SI50 Security
SI50 Security
Contents
Security Overview......................................................................................................................................6
Sterling Integrator Security Policy Overview............................................................................................................................6 Network Deployment Planning.................................................................................................................................................7
Passwords..................................................................................................................................................44
Password Policies....................................................................................................................................................................44
Contents
Custom Password Policy.........................................................................................................................................................45 Example: Password Policy Example.......................................................................................................................................45 Installation Password or Passphrase........................................................................................................................................46 Custom Policy Password Checklist.........................................................................................................................................46 Example - Custom Policy Password........................................................................................................................................46 Search for Password Policies...................................................................................................................................................47 Create Password Policies ........................................................................................................................................................48 Edit Password Policies.............................................................................................................................................................49 Delete Password Policies ........................................................................................................................................................49 Change the Number of Days for User Password Expiration ..................................................................................................49 Reset Your Own Password After Lockout...............................................................................................................................50 Define Error Message for Custom Password Policy...............................................................................................................50 Specify the Custom Password Policy Extension in the customer_overrides.property file......................................................51 Add the Implementation class JAR to the Classpath for the Custom Password Policy..........................................................51
LDAP Authentication...............................................................................................................................52
Lightweight Directory Access Protocol (LDAP) as an Authentication Tool for Sterling Integrator.......................................52 Example: LDAP Authentication Configuration Parameters....................................................................................................53 LDAP Authentication Configuration Checklist.......................................................................................................................54 Configure LDAP in Password Binding Mode.........................................................................................................................54 Configure LDAP in Password Comparision Mode.................................................................................................................54 Configure LDAP with Sterling Integrator...............................................................................................................................55 Verify LDAP Configuration....................................................................................................................................................58
User News.................................................................................................................................................59
User News................................................................................................................................................................................59 Create User News Messages for All Users..............................................................................................................................60 Create User News Messages for Specific Users......................................................................................................................60 Search for User News Messages.............................................................................................................................................61 Edit User News Messages ......................................................................................................................................................61 Delete User News Messages....................................................................................................................................................62
Document Encryption..............................................................................................................................63
Document Encryption Feature Overview................................................................................................................................63 Encryption Key for Document Encryption..............................................................................................................................64 Assign a Different Certificate for Document Encryption........................................................................................................64 Enable Document Encryption for File System and Database Documents..............................................................................64 Enable Document Encryption for Database Documents.........................................................................................................65 Enable Document Encryption for File System Documents.....................................................................................................65 Disable Document Encryption for Documents........................................................................................................................65
Certficates.................................................................................................................................................67
Digital Certificates ..................................................................................................................................................................67 Supported Digital Certificates.............................................................................................................................................67 CA Certificates........................................................................................................................................................................68 CA Certificate Names..........................................................................................................................................................68 Benefits of Self-signed and CA-signed Digital Certificates....................................................................................................68 Expiration Dates for Certificates.............................................................................................................................................69 System Cerificate Parameter Definitions................................................................................................................................69 Certificate Wizard....................................................................................................................................................................70 Sterling Certificate Wizard..................................................................................................................................................70 Download and Install the Sterling Certificate Wizard.........................................................................................................70
Copyright IBM Corp. 2012 3
Start the Sterling Certificate Wizard....................................................................................................................................71 Generate a Certificate Signing Request (CSR) Using the Certificate Wizard.....................................................................71 Create a Key Certificate Using the Certificate Wizard........................................................................................................72 Validate a Key Certificate Using the Certificate Wizard.....................................................................................................72 Certificate Tasks......................................................................................................................................................................73 Create a Self-Signed Certificate .........................................................................................................................................73 Configure Status Information on Certificate Summaries....................................................................................................74 Configure Thumbprint Displays..........................................................................................................................................74 Search for CA Certificates ..................................................................................................................................................75 View CA Certificate Summary Information........................................................................................................................75 Check In CA Certificates from the UI.................................................................................................................................75 Check In CA Certificates from the Console .......................................................................................................................76 Edit CA Certificates............................................................................................................................................................77 Delete CA Certificates ........................................................................................................................................................78 Search for System Certificates ...........................................................................................................................................78 Edit System Certificates in Sterling Integrator....................................................................................................................78 Identify System Certificates in Sterling Integrator..............................................................................................................78 Check the Expiration Date of a System Certificate ............................................................................................................79 Export System Certificates in Sterling Integrator................................................................................................................79 Delete System Certificates in Sterling Integrator................................................................................................................79 Check Out System Certificates ...........................................................................................................................................80 Search for Trusted Certificates ...........................................................................................................................................80 Check In Trusted System Certificates ................................................................................................................................81 Edit Trusted Certificates .....................................................................................................................................................81 Delete Trusted System Certificates ....................................................................................................................................82 Import PKCS12 System Certificates ..................................................................................................................................82 Check In PKCS12 System Certificates ..............................................................................................................................82 Import Pem System Certificates..........................................................................................................................................83 Import Key System Certificates .........................................................................................................................................83 Import Keystore System Certificates ..................................................................................................................................83 Check In Key System Certificates ......................................................................................................................................83
Proxy Servers............................................................................................................................................87
Proxy Servers ..........................................................................................................................................................................87 Configure HTTP Proxy Server................................................................................................................................................87 Configure SSP Proxy Server...................................................................................................................................................88 Configure a Proxy Server for SSL...........................................................................................................................................88 Edit Proxy Servers...................................................................................................................................................................88 Delete Proxy Servers...............................................................................................................................................................89
SSL............................................................................................................................................................90
SSL..........................................................................................................................................................................................90 Client Adapters for SSL...........................................................................................................................................................91 Server Adapters for SSL..........................................................................................................................................................91
Contents
Copyright..................................................................................................................................................94
Security Overview
Sterling Integrator Security Policy Overview
Sterling Integrator uses a variety of security mechanisms, including system passwords for administrative functions, password policies based on your companys security policies, and role-based security to provide different levels of access to different users within the organization. The following are the provided out of the box: Role-based security provides users access to certain files, business processes, Web templates, services, and product features, according to the permissions associated with the user account. Password policies are sets of security decisions that you make and apply to different user accounts according to security policies in your company. These choices include such items as the number of days a password is valid and the maximum and minimum length of a password. LDAP authentication can be used with the application to delegate authentication of an external user account to an LDAP directory and to provide authentication using the same security information used for other applications in your company. If your company has already adopted LDAP, you can use your existing LDAP directories with the application. System Installation password/passphrase - During installation, you create a system passphrase for your Sterling Integrator installation. The passphrase is a highly complex string longer than 16 characters. The system passphrase is required to start the system and to access protected system information. Digital Certificates provides information about the identity of an entity. Digital certificates are issued by a certification authority (CA). The CA guarantees the validity of the certificate information. Federal Information Processing Standards (FIPS) Secure Socket Layering (SSL) is a protocol that provides secure communication over the Internet. It uses both symmetric and asymmetric cryptography Additionally, the following security features can be configured: Security time out feature can be used to protect your system. For example, if you depart and come back to the computer and try to start working again, and if this time period is beyond the time out setting in your user account, you are prompted to log in again. Web Extensions also uses the same security time out feature Custom Password Policy feature allows you to add additional password policy rules. These additional password rules can help you prevent the use of weak, easily hacked passwords and reject non-compliant passwords.
Single Sign On (SSO) feature is an authentication process that enables users to access several applications and only have to enter one user name and password. Document Encryption feature allows for the configuration of an additional layer of security beyond the traditional file and database permissions.
Groups
Groups are collections of permissions. Groups make it possible to maintain access permissions for several users from a single place. Groups help to minimize the amount of work involved with maintaining accounts, especially when several users perform the same job function. You can associate many permissions to different users by creating groups for each job function instead of each user. You can also assign a group as a subgroup to another group. For example, a procurement department has five procurement specialists that all perform the same jobs. Instead of applying permissions to each individual procurement specialist user account, you can create a procurement group and maintain access permissions for all procurement specialists in one group. Within the procurement group, you can assign subgroups to further refine your access permissions according to the type of procurement the specialist conducts. You can assign subgroups named office supplies, machinery, general equipment, or vehicles to the procurement group to refine access permissions.
