivalent purpose
• Methods are provided for skipping over navigation links to get to main content of the page
• Captions are provided for prerecorded audio content in synchronized media
• Visual focus indicators by way of cursors in editable objects and highlighted buttons, menu items, and other
selections
• Content can be displayed in high contrast and large font mode
• Landmarks are used on the page to identify commonly found sections of web page content, such as banners,
breadcrumbs, and tabs
• Input errors that are automatically detected are identified and described in text
• Web pages do not contain content that flashes more than three seconds
• Color is not used as the only visual means of conveying information
• Documentation that includes hover-over image descriptions
AppScan® Enterprise uses the latest W3C Standard, WAI-ARIA 1.0 (http://www.w3.org/TR/wai-aria/), to ensure
compliance to US Section 508 (http://www.access-board.gov/guidelines-and-standards/communications-and-it/about-
the-section-508-standards/section-508-standards), and Web Content Accessibility Guidelines (WCAG) 2.0 (http://
www.w3.org/TR/WCAG20/). To take advantage of accessibility features, use the latest release of your screen reader
in combination with the latest web browser that is supported by this product.
Keyboard navigation
This product uses standard navigation keys.
Note:
1. During manual explore or recorded login, use the Tab key to navigate the links you want to explore and record.
Use ALT+F4 to exit the recording browser window. Pausing or resuming the recording session is not available
using keyboard shortcuts.
2. Input errors detected provide the user with text descriptions: for required fields not completed (upon
submit), when a user input falls outside the required values, and when input data is not in the list of allowed
values. Required fields may not always have indicators.
3. The DOM (Document Object Model) has been tagged with WAI-ARIA (Web Accessibility Initiative - Accessible
Rich Internet Applications) landmarks which vastly improves keyboard navigation for the following: Data
grouping, Accordion twisty, Regular twisty, breadcrumbs, navigational buttons, Quick scan Tabs, Help Tabs,
ViewHTTPRequest tabs, Report Grid Tabs, About this Document tabs, About this Form tabs, About this
Issue tabs, About this Page tabs, Dashboard tabs, Trend tabs, Report pack Summary layout tabs, and Security
Dashboard tabs.
To navigate into the charts by using the keyboard, press the tab key until the focus is on the chart.
1. Press the right arrow key to enter the chart, and press the down arrow key to focus on the axis of the chart.
2. Use the down and up arrow keys to move between the axes of the chart. You can use the right arrow key to enter
the elements of an axis, and use the left arrow key to return to the axis. Note: Key summary:
• Enter a chart: Right arrow, down arrow
• Navigate areas of a chart: Up and down arrow
• Enter an area of a chart: Right arrow
• Leave an area of a chart to move up a level: Left arrow
Interface information
The AppScan® Enterprise user interfaces do not have content that flashes 2 - 55 times per second.
The AppScan® Enterprise web user interfaces rely on cascading style sheets to render content properly and to provide
a usable experience. The application provides an equivalent way for low-vision users to use a user’s system display
settings, including high-contrast mode. You can control font size by using the device or web browser settings.
The AppScan® Enterprise web user interface includes WAI-ARIA navigational landmarks that you can use to quickly
navigate to functional areas in the application.
| Product overview | 15
The DOM (Document Object Model) has been tagged with WAI-ARIA (Web Accessibility Initiative - Accessible
Rich Internet Applications) landmarks which vastly improves keyboard navigation for the following: Data
grouping, Accordion twisty, Regular twisty, breadcrumbs, navigational buttons, Quick scan Tabs, Help Tabs,
ViewHTTPRequest tabs, Report Grid Tabs, About this Document tabs, About this Form tabs, About this Issue tabs,
About this Page tabs, Dashboard tabs, Trend tabs, Report pack Summary layout tabs, and Security Dashboard tabs.
What's new
Features and enhancements new to AppScan® Enterprise.
New in 9.0.3.14
This section describes new product features and enhancements in this release, as well as deprecations and anticipated
changes, where relevant.
New in HCL AppScan® Enterprise 9.0.3.14
Branding
Following the acquisition of AppScan products earlier this year by HCL, this release is an HCL branded version.
License transition
AppScan products now support both IBM and HCL licenses. As of this version, all new licenses issued will be HCL
licenses. Version 10 of the AppScan products will support HCL licenses only. In preparation for Version 10, please
feel free to reach out to your HCL representative. See license documentation here.
Performance improvements
• Scans page is optimized to load faster.
• The report generation functionality in the Monitor view is improved to avoid failures on big reports generation.
• Traffic data in the reports is truncated to 4000 characters by default to improve report generation performance.
• JRE for the AppScan Enterprise server is now upgraded to 64-bit.
Proxy server
Capability added to turn on the option to encrypt the traffic data, AppScan Enterprise can now, also accept encrypted
traffic file through REST APIs.
Upgrade simplification
• After upgrading an Agent, it is not necessary to run Config Wizard.
• While upgrading an Agent, it is not necessary to bring down Server console and other Agents.
| Product overview | 16
• While upgrading Server, it is not necessary to bring down Agents but necessary to make sure no scans or report
packs are running.
New REST APIs
• PUT /templates/{templateId}/scant - Update the scan template.
• GET /agentServer - Get a list of all agents.
• POST /jobs/{jobId}/designateAgentServer/{serverId} - Associate an agent to a scan job.
• GET /folderitems/{folderItemId}/reportPack - Get a list of all the report packs associated with a given scan job.
Capabilities nearing end of life
The following features are nearing end of life, and will be removed in future release:
• Flash execution and parsing.
• Glass Box Scanning.
• Generic Service Client (GSC).
• HCL AppScan Enterprise server on 32 bit Windows OS, and will be supported on 64 bit Windows OS only.
• HCL AppScan Enterprise Server on Linux platform.
• HCL AppScan Enterprise plug-in for IE browser.
• Manual explorer.
Note: The JavaScript Analyzer (JSA) component has now been replaced by the Cross-Site Scripting Analyzer, to
discover security issues more accurately.
New in 9.0.3.13
AppScan Issue Management Gateway Service v 0.3.0 improvements
• Support migration of issues from AppScan Enterprise 9.0.3.13 to Rational Team Concert.
• Support migration of issues from AppScan Enterprise 9.0.3.13 to Azure DevOps.
• Https support for Issue Gateway REST APIs.
• Support for Java 8, 9, 11 runtime.
• Support for Spring Boot Framework 2.0.
• Bug fixes - https://github.com/hclproducts/appscan-issue-gateway/releases/tag/0.3.0
AppScan Activity Recorder v 1.0.3 improvements
• Added log window to display recording activities.
• Improvements to filtering mechanism for a smaller size of traffic file.
Action-Based Explore improvements in DAST scanning Engine
• Able to select items from drop-down lists.
• Able to click on elements with a lower z-index (such as when there is a dialog box or other element in front of
them).
• Identifies new cookies created by JavaScript.
• Improved URL filters.
Server-Down improvements
The Server Down heartbeat for target application, now tests the full Starting URL for the scan rather than just its root
path, to handle cases where the server is up but the application is down.
Request-Based JavaScript Execution change
Due to the efficiency of Action-Based JavaScript Execution, these two redundant Request-Based JavaScript
configuration options (and related Advanced Configuration Options) have been removed:
• Execute JavaScript to discover URLs and dynamic content.
• Execute JavaScript when replaying login.
| Product overview | 17
The above options are removed both in ADAC and web UI for both DAST and Content Scan jobs. If you load a scan
saved in an earlier version, in which one or both of these check boxes was selected, the selection is now ignored. See
the section below for the reasoning behind this change.
Improved Cross-Site Scripting analysis
Due to the improvements to the Cross-Site Scripting Analyzer, that enable it to better detect DOM-Based Cross-Site
Scripting, when creating new scans all JavaScript Analyzer (JSA) rules are now disabled in the Default Test Policy,
and will be removed altogether in a future version. Your existing scans and templates are not affected by this change.
Configuration wizard upgrade improvement
Configuration Wizard utility is updated to modify security rules in the database seamlessly while upgrading the
server.
New in 9.0.3.12
Automation and DevOps
• New REST APIs
• Search scan Jobs and report packs.
• Configure Email Alerts for Jobs and report packs.
• Download a scan file that can be opened in AppScan Standard.
• Delete scan Jobs and report packs.
• Enable additional domains in DAST scan jobs.
• Consistent REST API response format
• A few REST APIs that return a response in XML format have been modified to return a response in JSON data
or XML data, depending on the input parameter.
• A new set of REST APIs have been created to return the response in JSON format and these are intended to
replace those APIs that return a response in XML format (APIs whose name ends with /XML).
• Integration with Issue Management System
AppScan Issue Management Gateway service is integrated with AppScan Enterprise to migrate issues to JIRA,
which is a tool to track issues.
Request-Based JavaScript Execution
Due to the efficiency of Action-Based JavaScript Execution, Request-Based JavaScript Execution is now redundant,
and this option is disabled by default in all the pre-defined templates. If you load a scan job in which the option was
selected, it will remain selected, though we recommend clearing it.
JavaScript Execution option is present in the following locations:
• AppScan Dynamic Analysis Client (ADAC) for DAST scan jobs: Explore Options > Request-Based > Execute
JavaScript to discover URLs and dynamic content.
• Web UI for Content scan jobs: Explore Options > Execute JavaScript to discover URLs and dynamic content.
Understanding the JavaScript Execution change
Over the last few years, we have developed a replacement mechanism for Request-Based Exploring, which imitated
and approximated the workings of a browser. The new mechanism, Action-Based Exploring, utilizes an actual,
embedded (Chromium-based) browser. Both mechanisms include JavaScript Execution (JSX), but we are now in the
process of retiring the Request-Based JSX mechanism, as the newer technology duplicates and surpasses it.
Action-Based JSX more closely resembles the way a user interacts with the browser. It offers increased coverage and
accuracy, and better support for new JavaScript frameworks as they emerge.
Request-Based JSX is, therefore, being phased out by stages:
• In this fix pack, the JavaScript Execution check box is cleared by default, but you can still select it if you find that
Action-Based Exploring fails for a specific application.
| Product overview | 18
• In future releases, the mechanism will be removed entirely. Note that when you load a saved scan or template in
which the JSX check box was selected it will remain selected. However, we suggest clearing the check box.
If you see a difference in the results due to this change, we urge you to open a Support Ticket so we can either
explain the difference to you or fix the Action-Based mechanism.
General
• Change Host in traffic file: If StartingURL of a scan job is changed through the API POST /jobs/{jobid}/
dastconfig/updatescant or user interface (web UI or ADAC), URLs in traffic data are modified automatically to
update host, port and scheme.
• Scan file download: A scan file that can be opened in AppScan Standard can be downloaded from the scan job
statistics page.
• SQL Server 2017 (Enterprise and Standard) is now supported.
• .NET framework 4.7.2 is now a system requirement, and is installed as part of the installation.
New in 9.0.3.11
Test Optimization
A full regular AppScan® Enterprise scan typically sends thousands of tests and may take hours, in some cases days, to
complete. During the early stages of development, or for a quick overall evaluation of the current security posture of
your product, you can use Test Optimization to get the results you need in a shorter time frame.
App Scan’s intelligent test filters are based on statistical analysis, and select tests for the more common, severe
and otherwise important vulnerabilities. AppScan updates keep your Test Optimization up-to-date with the latest
optimization filters. Using Test Optimization can greatly reduce overall scan time when speed is more important to
you than scan depth.
Test Optimization can be activated from both the AppScan Dynamic Analysis Client and API.
For more information, refer Understanding Test Optimization.
Chrome Extension for Actions and Traffic recording - AppScan Activity Recorder
AppScan’s new Chrome extension simplifies web application security testing. During web application testing, you
can record manual crawl, login, and multi-step data (traffic and actions) for an AppScan Dynamic Analysis scan. The
data is saved as a file that can be uploaded to AppScan Enterprise to be used in a scan. Upload is supported both by
the UI and by the REST API.
For more information, refer Capturing Traffic and Actions using AppScan Activity Recorder.
Automation and DevOps
• New REST APIs
• Search Users, Folders, Applications, and Server groups.
• Schedule scan jobs and configure job-level blackouts.
• Remove specific domains from imported manual explore data.
Improvements
• ADAC - Ability to import manual explore data.
• Improved BURP results import: now includes traffic data.
• Support multiple AppScan Enterprise installations on a single machine, using a common database.
• Support for Rational Team Concert 6.0.6 integration.
New in 9.0.3.10
REST APIs for DevOps and Automation
• Scan Management REST APIs are now integrated unified with the Application Management APIs through
Swagger.
| Product overview | 19
New in 9.0.3.9
• Improved Action-Based Scanning: Updated Dynamic Analysis engine for greater compatibility with newer web
apps, and improved coverage to reveal additional vulnerabilities.
• Windows 2016 Server support.
• Import HTTP Archive (HAR) traffic files for content scan jobs.
• To be used as login sequence data in Login Management page.
• To be used as explore data in What to Scan page.
• Users search capability in the Administration tab.
• OWASP Top 10 2017 Report in scan view.
• New ADAC capabilities.
• Greatly Improved Login Management Configuration: Login Management includes many improvements to help
you configure and manage how AppScan logs in to your application, and maintains sessions.
• New Action-Based Explore Options give you greater control, and the Action-Based tab includes new settings
to help achieve more efficient Action-Based exploring.
• Communication and Proxy settings allows to:
• Configure local proxy settings.
• Configure the local proxy with the same settings as the ASE Agent.
• Improved Chrome-based embedded browser provides greater compatibility with newer web apps.
• APIs for DevOps
• Enhanced WebHook capability to post job status to endpoint URL.
• Enhanced REST API to support exclusions with exceptions for content scan jobs.
• New REST API for uploading a template file.
• New REST API for creating a job using a template file.
• Updated REST API to generate a report for a scan with no issues.
• Script to delete old and unused issue records included in downloads folder.
• Enhanced scanners in monitor view to compute CVSS for issues imported from AppScan Standard.
| Product overview | 20
New in 9.0.3.8
• Security updates and APAR fixes
• Add test WordPress load-scripts.php Denial of Service.
• Add HSTS max-age check.
• Visit this page to view the complete list: AppScan Enterprise 9.0.3 Fix List
• DAST for DevOps
• Integration with Deployment tools (for example: UDeploy) to automate creating and initiating Scans; and now
added capability to subscribe for receiving notifications about Scan status ( completed, failed, suspended etc. ).
For more information, refer to the technote -http://www.ibm.com/support/docview.wss?uid=swg22015122.
• REST APIs for improved automation.
• Unable to upload a multi-line HAR format manual explore data via Scan Management REST API.
• Uploading a HAR file manual explore data with JSON POST body does not get seen after import via the
Scan Management REST API.
• New capability enables importing of traffic file(s) containing multi-step sequence via the Application
Management REST API.
• Other Improvements
• Added Support for TLS 1.2. For more information, refer to the technote - http://www.ibm.com/support/
docview.wss?uid=swg22015121
New in 9.0.3.7
• Security updates and APAR fixes
• Includes a variety of new security rules for Apache Struts.
