IBM BS029ML Self Help Guide - Page 110

Secure communications over SSL, 4.1.8 Integration with Tivoli Access Manager and WebSEAL

Page 110 highlights

The general guidelines for configuring PAC are summarized in the white paper Performance tuning of Portal Access Control, found at: http://www.ibm.com/developerworks/websphere/library/techarticles/0508_buehler/0508 _buehler.html Although this white paper was written for Version 5, many principles are still applicable to Version 6. 4.1.7 Secure communications over SSL Secure communication over the wide-open unprotected internet is essential to many business applications. It builds up consumer confidence and protects sensitive data transmitted through the internet. Secure Socket Layer (SSL) or its successor Transport Layer Security (TLS) are the protocols that leverage a variety of cryptographic algorithms to implement security. Even within corporations, the communication through the intranet is not necessarily safe. As a matter of fact, reported internal attacks constitute an alarming 45 - 50% of the total cases. Sensitive information passed around the corporate networks are subject to attacks by disgruntled or dishonest employees. Companies put themselves at risk by holding and passing sensitive information without protection. Internal threats can generally be categorized as the following three types: Corporate espionage: Employees or contractors may be recruited and paid by competitors to steal company secrets. Malicious employees: Current and recently terminated employees may want to cause damages to the company by destroying valuable data or files, or causing network disruption. Unintentional breaches: Employees put the network at risk by installing unauthorized software, opening virus-infected e-mail attachments, succumbing to social network attacks, and so on. When designing your Web sites based on WebSphere Portal, you should understand clearly what data is sensitive and needs protection. Depending on the nature of the application, you may want to secure the entire site or only a portion of it. The WebSphere Portal infrastructure provides the flexibility of a range of solutions that suit your requirements. On the other hand, you have to understand that there are performance implications when configuring SSL due to its protocol nature, that is, a handshake phase is required to establish the trust relationship between the communication parties, and then there is an exchange of keys. In addition, all communications over SSL channels must be encrypted at the source and decrypted at the destination. This process will impact processing on all requests going through the secured channel. Also, the configuration makes certain cache options impossible. Depending on the encryption algorithm, the length of the encryption key, the complexity of the data, and other factors of the network, the overhead of SSL can be between 10 - 50%. In most cases, using SSL accelerator will help performance. 4.1.8 Integration with Tivoli Access Manager and WebSEAL For WebSphere Portal authentication, you can use the native authentication mechanism provided by the underlying WebSphere Application Server infrastructure, or an external security manager such as Tivoli Access Manager for e-business (TAM). The integration of WebSphere Portal and TAM provides a single central authentication point for one or more systems and other Web applications, thus providing easier management of security assets. 96 IBM WebSphere Portal V6 Self Help Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

96
IBM WebSphere Portal V6 Self Help Guide
The general guidelines for configuring PAC are summarized in the white paper
Performance
tuning of Portal Access Control
, found at:
_buehler.html
Although this white paper was written for Version 5, many principles are still applicable to
Version 6.
4.1.7
Secure communications over SSL
Secure communication over the wide-open unprotected internet is essential to many business
applications. It builds up consumer confidence and protects sensitive data transmitted
through the internet. Secure Socket Layer (SSL) or its successor Transport Layer Security
(TLS) are the protocols that leverage a variety of cryptographic algorithms to implement
security.
Even within corporations, the communication through the intranet is not necessarily safe. As a
matter of fact, reported internal attacks constitute an alarming 45 - 50% of the total cases.
Sensitive information passed around the corporate networks are subject to attacks by
disgruntled or dishonest employees. Companies put themselves at risk by holding and
passing sensitive information without protection. Internal threats can generally be categorized
as the following three types:
±
Corporate espionage: Employees or contractors may be recruited and paid by competitors
to steal company secrets.
±
Malicious employees: Current and recently terminated employees may want to cause
damages to the company by destroying valuable data or files, or causing network
disruption.
±
Unintentional breaches: Employees put the network at risk by installing unauthorized
software, opening virus-infected e-mail attachments, succumbing to social network
attacks, and so on.
When designing your Web sites based on WebSphere Portal, you should understand clearly
what data is sensitive and needs protection. Depending on the nature of the application, you
may want to secure the entire site or only a portion of it. The WebSphere Portal infrastructure
provides the flexibility of a range of solutions that suit your requirements.
On the other hand, you have to understand that there are performance implications when
configuring SSL due to its protocol nature, that is, a handshake phase is required to establish
the trust relationship between the communication parties, and then there is an exchange of
keys. In addition, all communications over SSL channels must be encrypted at the source and
decrypted at the destination. This process will impact processing on all requests going
through the secured channel. Also, the configuration makes certain cache options impossible.
Depending on the encryption algorithm, the length of the encryption key, the complexity of the
data, and other factors of the network, the overhead of SSL can be between 10 - 50%. In
most cases, using SSL accelerator will help performance.
4.1.8
Integration with Tivoli Access Manager and WebSEAL
For WebSphere Portal authentication, you can use the native authentication mechanism
provided by the underlying WebSphere Application Server infrastructure, or an external
security manager such as Tivoli Access Manager for e-business (TAM). The integration of
WebSphere Portal and TAM provides a single central authentication point for one or more
systems and other Web applications, thus providing easier management of security assets.