To avoid overwriting when applying upgrades or patches, do not modify the groups that come preconfigured with the application. Groups tasks include: Create a group Search for a group Edit a group Delete a group
Preconfigured Groups
To assign permissions to users, you can assign the preconfigured groups. Users inherit all permissions associated with the groups. A predefined group might be assigned to a user when Accessibility and Theme are defined for the user account. You must have permission to the Accounts module to create groups.
Create Groups
Before you begin you need to know: Group ID for the group you are creating. Group name of the group you are creating. Name of the Owner for the group. Identity of the trading partner to associate with the group. Only one trading partner can be associated with a group, but a user account can be associated with many groups. This enables a user account to be associated with more than one trading partner. The identity field is used for routing messages in Mailbox. To create a group:
1. 2. 3. 4. 5. 6. 7. 8.
From the Administration Menu, select Accounts > Groups. Next to Create a new Group, click Go! In the New Group page, enter the Group ID. Enter Group Name. Enter Owner. Select the Identity. Click Next. In the Assign Subgroups page, if you want to filter groups by name, under Filter Data in the By Name field, enter a portion of the name or the entire name of the group you want to filter for and click the filter button. 9. Select the groups you want to assign to this group. Move the groups from the Available pane to the Assigned pane. 10. Click Next. 11. In the Assign Permissions page, do you want to filter permissions? To filter by name, under Filter Data in the By Name field, enter a portion of the name or the entire name of the permission you want to filter for and click the filter button to the right of the By Type field. To filter by type, under Filter Data, select the type of permission you want to filter for from the By Type list and click the filter button to the right of the By Type field. 12. Select the permissions you want to assign to this group. Move the permissions from the Available pane to the Assigned pane. By default, the permissions associated with the subgroups assigned to this group are already selected. The associated permissions do not display in the available column; but they are displayed in the confirm page. 13. Click Next. 14. Review the group information. 15. Click Finish.
Edit Groups
When you edit a group, you can update: Settings Subgroups Permissions You cannot change the Group ID. If you need to change the Group ID, you must create a new group. To edit a group: 1. From the Administration Menu, select Accounts > Groups. 2. Search for the group you want to edit, using either the Group Name Search or Alphabetically List and click Go! 3. Select edit for the group you want to update. 4. Update any of the group settings and click Next. 5. Update any of the assigned subgroups and click Next. 6. Update any of the assigned permissions and click Next. 7. Click Next.
10
Delete Groups
You can not remove the Sterling Integrator Admin group or the UI Accounts permission from an administrator user. These allow the system administrator to administer the application. To delete a group: 1. From the Administration Menu, select Accounts > Groups. 2. In the Groups page, locate the group you want to delete by using either the Search or List option. 3. In the Groups page, next to the group you want to delete, click delete. The application deletes the group and displays the message: The system update has completed successfully.
Permissions
Permissions provide access to the different modules within Sterling Integrator and are the foundation of role-based security. A users permissions consist of permissions from groups plus any permissions that are assigned individually. Use permissions to: Manage access for several users from a single place. Manage user accounts with minimum effort, especially for multiple users who perform the same job function. Permissions tasks include: Create a permission Search for a permission Edit a permission name Delete a permission Before you create, edit, or delete a permission, decide which modules the users in that group need or do not need to access to perform their assigned functions. You must be assigned permission to the Accounts module to create permissions. To avoid overwriting when applying upgrades or patches, do not modify the permissions that come preconfigured with the system. When customized groupings of permissions are required, create a new group.
11
ADVANCED_SETUP
ADVANCED_SETUP
eventAbnormal
acctadmin
All permissions from the subgroup ACCOUNTS, plus UI Groups, UI User Accounts. None BPSSCorrelation, BusinessProcesses, CentralSearch, CommunicationSessions, Correlation, CurrentActivities, CurrentDocuments, CurrentProcesses, DataFlows, Documents, EBXMLCorrelation, EDICorrelation, EDIINT, GentranServerforUnix, Message Entry Workstation Home, SWIFTNETCorrelation, UI BP Monitor All permissions from the BPMONITOR and SERVICES subgroups, plus UI BP Manager, UI Business Process, UI Delete BP.
notifications BPMONITOR
Business Process
bpadmin
12
Group ID cdsp_admin
Permissions Inherited from the Group All permissions from the subgroups ACCOUNTS, BPMONITOR, CD Server Proxy User, OPERATIONS, and SERVICES, plus UI Groups, UI Licenses, UI Password Policy, UI SQL Tool, UI User Accounts. This group is assigned by default when a user account is created with CDSP Accessibility. All permissions from the ACCOUNTS, BPMONITOR, OPERATIONS, and SERVICES subgroups, plus CDSP Services, UI CA Certs, UI Import/Export, UI Lock Manager, UI Logs, UI Perimeter Servers, UI Reports, UI Support Case Tool, UI System Certs, UI Trusted Certs.
cdsp_user
Command-Line User
commandlineuser
eInvoicing, eInvoicing ALL BUYERS, eInvoicing ALL SUPPLIERS, eInvoicing Archive, eInvoicing Configuration, eInvoicing CREATE/EDIT AGREEMENT, eInvoicing DELETE AGREEMENT, VIEW AGREEMENT UI Deployment, Resource Tags This group is assigned by default when a user account is created with Dashboard UI accessibility and any of the following dashboard themes: AFT Default Community Management Operator, Participant, Participant Sponsor, or Sponsor Administration Management Console, Business Process Search Portlet, Cache Statistics Portlet, Cache Usage Portlet, Community Management Portlet, Community Statistics Portlet, Database Pool Usage Portlet, Database Status Portlet, Database Usage Portlet, Document Search Portlet, Document Tracking Portlet, Documents Processed Bar Chart Portlet, Documents Processed Time Series Portlet, Event Viewer Portlet, IFrame Portlet, Log File Viewer Portlet, Log File Viewer Portlet 2, ParticipatingCommunities Portlet, Peers Portlet, Queue Priority Statistics Portlet, Quick Links Portlet, RSS Feed Portlet, Sponsored Communities Portlet, System Alerts Portlet, Web Search Portlet, Web View Plus Portlet
DEPLOYMENT dashboardUsers
Deployment
deploymentadmin
All permissions from the ADAPTER_UTILITIES, DEPLOYMENT, EBXML, MAILBOX, MAPS, SERVICES, WEB_EXTENSIONS, and WEB_SERVICES subgroups, plus UI Connect:Direct, UI Delete CPA and CPSS Schema/Extension, UI Delete Map, UI Delete PGP Profile, UI Delete SAP Routes, UI Delete Schema, UI Delete Service Instance, UI Delete SWIFTNet Routing Rule, UI Delete Web Resource, UI Delete Web Templates, UI Delete WSDL, UI Delete XSLT Template, UI Generate/Download WAR Files, UI Import/Export, UI Scheduler, UI Schemas, UI SSH Local Identity Key, UI SWIFTNet Routing Rule, UI XSLT
13
Group ID EBICS_ADM