• Visit this page to view the complete list: AppScan Enterprise 9.0.3 Fix List
• Enhanced DAST Scanning Engine
• Improved Cross-Site Scripting testing: If a traditional XXS test fails, the test is automatically sent again
using an actual browser. This approach enables finding additional vulnerabilities that were not found before.
• Improved Automatic Login: Various techniques were added to increase the success of Automatic Login.
• Improved Action-Based Crawling: Action-based crawling is more accurate and thorough, increasing
application coverage.
• Improved scan accuracy: A variety of security rule updates reduce false positive results.
• DAST for DevOps
• HAR file support: Traffic recorded with CI/CD tools and saved in HAR format can now be imported and used
as part of an ASE job using the REST API.
• New REST APIs for improved automation.
• Update credentials of recorded Action-Based Login and Automatic Login.
• Import traffic file including login requests for Request-Based Login.
• Proxy Server and Automation APIs were added in 9.0.3.5 iFix2. For more information, refer to the Other
Improvements section.
• Other Improvements
• Includes latest JRE 1.8 SR5.
• Export issues from Security Reports in Excel format from Monitor tab.
• Import issues exported from AppScan Source in OZASMT format.
New in 9.0.3.5
• Support was added for Microsoft™ SQL Server 2016 and for the .NET 4.6.2 framework
• You can delete selected 3rd party scanner issue imports from an application
| Product overview | 21
• A new compliance report was added: Regulation (EU) 2016/679 of the European Parliament and of the Council -
General Data Protection Regulation
New in 9.0.3.4
This fix pack synchronizes the versions across the AppScan product suite to simplify centralized management
(the installation or updating of client components). AppScan Enterprise 9.0.3 fix pack versions are 9.0.3.1
(released on 04/26/16) and 9.0.3.4.
• Importing user-defined tests from AppScan Standard.
• New features in the AppScan Dynamic Analysis Client:
• AppScan Dynamic Analysis Client now offers a second Automatic Explore method: Action-based Explore.
This complements the existing Request-based Explore, in the Automatic Explore stage of the scan. By default
both methods are used, with a 30 minute time limit for the Action-based Explore stage. See the "Explore
Options view" topic in the AppScan Dynamic Analysis Client online help.
Note: You can also access this feature on the Explore Options page of a content scan job. The options are
turned on by default.
• You can now change the host, scheme or port of the Starting URL in a scan configuration and AppScan will
update, verify and confirm the necessary changes.
• You can now set individual requests in a multi-step sequence to "Don't Test".
• You can now delete individual URLs from a Manual Explore recording.
• Ability to see the issue imports for an application.
• Scan results (*.scan files) are now exported in the Support download logs.
• Ability to export reports in XML format.
New in 9.0.3.1
• Reporting improvements:
• Ability to include application and issue attributes in an exported Security Report
• Enhancements were made to the Activity Log report to track activities from the Monitor view:
• issue classification
• create, modify, and delete applications
• issue imports
• change user permissions
• New compliance report: Federal Risk and Authorization Management Program (FedRAMP)
• Added defect tracking with HCL® Rational Team Concert™ to the Monitor view
• Improved security rules update process
• New and updated REST APIs.
New in 9.0.3
• Reporting: From the Monitor view, export issues to reports in PDF or HTML formats.
• Issue import: Ability to import issues exported from a report in XML format from AppScan® Standard v9.0.3
• New and updated dashboard charts:
• OWASP Top Ten 2013: Identifies applications that contain issues that match the 10 most critical web
application security risks.
• CWE/SANS Top 25 Most Dangerous Software Errors: Identifies applications that contain issues that match
the CWE/SANS Top 25 Most Dangerous Software Errors.
• Top Issue Types (App): Updated to reflect the number of apps that are affected by the top issues that are
discovered in your portfolio
• Issue management:
• Track overdue issues. From the Portfolio view, track the number of applications with overdue issues. At the
application level, track the overdue status for each individual issue.
• New issue attributes:
• Fixed Date: The date and time stamp when an issue was fixed.
• Overdue: An issue that is not fixed by a predetermined date.
• Customize the issue list view so that issues with a particular status are hidden from view: noise, passed, or
fixed. From an application, go to List menu > Customize View to make your selections. As you classify
| Product overview | 23
issues with one of these statuses, they disappear from the list so that you can continue focusing on the
issues that need attention.
• Edit multiple applications simultaneously
• Portfolio triage:
• Advanced filtering
• Filter applications by issue attributes.
• New and updated REST APIs
• Page structure (DOM) filtering capability in the AppScan® Dynamic Analysis Client.
New in 9.0.2.1
• Editing multiple issues simultaneously
• New dashboard trend chart: Open Issues by Severity
• Support was added for Microsoft™ SQL Server 2014
• Support for Liberty was upgraded from v8.5.5.4 to v8.5.5.6
• Standard Users can edit Basic and Additional options in the AppScan® Dynamic Analysis Client. This capability
can be given to other users as a custom user permission.
• Changes in the AppScan® Dynamic Analysis Client:
• New Proxy pane. If AppScan® Enterprise uses a proxy server during the scan, you can use your Internet
Explorer proxy settings (if configured), or enter custom settings.
• Ability to log in to the Client from the desktop by using LDAP authentication.
• New and updated REST APIs
• Changes in content and layout of the About this Issue dialog
New in 9.0.2
• A new Dashboard tab displays the charts that were previously displayed in the Portfolio tab, and adds more
metrics to assess the current status and progress of an application security initiative. This includes
• trend of portfolio risk status
• the number of applications with open security issues
• trend of overall open issues
• trend of applications test status
• A new approach to create scans consistent with AppScan® Standard, for both the security team who creates the
templates and for the developers who create the scans. See Overview of scan configuration differences in v9.0.2
and higher and in previous versions on page 152.
• New built-in formulas include new issues, open issues, fixed issues, and total issues.
| Installing | 24
New in 9.0.1.1
• Security rules can be updated from Fix Central. See Deprecated features.
• When a scan is associated with an application, the Status and Severity Value for any issues that are triaged from
the Monitor view are propagated in the reports in the Scans view. Reports do not need to be rerun to see the
changes.
• Added support for Windows™ Server 2012 R2.
• Improved the way that CVSS scores are calculated for Static Analysis (SAST) issues that are imported from
AppScan® Source.
• Added a horizontal scroll bar for easier viewing in both the Applications and Issues tabs.
• Added a new compliance report: DISA's Application Security and Development STIG Category 1, V3R9.
New in 9.0.1
• Redesigned Application Security Management user interface for easier navigation and access to information.
• Capability to import application security vulnerabilities discovered using manual pen-testing or third-party tools.
• Scoring and ranking vulnerabilities in application context using Common Vulnerability Scoring System (CVSS).
See Determining issue severity.
• Architecture redesign to reduce installation footprint and replacement of HCL® Rational® Jazz™ user
authentication component with HCL® WebSphere® Liberty. See Replacing Jazz Team Server with WebSphere
Liberty - Frequently asked questions on page 122 before upgrading.
• A built-in REST API interface provides you with a way to visualize RESTful web services that are used for
creating and updating applications, setting up application access for users, and adding or updating issues. Use the
framework to interact with the API and get clear insight into how the API responds to parameters and options. See
Enabling the Application Security Management REST API interactive framework.
• Glass box .NET agent now supports invisible parameters This enables AppScan® to identify HTTP parameters that
are not visible to black box scanners, improving scan coverage. No special configuration is needed. Until now,
invisible parameters were supported only for Java™ platforms.
Installing
Learn how to install the product.
Planning checklist
Before you install HCL® AppScan® Enterprise, review and complete all of the necessary tasks on the planning
checklist.
planning checklist
Find out if you already have Rational® License Key Server in your organization. If you do �?
not, you can use the one that gets installed with AppScan® Enterprise.
Determine which components of AppScan® Enterprise you need to install. �?
Installation requirements
The Installation of AppScan® Enterprise requires the correct hardware, software, operating system, and other factors.
Machine that hosts the Machine that hosts the Machine that hosts
SQL Server Database AppScan® Enterprise the Dynamic Analysis
Server Scanner
Also applicable for
an AppScan® Source
deployment
Machine that hosts the Machine that hosts the Machine that hosts
SQL Server Database AppScan® Enterprise the Dynamic Analysis
Server Scanner
Also applicable for
an AppScan® Source
deployment
Database Note:
1. While Enterprise and Standard editions are supported
for the following SQL Server versions, the Enterprise
edition has superior scalability and security-enabling
capabilities, such as built-in support for Transparent
Data Encryption (TDE). Standard Edition can
be secured through MS Windows™ Encrypting
File System (EFS) or other third party encryption
methods.
2. While both 64 and 32 bit versions of SQL Server are
supported, using the 64-bit version of SQL Server can
result in better performance. The 32-bit version works
best for evaluation and small deployments.
3. If your environment uses a named SQL Server for
the AppScan® Enterprise database, make sure that
TCP/IP is enabled in the SQL Server configuration
manager, and restart the SQL services for SQL Server
and SQL Server browser.
• Microsoft™ SQL Server 2008 SP3
• Microsoft™ SQL Server 2008 R2 SP2
• Microsoft™ SQL Server 2012
• Microsoft™ SQL Server 2014
•
Software Requirement
Java™ EE containers JBoss AS 6, 7; JBoss EAP 6.1; Tomcat 6.0, 7.0;
WebLogic 11; WebSphere® 7.0, 8.0, 8.5, 8.5.5
Operating Systems Windows™:
• Windows™ Server 2008 R2 with and without SP1
(both 32 and 64-bit supported)
Linux™ RHEL 5, 6, 6.1, 6.2, 6.3
UNIX™: AIX®, 6.1
Software Requirement
Operating System 32 - bit and 64 - bit editions:
• Microsoft™ Windows™ Server 2008
• Microsoft™ Windows™ Server 2008 R2
• Microsoft™ Windows™ Server 2012
• Microsoft™ Windows™ Server 2012 R2
Note: The agent should be installed after the application you want to test is successfully installed on the server.
Translated languages
The AppScan® Enterprise user interfaces are available in these languages:
• English
• French
• German
• Italian
• Japanese
• Korean
• Brazil Portuguese
• Russian
• Spanish
• Simplified Chinese
• Traditional Chinese
Supported technologies
It's important to understand which of the technologies that are used by your site might affect AppScan’s ability to scan
the site, and which ones do not affect the scan at all.
• AppScan is a "black box" (DAST) tool, and scans your site by using the same mechanisms as a browser.
Therefore, in general, server-side technologies that are transparent to a browser are also transparent to AppScan,
and do not affect the scan.
| Installing | 33
• Client-side technologies such as JavaScript and the HTTP protocol itself, do affect AppScan. Unlike a browser,
AppScan needs to understand these technologies at a level that allows automatic crawling, session maintenance,
and testing. In these cases, you need to configure AppScan to scan correctly.
An AppScan scan consists of two main stages: Explore and Test. For each stage, the table offers guidelines for
understanding which server-side and client-side technologies might affect the scan, and in which cases configuration
is needed.
Test stage AppScan is designed to test the Client-side testing is performed only
application and not its supporting on JavaScript code. Currently, only
technologies; they do not affect plain JS vulnerabilities are detected.
testing. To consider databases again:
AppScan’s suite of SQL Injection JS Frameworks are not supported; JS
tests are independent of the database code that uses a framework might not
used. It also offers specific tests be properly analyzed.
for third-party testing (Common HTML5 is fully supported.
Vulnerabilities testing).
Permissions Descriptions
Make the service account a local If there is some type of group policy that is deployed on the server that
administrator. Log in as this account alters the local security policy of the computer and revokes any of these
when you are installing or maintaining the rights after installation and configuration, AppScan Enterprise will not
software. The service account must have work.
the following permissions in the local
security policy for the computer:
• Access this computer from the
network
• Log on as a service (this permission is
granted by the Server Configuration
wizard, which is being run by a local
Product Administrator)
With a SQL Server database, you can
use a single service account or multiple
service accounts, depending on how you
decide to install.
Permissions Descriptions
File and folder permissions The service account must have the following permissions on Drive:
\\YourInstallFolder\HCL\product name\ and all of its
subfolders:
• Read and Execute
• Write
• Delete
• Delete files and subfolders
• Create files and subfolders
Note: These permissions enable the service account to write to the log
files. They also enable the scan agents to write temp files, without which
the scans would not function. The Configuration wizard creates these
permissions for you - do not change them.
Local security policies The service account must have permission to log on locally on the target
machine so that it can impersonate the user's logon credentials. It also
must have permission to log on as a service.
Registry permissions The service account must have the following permissions:
• Read and Execute
• Write
• Delete
Using the local system user account during installation and configuration
The Local System User Account must be a local Product Administrator on the machine (does not have to be the
service account). In the local security policy for that machine, this user must have the following permissions:
• Access this computer from the network
• Allow logon locally
During installation and configuration, the Local System User Account requires db_owner permissions on the SQL
Server database to create a database and tables, add users, run stored procedures, and grant rights. After installation
and configuration are completed, remove the database permissions from the Local System User Account and assign
them to the Service Account to handle all interaction between AppScan Enterprise and the database.
Tip: If you upgrade AppScan Enterprise or rerun the configuration wizard (which changes the database), give the
Local System User Account the appropriate database privileges.
1. The Local System User Account creates and structures the AppScan database on the MS SQL Server.
2. The Local System User Account adds the database service to the database as db_owner.
3. The Local System User Account initializes the database with necessary data.
Table 6: Using the Local System User Account as the installation account
| Installing | 36
Permissions Descriptions
Make the local system user account a If there is some type of group policy that is deployed on the server that
local administrator. Log in as this account alters the local security policy of the computer and revokes any of these
when you are installing or maintaining the rights after installation and configuration, AppScan Enterprise will not
software. The local system user account work.
must have the following permissions in
the local security policy for the computer:
• Access this computer from the
network
• Log on as a service (this permission is
granted by the Server Configuration
wizard, which is being run by a local
Product Administrator)
With a SQL Server database, you can use
a single account or multiple accounts,
depending on how you decide to install.
The local system user account allows After installation and configuration are completed, remove the database
the agents to access the database server. permissions from the Local System User Account and assign them to the
Individual users do not require any form Service Account to handle all interaction between AppScan Enterprise
of database permissions. The local system and the database.
user accounts used for the agents and the
database should have passwords that do
not expire. If, however, the passwords
must change at regular intervals, you can
rerun the Configuration wizard on all the
AppScan® Enterprise Server and Dynamic
Analysis Scanner computers and enter the
new password.
File and folder permissions The local system user account must have the following permissions on
Drive:\\YourInstallFolder\HCL\product name\ and all
of its subfolders:
• Read and Execute
• Write
• Delete
• Delete files and subfolders
• Create files and subfolders
Note: These permissions enable the local system user account to write
to the log files. They also enable the scan agents to write temp files,
without which the scans would not function. The Configuration wizard
creates these permissions for you -- do not change them.
Local security policies The local system user account must have permission to log on locally on
the target machine so that it can impersonate the user's logon credentials.
