200 likes | 350 Views
Building an Effective Extranet. Sumner Blount Product Manager Netegrity. Products and Services for e-Business. Publicly traded (NASDAQ: NETE) 4 Years of experience providing security products and services to over 400 firms 1998 Revenues: $5 million
E N D
Building an Effective Extranet Sumner Blount Product Manager Netegrity
Products and Services for e-Business • Publicly traded (NASDAQ: NETE) • 4 Years of experience providing security products and services to over 400 firms • 1998 Revenues: $5 million • Industry leader in secure user management market
Key Issues in Extranets • Directories - how to track and manage users, whether they are employees, partners, or customers. • Security - how to limit access to sensitive information to properly authorized people. • Integration - how to integrate the security model with the directory infrastructure • Scalability - how to support huge numbers of users and policies • Extensibility - to meet unique needs of each environment
Current Directory Situation “On average, a corporate user name appears in 16 different places, each of which must be administered” - PC Week, 7/21/97 “The average Fortune 1000 company has 181 directories, and 42% synchronize their directories manually” - Forrester, 7/14/98 Other Apps HR Email Partners Name: Org: Title: Salary: Name: Company: Security: Name: etc,etc…. Name: Email:
Directories: What’s the Payback?The cost of doing nothing Dir-1 Dir-2 ..... Dir-n $ $$$ $$ Config Admin Training Maintenance $$$ $$ $ $ $$$ $$ $ $$$ $$ Total: Lots of $$$$$$$’s
ROI: The Cost of Redundant Directory Administration An example of directory administrative costs: • Assumptions: • Directories: 6 • Users: 25,000 • Turnover: 20% • Edit time: 15 min Source: The Burton Group
Key Issue: Extranet SecurityWhy is it so critical? • Your “family jewels” are heavily exposed! Your business information and processes could be your competitive advantage • Partner relationships are dynamic - today: your partner. Tomorrow: your competitor • Your partner companies are multi-faceted - one division might be a partner, another a competitor.
Web content…. Web content…. Web content…. Web content…. Web content…. Web content…. • Combinations (“AND”) • Fallbacks (“OR”) Extranet Authentication • Flexible authentication schemes • Basic • Certs • Tokens • Forms • Custom • Authentication “levels” for easier single sign-on • Authen. methods associated with resource security Employees Partners Customers Requirements:
Extranet Access Control • Provide Higher-level abstraction than ACLs • Provide permissions on sub-page objects • Allows easy personalization of content • Requires: both static and dynamic permissions • Provide Policies attached to any directory object • Integrate access control with business logic
Users Privileges Users Privileges Users Privileges The Traditional Approach Hundreds of eCommerce Apps. Separate Directories and Access Controls Millions ofUsers MultipleLog-ons OrderStatus Log-on BillingStatus Log-on Claims Log-on
Application Servers Directory Servers Web Servers Authentication Servers The Result:Disparate technologies make sites difficult to navigate & manage
Web Servers Application Servers Authentication Servers Directory Servers The Solution:Secure User Management Policy Server Controlling access for hundreds of applications and millions of users
SiteMinder: Secure User Management • Centralized access control • Single sign-on • Full, native directory integration • Distributed user management SiteMinder is a secure user management system that provides...
SiteMinder Architecture Users Application Servers Custom Applications Resources WebServer(s) ISAPI or NSAPI HTTP, SSL Web Agent Encrypted TCP Employees Partners Customers • Web Agent: • URL • HTML Page • Active Server Pages • Application Server Agents • Application rights • Custom Agents: • Client-Server Apps SiteMinderPolicy Server(s) Directory Service(s) LDAP, ADSI, ODBC
SiteMinder Authorization • Based on Access Control Rules & Policies • Rule = Action + Resource + Time + <Active Rule> • Policy = Rule(s) + Directory Object + Response + <Active Policy> • The user’s DN from authentication maps to the correct policy • Policies can be bound to any directory object or “ou” • Policies can be bound to any attribute search constraint • The Active Rules and Policies API provide integration of business logic with authorization decisions.
Native Directory Integration User and Group information NT Domain Netscape Directory Novell NDS • All user + group information is obtained from directory • Policy info can also be stored in LDAP directory • Support for Directory “Chaining” SiteMinderPolicy Server
App Server Non-HTTP Application (early 99) IIS (NT) Netscape (NT,UNIX) SiteMinder Single Sign-On Firewall Web Agent Web Agent App Agent Custom Agent RADIUS Services Policy Server
WebServer WebServer WebServer Web Agent w/Cache Web Agent w/Cache Web Agent w/Cache Policy Server w/Cache Policy Server w/Cache Policy Server w/Cache Directory Server Directory Server Extranet Scalability: Load Distribution and Replication/Failover Requests from web server can be distributed across Policy Servers Requests from Policy Servers can be distributed across Directory Servers Replication
Extranet ExtensibilitySAFE: Secure Access Framework for Enterprises Custom interfaces Custom Agents Policy Mgt. interface Agent Interface SiteMinderPolicy Engine DirectoryServices Interface(LDAP, ADSI) Other Directories AuthorizationInterface AuthenticationInterface RADIUSInterface Policy Extensions Auth. Methods RADIUS Clients
Summary • Corporate extranets are experiencing very high growth • The key requirements for extranet deployments are: • A central model for managing all access • Native directory integration • Distributed & delegated user management • Single Web Sign-on • Scalable to millions of users