Permissions Inherited from the Group UI EBICS Menu, UI EBICS Subscription Manager, UI EBICS Order Type Manager, UI EBICS File Format Configuration, UI EBICS Order Type Configuration, UI EBICS Profile Manager, UI EBICS Bank Profile Configuration, UI EBICS Partner Profile Configuration, UI EBICS User Profile Configuration, UI EBICS Offer Manager, UI EBICS Offer Configuration, UI EBICS Contract Configuration, UI EBICS User Permission Configuration, UI EBICS Subscriber Key Validation UI Delete EBICS File Format Configuration, UI Delete EBICS Order Type Configuration, UI Delete EBICS Bank Profile Configuration, UI Delete EBICS Partner Profile Configuration, UI Delete EBICS User Profile Configuration, UI Delete EBICS User Permission Configuration, UI Delete EBICS Offer Configuration, UI Delete EBICS Contract Configuration
EBICS Operators
EBICS_OPERATOR
UI EBICS Menu, UI EBICS Subscription Manager, UI EBICS Order Type Manager, UI EBICS File Format Configuration, UI EBICS Order Type Configuration, UI EBICS Profile Manager, UI EBICS Bank Profile Configuration, UI EBICS Partner Profile Configuration, UI EBICS User Profile Configuration, UI EBICS Offer Manager, UI EBICS Offer Configuration, UI EBICS Contract Configuration, UI EBICS User Permission Configuration, UI EBICS Subscriber Key Validation BPSS, BPSSExtension, CPA, UI EBXML ControlNumberHistory, ControlNumbers, EDISequenceCheckQueue, Envelopes, TransactionRegister, UI Envelopes None
EBXML ENVELOPES
EBXML ENVELOPES
eventExceptional
Configuration, Messages, Routing Rules, UI Mailbox, VirtualRoots ExtendedRuleLibraries, Maps, Standards, UI Maps All permissions from the MAILBOX and Mailbox Browser Interface Users groups, plus: DeadLetter Mailbox, Mailbox Global Delete, Mailbox Global Query
Mailbox Add Business Process, Mailbox Extract Business Process, Mailbox Path List Process, Mailbox Query Business Process, Mailbox Search Business Process, Mailbox Self Registration Business Process, Mailbox View Business Process, MBISearch JSP JDBCMonitor, MessageMonitor, Perfdumps, SequenceManager, Statistics, ThreadMonitor, Troubleshooter, Tuning, UI Federated Systems, UI Operations
OPERATIONS
OPERATIONS
14
Group ID provisionalpartners
SERVICES SSH
Configuration, Installation/Setup, UI Services AuthorizedUserKey, KnownHostKey, RemoteProfiles, UI SSH, UserIdentityKey WebSuite Change Password Confirm Template, WebSuite Change Password Template, WebSuite Draft Save Business Process, WebSuite Email Notification Business Process, WebSuite Email Notification Template, WebSuite Invoice Template, WebSuite Invoice View Template, WebSuite Load Business Process, WebSuite Menu Business Process, WebSuite PO Ack Template, WebSuite PO Ack View Template, WebSuite Query Business Process, WebSuite RA Send Business Process, WebSuite Self Registration Business Process, WebSuite Session Demo Confirm Send Template, WebSuite Session Demo PO Send Business Process, WebSuite Session Demo PO Template, WebSuite Session Demo PO View Template, WebSuite Session Demo Query List Template WebSuite Change Password Confirm Template, WebSuite Change Password Template, WebSuite Draft Save Business Process, WebSuite Email Notification Business Process, WebSuite Email Notification Template, WebSuite Invoice Template, WebSuite Invoice View Template, WebSuite Load Business Process, WebSuite Menu Business Process, WebSuite PO Ack Template, WebSuite PO Ack View Template, WebSuite PO to Advance Ship Notice Template, WebSuite PO to Invoice Template, WebSuite PO Turn Business Process, WebSuite Query Business Process, WebSuite RA Send Business Process, WebSuite Self Registration Business Process, WebSuite Session Demo Confirm Send Template, WebSuite Session Demo PO Send Business Process, WebSuite Session Demo PO View Template, WebSuite Session Demo Query List Template All permissions from the ACCOUNTS, ADAPTER_UTILITIES, ADVANCED_SETUP, BPMONITOR, DEPLOYMENT, EBXML, ENVELOPES, MAILBOX, MAPS, Mailbox Administrators, OPERATIONS, SERVICES, SSH, WEB_EXTENSIONS, and WEB_SERVICES subgroups, plus UI Archive, UI AS2 Trading Profile Setup, UI Basic Trading Profile Setup, UI BP Manager, UI Business Process, UI CA Certs, UI CodeLists, UI Connect:Direct, UI Contracts, UI Delete BP, UI Delete CPA and CPSS Schema/Extension, UI Delete Map, UI Delete PGP Profile, UI Delete SAP Routes, UI Delete Schema, UI Delete Service Instance, UI Delete SWIFTNet Routing Rule, UI Delete Trading Partner Data, UI Delete Web Resource, UI Delete Web Templates, UI Delete WSDL, UI Delete XSLT Template, UI Federated, UI Generate/Download WAR Files, UI Groups, UI Import/Export, UI Licenses, UI Lock Manager, UI Logs, UI Notify, UI Perimeter Servers, UI PGP Profile Manager, UI Reports, UI Scheduler, UI Schemas, UI SQL Tool, UI SSH Local Identity Key,
super
15
Group Name
Group ID
Permissions Inherited from the Group UI Support Case Tool, UI SWIFTNet Routing Rule, UI System Certs, UI Trading Partners, UI Trusted Certs, UI User Accounts, UI XSLT
System Operations
operator
All permissions from the OPERATIONS subgroup, plus UI Archive, UI Licenses, UI Lock Manager, UI Logs, UI Notify, UI Perimeter Servers, UI Reports, UI Scheduler, UI SQL Tool, UI Support Case Tool All permissions from the ADVANCED_SETUP, ENVELOPES, and SSH subgroups, plus UI AS2 Trading Profile Setup, UI Basic Trading Profile Setup, UI CA Certs, UI CodeLists, UI Contracts, UI Delete Trading Partner Data, UI System Certs, UI Trading Partners, UI Trusted Certs Utilities, WebResources, WebTemplates SchemaMappings, SecurityToken, UI Web Services, WebServicesManager, WSDLCheckin WebSuite ASN View Template, WebSuite Change Password Confirm Template, WebSuite Change Password Template, WebSuite Confirm Send Template, WebSuite Draft Save Business Process, WebSuite Email Notification Business Process, WebSuite Email Notification Template, WebSuite Invoice View Template, WebSuite Load Business Process, WebSuite Menu Business Process, WebSuite PO Ack View Template, WebSuite PO Send Business Process, WebSuite PO Template, WebSuite PO View Template, WebSuite Query Business Process, WebSuite Query LIst Template, WebSuite RA Send Business Process, WebSuite Remittance Advice Template, WebSuite Remittance Advice View Template, WebSuite Self Registration Business Process WebSuite Change Password Confirm Template, WebSuite Change Password Template, WebSuite Confirm Send Template, WebSuite Draft Save Business Process, WebSuite Email Notification Business Process, WebSuite Email Notification Template, WebSuite ER Send Business Process, WebSuite Expense Report Template, WebSuite Expense Report View Template, WebSuite Load Business Process, WebSuite Menu Business Process, WebSuite Purchase Req Send Business Process, WebSuite Purchase Req Template, Websuite Purchase Req View Template, WebSuite Query Business Process, WebSuite Query LIst Template, WebSuite Self Registration Business Process, WebSuite TimeSheet Template, WebSuite TimeSheet View Template, WebSuite TS Send Business Process WebSuite Change Password Confirm Template, WebSuite Change Password Template, WebSuite Confirm Send Template, WebSuite Draft Save Business Process, WebSuite Email Notification Business Process, WebSuite Email Notification Template, WebSuite Expense Report View Template, WebSuite
Trading Profiles
tpadmin
WEB_EXTENSIONS WEB_SERVICES
WEB_EXTENSIONS WEB_SERVICES
wsbuyers
wsemployees
wsfinance
16
Group Name
Group ID
Permissions Inherited from the Group Load Business Process, WebSuite Menu Business Process, WebSuite Query Business Process, WebSuite Query LIst Template, WebSuite Self Registration Business Process
wshr