It also must have permission to log on as a service.
| Installing | 37
Permissions Descriptions
Registry permissions The local system user account must have the following permissions:
• Read and Execute
• Write
• Delete
Account Description
ASPNET account The ASPNET account must have the following permissions on Drive:\
\YourInstallFolder\HCL\product name\ and all of its subfolders:
• Read and Execute
• Write
• Delete
• Impersonate a client after authentication
Internet Guest account The Internet Guest account must have the following permissions on
Drive:\\YourInstallFolder\HCL\product name\ and all of its subfolders:
• Read and Execute
• Write
Related information
Troubleshooting: Viewing a report in AppScan Enterprise results in error
• HCL_Appscan_Enterprise_Server_Basic
• HCL_Appscan_Enterprise_Server
b. In the Qty to add column, enter the number of license you want assign to the new server in a cell
corresponding to product license type.
c. Click Save to save the mapping entitlement.
After you complete the Cloud server setup, you must configure this new server in AppScan Enterprise.
| Installing | 42
e. Enter the License Server ID you had noted during server creation.
f. Enter the password you have set for this server.
g. Click Add Proxy, if proxy support is required to connect to the license server.
| Installing | 43
e. Enter the License Server IP and Port you had noted during server creation.
f. Enter the password set for this server.
g. Click Add Proxy, if proxy support is required to connect to the license server.
| Installing | 46
As of AppScan® Enterprise version 8.7, scan data is now written into a local built-in database on the DAST scan
server. At the end of the scan, data is transferred to the central SQL Server database which resides on the AppScan®
Enterprise Server. The increase in network traffic between the scan server and the target application reduces the
network bandwidth between the scan server and the database. This improves the performance of the Web UI, enables
organizations to run more simultaneous scans on a single scan server, and addresses the latency concerns when the
scan server is located far from the database server.
Network traffic benchmarks for AppScan® Enterprise DAST scanning
The following benchmarks are based on a dynamic analysis scan of a test website 'Altoro Mutual' (demo.testfire.net).
The web application is hosted in Texas, USA; the DAST scan server and the SQL Server database are hosted in
Ottawa, Canada. The test scan was completed by AppScan® Enterprise 8.7 in 41 minutes, covered 688 pages, and
included 21,068 unique security tests.
The specifications of the computer that hosted AppScan® Enterprise Sever and the SQL Server database are:
• Windows™ 2008 R2 SP1
• 4 CPU 16G RAM
• Microsoft™ SQL Server 2008 R2 (SP2), 10.50.4000.0 (x64)
The specifications of the computer that hosted the DAST scanner are:
• Windows™ 2008 R2 SP1
• 2 CPU 4G RAM
KB/second
Server Total bytes Bytes sent KB/second sent Bytes received received
SQL Database 167,471,086 81,546,724 258.6 85,924,362 272.5
Server
DAST Scan 329,359,220 112,187,145 355.8 217,172,075 688.8
Server
Web Server 161,890,890 135,628,107 472.5 26,262,783 91.5
The total traffic usage between the SQL Database Server and the DAST scan server is 81,546,724 (Bytes sent)
+85,924,362 (Bytes received) =167,471,086 bytes.
The total traffic usage between the DAST scan server and the Web Server is 135,628,107 (Bytes sent) +26,262,783
(Bytes received) =161,890,890 bytes.
Preinstallation tasks
Before you install AppScan® Enterprise, you will need to prepare and configure your system.
Preinstallation checklist
You must take certain steps before you install AppScan Enterprise.
preinstallation checklist
4. In the Server Certificate window, choose a certificate specific to your organization. This step helps you deploy a
secure AppScan® Enterprise in your environment. See Server Certificate on page 157.
5. In the Server Keystore screen, select a server keystore to be used by the Enterprise Console. If you exported
a .pfx file, select Public key cryptography standards #12 (PKCS #12). Browse to the location where you saved
| Installing | 54
the .pfx file, import it and enter the password you created when you exported the file. See Server Keystore on page
157.
Installation tasks
This section provides the instructions for installing AppScan® Enterprise.
Installation checklist
As you install AppScan® Enterprise, review and complete all of the necessary tasks on the installation checklist.
installation checklist
4. If HCL® Installation Manager is not already installed on your system, it launches for installation purposes. Click
Install.
5. On the first page of the Install Packages wizard, ensure that the HCL Rational License Key Server check box,
and check boxes for all entries beneath it, are selected. Click Next.
6. In the Prerequisites page, you are instructed to close all applications and disable anti-virus software. Complete
these precautionary tasks and then click Next.
7. On the Licenses page, read the license agreement. If you agree to the terms of the license agreement, click I
accept the terms in the license agreement and then click Next.
8. In the Location page, specify the installation directory and then click Next.
9. Complete the Package Group page according to your needs
(for example, if you are using Installation Manager for the first time and have no existing package group, leave the
default settings as-is). Click Next.
10. In the Translation Selection page, select the national languages that you want to install. Click Next.
11. On the Features page, ensure that all features are selected and then click Next.
12. A summary of what is installed is shown on the Summary page. If you want to change your selections, click
Back to return to the previous pages. When you are satisfied with your installation choices, click Install.
13. When the installation is complete, click Finish and close HCL® Installation Manager.
14. Start the HCL® Rational® License Key Administrator from the Windows Start menu (in the Programs menu,
launch HCL Rational > License Key Administrator).
15. When the HCL® Rational® License Key Administrator starts, you are prompted with the License Key
Administrator wizard (if the wizard does not open automatically, select License Keys > License Key Wizard
from the main menu). In this wizard, select Import a Rational License File and then click Next.
16. In the Import a License File panel, click Browse and then browse to your AppScan® Enterprise Server license file.
Open the file with the browse dialog box and then click Import. This table maps the license names in LKAD to
the license types in AppScan® Enterprise.
AppScan® licenses
5. In the Destination Folder window, do one of the following actions and click Next:
a) Click Next to accept the default installation location.
b) Click Change to select a different installation location.
6. In the Ready to Install the Program window, click Install to proceed with the installation.
7. On the Setup Wizard Completed screen, click Finish to launch the Configuration Wizard.
3. In the License Server window, specify the Rational® License Server to use for licenses. See License Server on
page 153.
4. In the Server Components window, select the components that you want to configure. The components available
to you depend on your license. See Server Components on page 154. If you are installing the components on
one machine, select all the check boxes, even if you have installed one of the components previously.
| Installing | 61
5. In the Instance Name window, specify the name of the instance you want to configure. See Instance Name on
page 155.
| Installing | 62
6. In the Service Account window, enter the Domain/Username Service Account and password, and click Next.
See Service Account on page 156.
7. In the Database Connection window, enter the SQL Server name, port number, and the name of the database
you are connecting to. You can click Test Connection to make sure you can connect to the SQL Server. The
| Installing | 63
configuration wizard does not proceed until the connection is successful. When AppScan® Enterprise Server
creates the database in SQL Server, it automatically configures the collation for it.
Note:
a. The syntax for the SQL Server name has changed with the introduction of Liberty support. ".
\SQL_SERVER_NAME" no longer works. Use "HOSTNAME\SQL_SERVER_NAME" instead.
b. If you are upgrading an existing database from v8.6 or earlier, enter the Database Master Key Password on
the next screen to access it. Keep this password in a secure location.
c. If your environment uses a named SQL Server instance for the AppScan Enterprise database, make sure that
TCP/IP is enabled in the SQL Server configuration manager, and restart the SQL services for SQL Server. Use
the port number of the named SQL Server instance instead of the default port number (1443).
| Installing | 64
8. In the Server Certificate window, choose a certificate specific to your organization. This step helps you deploy a
secure AppScan® Enterprise in your environment. See Server Certificate on page 157.
| Installing | 65
9. (Upgrade only). In the Restore AppScan Server Settings screen, you can choose to restore previous AppScan
Server customized settings on the Liberty Server (default). This screen appears once upon upgrade; if you run the
configuration wizard later, this screen won't appear. See Restore AppScan Server settings.
10. In the Server Keystore screen, select a server keystore to be used by the Enterprise Console. If you exported
a .pfx file, select Public key cryptography standards #12 (PKCS #12). Browse to the location where you saved
| Installing | 66
the .pfx file, import it and enter the password you created when you exported the file. See Server Keystore on page
157.
| Installing | 67
11. In the Authentication Mechanism window, select an Authentication Mechanism to use to log in to the
Enterprise Console. The default is to authenticate via Windows™. To use LDAP, see Authentication Mechanism on
page 157.
Note: If you need to authenticate with the Common Access Card (CAC), make sure you choose LDAP as your
authentication mechanism. Once AppScan Enterprise is configured, follow the instructions in Authenticating with
the Common Access Card (CAC) on page 112 to authenticate with CAC.
| Installing | 68
a) Configure the host name and port of the Liberty server for AppScan Server to use. If you are using Windows
authentication, prefix the host name with your domain name.
b) While it is not a recommended practice, you can allow SSL connections with invalid or untrusted certificates
during scanning. When the option is disabled, messages will appear in the scan log to indicate that the insecure
server could not be reached for scanning. This option also affects the Manual Explore functionality.
c)
: Configure the Advisory services port (installed with the Enterprise Console). This port runs over
HTTP and is used by the node.js server to provide advisories and fix recommendations. The advisories appear
in the About this Issue page for the application issues, and provide fix recommendations. You can select a
different port if 9444 is already used.
| Installing | 69
13. (upgrade only) In the Database Encryption Changes window, click Help to learn how to protect the SQL
Server where the database is located. If you decide not to enable TDE, select the check box so you can continue
configuration.
Note: AppScan® Enterprise uses transparent data encryption (TDE) technology that is available in SQL Server
2008 and later. TDE encrypts the data that is stored in the database or in backups on physical media. If you are
using an older version of SQL Server, any data that is contained in that database is at risk of compromise by
unauthorized access.
| Installing | 70
14. In the Product Administrator window, specify a user as Product Administrator. This user is licensed separately;
if you want to reassign the Product Administrator license, you must rerun the configuration wizard. See Product
Administrator on page 157.
15. Ensure that nobody is accessing the database, and click Finish in the Specifications Complete window to
complete the configuration. This process might take awhile.
Note:
a. IIS AppPool settings on Windows™ 2008 Server R2 are set during configuration:
• IIS recycling is set at 2:00am
• Idle timeout is set at 120 minutes
b. If you see an error message that the proxy server certificate cannot be configured, it might be expired. Contact
your Product Administrator to investigate further.
16. Optional: Select the Start the Services check box to automatically start the services.
Note: If you do not choose to automatically start the agent service, the agents do not pick up any jobs that are
created by users. You can manually start the service by using the Administrative tools; see Verifying the agent
service and alerting service installation on page 102.
| Installing | 71
17. Run the Default Settings Wizard. This wizard helps you to install sample data in by providing defaults for a
number of configurable options.
18. Click Exit.
Running the Default Settings wizard
This wizard helps you install sample data in by providing defaults for a number of configurable options. You can
create users, add security test policies, create scan templates, add pre-created dashboards, and configure defect
tracking integration with Rational® Quality Manager or Rational® Team Concert.
Ensure that the Launch Default Settings Wizard check box is selected when the Configuration wizard finishes.
1. In the Welcome page, choose the instance that you want to update, and click Next.
2. In the Initialization Type window, select one of the available initializations, and click Next.
3. In the Default Setting window, configure the following options and click Next:
a) Instance: Select the instance name for this setup. The Instance that was configured in the Configuration
wizard is selected here by default.
b) Contact: The name or a point of contact for the items that are created by the wizard. You can edit these items
later if necessary.
c) Root folder name: Enter a name for the default root folder. The default folder acts as the root folder for all
other folders you create.
d) Application URL: Enter the URL for the application users to access the application. By default, this URL is
the current computer's FQDN (fully qualified domain name).
(for example, http://myserver/mydomain/appscan/).
4. (Windows™ authentication only): In the LDAP Settings page, select the Enable LDAP check box if you use an
LDAP server.
a) In the Server Name field, enter the LDAP group name.
b) In the Group Query field, enter the path of the group query that is used to retrieve user group information.
You can use an LDAP server or an Active Directory server.
c) Optional: If you want to integrate with the LDAP server by using anonymous access, select the Anonymous
access check box. This option is disabled by default.
d) Click Test LDAP to confirm the configuration works.
5. In the IP Security Permissions page, configure the IP addresses and ranges that are allowed for scanning. Use a
dash to define IPv4 ranges (such as 1.2.3.4 - ); use a prefix to define IPv6 ranges (such as fe80::/10).
6. In the Populate Database with Sample Data page, select the Populate Sample Data check box to populate the
database with scan templates, pre-created dashboards, server groups, and test policies.
7. Click Next. The Default Settings Wizard Progress page opens, displaying the setup's progress.
8. When the wizard is complete, the Default Settings Wizard Complete page opens.
9. Click Exit to close the wizard.
Installing HCL® Dynamic Analysis Scanner
Use this procedure to install the agents that are used for scanning and testing your website applications.
Note:
1. Make sure you read Required user account information during installation and configuration on page 33 so
that you know which user account to use during installation.
2. Any technologies that you use on your website must also be installed with the Scanner. For example, if you use
Flash on any web pages, you must have the correct version of Flash installed.
1. Go to the directory where you downloaded the executable file (ASE_DASSetup_<version>.exe) and
double-click the file.
Note: It might take a while for the next screen to display.
2. In the License Agreement window, select the I accept the terms in the license agreement option, and click
Next.
| Installing | 72
3. Optional: In the Program Features window, select Web Services Explorer to add the ability to test web services
for security vulnerabilities, and click Next.
Note: Approximately 330 MB is required for the Web Services Explorer – GSC (Generic Service Client tool)
version 8.1 that is used to test Web Services for security vulnerabilities
4. In the Destination Folder window, click Next.
5. In the Ready to Install the Program window, click Install to proceed with the installation, and then click Finish.
3. In the License Server window, specify the Rational® License Server to use for licenses. See License Server on
page 153.
4. In the Server Components window, select the components that you want to configure. The components available
to you depend on your license. See Server Components on page 154. If you are installing the components on
one machine, select all the check boxes, even if you have installed one of the components previously.
| Installing | 75
5. In the Instance Name window, specify the name of the instance you want to configure. See Instance Name on
page 155.
| Installing | 76
6. In the Service Account window, enter the Domain/Username Service Account and password, and click Next.
See Service Account on page 156.
7. In the Database Connection window, enter the SQL Server name, port number, and the name of the database
you are connecting to. You can click Test Connection to make sure you can connect to the SQL Server. The
| Installing | 77
configuration wizard does not proceed until the connection is successful. Enter the database name. When
AppScan® Enterprise Server creates the database in SQL Server, it automatically configures the collation for it.
Note:
a. If you are upgrading an existing database from v8.6 or earlier, enter the Database Master Key Password on
the next screen to access it. Keep this password in a secure location.
b. If your environment uses a named SQL Server instance for the AppScan Enterprise database, make sure that
TCP/IP is enabled in the SQL Server configuration manager, and restart the SQL services for SQL Server. Use
the port number of the named SQL Server instance instead of the default port number (1443).
| Installing | 78
8. (upgrade only) In the Database Encryption Changes window, click Help to learn how to protect the SQL
Server where the database is located. If you decide not to enable TDE, select the check box so you can continue
configuration.
Note: AppScan® Enterprise uses transparent data encryption (TDE) technology that is available in SQL Server
2008 and later. TDE encrypts the data that is stored in the database or in backups on physical media. If you are
using an older version of SQL Server, any data that is contained in that database is at risk of compromise by
unauthorized access.
9. Ensure that nobody is accessing the database, and click Finish in the Specifications Complete window to
complete the configuration. This process might take awhile.
Note:
a. IIS AppPool settings on Windows™ 2008 Server R2 are set during configuration:
• IIS recycling is set at 2:00am
• Idle timeout is set at 120 minutes
b. If you see an error message that the proxy server certificate cannot be configured, it might be expired. Contact
your Product Administrator to investigate further.
| Installing | 79
10. Optional: Select the Start the Services check box to automatically start the services.
Note: If you do not choose to automatically start the agent service, the agents do not pick up any jobs that are
created by users. You can manually start the service by using the Administrative tools; see Verifying the agent
service and alerting service installation on page 102.
11. Click Exit.
Verifying the installation of the Enterprise Console
After the installation process is complete, you can verify the installation of the Enterprise Console.
Go to https://domain/ase/ and log in.
Related reference
Ports used by AppScan Enterprise on page 37
Deployment of AppScan® Enterprise requires that certain ports be open on the computers where those components
are installed.
2. Click Yes when you are asked to install Rational® License Key Server.
3. In the Rational® License Server installer, click Install or Update HCL Rational License Key Server.
4. If HCL® Installation Manager is not already installed on your system, it launches for installation purposes. Click
Install.
5. On the first page of the Install Packages wizard, ensure that the HCL Rational License Key Server check box,
and check boxes for all entries beneath it, are selected. Click Next.
6. In the Prerequisites page, you are instructed to close all applications and disable anti-virus software. Complete
these precautionary tasks and then click Next.
7. On the Licenses page, read the license agreement. If you agree to the terms of the license agreement, click I
accept the terms in the license agreement and then click Next.
8. In the Location page, specify the installation directory and then click Next.
9. Complete the Package Group page according to your needs
(for example, if you are using Installation Manager for the first time and have no existing package group, leave the
default settings as-is). Click Next.
10. In the Translation Selection page, select the national languages that you want to install. Click Next.
11. On the Features page, ensure that all features are selected and then click Next.
12. A summary of what is installed is shown on the Summary page. If you want to change your selections, click
Back to return to the previous pages. When you are satisfied with your installation choices, click Install.
13. When the installation is complete, click Finish and close HCL® Installation Manager.
14. Start the HCL® Rational® License Key Administrator from the Windows Start menu (in the Programs menu,
launch HCL Rational > License Key Administrator).
15. When the HCL® Rational® License Key Administrator starts, you are prompted with the License Key
Administrator wizard (if the wizard does not open automatically, select License Keys > License Key Wizard
from the main menu). In this wizard, select Import a Rational License File and then click Next.
16. In the Import a License File panel, click Browse and then browse to your AppScan® Enterprise Server license file.
Open the file with the browse dialog box and then click Import. This table maps the license names in LKAD to
the license types in AppScan® Enterprise.
AppScan® licenses
5. In the Destination Folder window, do one of the following actions and click Next:
a) Click Next to accept the default installation location.
b) Click Change to select a different installation location.
6. In the Ready to Install the Program window, click Install to proceed with the installation.
7. On the Setup Wizard Completed screen, click Finish to launch the Configuration Wizard.
3. In the License Server window, specify the Rational® License Server to use for licenses. See License Server on
page 153.
| Installing | 84
4. In the Server Components window, select the components that you want to configure. The components available
to you depend on your license. See Server Components on page 154. If you are installing the components on
one machine, select all the check boxes, even if you have installed one of the components previously.
| Installing | 85
5. In the Instance Name window, specify the name of the instance you want to configure. See Instance Name on
page 155.
| Installing | 86
6. In the Service Account window, enter the Domain/Username Service Account and password, and click Next.
See Service Account on page 156.
7. In the Database Connection window, enter the SQL Server name, port number, and the name of the database
you are connecting to. You can click Test Connection to make sure you can connect to the SQL Server. The
| Installing | 87
configuration wizard does not proceed until the connection is successful. When AppScan® Enterprise Server
creates the database in SQL Server, it automatically configures the collation for it.
Note:
a. If you are upgrading an existing database from v8.6 or earlier, enter the Database Master Key Password on
the next screen to access it. Keep this password in a secure location.
b. If your environment uses a named SQL Server instance for the AppScan Enterprise database, make sure that
TCP/IP is enabled in the SQL Server configuration manager, and restart the SQL services for SQL Server. Use
the port number of the named SQL Server instance instead of the default port number (1443).
| Installing | 88
8. In the Server Certificate window, choose a certificate specific to your organization. This step helps you deploy a
secure AppScan® Enterprise in your environment. See Server Certificate on page 157.
| Installing | 89
9. (Upgrade only). In the Restore AppScan Server Settings screen, you can choose to restore previous AppScan
Server customized settings on the Liberty Server (default). This screen appears once upon upgrade; if you run the
configuration wizard later, this screen won't appear. See Restore AppScan Server settings.
10. In the Server Keystore screen, select a server keystore to be used by the Enterprise Console. If you exported
a .pfx file, select Public key cryptography standards #12 (PKCS #12). Browse to the location where you saved
| Installing | 90
the .pfx file, import it and enter the password you created when you exported the file. See Server Keystore on page
157.
| Installing | 91
11. In the Authentication Mechanism window, select an Authentication Mechanism to use to log in to the
Enterprise Console. The default is to authenticate via Windows™. To use LDAP, see Authentication Mechanism on
page 157.
Note: If you need to authenticate with the Common Access Card (CAC), make sure you choose LDAP as your
authentication mechanism. Once AppScan Enterprise is configured, follow the instructions in Authenticating with
the Common Access Card (CAC) on page 112 to authenticate with CAC.
| Installing | 92
a) Configure the host name and port of the Liberty server for AppScan Server to use. If you are using Windows
authentication, prefix the host name with your domain name.
b) While it is not a recommended practice, you can allow SSL connections with invalid or untrusted certificates
during scanning. When the option is disabled, messages will appear in the scan log to indicate that the insecure
server could not be reached for scanning. This option also affects the Manual Explore functionality.
c)
: Configure the Advisory services port (installed with the Enterprise Console). This port runs over
HTTP and is used by the node.js server to provide advisories and fix recommendations. The advisories appear
in the About this Issue page for the application issues, and provide fix recommendations. You can select a
different port if 9444 is already used.
| Installing | 93
13. (upgrade only) In the Database Encryption Changes window, click Help to learn how to protect the SQL
Server where the database is located. If you decide not to enable TDE, select the check box so you can continue
configuration.
Note: AppScan® Enterprise uses transparent data encryption (TDE) technology that is available in SQL Server
2008 and later. TDE encrypts the data that is stored in the database or in backups on physical media. If you are
using an older version of SQL Server, any data that is contained in that database is at risk of compromise by
unauthorized access.
| Installing | 94
14. In the Product Administrator window, specify a user as Product Administrator. This user is licensed separately;
if you want to reassign the Product Administrator license, you must rerun the configuration wizard. See Product
Administrator on page 157.
15. Ensure that nobody is accessing the database, and click Finish in the Specifications Complete window to
complete the configuration. This process might take awhile.
Note:
a. IIS AppPool settings on Windows™ 2008 Server R2 are set during configuration:
• IIS recycling is set at 2:00am
• Idle timeout is set at 120 minutes
b. If you see an error message that the proxy server certificate cannot be configured, it might be expired. Contact
your Product Administrator to investigate further.
16. Optional: Select the Start the Services check box to automatically start the services.
Note: If you do not choose to automatically start the agent service, the agents do not pick up any jobs that are
created by users. You can manually start the service by using the Administrative tools; see Verifying the agent
service and alerting service installation on page 102.
| Installing | 95
17. Run the Default Settings Wizard. This wizard helps you to install sample data in by providing defaults for a
number of configurable options.
18. Click Exit.
Running the Default Settings wizard
This wizard helps you install sample data in by providing defaults for a number of configurable options. You can
create users, add security test policies, create scan templates, add pre-created dashboards, and configure defect
tracking integration with Rational® Quality Manager or Rational® Team Concert.
Ensure that the Launch Default Settings Wizard check box is selected when the Configuration wizard finishes.
1. In the Welcome page, choose the instance that you want to update, and click Next.
2. In the Initialization Type window, select one of the available initializations, and click Next.
3. In the Default Setting window, configure the following options and click Next:
a) Instance: Select the instance name for this setup. The Instance that was configured in the Configuration
wizard is selected here by default.
b) Contact: The name or a point of contact for the items that are created by the wizard. You can edit these items
later if necessary.
c) Root folder name: Enter a name for the default root folder. The default folder acts as the root folder for all
other folders you create.
d) Application URL: Enter the URL for the application users to access the application. By default, this URL is
the current computer's FQDN (fully qualified domain name).
(for example, http://myserver/mydomain/appscan/).
4. (Windows™ authentication only): In the LDAP Settings page, select the Enable LDAP check box if you use an
LDAP server.
a) In the Server Name field, enter the LDAP group name.
b) In the Group Query field, enter the path of the group query that is used to retrieve user group information.
You can use an LDAP server or an Active Directory server.
c) Optional: If you want to integrate with the LDAP server by using anonymous access, select the Anonymous
access check box. This option is disabled by default.
d) Click Test LDAP to confirm the configuration works.
5. In the IP Security Permissions page, configure the IP addresses and ranges that are allowed for scanning. Use a
dash to define IPv4 ranges (such as 1.2.3.4 - ); use a prefix to define IPv6 ranges (such as fe80::/10).
6. In the Populate Database with Sample Data page, select the Populate Sample Data check box to populate the
database with scan templates, pre-created dashboards, server groups, and test policies.
7. Click Next. The Default Settings Wizard Progress page opens, displaying the setup's progress.
8. When the wizard is complete, the Default Settings Wizard Complete page opens.
9. Click Exit to close the wizard.
Verifying the installation of the Enterprise Console
After the installation process is complete, you can verify the installation of the Enterprise Console.
Go to https://domain/ase/ and log in.
Related reference
Ports used by AppScan Enterprise on page 37
Deployment of AppScan® Enterprise requires that certain ports be open on the computers where those components
are installed.
1. Make sure you read Required user account information during installation and configuration on page 33 so
that you know which user account to use during installation.
2. Any technologies that you use on your website must also be installed with the Scanner. For example, if you use
Flash on any web pages, you must have the correct version of Flash installed.
1. Go to the directory where you downloaded the executable file (ASE_DASSetup_<version>.exe) and
double-click the file.
Note: It might take a while for the next screen to display.
2. In the License Agreement window, select the I accept the terms in the license agreement option, and click
Next.
3. Optional: In the Program Features window, select Web Services Explorer to add the ability to test web services
for security vulnerabilities, and click Next.
Note: Approximately 330 MB is required for the Web Services Explorer – GSC (Generic Service Client tool)
version 8.1 that is used to test Web Services for security vulnerabilities
4. In the Destination Folder window, click Next.
5. In the Ready to Install the Program window, click Install to proceed with the installation, and then click Finish.
2. Running the wizard after you install the AppScan® Enterprise Server sets up the database on the SQL Server and
does the initial setup of the component.
3. Running the wizard after you install the Dynamic Analysis Scanner registers the Scanner with AppScan®
Enterprise Server.
1. Start the Configuration wizard by using one of these methods:
a) After installation, select the Launch Configuration Wizard check box in the Setup Wizard Completed
window.
b) From the Windows™ Start menu, select Configuration Wizard.
2. In the Welcome screen, click Next.
3. In the License Server window, specify the Rational® License Server to use for licenses. See License Server on
page 153.
| Installing | 98
4. In the Instance Name window, specify the name of the instance you want to configure. See Instance Name on
page 155.
| Installing | 99
5. In the Service Account window, enter the Domain/Username Service Account and password, and click Next.
See Service Account on page 156.
6. In the Database Connection window, enter the SQL Server name, port number, and the name of the database
you are connecting to. You can click Test Connection to make sure you can connect to the SQL Server. The
| Installing | 100
configuration wizard does not proceed until the connection is successful. When AppScan® Enterprise Server
creates the database in SQL Server, it automatically configures the collation for it.
Note:
a. If you are upgrading an existing database from v8.6 or earlier, enter the Database Master Key Password on
the next screen to access it. Keep this password in a secure location.
b. If your environment uses a named SQL Server instance for the AppScan Enterprise database, make sure that
TCP/IP is enabled in the SQL Server configuration manager, and restart the SQL services for SQL Server. Use
the port number of the named SQL Server instance instead of the default port number (1443).
| Installing | 101
7. (upgrade only) In the Database Encryption Changes window, click Help to learn how to protect the SQL
Server where the database is located. If you decide not to enable TDE, select the check box so you can continue
configuration.
Note: AppScan® Enterprise uses transparent data encryption (TDE) technology that is available in SQL Server
2008 and later. TDE encrypts the data that is stored in the database or in backups on physical media. If you are
using an older version of SQL Server, any data that is contained in that database is at risk of compromise by
unauthorized access.
8. Ensure that nobody is accessing the database, and click Finish in the Specifications Complete window to
complete the configuration. This process might take awhile.
Note:
a. IIS AppPool settings on Windows™ 2008 Server R2 are set during configuration:
• IIS recycling is set at 2:00am
• Idle timeout is set at 120 minutes
b. If you see an error message that the proxy server certificate cannot be configured, it might be expired. Contact
your Product Administrator to investigate further.
| Installing | 102
9. Optional: Select the Start the Services check box to automatically start the services.
Note: If you do not choose to automatically start the agent service, the agents do not pick up any jobs that are
created by users. You can manually start the service by using the Administrative tools; see Verifying the agent
service and alerting service installation on page 102.
10. Click Exit.
Postinstallation checklist
After you install AppScan® Enterprise, review and complete all of the necessary tasks on the postinstallation
checklist.
postinstallation checklist
users will not be issued. Make sure that only one instance of the alerting service is installed; otherwise, duplicate
notifications might be sent out.
If you installed Server components on different machines, you must verify that the services are started on each one.
1. Using the Control Panel or the Start Menu, select Administrative Tools > Services.
2. In the list of services, select Agent Service. If the service was properly installed and started, a Started status will
be displayed in the Status column. If this is not the case, you can start the service by right-clicking the service
name and selecting Start.
3. Repeat Step 2 for the Alert Service.
3. In the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders
\SCHANNEL\Hashes directory:
a) Create a key called MD5 (Hashes > New > Key > MD5).
b) Right-click the key's name and create a new DWORD (32-bit) Value called 'Enabled'. (New > DWORD (32-
bit) Value > Enabled).
c) Leave the default value as '0'.
4. Close the Registry Editor.
Related tasks
Enabling Transparent Data Encryption on SQL Server databases on page 106
SQL Server has a built-in encryption TDE mechanism (Transparent Data Encryption) encrypts the data residing in the
database or in backups on physical media.