WebSuite Change Password Confirm Template, WebSuite Change Password Template, WebSuite Confirm Send Template, WebSuite Draft Save Business Process, WebSuite Email Notification Business Process, WebSuite Email Notification Template, WebSuite Load Business Process, WebSuite Menu Business Process, WebSuite Query Business Process, WebSuite Query LIst Template, WebSuite Self Registration Business Process, WebSuite TimeSheet View Template WebSuite Change Password Confirm Template, WebSuite Change Password Template, WebSuite Confirm Send Template, WebSuite Draft Save Business Process, WebSuite Email Notification Business Process, WebSuite Email Notification Template, WebSuite ER Send Business Process, WebSuite Expense Report View Template, WebSuite Load Business Process, WebSuite Menu Business Process, WebSuite Purchase Req Send Business Process, WebSuite Purchase Req View Template, WebSuite Query Business Process, WebSuite Query LIst Template, WebSuite Self Registration Business Process, WebSuite TimeSheet View Template, WebSuite TS Send Business Process WebSuite Change Password Confirm Template, WebSuite Change Password Template, WebSuite Confirm Send Template, WebSuite Draft Save Business Process, WebSuite Email Notification Business Process, WebSuite Email Notification Template, WebSuite Load Business Process, WebSuite Menu Business Process, WebSuite Purchase Req View Template, WebSuite Query Business Process, WebSuite Query LIst Template, WebSuite Self Registration Business Process WebSuite ASN Send Business Process, WebSuite ASN Template, WebSuite ASN View Template, WebSuite Change Password Confirm Template, WebSuite Change Password Template, WebSuite Confirm Send Template, WebSuite Draft Save Business Process, WebSuite Email Notification Business Process, WebSuite Email Notification Template, WebSuite Invoice Send Business Process, WebSuite Invoice Template, WebSuite Invoice View Template, WebSuite Load Business Process, WebSuite Menu Business Process, WebSuite PO Ack Send Business Process, WebSuite PO Ack Template, WebSuite PO Ack View Template, WebSuite PO to Advance Ship Notice Template, WebSuite PO to Invoice Template, WebSuite PO to PO Ack Template, WebSuite PO Turn Business Process, WebSuite PO View Template, WebSuite Query Business Process, WebSuite Query LIst Template, WebSuite Remittance Advice View Template, WebSuite Self Registration Business Process
wsmanagers
wspurchaser
wssupplier
17
Business Process > Monitor > Advanced Search BusinessProcesses (PLTADM2) plus UI BP Monitor (BPMONITOR) > Business Process Business Process > Monitor > Advanced Search SWIFTNETCorrelation (GISADM9) plus UI BP Monitor (BPMONITOR) > SWIFTNET Correlation and UI SWIFTNet Routing Rule (SWIFTNET_ROUTING_RULE) Business Process > Monitor > Advanced Search DataFlows (GISADM1) plus UI BP Monitor (BPMONITOR) > Data Flows Business Process > Monitor > Advanced Search Documents (GISADM2) plus UI BP Monitor (BPMONITOR) > Documents Business Process > Monitor > Advanced Search Communication Sessions (GISADM3) plus UI BP Monitor (BPMONITOR) > Communication Sessions Business Process > Monitor > Advanced Search Correlation (GISADM4) plus UI BP Monitor (BPMONITOR) > Correlation Business Process > Monitor > Advanced Search BPSSCorrelations (GISADM5) plus UI BP Monitor (BPMONITOR) > BPSS Correlation Business Process > Monitor > Advanced Search EBXMLCorrelation (GISADM6) plus UI BP Monitor (BPMONITOR) > EBXML Correlation Business Process > Monitor > Advanced Search EDICorrelation (GISADM7) plus UI BP Monitor (BPMONITOR) > EDI Correlation Business Process > Monitor > Advanced Search EDIINT (STDSADM6) plus UI BP Monitor (BPMONITOR) > EDIINT Business Process > Monitor > Central Search Business Process > Monitor > Current Processes Business Process > Monitor > Current Documents CentralSearch (GISADM10) plus UI BP Monitor (BPMONITOR) CurrentProcesses (PLTADM3) plus UI BP Monitor (BPMONITOR)
Business Process > Monitor > Current Activities CurrentActivities (PLTADM4) plus UI BP Monitor (BPMONITOR)
18
Business Process > Message Entry Workstation Message Entry Workstation Home (MESSAGE_ENTRY_HOME)
From the Administration Menu > Trading Partner, UI Resource Trading Partner > Setup > Basic Trading Partner > Setup > Advanced > Identities
UI Basic Trading Profile Setup (BASIC_SETUP) Identities (GISADM12) plus UI Advanced Trading Profile Setup (ADVANCED_SETUP) Deleting also requires UI Delete Trading Partner permission (TP_DELETE)
Transports (GISADM13) plus UI Advanced Trading Profile Setup (ADVANCED_SETUP) Deleting also requires UI Delete Trading Partner permission (TP_DELETE)
Trading Partner > Setup > Advanced > Document Exchange DocumentExchange (GISADM14) plus UI Advanced Trading Profile Setup (ADVANCED_SETUP) Deleting also requires UI Delete Trading Partner permission (TP_DELETE) Trading Partner > Setup > Advanced > Delivery Channels DeliveryChannels (GISADM15) plus UI Advanced Trading Profile Setup (ADVANCED_SETUP) Deleting also requires UI Delete Trading Partner permission (TP_DELETE) Trading Partner > Setup > Advanced > Packaging Packaging (GISADM16) plus UI Advanced Trading Profile Setup (ADVANCED_SETUP) Deleting also requires UI Delete Trading Partner permission (TP_DELETE) Trading Partner > Setup > Advanced > Profiles Profiles (GISADM17) plus UI Advanced Trading Profile Setup (ADVANCED_SETUP) Deleting also requires UI Delete Trading Partner permission (TP_DELETE) Trading Partner > Digital Certificates > CA UI CA Certs (CA_CERTS) plus UI System Certs (SYSTEM_CERTS) UI System Certs adds the System option. Trading Partner > Digital Certificates > Trusted Trading Partner > Digital Certificates > System Trading Partner > Document Envelopes > Envelopes UI Trusted Certs (TRUSTED_CERTS) UI System Certs (SYSTEM_CERTS) Envelopes (STDSADM1) plus UI Envelope (ENVELOPE)
19
Trading Partner > Document Envelopes > Control Numbers ControlNumbers (STDSADM2) plus UI Envelope (ENVELOPE) Trading Partner > Document Envelopes > Transaction Register TransactionRegister (STDSADM3) plus UI Envelope (ENVELOPE)
Trading Partner > Document Envelopes > Control Number ControlNumberHistory (STDSADM4) plus UI Envelope History (ENVELOPE) Trading Partner > Document Envelopes > EDI Sequence Check Queue Trading Partner > Contracts EDISequenceCheckQueue (STDSADM5) plus UI Envelope (ENVELOPE) UI Contracts (CONTRACTS) plus UI Advanced Trading Partner Setup (ADVANCED_SETUP) UI CodeLists (CODELISTS) UI AS2 Trading Profile Setup (AS2_SETUP) Trading Partner > SSH > Remote Profiles Trading Partner > SSH > Known Host Key Trading Partner > SSH > User Identity Key RemoteProfiles (ASSETADM1) plus UI SSH KnownHostKey (ASSETADM2) plus UI SSH UserIdentityKey (ASSETADM3) plus UI SSH Trading Partner > SSH > Authorized User Key AuthorizedUserKey (ASSETADM4) plus UI SSH Trading Partner > AS3 UI AS3 Trading Profile Setup (AS3_SETUP) Trading Partner > Odette FTP Partner Profile > Physical Partner Trading Partner > Odette FTP Partner Profile > Physical Partner Contract Trading Partner > Odette FTP Partner Profile > Logical Partner Trading Partner > Odette FTP Partner Profile > Logical Partner Contract OftpPhysicalPartner (ASSETOFTP1) plus UI Adapter Utilities (ADAPTER_UTILITIES) OftpPhysicalPartnerContract (ASSETOFTP3) plus UI Adapter Utilities (ADAPTER_UTILITIES) OftpLogicalPartner (ASSETOFTP2) plus UI Adapter Utilities (ADAPTER_UTILITIES) OftpLogicalPartnerContract (ASSETOFTP4)
20
From the Administration Menu > Trading Partner, UI Resource Trading Partner > PGP > Server Manager
PGP Server Manager (ASSETADM55) plus UI PGP Profile Manager (PGP) PGP Sponsor Manager (ASSETADM56) plus UI PGP Profile Manager (PGP) PGP Partner Manager (ASSETADM57) plus UI PGP Profile Manager (PGP)
From the Administration Menu > Deployment, UI Resource Deployment > Services > Installation/Setup Deployment > Services > Configuration
Installation/Setup (PLTADM9) plus UI Services (SERVICES) Configuration (PLTADM10) plus UI Services (SERVICES) and UI BP Manager (BPMANAGE) UI Scheduler (SCHEDULER) Maps (ASSETADM5) plus UI_Maps Standards (STDSADM7) plus UI_Maps ExtendedRuleLibraries (ASSETADM6) plus UI_Maps UI XSLT (XSLT) WebResources (GISADM19) plus UI Web Extensions and UI Web Services (WEB_SERVICES) UI Web Services allows the user to check in a new Web Resource file
Deployment > Schedules Deployment > Maps Deployment > Standards Deployment > Extended Rule Libraries Deployment > XSLT Deployment > Web Extensions > Web Resources
Utilities (GISADM20) plus UI Web Extensions. Visible only in the case of an upgrade from an earlier version.
Deployment > Schemas Deployment > Mailboxes > Configuration Deployment > Mailboxes > Virtual Roots Deployment > Mailboxes > Routing Rules Deployment > Mailboxes > Messages
UI Schemas (SCHEMAS) Configuration (MBXADM1) plus UI Mailbox (MAILBOX) VirtualRoots (MBXADM2) plus UI Mailbox (MAILBOX) RoutingRules (MBXADM3) plus UI Mailbox (MAILBOX) Messages (MBXADM4) plus UI Mailbox (MAILBOX)
21
From the Administration Menu > Deployment, UI Resource Deployment > EBXML > BPSS Deployment > EBXML> BPSS Extension Deployment > EBXML > CPA Deployment > Resource Manager > Resource Tags
BPSS (ASSETADM7) plus UI EBXML (EBXML) BPSSExtension (ASSETADM8) plus UI EBXML (EBXML) CPA (ASSETADM9) plus UI EBXM (EBXML) Resource Tags (PLTADM1) plus UI Deployment (DEPLOYMENT) UI Import/Export (IMPORT_EXPORT) SAPSuiteBuilder (ASSETADM10) plus UI Adapter Utilities
Deployment > Resource Manager > Import/Export Deployment > Adapter Utilities > SAP Suite Builder
Deployment > Adapter Utilities > Sap Routes > Sap Routes SAPRoutes (ASSETADM11) plus UI Adapter Utilities Deployment > Adapter Utilities > Sap Routes > SapRouteXRef Deployment > Adapter Utilities > BEATuxedo SAPRouteXREF (ASSETADM12) plus UI Adapter Utilities
BEATuxedo (ASSETADM13) plus UI Adapter Utilities Menu item does not display unless BEATuxedo jar is installed.
Deployment > Adapter Utilities > SWIFTNET Routing Rule UI SWIFTNet Routing Rule (SWIFTNET_ROUTING_RULE) Deployment > Adapter Utilities > SWIFTNET Service Profile UI SWIFTNet Service Profile (SWIFTNET_SVC_PROFILE) Deployment > Adapter Utilities > SWIFTNET Copy Service UI SWIFTNet Copy Profile (SWIFTNET_COPY_PROFILE) Profile Deployment > Adapter Utilities > Lockout Policy Manager LockoutPolicyManager (ASSETADMIN50)
Deployment > Adapter Utilities > C:D Netmaps > C:D Node CDNetmaps (ASSETADM51) plus UI Adapter Utilities (ADAPTER_UTILITIES) Deployment > Adapter Utilities > C:D Netmaps > C:D Netmaps Deployment > Adapter Utilities > C:D Netmaps > C:D Netmap X-REF Deployment > SSH Host Identity Key CDNodes (ASSETADM52) plus UI Adapter Utilities (ADAPTER_UTILITIES) CDNetmapXref (ASSETADM53) plus UI Adapter Utilities (ADAPTER_UTILITIES) UI SSH Local Identity Key (SSH_LCL_ID_KEY) and UI SSH (SSH) WebServicesManager (ASSETADM16) and UI Web Services (WEB_SERVICES)
22
From the Administration Menu > Deployment, UI Resource Deployment > Web Services > Schema Mappings
SchemaMappings (ASSETADM17), UI Web Services (WEB_SERVICES), and UI EBXML (EBXML) WSDLCheckIn (ASSETADM18) plus UI Web Services (WEB_SERVICES) SecurityToken (ASSETADM18) plus UI Web Services (WEB_SERVICES)
From the Administration Menu > e-Invoicing, UI Permission Name / Permission ID Resource e-Invoicing > Agreements eInvoicing VIEW AGREEMENT (EINV_VIEW_AGREEMENT) Deleting also requires eInvoicing DELETE AGREEMENT (EINV_DELETE_AGREEMENT) permission. e-Invoicing > Integrated Archive eInvoicing Archive (EINVOICING_ARCHIVE) plus eInvoicing VIEW INVOICE (EINV_VIEW_INVOICE) eInvoicing Configuration (EINVOICING_CONFIGURATION)
From the Administration Menu > Operations, Permission Name / Permission ID UI Resource System > Troubleshooter System > Performance > Tuning System > Performance > Statistics System > Performance > JVM monitor System > Support Tools > SQL Manager System > Support Tools > Support Case System > Logs System > Licenses Reports Thread Monitor Troubleshooter (PLTADM17) plus UI Operations (OPERATIONS) Tuning (PLTADM18) plus UI Operations (OPERATIONS) Statistics (PLTADM19) plus UI Operations (OPERATIONS) Perfdumps (GISADMIN27) plus UI Operations (OPERATIONS) UI SQL Tool (SQLMANAGER) UI Support Case Tool (SUPPORT_CASE) UI Logs (SYSTEM_LOGS) UI Licenses (LICENSES) UI Reports (REPORTS) ThreadMonitor (PLTADM24) plus UI Operations (OPERATIONS)
23
From the Administration Menu > Operations, Permission Name / Permission ID UI Resource JDBC Monitor JDBCMonitor (PLTADM25) plus UI Operations (OPERATIONS) and UI SQL Tool (SQLMANAGER) UI Archive (ARCHIVE-UI) plus UI Operations (OPERATIONS), UI BP Manage (BPMANAGE) and UI Business Process (BUSINESS_PROCESS) UI Lock Manager (LOCK_MANAGER) MessageMonitor (GISADM24) plus UI Operations (OPERATIONS) UI Perimeter Servers (PSERVERS) UI Proxy Servers (PROXYSERVERS) plus Sterling Integrator Admin group UI Federated Systems (FEDERATED_SYSTEMS)
Archive Manager
Federated Systems
From the Administration Menu > Accounts, UI Resource Permission Name / Permission ID Groups Permissions User Accounts UI Groups (GROUPS) plus UI Accounts (ACCOUNTS) Permissions (PLTADM27) plus UI Accounts (ACCOUNTS) UI User Accounts (USER_ACCOUNTS) plus UI Accounts (ACCOUNTS) PasswordPolicy (PLTADM29) plus UI Accounts (ACCOUNTS) UserNews (GISADM25) plus UI Accounts (ACCOUNTS) MyAccount (PLTADM30)
Password Policy
Preconfigured Permissions
Preconfigured permissions are provided with the application. Like custom permissions, they provide access to the different modules within the system.
24
Under Search in the Permission Name field, enter a portion of the permission name or the entire permission name you are searching for and click Go! The Permissions page lists all of the permissions that match your search criteria. Under List in the Alphabetically field, select ALL or the letter that begins the name of the permission you are searching for and click Go! The Permissions page lists all of the permissions that match your search criteria.
Create Permissions
If you have upgraded from a previous version of the system, the existing permissions are set to Other by default. You may need to edit each permission to apply a new permission type. Before you begin you need to know the following information:
Field Permission ID Description Permission ID for the permission you are creating. Permission ID is the name of the business process, XSLT document, Web template, or resource for which you are setting the permission. Include the extension for the resource after the ID. Required. Permission IDs: They must be unique. They are case-sensitive. The permission ID must match the name of the business process, XSLT document, Web template, or resource. If the permission ID and the name of the resource do not match exactly, you cannot lock down the resource. Permission Name Name of the permission you are creating. Required. A permission name does not need to be unique. Permission names are case-sensitive. Permission Type Permission type of the permission you are creating. Required. Permission types include: UI Allows access to specific menu items in the interface. UI Permissions with a Permission ID prefixed by _DENY_ deny access to that particular resource or action. For example, if you add a permission, _DENY_BPMANAGE to a user or a group, the user or group will not be able to access BP Management UIs. Mailbox Allows access to specific mailboxes in the application. Template Allows access to specific Web templates. BP Allows access to specific business processes. Tracking Allows access to specific document tracking options. Community Allows access to specific community management options. Web Service Service eInvoicing Other Allows access to resources that are not identified by one of the preceding types.