Encrypting, backing up, and restoring a SQL Server database with EFS on page 108
The Encrypting File System (EFS) is a feature of Microsoft™ Windows™ that lets you store information on your hard
disk in an encrypted format. EFS enables transparent encryption and decryption of files by using advanced, standard
cryptographic algorithms. Use this method to encrypt the database file if you have SQL Server Standard Edition 2008,
2008 SP3, 2008 R2 SP2, 2012, and 2014.
Related tasks
Moving a TDE-protected database to another SQL Server on page 107
Follow these steps when you need to restore or move a TDE-protected database to another server.
Related information
Transparent Data Encryption (TDE)
3. Go to the location where you downloaded the RestoreTDECertificate.zip file. Unzip the file and open the script.
(File > Open > File). You will notice several commands that will be executed on the server.
4. Before you execute the script, you must set three fields for your environment (they are all marked with 'ACTION
REQUIRED' in the comments section of the script):
• DECLARE @MKPassword: The Master Key Password used to create the master key in the [master]
database where you enabled TDE
• DECLARE @BackupPassword: The password that was used to back up the certificate if it is different from
@MKPassword
• DECLARE @Path: The path of the location that you copied the two files AppScanEntCert.bak and
AppScanEntCert.pvk
5. After the fields have been updated, click Query > Execute to launch the script.
After the script has completed, the result will be displayed in the 'Messages' window of SQL Management Studio. If
you see the message: "The certificate is restored successfully, you can restore the database.", you should be able to
restore the database on this SQL Server.
Using Encrypting File System on SQL Server Standard Edition
Encrypting database file using the Encrypting File System (EFS) method on Standard version of SQL Server.
Encrypting, backing up, and restoring a SQL Server database with EFS
The Encrypting File System (EFS) is a feature of Microsoft™ Windows™ that lets you store information on your hard
disk in an encrypted format. EFS enables transparent encryption and decryption of files by using advanced, standard
cryptographic algorithms. Use this method to encrypt the database file if you have SQL Server Standard Edition 2008,
2008 SP3, 2008 R2 SP2, 2012, and 2014.
This task assumes that you have:
1. Chosen a service account for SQL server service that
• remains available for the lifetime of the encrypted database and its backup.
• can be used to transfer the database or its backup across the network, if needed.
Note:
• The service account can be the same or different than the one you use for AppScan® Enterprise.
• Use one service account to log in to the SQL Server service and to encrypt any of the databases that are hosted
through that service.
• The SQL Server service account will be referred to as 'the service account' in these instructions.
2. Located the filepath of the database, if different than the default locations listed here. You will need this
information for step 3. You can find the default location by opening Microsoft™ SQL Server Management Studio.
Right-click the SQL Server that hosts the database. Click Properties > Database settings > Database default
locations.
This procedure must be completed before you run the configuration wizard; otherwise, you won't be able to access the
database. See Configuring the SQL Server database for AppScan Enterprise on page 50.
1. Go to Start > Administrative Tools > Services and stop the SQL Server service that hosts the AppScan®
Enterprise database you are going to encrypt. The default service is SQL Server (MSSQLSERVER).
2. Right-click the name of the service to open the properties dialog. On the Log on tab, select This account, enter
the credentials of the service account, and then click OK.
3. In Windows™ Explorer, right-click the folder where the database resides, and go to Properties > Security to give
the service account Read and execute and read access to both the <databasename.mdf> file and the parent
folder.
Note: The credentials of the user that is logged in will be used to encrypt the database. If you are not logged in as
the service account, do that now.
| Installing | 109
4. Right-click the folder that contains the <databasename.mdf> file and go to Properties > General > Advanced
Attributes. Select the Encrypt contents to secure data check box and click OK.
Note:
If the folder is not encrypted yet, select Apply changes to this folder, subfolders and files when prompted. If
you select this option after you run the Server Configuration Wizard, then the database is not encrypted. If this
process is applied to the database and the corresponding log file after the Server configuration wizard is run, then
the database might get into a "Recovery Pending" state. Then, the encrypted database is not accessible in SQL
Server Management tools and AppScan Enterprise.
5. In the Services window, start the SQL Server that hosts the AppScan® Enterprise database.
The DATA folder C:\Program Files\Microsoft SQL Server\MSSQL12.MSSQLSERVER\MSSQL
\DATA (if defaults were used during Microsoft SQL Server 2014 Standard installation) will appear in green in
Windows Explorer after it gets encrypted. Any databases that are added after this procedure are encrypted, including
the AppScan Enterprise database created by the Server Configuration Wizard.
Note: Only the user who encrypted the file can decrypt it. You can determine who encrypted specific files in the
Details section on the Properties > Advanced Attributes window. The backup of the encrypted database will NOT
be encrypted automatically. Follow the steps in Backing up and restoring an EFS-encrypted database.
Backing up and restoring an EFS-encrypted database
You can move an encrypted backup database file to a network-shared location hosted on the same Windows™ version
to preserve the file encryption. You can restore the database from any location where the encrypted database file is
stored. When restoring into a SQL Server, that Server's service should be running with the service account credentials
of the user who encrypted the database. However, a restored database file is NOT encrypted, so you must encrypt it
using the steps in the above task.
1. In Windows™ Explorer, expand the folder where the database backup resides, and give the service account Read
and execute and read access to the <databasename.bak> file.
Note: The credentials of the user that is logged in will be used to encrypt the database. If you are not logged in as
the service account, do that now.
2. Right-click the <databasename.bak> file and go to Properties > General > Advanced > Encrypt contents to
secure data, and click OK.
Detaching, encrypting, and attaching a database encrypted with EFS
There might be times when you do not want to stop the SQL Server service during database encryption; for example,
when there are several databases running on that service and you do not want them to be unavailable. You can detach,
encrypt, and attach the database instead.
'The service account' must be used to log in to the SQL Server service and to encrypt any other databases on the same
SQL Server.
1. Go to Start > Administrative Tools > Services and stop the SQL Server service that hosts the AppScan®
Enterprise database you are going to encrypt. The default service is SQL Server (MSSQLSERVER).
2. Right-click the name of the service to open the properties dialog. On the Log on tab, select This account, enter
the credentials of the service account, and then click OK.
3. In the Services window, start the SQL Server that hosts the AppScan® Enterprise database.
4. In Windows™ Explorer, right-click the <databasename.mdf> file and go to Properties > General > Advanced >
Encrypt contents to secure data, and click OK.
5. Open Microsoft™ SQL Server Management Studio and connect to the SQL Server that serves that database.
6. Under the 'Databases' tree, right-click the database you want to encrypt and click Tasks > Detach.
7. In the Detach Database window, if there are open connections, select the Drop Connections check box and click
OK.
8. In Windows™ Explorer, right-click the <databasename.mdf> file and go to Properties > General > Advanced >
Encrypt contents to secure data, and click OK.
9. Repeat Steps 3 and 4 for the <databasename.ldf> file.
| Installing | 110
10. In Microsoft™ SQL Server Management Studio, right-click the Databases tree, and choose Attach.
11. In the Attach Databases window, click Add and navigate to the encrypted <databasename.mdf> file. Select it and
click OK > OK
12. Repeat Step 11 for the <databasename.ldf> file.
Overview
Government agencies and financial institutions use these standards to ensure that their products conform to specified
security requirements. Recently, new security standards have become available. The National Institute of Standards
and Technology (NIST) developed a new standard, Special Publications 800-131a (or SP 800-131a), to replace the
current FIPS standards (FIPS 140-2). NIST SP800-131a replaces FIPS 140-2. SP800-131a strengthens the algorithms
and increases the key lengths to increase security, and provides both transition mode and strict mode.
FIPS 140-2
One of the standards published by NIST is the Federal Information Processing Standard Security Requirements for
Cryptographic Modules, referred to as FIPS 140-2. FIPS 140-2 provides a standard that can be required by US federal
agencies who specify that cryptographic-based security systems are to be used to provide protection for sensitive or
valuable data. Many US federal agencies can be configured to use this level, but might be required to move up to the
newer SP800-131a standard. See The National Institute of Standards and Technology for more information about the
140-2 standard. AppScan® Enterprise is compliant with FIPS 140-2.
NIST SP800-131a
SP800-131a is a requirement originated by the National Institute of Standards and Technology (NIST) which requires
longer key lengths and stronger cryptography. The specification also provides a transition configuration to enable
US federal agencies to move to a strict enforcement of SP800-131a. The transition configuration also enables US
federal agencies to run with a mixture of settings from both FIPS140-2 and SP800-131a. SP800-131a can be run in
two modes: transition and strict. AppScan® Enterprise is compliant with NIST transition mode.
#ssl.SocketFactory.provider=
#ssl.ServerSocketFactory.provider=
to
ssl.SocketFactory.provider=com.hcl.jsse2.SSLSocketFactoryImpl
ssl.ServerSocketFactory.provider=com.hcl.jsse2.SSLServerSocketFactoryImpl
f) Locate the list of cryptographic providers that are located after the line # List of providers and their preference
orders and replace it with the following list:
security.provider.1=com.hcl.crypto.fips.provider.HCLJCEFIPS
security.provider.2=com.hcl.jsse2.HCLJSSEProvider2
security.provider.3=com.hcl.crypto.provider.HCLJCE
security.provider.4=com.hcl.security.jgss.HCLJGSSProvider
security.provider.5=com.hcl.security.cert.HCLCertPath
security.provider.6=com.hcl.security.sasl.HCLSASL
security.provider.7=com.hcl.xml.crypto.HCLXMLCryptoProvider
security.provider.8=com.hcl.xml.enc.HCLXMLEncProvider
security.provider.9=org.apache.harmony.security.provider.PolicyProvider
security.provider.10=com.hcl.security.jgss.mech.spnego.HCLSPNEGO
g) Go to <install-dir>\AppScan Enterprise\Liberty\jre\bin and open a cmd window. Your
certificates must be at least 1024 in size and can be signed with a DSA or RSA signature algorithm. The
keytool utility can be used to generate a compatible keypair: 1 keytool -genkey -alias default -keyalg RSA -
keysize 1024 -dname CN=example -keystore fips.jks -storepass Liberty -keypass Liberty.
h) Save and close the file, and then rerun the configuration wizard.
| Installing | 112
CAC authentication over LDAP so that users can log in to AppScan® Enterprise without providing a user name and
password.
During installation and configuration, make sure that you select LDAP authentication in the Authentication
Mechanism screen of the configuration wizard.
Note:
1. If CAC was enabled before you apply AppScan Enterprise v9.0.3.1 iFix1, disable it before you run the
configuration wizard during the iFix1 installation. Then, you can re-enable CAC and log in to AppScan Enterprise
and complete the following task.
2. No user actions are required to enable authentication by using Microsoft™ Internet Explorer. For Mozilla Firefox
users, your organization might have specific instructions for enabling CAC in the browser.
1. Install AppScan® Enterprise by using an LDAP server that contains the CAC users.
2. Make sure that the Product Administrator for AppScan Enterprise is also a CAC user.
a) Log in to AppScan Enterprise as an administrator.
b) Go to Administration > Users and Groups, and select Default User from the list.
c) On the Edit User page, select Administrator from the Type list. Finish configuring the user properties, click
Save, and then log out of AppScan Enterprise.
3. Import the full certificate authority chain into the truststore.
a) Create a keystore file or use your existing keystore.
Note: To generate a keystore, you can use keytool. AppScan Enterprise includes a keytool, and can be
downloaded from <install-dir>\AppScan Enterprise\Liberty\jre\bin\
<login-config>
<auth-method>FORM</auth-method>
<form-login-config>
<form-login-page>/pages/Login.jsp</form-login-page>
<form-error-page>/pages/Login.jsp?Retry=True</form-error-page?
</form-login-config>
| Installing | 114
</login-config>
with
<login-config>
<auth-method>CLIENT-CERT</auth-method>
</login-config>
e) Save the file and rename AppScanServerWeb.zip to AppScanServerWeb.war.
5. Modify the server.xml file to enforce SSL protocol, set the trust keystore and set the LDAP certificate
mapping.
a) Locate the server.xml file at <install-dir>\AppScan Enterprise\Liberty\usr\servers
\<ase instance name>\server.xml.
b) Make sure that the <featureManager> section contains <feature>ssl-1.0</feature>.
c) Locate the <keystore> section of the file and add this line: <keyStore
id="cacTrustKeyStoreID" password="store password"
location="cacTrustKeyStore.jks" type='jks' />, where
• id is a string that uniquely identifies the keystore (use any string)
• password is the password of the keystore (this value can be stored in clear text or encoded form; use the
securityUtility from Liberty to encode the password)
• location is an absolute or relative path to the keystore file (the relative path points to <install-dir>
\AppScan Enterprise\Liberty\usr\servers\<ase instance name>\resources
\security\
• type is the type of the keystore. jks is the default value.
Note: See Liberty profile: Keystores.
d) Locate the <ssl> section of the file, and make sure that it includes <ssl-Protocol="SSL_TLSv2">.
e) Add these attributes to <ssl>
• trustStoreRef="cacTrustKeyStoreID" where cacTrustKeyStoreID is the ID of the
keystore that was configured in the <keystore> section of the file.
• clientAuthenticationSupported="true"
The section might look like this example when you're done editing: <ssl id="defaultSSLConfig"
sslProtocol="SSL_TLSv2" keyStoreRef="defaultKeyStore"
trustStoreRef="defaultKeyStore" clientAuthenticationSupported="true" />.
f) Locate the <ldapRegistry> section of the file and add these attributes:
• certificateMapMode="CERTIFICATE_FILTER"
• certificateFilter="uid=${SubjectCN}" .
Note: The "uid" in the LDAP directory must match the attribute of the certificate. Modify this example
of a filter so that it maps to your environment. In this example, if the "SubjectCN" of the certificate is
"CN=HCL", then the user name (uid) in the LDAP directory must also be "HCL".
This example shows an LDAP registry configuration that uses HCL® Tivoli® Directory Server. The LDAP user
IDs match the subject CN in the certificates that are stored on the CAC card:
8. Go to Administration > Users and Groups, and change the permissions for the default user back to whatever
permissions you want that role to have. (Typically, you would not want the default user to be an administrator, but
perhaps a Standard User instead).
9. After AppScan Enterprise is configured, there is no other way to create the Administrator account for the CAC
user, except by using a database query. If you did not complete Step 2, follow these steps:
a) Log in to AppScan Enterprise with your CAC card, and check your permissions to see if you are an
Administrator.
b) If you are not an administrator, run this query against your AppScan Enterprise SQL Server database: select
*from UserInfo.
c) Locate the CAC user in the query results and note their UserId.
d) Then, run this query: Update UserInfo set UserTypeId=5, LicenseType=3,
EffectiveType=32768, where UserId is the ID of your CAC admin user.
e) Log out of AppScan Enterprise, and then log in again. You should now be an administrator.
Users that use Common Access Cards are able to log in to AppScan® Enterprise without providing a user name and
password.
1. Create local accounts on all of the Dynamic Analysis Scanners with the same user name/password to be used as
the service account and for login during installation. Administrative accounts are preferred; see Required user
account information during installation and configuration on page 33 for a list of specific permissions.
2. A connection between the scanner and ASE database is required. Open the standard MS SQL ports 1433/1434 in
the firewall, or add a custom port if communication with SQL Server is configured this way and is preferred.
3. Run the configuration wizard. In the Database Connection window, enter the server name and port numbers
when prompted.
4. While the configuration wizard is running, you will encounter this error: "The server or role does not exist." This
message displays because you are using local accounts, but it doesn't affect the installation. To bypass the error,
use the Ctrl key while you click OK in the message dialog.
5. Finish the configuration wizard and exit.
• Existing content scan jobs in the Folder Explorer view, including QuickScan jobs that are not created in the
AppScan Dynamic Analysis Client, will have a new check box enabled on the Explore Options page that enables
filtering of similar pages based on structure (DOM). If an existing content scan job:
• had a redundant path limit set to 5, that option is disabled and DOM-based filtering is turned on
• had a redundant path limit set to a different value, that option is kept enabled and DOM-based filtering is not
turned on
• had a similar content limit set to 5, with HTML structure enabled, that option is turned off and DOM-based
filtering is turned on
• had a similar content limit set to a different value, or it compares Text and HTML structure, that option is kept
enabled and DOM-based filtering is not turned on
• Issue types are changed periodically in the security rules. If you have a scan with old issue types that no longer
exist after a security rules update, the issues with those issue types will disappear after the update, and new issues
will be found with the new issue types. Those issues will have to be triaged again.
Upgrading from 9.0.2.1
• On the Restore AppScan Server Settings screen of the configuration wizard, an additional option has been added
that preserves custom scanner *.jar files that might have been added to the <install-dir>\HCL\AppScan
Enterprise\Liberty\usr\servers\<instance_name>\lib\scanners.
Upgrading from 9.0.2
• In previous releases, imported issues were cumulative. In v9.0.2.1, you can remove issues that were previously
found in an application but are not included in subsequent imports. In scanner profiles from v9.0.1, the Remove
Orphaned Issues check box is disabled in v9.0.2.1 to respect previous behavior (can be overridden by clearing
the check box).
• When you add a new issue attribute name to a scanner profile, the Use Imported Values check box is enabled
by default. Keep the Use Imported Values check box enabled if you want to update an existing issue attribute
with values contained in the imported file. If you clear the check box, AppScan Enterprise will retain the value
previously used. If you select the Unique check box, you cannot clear the Use Imported Values check box.
• There were changes to the REST APIs.
Upgrading from 9.0.1
• There is a New issue status. Upon upgrade, the New issue column is available for display in the Portfolio tab in
the Monitor view. Formulas are updated to include issues with a New status. Upgrade does not affect the status of
issues that were discovered in previous versions.
• A new Dashboard tab displays the charts that were displayed in the Portfolio tab in v9.0.1. The new dashboard
includes trend charts for Security Risk Rating, Testing Status, Applications with Open Issues, and Open Issues.
Note:
Possible naming conflicts between v9.0.1 application attribute customizations and new v9.0.2 dashboard trend
charts
The Open Issues and Applications with Open Issues charts rely on a new application attribute called "Open
Issues" that is defined as a formula. However, if you previously created an application attribute called "Open
Issues" of any type other than formula, the upgrade does not attempt to resolve the conflict between your attribute
and the one that version 9.0.2 needs for the new charts.
The new charts will not display as intended after upgrade, and you must resolve this problem manually. Rename
your "Open Issues" attribute to something else if you want to preserve its values. Update all formulas where you
referenced your "Open Issues" attribute to reflect the new name. Then, rerun the configuration wizard to create the
"Open Issues" formula attribute that the new charts require.
| Upgrading and migrating | 119
• A new approach to create scans consistent with AppScan Standard, for both the security team who creates the
templates and for the developers who create the scans. See Overview of scan configuration differences in v9.0.2
and higher and in previous versions on page 152.
• The new method is accessed from both the Monitor and Scans views.
• Existing scan templates from v9.0.1.1 are kept after upgrade, and the old method of QuickScan template
creation still exists.
• To take advantage of this new method, during upgrade you must run the Default Settings Wizard after the
Configuration Wizard to install the templates for v9.0.2.
• To avoid any template name conflicts in the Templates directory in the Folder Explorer, (v9.0.2) is appended
to the template name.
• If you install a new instance of AppScan Enterprise, you can still access the templates from v9.0.1.1.
When you create a new content scan or template from the Scans view, select Create using previously
saved settings file and go to <install-dir>\AppScan Enterprise\Initializations\ASE
\DefaultTemplates\Job\Version 9.0.1.1 to select the *.xml file.
• The embedded version of Liberty is now v8.5.5.4. During configuration, you can choose to restore previous
AppScan Server customized settings on the Liberty Server. See Restore AppScan Server settings.
For further details on what's new and changed since v9.0.1.1, read this whitepaper.
Upgrading from 9.0
• AppScan Enterprise v9.0.1 includes an architecture redesign to reduce the installation footprint and to remove
IBM Rational Jazz Team Server (Jazz Team Server) as the user authentication component. With the removal
of Jazz Team Server, the Apache Tomcat and WebSphere Application Server deployment servers are no longer
supported in v9.0.1. They are replaced with IBM WebSphere Application Server Liberty Core v8.5.5.2. See
Replacing Jazz Team Server with WebSphere Liberty - Frequently asked questions on page 122.
• For new instances of v9.0.1, the risk rating formula has changed. If you are upgrading from v9.0, the risk
rating formula remains the same, and your risk ratings remain consistent. However, you can use the new
formula IF(businessimpact = 0, 0, IF(testingstatus > 0, 0, businessimpact *
rr_maxseverity)) by replacing the old formula in the application profile template in AppScan Enterprise.
• Issue management through application view: In v9.0, issue management privileges were set on the folder
that contained a scan. In v9.0.1, issue management is set on the application. Upon upgrade from 9.0, if a scan is
already associated with an application, users who used to have issue management privileges on the folder will now
have basic permissions on the application so they can continue managing these issues. There is the potential of
giving them access to scans they previously were not allowed to access. For example,
To restrict a user's permissions to managing issues on specific applications, remove them from the Basic Access
on the applications they are not allowed to access. In the example above, remove Mary's Basic Access permissions
on Scan X. To find the application that contains Scan X, go to the Scans view and flatten the hierarchy to show
only jobs. Find Scan X and click the link for the application name it is associated with. On the Application tab,
click View details and in the Users section of the dialog, remove Mary's Basic Access permissions.
Upgrading from 8.8
| Upgrading and migrating | 120
• Server Groups are no longer defined by URLs. Any existing URL definitions will be removed from existing
Server Groups. Check the WFCfgWiz.log for details.
• HTTPS has replaced HTTP as the scheme required for login and REST Services.
• Some reports have been removed because they no longer fit the product direction. Read the Deprecated features
topic.
Upgrading from 8.7
• Common scan engine between AppScan® Standard and AppScan® Enterprise: A new common scan engine
provides a more standardized scan job option configuration. As such, some reports are no longer available in
AppScan® Enterprise:
• Correlated Security Issues (AppScan® DE) report
• Image Catalog report
• Metadata Catalog report
• Missing Alt Text report
• Missing Titles report
• Multimedia Content report
• Server Side Image Maps report
• Third Party Links report
• Web Applications report
• Web Beacons report
• Website Technologies report
• Load balancing option removed: Load balancing on starting URLs and domains is no longer available with the
new standardized scan job option configuration. Upon upgrade, jobs that had load balancing set will use the new
common engine to run without the load balancing option.
• User licensing: The service account license type has been removed. Upon database upgrade, the Configuration
Wizard will set the service account license type to the same license type as the Default User (one of floating user
scanning, floating user reporting, authorized user scanning, or authorized user reporting).
• Enabling FIPS 140-2 compliance on the Enterprise Console: Name and behavioral changes to incorporate
NIST compliance have been made to the General Settings page where this is enabled on the Administration
tab. The "Enable enhanced security" check box has been renamed "Disable Manual Explorer Plugin", and upon
upgrade, the check box keeps the value it had before upgrade. If you were FIPS compliant, then this check box
remains selected; otherwise, it remains cleared. If your organization is a US federal agency and must comply with
FIPS 140-2 or NIST SP800-131a, enable the check box to make the Enterprise Console compliant with those
security standards.
• Case-sensitivity has moved from the domain to the job level. Set it on the job's What to Scan page.
• Deprecated reports: The OWASP Top 10 2010 report has been replaced with the 2013 version in v8.8. However,
if you have report packs and dashboards that used the 2010 report, the data will not be lost. New instances of
AppScan® Enterprise 8.8 will only use the 2013 report.
• Login attempts algorithm changes: Prior to version 8.8, the scan would attempt to log in three times before
suspending. Now the scan attempts for 90 seconds before suspending.
Upgrading from 8.6
Note: Upgrading to 8.7 includes a one-time database optimization step that requires additional time and could extend
the overall upgrade process.
• The previously used method for protecting data 'at rest' (physical media) has been deprecated and will be
removed as part of the upgrade process. Read Data protection through encryption on page 105 before you
begin upgrading.
• A new method is available, Transparent Data Encryption (TDE), which is built into Microsoft™ SQL Server
2008 Enterprise Edition and higher. See Enabling Transparent Data Encryption on SQL Server databases
| Upgrading and migrating | 121
on page 106 for details on encryption and how to enable TDE. To improve database upgrade performance,
enable TDE after the database upgrade has completed.
• For Microsoft™ SQL Server 2008 Standard Edition and higher, other third party encryption methods are
also available, including MS Windows™ Encrypting File System. See Encrypting, backing up, and restoring a
SQL Server database with EFS on page 108.
• Additional disk space is required during the upgrade process on the database server, roughly equal to
the size of the existing AppScan® Enterprise database. This space will be used temporarily during upgrade and
returned after upgrade is completed.
• Scans will now use a local (embedded) database file. It is important to have sufficient disk space that is
allocated to Agent Server machines. For more information, see the Dynamic Analysis Scanner section in
theInstalling all required components on one computer on page 55 topic for more information about how the
local database file works during scanning.
• Enabling FIPS 140-2 compliance: Products that support FIPS 140-2 standards can be set into a mode where the
product uses only FIPS 140-2 approved algorithms and methods.
• Previous folder items that were suspended are now "Ready" after upgrade. Any folder items that were in a
suspended state before upgrade are now in a ready state. An icon will identify these items so that you can decide
whether further investigation or actions are required.
• XRule filters on report packs: XRule filters were removed from report packs. Any reports that contain XRules
will contain more data after the report pack is rerun.
Upgrading from 8.5.0.1
• Aligning default scan job options with AppScan® Standard: Existing jobs and templates that are created in
versions before 8.6 do not automatically update to use new job options that have new default values. Only new
job/templates use new default values.
• Installer/config wizard workflow: During installation of v8.6, you can choose to install a brand new Jazz™ Team
Server or use an existing one.
Upgrading from 8.5.0.0
• User Licenses: During upgrade, the License Serve is queried to determine which user license you have the most
licenses for, and changes the license type for all users (excluding the Service Account and Product Administrator)
to that license type. If you must change the license type for any of your users, go to Administration > Users and
Groups and change them there.
• Finding variants: When you import an assessment file from AppScan® Source, if the findings differ only by the
trace, AppScan® Enterprise rolls up those findings into a single issue with multiple variants.
• Changes to service account: Service account impersonation no longer supported. Any jobs that use that service
account will suspend. Edit the properties with a proper username/password and re-run the job.
Upgrading from 8.0.0.0
Version 8.5 and 8.6 use the Rational® License Server. It is critical that you read and understand Product and user
licenses on page 39 before you install the current version.
7. In the Select fixes page, select the Interim fix check box, and click Continue.
8. Enter in your Passport Advantage credentials into the Sign in page and click Continue.
9. In the Download options page, choose your download method (Download Director or your browser), and click
Continue.
To install the fix pack:
10. Navigate to the directory where you downloaded the executable and double-click the files you downloaded..
11. In the Setup Wizard, click Next.
12. In the License Agreement dialog box, choose the "I accept the terms in the license agreement" option, and click
Next.
13. The Fix pack is installed. When the installation is finished, it will launch the Configuration Wizard (If Config
Instances is selected); click Next.
14. Exit the installation.
7. I still use WebSphere® Application Server for other HCL® applications. Will I need to do anything to make sure
that nothing is affected by these new changes in v9.0.1?
WebSphere® Application Server can co-exist with Liberty, provided they use different ports. During AppScan®
Enterprise configuration, you can change the port number for Liberty from 9443 to use a different number.
8. What happens to the ASC application of AppScan® Enterprise that runs on Tomcat?
WebSphere® Liberty Profile replaces Tomcat + Jazz™ Team Server + ASC. A Liberty profile is created, and
uses the same instance name as AppScan® Enterprise. The configuration wizard makes all of these changes for
you. You can remove the reference to the ASC application in WebSphere® Application Server if you wish. The
asc.properties file is kept after upgrade for use if you use AppScan® Source with an Oracle database.
9. In my current environment, I have a Jazz™ Team Server for ASE and a different Jazz™ Team Server for Rational®
Quality Manager. They are both pointing to the same LDAP server. What happens to My RQM Jazz™ Team Server
instance if you are removing Jazz™ Team Server from AppScan® Enterprise v9.0.1?
Both products use different versions of Jazz™ Team Server, and so the Jazz™ Team Server version used by
Rational® Quality Manager will not be affected by the removal of Jazz™ Team Server in AppScan® Enterprise
v9.0.1. During upgrade, the AppScan® Enterprise installer removes the Jazz™ Team Server that the previous
version used and replace it with Liberty. The new Liberty server is used to point to the LDAP server. Because
Rational® Quality Manager and AppScan® Enterprise have the same user base registered in the LDAP server, users
are still recognized by both products. No extra work is required to re-input users.
10. Will AppScan® Enterprise retain the mapping between user groups and LDAP groups?
Yes. We retain the server host, server port, base dn, and the uid mapping.
11. Do I need any certificates for Liberty to secure IIS?
Yes. If you don't have a server certificate, you can request one from your certificate authority and then use it
during the configuration wizard. See Using a certificate in your certificate store with Liberty on page 52.
12. I'm a US federal government agency. Does Liberty support FIPS 140-2 and NIST SP800-131a security standards?
Switching to Liberty does not affect the level of support that is provided in previous versions. See Enabling FIPS
140-2 or NIST SP800-131a on WebSphere Liberty Profile on page 111.
13. I use a non-standard port number for Jazz™ Team Server. Will the move to Liberty respect this use?
Yes. Using a non-standard port is supported; modify the default port during configuration.
14. Can I upgrade from all previous versions of AppScan® Enterprise? What happens for my particular deployment
scenario?
All previous versions can upgrade to use Liberty. This table explains how the upgrade works for each deployment
scenario:
Upgrade scenarios
Jazz™ Team Server with Windows™ authentication During installation and configuration, all the necessary
(also applies to AppScan Source with Windows settings are propagated. No user action is required.
authentication)
Jazz™ Team Server + LDAP on remote server During configuration, you must enter LDAP settings
when prompted. You can delete the ASC application
from Jazz™ Team Server if wanted.