25
To create a permission: 1. 2. 3. 4. 5. 6. 7. 8. From the Administration Menu, select Accounts > Permissions. Next to Create a new Permission, click Go! In the Permissions page, enter the Permission ID. Enter the Permission Name. Select the Permission Type. Click Next. Review the permission settings. Click Finish.
Delete Permissions
You can delete a permission that is associated with a user account. When you delete a permission, you remove it from use for all user accounts. If the permission you are deleting is the only permission associated with a user account, you must edit the user account to associate another permission. If you do not associate at least one new permission with the user account, the user can log in to the application, but has no access to any menu items. To delete a permission: 1. From the Administration Menu, select Accounts > Permissions. 2. Search for the permission you want to delete, using either the Permission Name Search or Alphabetically List and click Go! 3. In the Permissions page, click Delete for the permission you want to delete. 4. Verify that the permission information matches the permission you want to delete and click Delete. The application deletes the permission and displays the message The system update completed successfully.
26
User Accounts
User accounts are defined by groups, permissions, and password policies to help to provide a secure environment. This type of user account definition is defined as a role-based security model. Before you create any new user accounts, you need to determine what groups, permissions, and password policies your business environment requires. The assignment of groups, permissions, and password policies is optional. Only account with create permissions can create new user accounts. User accounts tasks include: Create a user account Search a user account Edit a user account Delete a user account
27
2 3 4
28
Session Timeout
Accessibility
29
Description Predefined dashboard that the user account has access to. Required if accessibility is set as Dashboard UI. The following are dashboard theme options: Default Operator Participant Participant Sponsor Sponsor AFT
First Name Last Name E-mail Pager Preferred Language Manager ID Identity
Users first name. Required. Users last name. Required. Users e-mail address. Users pager number. Users preferred language. Select from: English, French, Japanese, or Spanish. User ID of the users manager. Identity of the trading partner to associate with the user account. Only one trading partner can be associated with a user account. A user account can be associated with many groups, each with its own trading partner identity association. This enables a user account to be associated with more than one trading partner. The Identity field is used for routing messages in Mailbox. Select a trading partner identity from the list. The default value is Hub Organization.
To create a user account: 1. From the Administration Menu, select Accounts > User Accounts. 2. Next to Create a new Account, click Go! 3. In the New Account page, select the Authentication Type. 4. Enter the User ID. 5. Enter the Password. 6. Confirm the Password. 7. Select the Policy. 8. Enter the Session Timeout. 9. Select the Accessibility. 10. Select the Dashboard Theme. 11. Click Next.
30 Security for Sterling Integrator
12. On the SSH Authorized User Key page, assign one or more public keys. Move the keys by from the Available pane to the Assigned pane and click Next. 13. On the Groups page, assign groups of permissions. Move the group names from the Available pane to the Assigned pane and click Next. 14. On the Permissions page, assign individual permissions. Move the permissions from the Available pane to the Assigned pane and click Next. By default, the permissions associated with the groups that this user is assigned to are already selected. The required permissions are Admin Web App Permission and MyAccount. 15. On the User Information page, enter the First Name. 16. Enter the Last Name. 17. Enter the E-mail address. 18. Enter the Pager number. 19. Select the Preferred Language. 20. Enter the Manager ID. 21. Select the Identity. 22. Click Next 23. Review the user account settings. 24. Click Finish. The application creates the user account and displays the message: The system update completed successfully. If you created an external user, log out of the system, and then log back in with the external user ID or account. Sterling Integrator will authenticate the external user ID on the external LDAP server.
31
32
The application saves the new account information and displays the message, Your update has completed successfully.
33
Single Sign On
Single Sign On
Single Sign On (SSO) is an authentication process that enables users to access several applications and only have to enter one user name and password. Previously, a user logged in to each application and had to manage several user names and passwords. User authentication for SSO does not require the LDAP adapter, which is used with business processes and enables this application to communicate with local or remote LDAP servers using a Java Naming Directory Interface (JNDI). Sterling Integrator supports SSO from CA SiteMinder, SSP, and other applications. Single sign on is limited to the following components: Administration Interface Mailboxing Interface Dashboard Interface Advanced File Transfer (AFT) Interface MyAFT Interface
34
35
* (Must throw SSOException if return false!!!!) */ public boolean authenticatePage(HttpServletRequest request) throws SSOAuthenticationException, SSOException { return true; // Always pass Page Validation for SSOProviderDefault /***** Uncomment if want to do SSO_USER_HEADER (SM_USER) check on Page String sso_user = request.getHeader(SecurityManager.getInstance().getSSOAuthenticationHeader()); if (sso_user != null) { passed = true; } else { passed = false; throw new SSOAuthenticationException(ISSOProvider.REASON_SSO_AUTHENTICATION_FAILURE); } return passed; ******/ } /** * When user logs out, calling this to do any extra actions * * @param Response : The http response * @param Request : The http request. * @param int reason : An id to to tell where we called from * @param String : The String identify the session type: WS, DASHBOARD, MAILBOX, * * * @return boolean : True if executes sucessfully, * False if not & should use default logout logic * */ public boolean invalidate(HttpServletRequest request, HttpServletResponse response, int reason, String sessionType) { HttpSession session = request.getSession(false); String forward = "SSO_FORWARD_URL"; if (sessionType != null) { forward = forward + "."; forward = forward + sessionType; } if (reason == REASON_GIS_SESSION_EXPIRED) { forward = forward + ".GIS_TIMEOUT"; } else if (reason == REASON_LOGOUT) { forward = forward + ".LOGOUT"; } else { // Others reason : send all to VALIDATION_FAILED forward = forward + ".VALIDATION_FAILED"; } String forwardUrl = getForwardURLParameter(forward); if (AUTHLOG.debug) { AUTHLOG.logDebug(CLASS_NAME + " Forward properties: " + forward + " is forwardUrl: " + forwardUrl);
36 Security for Sterling Integrator
} if (forwardUrl != null) { try { // Dashboard Timeout - Use JSP to kick outof IFrame if ((reason == REASON_GIS_SESSION_EXPIRED)&& (sessionType != null) && (sessionType.equalsIgnoreCase(DASHBOARD_SESSION))) { if (AUTHLOG.debug) { AUTHLOG.logDebug(CLASS_NAME + " Set ExternalSsoUrl = " + forwardUrl); } request.setAttribute("ExternalSsoUrl", forwardUrl); return false; // Set to false, we need to handle redirect in JSP } else { response.sendRedirect(response.encodeRedirectURL(forwardUrl)); } } catch (Exception e) { return false; } return true; } return false; // Use default logic (ie: GIS Logout/Login Page) } }
37
SSOException class
public class SSOException extends Exception { private int reason = -1; public int getReason() { return reason; } public void setReason(int reason) { this.reason = reason; } }
SSOAuthenticationException class
public class SSOAuthenticationException extends SSOException { }
User Authentication Method The authenticate method is initialized during login. The authenticate method returns the user ID after successful authentication. The SSOAuthenticationException is thrown for unsuccessful authentication. The exception should contain an appropriate reason code and a redirecting page to handle if SSO headers are present. If SSO headers are not present, the control is passed back to the system login screen. Page Authentication Method The authenticatePage method will be initialized on each page. Any additional validation during page transition from the SSO server is handled in this method. For example, you can ping SSO server to check if the SSO session has timed out. For unsuccessful authentication, an exception should be thrown, which should contain an appropriate reason code and a redirecting page. SSO Requests That are Invalid The invalidate method is initialized when the user logs off, fails to authenticate login or page, or when the session expires. The HTTP redirection method should be performed for invalidating SSO requests. The following methods are initialized for unsuccessful authentication: If the SSO server authentication is successful and the Sterling Integrator authentication is unsuccessful, the REASON_GIS_AUTHENTICATION_FAILURE method is initialized with the reason code. If the SSO server authentication is unsuccessful, the REASON_SSO_AUTHENTICATION_FAILURE method is initialized with the reason code. If the user logs off, the REASON_LOGOUT method is initialized with the reason code. If the HTTP session expires, the REASON_HTTP_SESSION_EXPIRED method is initialized with the reason code. If the users SSO session expires, the REASON_SSO_SESSION_EXPIRED method is initialized with the reason code.
38
Task 1 2 3 4
Single Sign On with CA SiteMinder Checklist Install CA SiteMinder and configure it with a reverse proxy server. Configure the Properties Files for use with CA SiteMinder. Configure the CA SiteMinder Secure Proxy Server. Create CA SiteMinder Sever Secure Realms.
For custom implementation of SSO plug-ins for other single sign on applications and servers, see Single Sign On Plug-in Components.
5. Save and close the neo-ui.properties file. 6. Open the /install_dir/install/properties/security.properties file in a text editor.
39
7. In security.properties, locate the ## SSO Authentication configuration parameters, as shown in the following code sample:
## SSO Authentication configuration ## enable sso authentication (true, false) default=false SSO_AUTHENTICATION_ENABLED=true ## enable sso authentication on each Page (true, false) default=false #SSO_PAGE_AUTHENTICATION_ENABLED=false ## http header variable that contains externally authenticated userid SSO_USER_HEADER=SM_USER ## List of SSOProvider Classes that are supplied to use - If SSO Authentication is ## enable, should have at least one class, the following is the default one that we ## supplied. ## SSO_AUTHENTICATION_CLASS.1= <SSOProvider Class 1> Will try to use this first ## SSO_AUTHENTICATION_CLASS.2= <SSOProvider Class 2> Will try to use this if first ## one failed ## SSO_AUTHENTICATION_CLASS.3= <SSOProvider Class 3> Will try to use this if second ## one failed too ## SSO_AUTHENTICATION_CLASS.<n>= <SSOProvider Class n> Will try to use this if all ## first n-1 classes failed SSO_AUTHENTICATION_CLASS.1=com.sterlingcommerce.woodstock.security.authentication.SS OProviderDefault ## External Page for SSO when Logout (Specify the SSO Server external page for each of ## the cases) ## Example: SSO_FORWARD_URL.MAILBOX.LOGOUT=http://sterlingcommerce.com ## After SSO User logout from Mailbox, instead of display the Mailbox Login Screen ## display Sterling Commerce Web page. SSO_FORWARD_URL.AFT.LOGOUT= SSO_FORWARD_URL.MYAFT.LOGOUT= SSO_FORWARD_URL.MAILBOX.LOGOUT= SSO_FORWARD_URL.WS.LOGOUT= SSO_FORWARD_URL.DASHBOARD.LOGOUT= ## Default handling for LOGOUT if don't know source SSO_FORWARD_URL.LOGOUT= ## External Page for SSO when Timeout (Specify the SSO Server External page for each ## of the case) SSO_FORWARD_URL.AFT.GIS_TIMEOUT= SSO_FORWARD_URL.MYAFT.GIS_TIMEOUT= SSO_FORWARD_URL.MAILBOX.GIS_TIMEOUT= SSO_FORWARD_URL.WS.GIS_TIMEOUT= SSO_FORWARD_URL.DASHBOARD.GIS_TIMEOUT= ## Default handling for TIMEOUT if don't know source SSO_FORWARD_URL.GIS_TIMEOUT= ## External Page for SSO on Validation/Authentication failure (SSO User Validation ## Failed - At login or Page Validation) SSO_FORWARD_URL.AFT.VALIDATION_FAILED=
40
SSO_FORWARD_URL.MYAFT.VALIDATION_FAILED= SSO_FORWARD_URL.MAILBOX.VALIDATION_FAILED= SSO_FORWARD_URL.WS.VALIDATION_FAILED= SSO_FORWARD_URL.DASHBOARD.VALIDATION_FAILED= ##Default handling for VALIDATION FAILED if don't know source SSO_FORWARD_URL.VALIDATION_FAILED=
8. Below the ##SSO Authentication configuration entry, make the following changes to the SSO parameters:
Parameter Description Shipped Value False New Value True
SSO_AUTHENTICATION_ENABLED Enables or disables the use of SSO. SSO_USER_HEADER User header name from CA SiteMinder or your SSO application configuration.
SM_USER
Must match the entry in CA SiteMinder or your This is the value in CA SSO application. SiteMinder. False TrueTo authenticate SSO on every page. Note: Change only if custom SSO Provider Class is provided.
SSO_AUTHENTICATION_CLASS.n Implementation class to provide com.sterlingcom Select from the list of authentication support. merce.woodstoc supplied SSOProvider k.security.authe classes. ntication.SSOProviderDefault SSO_FORWARD_URL URL Displays the URL page provided Commented Provide the URL. after you log off from Mailbox. Displays default page. Otherwise displays the default.
9. Save and close the security.properties file. 10. Start Sterling Integrator.
41
The following example shows how the completed proxyrules.xml file should look after you add the forwarding rules to access Sterling Integrator components:
<?xml version="1.0"?> <?cocoon-process type="xslt"?> <!DOCTYPE nete:proxyrules SYSTEM "file:////home/netegrity/proxy-engine/conf/dtd/proxyrules.dtd"> <!-- Proxy Rules--> <nete:proxyrules xmlns:nete="http://acme.com/"> <nete:cond criteria="beginswith" type="uri"> <nete:case value="/ws"> <nete:forward>http://acme.gis.com:12400$0</nete:forward> </nete:case> <nete:case value="/gbm"> <nete:forward>http://acme.gis.com:12400$0</nete:forward> </nete:case> <nete:case value="/help"> <nete:forward>http://acme.gis.com:12400$0</nete:forward> </nete:case> <nete:case value="/certwiz"> <nete:forward>http://acme.gis.com:12400$0</nete:forward> </nete:case> <nete:case value="/webxtools"> <nete:forward>http://acme.gis.com:12400$0</nete:forward> </nete:case> <nete:case value="/ssdk"> <nete:forward>http://acme.gis.com:12400$0</nete:forward> </nete:case> <nete:case value="/mailbox"> <nete:forward>http://acme.gis.com:12400$0</nete:forward> </nete:case> <nete:case value="/dashboard"> <nete:forward>http://acme.gis.com:12433$0</nete:forward> </nete:case> <nete:case value="/communitymanagement"> <nete:forward>http://acme.gis.com:12400$0</nete:forward> </nete:case> <nete:case value="/portlets"> <nete:forward>http://acme.gis.com:12433$0</nete:forward> </nete:case> <nete:case value="/datastore"> <nete:forward>http://acme.gis.com:12433$0</nete:forward> </nete:case> <nete:default> <nete:forward>http://acme.portalserver.com$0</nete:forward> </nete:default> </nete:cond> </nete:proxyrules>
42
2. Add the following to the lines to the proxyrules.xml file to turn off the Cross Server Scripting checking in the secure proxy server, since Sterling Integrator does not support CA SiteMinder Cross Server Scripting policy enforcement.
# Web Agent.conf <WebAgent> ...." existing web agent configuration parameters" badurlchars="" badcsschars="" CSSChecking="NO" </WebAgent>
43
Passwords
Password Policies
Password policies are sets of security decisions that you make and apply to different user accounts according to security policies in your company. These choices include such items as the number of days a password is valid and the maximum and minimum length of a password. You can use password policies to streamline your security operations when adding new users. Instead of adding having individual policies for each individual user, you can create one password policy and apply it to all users that require the same access. After you create a password policy, you can apply it only to internal user accounts. This provides you the greatest flexibility in maintaining your security policies. If you are using LDAP, you cannot apply password policies to your external accounts. The default values for the password policy are:
Parameter Policy ID Policy Name Number of days valid Minimum Length Maximum Length Number of passwords kept in history Password required to contain special characters Required password change in first login attempt Default Value default_user Default User Policy 60 6 28 5 Selected Selected
44
Password policies tasks include: Create a password policy Search for a password policy Edit a password policy Delete a password policy Edit the lock out parameter Edit the password expires message
45
For example, if the number of consecutive log in attempts before failing is set to three, and you type the wrong password three times, you cannot log in using that specific computer. You can log in using any other computer that has access to the application.