Jazz™ Team Server (using JTS user authentication You must manually add those users into the Liberty
only) on local or remote server server.xml file. This file is stored in <install-
dir>\AppScan Enterprise\Liberty\usr
\servers\ase.
WebSphere® Application Server + LDAP on remote During configuration, you must complete the LDAP
server settings when prompted. You can delete the ASC
application from WebSphere® if wanted.
AppScan® Source (using ASE Jazz Team Server users) During installation, AppScan® Enterprise uninstalls
Jazz™ Team Server on Tomcat, makes a backup of the
settings, and then deletes Jazz™ Team Server. Nothing
changes during configuration.
AppScan® Source (using LDAP users with Oracle Change the filepath in the asc.properties file
Source DB) from Jazz™ Team Server to Liberty. See Upgrading
the AppScan Source LDAP connection with an Oracle
database on page 132.
<basicRegistry id="basic">
<user name="mlee" password="p@ssw0rd" />
<user name="rkumar" password="pa$$w0rd" />
<user name="gjones" password="{xor}Lz4sLCgwLTs=" />
</basicRegistry>
Note:
a. You must use unique names for your users and groups.
b. Remove all trailing and leading spaces from the user and group names.
c. If user ID or password contains characters other than US-ASCII, make sure that the file is saved by using
UTF-8 character encoding.
| Upgrading and migrating | 126
6. Encode the password for each user by using the securityUtility encode command. The securityUtility
command line tool is available in the <install-dir>\AppScan Enterprise\Liberty\bin directory.
7. When you run the securityUtility encode command, you either supply the password to encode as an
input from the command line. If no arguments are specified, the tool prompts you for the password. The tool then
outputs the encoded value.
8. Copy the value output by the tool, and use that value for the password.
For example, to encode the password "GiveMeLiberty", run the following command: securityUtility
encode GiveMeLiberty. You can encode the password using the “aes? encoding type. If there is a
key.xml file located in the <install-dir>\AppScan Enterprise\Liberty\usr\shared
\config directory, provide the encryption key specified in key.xml to securityUtility. For
example, securityUtility encode --encoding=aes --key=<the_key_in_key.xml>
GiveMeLiberty. If you do not have a key.xml, you do not need to specify the --key option.
9. Restart the HCL AppScan Enterprise Server service. You can type "net start HCL AppScan
Enterprise Server" in a command prompt window, or follow these steps:
a) Go to the Windows Service Management Console (Start > Run > services.msc).
b) In the Services section, right-click HCL AppScan Enterprise Server and select Start Services in the menu.
10. If you install the Enterprise Console on more than one computer, you must repeat this process on every computer.
Note: Liberty does not provide a mechanism for password expiry, and changing passwords periodically is a
manual process that involves encryption steps as described next.
<basicRegistry id="basic">
<user name="mlee" password="p@ssw0rd" />
<user name="rkumar" password="pa$$w0rd" />
<user name="gjones" password="{xor}Lz4sLCgwLTs=" />
</basicRegistry>
3. Add the <feature>usr:WindowsRegistryFeature</feature> section back in.
4. Rerun the configuration wizard.
5. Delete server.xml.
6. Rename server.xml.backup to server.xml
If the user IDs that are recorded in the Liberty basic user registry match the user IDs that were specified in Jazz Team
Server, no further configuration is necessary, and the migration is complete. However, if the user IDs do not match
after migration, you can run a custom SQL script to remap older user IDs to newer ones. Run this custom script with
help from HCL.
| Upgrading and migrating | 127
Technical
Component Server Operating System Specifications Required Software
AppScan Enterprise
Server
SQL Server
AppScan Dynamic
Analysis Scanner
server
3. Validate identified software and hardware elements meet the system requirements.
4. Identify and document security elements:
• Installation account ID, rights and password
• Service Account ID, rights and password (used for database interaction)
• AppScan Enterprise URL
• Product administrator ID and password
5. Export or create a server certificate to use with IBM® WebSphere® Application Server Liberty Core.
6. Check that you have the correct AppScan® Enterprise Licenses for your upgrade.
7. Obtain AppScan® Enterprise 9.0.3 software from HCL® Passport Advantage®:
• AppScan® Enterprise Server and License Key Server
• AppScan® Enterprise Dynamic Analysis Scanner
8. If you use AppScan® Source, you can obtain the 9.0.3 software from HCL® Passport Advantage®. You also need to
upgrade your Oracle database.
9. Back up your SQL Server database.
10. If you upgrade your SQL Server, configure the SQL Server database for AppScan® Enterprise.
11. Verify product changes that might affect the version you are upgrading from.
| Upgrading and migrating | 128
Use these instructions for building a staging environment or if you are only upgrading your production environment.
1. Create three virtual or physical machines (one machine each for the SQL Server, AppScan Enterprise Server and
the Dynamic Analysis Scanner) to meet the system requirements.
2. Install required software (Application Services, SQL Server Services, etc.) to support the three components which
will make up the staging environment.
Note: If you do not install SQL Server on a separate machine, make sure that you specify "HOSTNAME
\SQL_SERVER_NAME" as the SQL Server name in the Database Connection window during configuration.
Liberty server does not support "." as a replacement for 'localhost'.
3. Back up the production database, and load the database into the staging SQL Server.
4. Install AppScan® Enterprise Server to the application server.
a) Go to the directory where you downloaded the executable file
(AppScanEnterpriseServerSetup_<version>.exe) and double-click the file.
Note: It might take a while for the next screen to appear.
b) If you do not have Rational® License Key Server installed on your network, install it when prompted.
c) In the Setup Wizard Welcome screen, click Next.
d) In the License Agreement window, select the I accept the terms in the license agreement option, and click
Next.
e) In the Destination Folder window, select a target location and click Next.
f) In the Ready to Install the Program window, click Install to proceed with the installation.
g) On the Setup Wizard Completed screen, select the check box to launch the Configuration Wizard and click
Finish.
h) Run the Configuration Wizard.
i) Run the Default Settings Wizard.
5. Install AppScan® Enterprise Dynamic Analysis Scanner to the dynamic scanner machines. Unzip to machine and
run ASE_DASSetup_<version>.exe. After you complete the installation, run the Server Configuration
Wizard, and repeat for all Dynamic Analysis Scanner machines.
6. Optional: Upgrade AppScan Source to version 9.0.3. See Upgrading AppScan Source for complete instructions.
7. If you use AppScan Source and connect with an Oracle database, modify the filepath to point to Liberty instead of
Jazz Team Server. See Upgrading the AppScan Source LDAP connection with an Oracle database on page 132.
8. If you upgrade from v8.8, the database is unencrypted. Read these topics to learn how to encrypt the database.
• Data protection through encryption on page 105
• Enabling Transparent Data Encryption on SQL Server databases on page 106
• Encrypting, backing up, and restoring a SQL Server database with EFS on page 108
Once the above steps have been completed, and your Information Security team is satisfied all components of the
running software in staging are functioning, stable, and ready for production use, upgrade to your production server.
Note: If your environment uses a named SQL Server instance for the AppScan Enterprise database, make sure that
TCP/IP is enabled in the SQL Server configuration manager, and restart the SQL services for SQL Server and SQL
Server browser. For example, if you specify the instance name as:SQL Server or Server\Instance name:
<sql_server_host>\<sql_server_instance> instead of SQL Server or Server\Instance
name: <sql_server_host>.
4. In the Server Certificate window, choose a certificate specific to your organization. This step helps you deploy a
secure AppScan® Enterprise in your environment. See Server Certificate on page 157.
5. In the Server Keystore screen, select a server keystore to be used by the Enterprise Console. If you exported
a .pfx file, select Public key cryptography standards #12 (PKCS #12). Browse to the location where you saved
| Upgrading and migrating | 132
the .pfx file, import it and enter the password you created when you exported the file. See Server Keystore on page
157.
#ssl.SocketFactory.provider=
#ssl.ServerSocketFactory.provider=
to
ssl.SocketFactory.provider=com.hcl.jsse2.SSLSocketFactoryImpl
ssl.ServerSocketFactory.provider=com.hcl.jsse2.SSLServerSocketFactoryImpl
f) Locate the list of cryptographic providers that are located after the line # List of providers and their preference
orders and replace it with the following list:
security.provider.1=com.hcl.crypto.fips.provider.HCLJCEFIPS
security.provider.2=com.hcl.jsse2.HCLJSSEProvider2
security.provider.3=com.hcl.crypto.provider.HCLJCE
security.provider.4=com.hcl.security.jgss.HCLJGSSProvider
security.provider.5=com.hcl.security.cert.HCLCertPath
security.provider.6=com.hcl.security.sasl.HCLSASL
security.provider.7=com.hcl.xml.crypto.HCLXMLCryptoProvider
security.provider.8=com.hcl.xml.enc.HCLXMLEncProvider
security.provider.9=org.apache.harmony.security.provider.PolicyProvider
security.provider.10=com.hcl.security.jgss.mech.spnego.HCLSPNEGO
g) Go to <install-dir>\AppScan Enterprise\Liberty\jre\bin and open a cmd window. Your
certificates must be at least 1024 in size and can be signed with a DSA or RSA signature algorithm. The
keytool utility can be used to generate a compatible keypair: 1 keytool -genkey -alias default -keyalg RSA -
keysize 1024 -dname CN=example -keystore fips.jks -storepass Liberty -keypass Liberty.
h) Save and close the file, and then rerun the configuration wizard.
2. To enable NIST SP800-131a:
a) Locate the installation directory of Liberty at <install-dir>\AppScan Enterprise\Liberty
\usr\servers\ase.
b) Add the -Dcom.hcl.jsse2.sp800-131=transition property to the jvm.options file to enable the JSSE2
provider to run in NIST transition mode.
c) Go to the server.xml file in the same directory and replace the sslProtocol="SSL_TLSv2" property with
sslProtocol="TLSv1.2".
d) Save and close the file, and then rerun the configuration wizard.
Administering
Learn how to administer the product.
| Administering | 134
User types
Every user is assigned a User Type by the Product Administrator. The User Type applies across an instance.
Product Administrator
The Product Administrator has full access to all areas and can perform the functions of any other type of user.
Standard User
Standard Users are users who are assigned a role in any folder. They can create applications. If the security model
within your organization permits, the Default User type can be set to Standard User. That way, the first time a new
user logs in, a new user account with a user type of Standard User will be automatically set up. This is a way of
automating the creation of new user accounts. Within folders or applications that they can access, a Standard User
can:
• Create applications
• Grant application access to users
• Create and delete folders in folders they can access
• Create, edit, run, view, and delete scan jobs
• Create, edit, run, view, and delete dashboards
• Create, edit, run, view, and delete report packs
• Grant or deny users access to report packs, dashboards and folders
• Classify issues according to their status
• Export report data
• Configure all options (Basic and Additional) in the AppScan Dynamic Analysis Client
No Access
Upon trying to log in, if the Default User is set to No Access, a new account will not be created. If the user has an
existing account, the account remains, but access is denied.
The No Access user type is often used to create an account in anticipation of the arrival of a new employee who will
require access at some future time.
Inherit Access
This user type only applies to users imported from an LDAP server. When a user with an Inherit Access user type
logs in for the first time, they will automatically be created as a user (whatever the Default User is) and be assigned
the user privileges associated with any LDAP group they belong to, if the group exists in the database and has been
granted access. If they belong to more than one group, they will inherit the highest permissions of all the groups they
belong to. Otherwise, their type will be No Access.
QuickScan User
QuickScan Users use a simplified view of the Enterprise Console to create quick, easy-to-use scans to test the
applications they are responsible for. Most users are QuickScan users. QuickScan Users can be given explicit
permissions on specific applications, but they cannot create them.
| Administering | 135
If a QuickScan user is given access to the advanced scan configuration for the template they are using, there are
restrictions on some of the scan options that they can modify. Here are some examples:
• What to Scan > Additional server and domains: Modify existing domains and make changes, but cannot add
new domain or delete existing domain.
• Exclude Paths and File > Overall Exceptions: Add new overall URL exception but not remove them.
• Explore options > Parser Setting: Add Search Patterns and Exclusions but not delete any.
• Explore options > WebSphere® Portal Advanced Settings: Modify the context root, but not delete them.
• Parameter and Cookies > Normalization Rules: Add new normalization rules but not delete them.
• Parameter and Cookies > Custom Parameter Definitions: Modify the existing parameters and cookies values
but cannot add or delete any.
• Parameter and Cookies: Modify the existing parameters and cookies values but cannot add or delete any.
• Login Management: Cannot delete URL from login sequence.
• Automatic form fill: Disable and enable Auto form fill values, but cannot add/delete/modify any.
• General Scan Options > Custom error pages: Cannot add/delete/modify any custom error pages.
• Malware: Add new exclusion patterns but not delete any.
• Advanced options > XRules: Modify XRules but cannot add or delete any.
User roles
One user can set up and run jobs that scan and analyze a website or application. Another user will only browse
through reports that detail the problems that were found with a website or application. Yet another user can set up and
administer users.
User roles are assigned on a per folder basis by a Product Administrator, and use a specific user license as well.
Job Administrator
Job Administrators can perform the following tasks:
• Create and delete folders
• Create, edit, and delete templates in Templates folders
• Create, edit, run, view, and delete scan jobs
• Create, edit, run, view, and delete dashboards
• Create, edit, run, view, and delete report packs
• Grant or deny users access to report packs, dashboards and folders
• Select test policies to run on allowed server groups in a content scan job
• Classify issues according to their status
• Retest security issues
| Administering | 136
Report Administrator
Report Administrators can perform the following tasks:
• Create and delete folders
• Edit report packs in Templates folders
• Create, edit, run, view and delete dashboards
• Create, edit, run, view and delete report packs
• Grant or deny users access to report packs, dashboards and folders
• Classify issues according to their status
• Export report data
• Retest security issues (only with scanning license)
Issue Manager
Issue Managers can perform the following tasks:
• Classify issues according to their status
• Retest security issues
• View dashboards and report packs
• Use templates
• Export report data
Report Consumer
Report Consumers can perform the following tasks:
• View dashboards and report packs
• Use templates
• Export report data
Related concepts
User types on page 134
Every user is assigned a User Type by the Product Administrator. The User Type applies across an instance.
How user types affect user groups on page 142
Every user is assigned a User Type by the Product Administrator. The User Type applies across all folders in an
installation.
Permission Description
Advanced View Gives Standard users who have a QuickScan role the
additional access to the advanced job configuration UI
from the QuickScan configuration.
Add Users/Groups Adds and edits users and groups but cannot edit user
security scan permissions.
Edit Users/Groups Edits users and groups, including user security scan
permissions. The user who is editing security scan
permissions can only assign scan permissions that they
have, unless the user who is editing also has Server
Groups or Security Test Policies permissions. Then all
scan permissions are available.
Configure Server Groups Creates server groups (a group of items that can be tested
as a unit) and assigns them to job administrators.
Configure Security Test Policies Creates security test policy (a predefined set of security
tests). Users must be assigned both a server group and a
test policy before they can run security scans.
Configure Global Scan Settings Provides access to the following pages in the
Administration tab: Agent Servers, Servers and
Domains, and Custom Error Pages.
Application permissions
View Trends Users can see the trend charts in the Dashboard tab.
Delete Any Application Users can delete any application, regardless of the access
that is given for the specific application.
Full DAST Client Configuration Access Users can view and edit both Basic and Additional scan
options in the AppScan Dynamic Analysis Client.
View Application Attributes on All Applications Users can view all applications. For example, you can
create a user type for a Chief Security Officer that allows
them to view applications, but not modify or delete
application properties.
Modify Application Attributes on All Applications Users can modify all applications, regardless of the
access that is given for the specific application.
Manage Access Control on All Applications Users can change the access for any individual
application, regardless of the access that is given for the
specific application.
| Administering | 139
Permission Description
Modify Application Profile Users can create, modify, or delete profile attributes
(except predefined attributes) to describe applications.
Issue permissions
Manage Issues on All Applications Users can perform issue management on all applications.
This permission is automatically added to the Basic and
Full access type.
Modify Issue Profile Users can create, modify, or delete profile attributes
(except predefined attributes) to define issues.
Modify Scanner Profile Users can create, modify, or delete profile attributes
(except predefined attributes) to define scanners that
import issues or findings.
Modify Application Profile Users can create, modify, or delete profile attributes
(except predefined attributes) to define applications and
the scans and users that are assigned to them.
Third-party integration permissions
QRadar Service Account This account uses a REST API to pull report data into
QRadar. It does not access the user interface.
Publish to QRadar Grants report access to QRadar.
Configure QRadar Integration Configures integration with QRadar and can revoke
report access.
Publish to SiteProtector Exports vulnerabilities to SiteProtector.
Configure SiteProtector Integration Configures integration with SiteProtector.
Those users will automatically be Report Administrators in any subfolder, unless an administrator (job, report,
or system administrator) manually changes their permissions. system administrators can also propagate user
permissions down the folder hierarchy at any time.
Note: All users with a Report Consumer role or greater in a folder are granted implicit access to a report pack or a
dashboard when one is created in that folder. You must specifically change their user access to No Access if you do
not want users to inherit access to an item. Implicit access is inherited through `All Other Users' when the user is not
listed on the Users and Groups page, and `All Other Users' is assigned access.
Access to a report pack or dashboard is considered explicit when you add a user/group to the Users and Groups page
of a report pack or dashboard and grant them access.
Related information
Viewing a report in Policy Tester results in error
Creating a user
Create a user and assign a user type to them. As a best practice, when you first create a new user you should give
them a No Access user type until you finish configuring their folder permissions, and then change their user type to
whatever type you want them to have. This prevents new users from being able to access areas they shouldn't if they
log in while you are still configuring their permissions.
| Administering | 141
Note: The user will inherit some properties from the Default User template. To change the Default User properties
the user inherits, you must edit the user's properties. If a user type is listed as "Restricted", you cannot change it
because that user type has additional administrative permissions that you don't have. You can only change user types
that have your access permission level or lower. For example, if you have a Standard User type, you cannot change
the Product Administrator user type.
User role: Product Administrator
1. Go to Administration > Users and Groups, and click Create.
2. On the Create User page:
a) Enter a Name for the user that is easy to recognize; for example, Bill Smith.
b) Enter the User ID using the Domain/Username format; for example, workgroup\billsmith.
Note: Do not use special characters, such as the percent sign (%). It might cause a 'session expired' error.
c) Choose a Type for this user.
3. Click Create to add the user is added to the list of users.
Related concepts
User types on page 134
Every user is assigned a User Type by the Product Administrator. The User Type applies across an instance.
Related tasks
Creating users with the Default User template on page 141
Most of the properties that a typical user will need can be given to the "Default User" template, and then used
automatically every time you create a new user.
Importing users
You can import individual users and assign a user type to them.
User role: Product Administrator
| Administering | 142
Related tasks
Defining custom user types on page 137
A user type is a set of permissions that are applied to a user so that they can perform certain administrative tasks.
Before creating user accounts, you must create custom user types if you want to assign limited administrative tasks to
Standard Users without making them full Product Administrators.
Importing LDAP user groups on page 142
You can import individual groups of users from an LDAP Server, and assign a user type to them. All groups must
have a valid LDAP account before they can be imported. A user group is used to calculate the effective permissions
when the user type is selected as Inherit access.
Make sure you restrict access to the report pack or to its folder so other users cannot see the Activity Log.
Managing a server
Product Administrators are responsible for managing each server to its optimal performance.
User role: Product Administrator
1. Go to the Agent Servers page of the Administration view.
2. Check the number and status of items (jobs, report packs, or dashboards) associated with each server: Use the
Current® Items section to see the status of items and click the Refresh icon to refresh the item's status. You might
have locked the server and you want to see if anything is running on it. You might need to discover which server
a particular job is running on. There might be too many items running (jobs, report packs, or dashboards) and you
believe more agent servers are needed to distribute the load.
3. Specify the maximum number of agents that can run concurrently on a server. Change the maximum number when
you want to optimize the load on your server.
4. Lock or enable a server. Lock a server to prevent any more items from running on it, such as before disconnecting
the server from the network, rebooting the server, or installing software on it.
a) Identify the server to be taken out of service.
b) Click the Name of the server.
c) On the Server Properties page, click Lock or Enable.
d) Click Save.
Note: The number of jobs running can exceed the maximum number of agents assigned to the server because the
number of jobs running includes jobs that are now in postprocessing. These jobs are no longer using an agent on
the server.
3. There might be times where you must remove the job from the queue, suspend the job, or stop it before it finishes
running. You can remove the job from the queue only if it is waiting to run. For jobs that are running, select the
job and choose one of the following options from the menu:
Each test looks for one specific issue. For example, one test modifies a path in a request; another test modifies user
input to include a character that should be invalid. For each test you can define multiple conditions:
• Filter: What conditions must be met to run the test.
• Modification: What are the changes that are made to the request.
• Validation: What conditions must be met for the test result to be considered positive.
1. Go to Main menu > Administration > User Defined Tests.
2. Browse to the location of the *.udt file and import it. It appears in the list of tests on the page when the import was
successful.
Note:
a. Each *.udt file can contain many user-defined tests.
b. Give each file a unique name to avoid conflicts.
If they are discovered in subsequent content or import scans, user-defined tests appear as Issue Types in the Security
Issues report.
3. Placing the data files and log files on separate physical disk drives can improve performance substantially. Make
sure that these physical disk drives have enough free space to allow for database growth.
Backup strategy
Because the database log files can grow in size between SQL Server backups, back up the database daily. Depending
on the frequency with which activities (such as report pack and dashboard generation, import jobs) are run, it might
be possible to do incremental backups frequently and full SQL Server backups less frequently. It is not necessary to
conduct backups while the database is quiet, but backup operations can be scheduled for times when the database is
known to be less busy. If your organization employs a regular maintenance window for servers, then this time might
be an ideal time to conduct the SQL Server backup.
For large organizations where the database is never, or rarely, quiet, consider using commercial backup software that
is configured to back up SQL incrementally.
Database recovery
If there is a catastrophic hardware failure, the database can be restored from the last SQL Server backup by using the
'Restore database' command in Microsoft™ SQL Server Management Studio.
Database maintenance
After the application is installed, a database maintenance plan must be established. Use the 'Maintenance Plan wizard'
to create the plan and schedule it. In the wizard, select these options:
• Check database integrity
• Shrink the database
• Reorganize the index
• Update statistics
• Do a full backup of the database
Disk defragmentation
Disk fragmentation occurs over time as files are created, deleted, and change in size. Consider using the Windows™
tools to periodically defragment disks when the database is not being used and can be taken down for maintenance.
| Administering | 148
2. Template stored procedures that are used to create stored procedures that perform an operation on the data for a
particular content scan job.
The names of these stored procedures begin with the prefix wt_; for example: wt_RepEntityInsert,
wt_VulnerabilityInsert.
3. Stored procedures that perform operations on the data for a particular job iteration.
These stored procedures are created from the template stored procedures the first time an item is run. The name
of the stored procedure begins with the prefix wi_, followed by the item identifier, item iteration, and operation
name; for example: wi_21_0_RepEntityInsert, wi_21_1_VulnerabilityInsert.
Referential integrity in the application is performed at the database level. All foreign key constraints are defined in the
database.
can "take ownership" of the job. When a Job Administrator takes ownership of a job, the available security test
policies and server groups become those of the new Job Administrator.
1. Go to the Folder Content Summary, select the job, and click Edit.
2. On the General Properties page, click Select Job Owner, and choose yourself as the new job owner.
3. Click Select Job Owner > Save.
Assigning security test policies and server groups to users on page 152
This workflow provides many benefits: The security team uses a richer environment to select scan options in
AppScan Standard. This method is a one-step process to provide these templates to developers in AppScan
Enterprise. It produces more consistent results across the organization, and provides the same user experience during
job configuration. It improves the configuration experience for developers, who often don't have much security
knowledge, and provides them with the ability to configure action-based login and manual explore features.
There are some upgrade considerations to know about:
• The new method is accessed from both the Monitor and Scans views.
• Existing scan templates from v9.0.1.1 are kept after upgrade, and the old method of QuickScan template creation
still exists. To take advantage of this new method, during upgrade you must run the Default Settings Wizard after
the Configuration Wizard to install the templates for v9.0.2.
• To avoid any template name conflicts in the Templates directory in the Folder Explorer, (v9.0.2) is appended to
the template name. If you install a new instance of AppScan Enterprise, you can still access the templates from
v9.0.1.1. When you create a new content scan or template from the Scans view, select Create using previously
| Reference | 153
Reference
License Server
Specify the Rational® License Server to use for licenses.
1. If you installed a local license server during installation, <localhost> will be pre-populated in the field.
2. If you are using a single license server and a port in the default port range (27000-27009), enter the license server
name in the License server box. Otherwise, click the Advanced button to display the advanced license server
view.
| Reference | 154
3. In the advanced license server view, enter the license server name in the Server box. If you are using redundant
license servers, you can enter up to three redundant server names, separated by a comma (for example,
server1,server2,server3).
Note:
• The port number is not needed if the license server(s) in the Server box are using a port in the default port
range. Otherwise, enter the port number used by the license server(s).
• Licenses are searched for on the license servers in the order in which they appear in the 'License server search
order' list.
• The license servers you choose during configuration apply to all instances configured on this Server.
Server Components
Select the components you want to configure. The components available to you depend on the license.
Component Description
User Administration User administration for LDAP authentication.
Enterprise Console Enterprise reporting, collaboration, and the ability to
conduct dynamic analysis assessments. Select this
component for AppScan® Enterprise and for AppScan®
Source distributed deployments that only require
Windows™ authentication.
Dynamic Analysis Scanner Scanning and testing web applications. Select this
component for an AppScan® Enterprise deployment.
| Reference | 155
Instance Name
Specify the name of the instance you want to configure.
1. If you are installing only one instance on this computer, select the Select or create a default instance check box
and then click Next.
2. If you are installing more than one instance on this computer, clear the Select or create a default instance check
box, enter a name for the instance, and then click Next. You will be given the option to configure another instance
at the end of the wizard.
Related tasks
Uninstalling an instance of the Enterprise Console on page 117
Remove instances that are no longer needed on a single server.
Database Connection
Enter the SQL Server name, port number, and the name of the database you are connecting to. You can click Test
Connection to make sure you can connect to the SQL Server. The configuration wizard does not proceed until the
connection is successful.
Note:
1. The syntax for the SQL Server name has changed with the introduction of Liberty support. ".
\SQL_SERVER_NAME" no longer works. Use "HOSTNAME\SQL_SERVER_NAME" instead.
2. If your environment uses a named SQL Server instance for the AppScan Enterprise database, make sure that TCP/
IP is enabled in the SQL Server configuration manager, and restart the SQL services for SQL Server. Use the port
number of the named SQL Server instance instead of the default port number (1443).
3. If you have multiple instances and want to remove an instance that is no longer required:
• Clear the Use default name check box.
• Select the name of the relevant instance, click Remove, confirm the removal when prompted, and finish the
wizard.
cryptographic algorithms. Use this method to encrypt the database file if you have SQL Server Standard Edition 2008,
2008 SP3, 2008 R2 SP2, 2012, and 2014.
Service Account
Specify the service account that will be used by the services.
During the configuration of the components you install, you must enter service account information. This service
account allows the agents to access the database server. Individual users do not require any form of database
permissions. The service accounts used for the agents and the database should have passwords that do not expire. If,
however, the passwords must change at regular intervals, you can rerun the Configuration wizard on all the AppScan®
Enterprise Server and Dynamic Analysis Scanner computers and enter the new password.
The Local System User account and the Service Account can be a single account, with the same user name and
password.
The service account is granted db_owner rights to the database and must have permissions that allow it to create a
database and tables, add users, run stored procedures, and grant rights.
With a SQL Server database, you can use a single service account or multiple service accounts, depending on how
you decide to install.
Registry permissions
The service account must have the following permissions:
• Read and Execute
• Write
• Delete
Related reference
Required user account information during installation and configuration on page 33
During installation and configuration, various user accounts are used, each with specific permissions. The Service
Account and the Local System User account can be a single account, with the same user name and password.
However, if your organization requires a separation of duties, use the Local System User Account during installation
and configuration, and then use the Service Account for maintaining SQL Server database access.
| Reference | 157
Server Certificate
For security reasons, HTTPS is enabled for Enterprise Console. Choose a certificate from the list of certificates that
are installed in IIS. Taking these actions will help you deploy a secure AppScan® Enterprise in your environment.
Server Keystore
If you choose to use a keystore that contains a trusted certificate chain for this host, complete the available fields.
• If you exported a certificate .pfx file, select Public key cryptography standards #12 (PKCS #12) as the Keystore
Type.
• Browse to the location where you exported the certificate .pfx file.
• Enter the keystore password that you created when you exported the .pfx file.
Authentication Mechanism
Select an Authentication Mechanism to use to log into the Enterprise Console. If you choose Windows, you must be
part of a domain.
LDAP authentication
• When you configure LDAP authentication in the configuration wizard, you can specify any user account to be the
product administrator if the user exists in the LDAP server.
• When you log in to AppScan Enterprise, don't prefix the user name with a domain name.
• If your LDAP server supports SSL, select the Connect to LDAP server using SSL check box. Some of the
LDAP configuration fields are pre-populated for you. Check that they are correct for your environment.
• When you select an LDAP Server Type, default settings for the LDAP Server Port, User Filter, and User ID
Map fields are automatically filled in for you. However, you must understand the syntax required for each field
so that the connection to Liberty works successfully. Contact your LDAP administrator to get the settings for your
environment, especially for filtering users.
Related information
Configuring a basic user registry for the Liberty profile
Configuring LDAP user registries with the Liberty profile
Product Administrator
This user is licensed separately; if you want to reassign the Product Administrator license, you must rerun the
configuration wizard.
• For Windows authentication, provide your user name and full name.
• For LDAP authentication, provide your User ID, name and password.