2 3
46
* @param password - The password string to validate * @param policyId - The PWD_POLICY.POLICY_NAME of the policy associated with the user in case the extension needs it. * @return String Return null if password validation was successful, the error message key if password validation fails */ public String validateNewPassword (String password, String policyName); }
Returning null from the method indicates that the password was accepted. Returning anything else means the password was not valid. Example Implementation
package test.policy.extension; import java.util.regex.Pattern; public class PwdPolExtnImpl implements com.sterlingcommerce.woodstock.security.IPasswordPolicyExtension { public String validateNewPassword(String pwd, String policyName) { // Additional password validation checks boolean match=Pattern.matches(".*[a-z].*", pwd) && Pattern.matches(".*[A-Z].*", pwd) && (Pattern.matches(".*[0-9].*", pwd) || Pattern.matches(".*[^A-Za-z0-9].*",pwd)); if (match==true) return null; else return "nogood"; } }
47
Minimum Length
Maximum Length
Password required to contain special characters Required password change on first login attempt
To create a password policy: 1. 2. 3. 4. 5. 6. 7. From the Administration Menu, select Accounts > Password Policy. Next to Create a new Password Policy, click Go! In the Password Policy page, enter the Policy ID. Enter the Policy Name. Enter the Number of days valid. Enter the Minimum Length. Enter the Maximum Length.
48
8. Enter the Number of passwords kept in history. 9. If the password is required to contain special characters, select the checkbox. 10. If the user is required to change the password change on first login attempt, select the checkbox. 11. Click Next. 12. Review the password policy settings. 13. Click Finish.
49
ui.properties file and restart the application, the changes you made to the ui.properties file are overwritten by the ui.properties.in file. To change the number of days for the password expiration: 1. 2. 3. 4. 5. 6. 7. 8. 9. Stop Sterling Integrator. Navigate to /install_dir/install/properties. Open the ui.properties.in file. Locate the MsgPwdExpires= 15 entry. Change the 15 to the new number of days for the user password expiration. Save the file. Navigate to /install_dir/install/bin. Enter setupfiles.sh. Restart the application. The changes you made in the ui.properties.in file are applied to the ui.properties file and are in effect for all user accounts.
2. Edit the Login_<language_dir>.properties_<uniqueID>_ext file. Where <language_dir> is the language set for the customers locale and <filename> is the unique identifier for the new custom password extension. For example: Login_en.properties_custompasswd_ext. 3. Add an entry to the file for the error condition set in the custom extension file and define the descriptive string to return to the user.
50
For example: nogood = The password must contain a minimum of one lower case
character, one upper case character, and one digit or special character.
Add the Implementation class JAR to the Classpath for the Custom Password Policy
The extension implementation class must be compiled and jarred as follows: 1. Navigate to the directory where the password extension class files are located. 2. Enter: javac -cp /install_dir/jar/woodstock.jar test/policy/extension/*.java 3. Enter: jar cf <new_filename>.jar <path_to_class_file>/<Custom_Impl>.class Where <new_filename>.jar is the name of the new Jar file to be created and where <Custom_Impl>.class is the name of the custom implementation Java class file. For example: jar cf userExit.jar
test/policy/extension/PwdPolExtnImpl.class
4. Navigate to the installation directory. 5. Navigate to the bin directory. 6. Enter: Install3rdParty.sh userExit 1_0 -j <path_to_user_exit_jar>
51
LDAP Authentication
Lightweight Directory Access Protocol (LDAP) as an Authentication Tool for Sterling Integrator
Lightweight Directory Access Protocol (LDAP) is a set of protocols used to access information stored in an information directory, which is an LDAP directory. An LDAP directory is a database, but not a relational database, used to manage information that is spread across multiple servers on a network and is optimized for read performance. You can use LDAP with the application to delegate authentication of an external user account to an LDAP directory and to provide authentication using the same security information used for other applications in your company. If your company has already adopted LDAP, you can use your existing LDAP directories with the application. User account authentication does not require the LDAP adapter, which is used with business processes and enables the application to communicate with local or remote LDAP servers using a Java Naming Directory Interface (JNDI). If your LDAP server is not working, users who have internal accounts retain access to the application; however, those users who have external accounts do not have access to the application until the LDAP server is working. Before you can configure LDAP with Sterling Integrator, you must have: Knowledge of LDAP Access to an installed and configured LDAP server containing user information The location of the LDAP server (For SSL) Installed security certificates in the Keystore and Truststore Created the application external user accounts for each user that will authenticate through your LDAP server (For SSL) The location of your Keystore and Truststore
52
53
# authentication_<number>.port=636 # authentication_<number>.security_type=simple # authentication_<number>.principle=cn=Manager,dc=acme,dc=inc,dc=com # authentication_<number>.credentials=SecretPassword ## comment out or leave as blank on this property if the server is not going to use SSL for the security protocol. # authentication_<number>.security_protocol=ssl ## search parameters for user password # authentication_<number>.password_attribute=userPassword # authentication_<number>.search_root=dc=acme,dc=inc,dc=com # authentication_<number>.search_filter=(uid=<userid>) # authentication_<number>.with_user_bind=falseBelow the ##LDAP Authentication
54
1. Enter your user ID and password from your external user account into the application. 2. The application attempts to bind to the LDAP repository with credentials enabling execution of necessary queries. 3. The application searches for the user in the LDAP directory with the proper userid. 4. The application retrieves the user password from the LDAP directory. 5. The application compares the password supplied by the user with the password retrieved from the LDAP directory. If the passwords match, you are authenticated and permitted access to the application. If the passwords do not match, you are not authenticated and not permitted access.
Path to the local truststore. Inactive path You must have LDAP required certificates stored in the truststore. You cannot use certificates from trading partners. Optional. Use only if you are using SSL. Password that allows changeit access to the truststore.Optional. Use only if you are using SSL. Path to the local keystore. Inactive path You must have LDAP required certificates stored in the keystore. You cannot use certificates from trading partners. Optional. Use only if you are using SSL.
#LDAP_SECURITY_TRUSTSTORE_PASSWORD
Password allowing access to the local truststore. Full path to the local keystore.
#LDAP_SECURITY_KEYSTORE
55
Parameter #LDAP_SECURITY_KEYSTORE_PASSWORD
Description Password that allows access to the keystore. Optional. Use only if you are using SSL. Enables or disables the use of LDAP. False All users who are created from this authentication host will be disabled (fail to log in). True Each user can be accessed either internally or externally, but not both, since each user ID is unique. This value is not checked when it is for internal authentication.
Shipped Value Change to password Password allowing access to the local keystore. True
#authentication_<number>.enabled
False
#authentication_<number>.jndi_factory
Class name of the factory com.sun. No change class that creates the initial jndi.ldap. context for the LDAP LdapCtxFactory service provider. This is the standard context factory shipped with the JDK. URL specifying the host Inactive path name of the LDAP server. The port number of the LDAP server. Authentication method for simple the provider to use. The application supports only simple authentication. Identity of the principle to authenticate, which enables the application to perform queries. This parameter is the name component in an LDAP ASN.1 bind request. cn=Manager, dc=amr, dc=stercomm, dc=com No change Local LDAP host URL.
#authentication_<number>.server
#authentication_<number>.port
#authentication_<number>.security_type
#authentication_<number>.principle
#authentication_<number>.credentials
Password set up in the Sterling LDAP repository for the LDAP principle, which enables the application to perform queries.
56
Parameter #authentication_<number>.security_protocol
Description Object specifying which security protocol for the provider to use.
Shipped Value Change to SSL No change. This parameter is not visible if you have chosen not to use SSL. Local attribute that contains the password.
#authentication_<number>.password_attribute
Name of the LDAP attribute that contains the user password. This parameter is only used if the #LDAP_ AUTHENTICATE_WITH_ USER_BIND is set to false.
userPassword
#authentication_<number>.search_root
Object specifying the root dc=amr, from which the user query dc=stercomm, is based. dc=com Object specifying the (uid=<userid>) template to use in the search. The <userid> value is dynamically replaced at request time with the userid of the user requesting authentication. Specifies whether to authenticate a user according to a successful bind. False The application extracts the value of the user password from the LDAP server and performs a comparison to the user credentials provided. True The application binds to the LDAP server using the users distinguished name and provided credentials. A successful bind means a successful authentication. false
#authentication_<number>.search_filter
A Windows Active Directory server may use an entry such as (sAMAccount Name=<userid>) Change to true if you want to authenticate with the user bind.
#authentication_<number>.with_user_bind
7. Save the authentication_policy.properties.in file. 8. Enter /install_dir/install/bin/setupfiles.sh (UNIX) or \install_dir\install\bin\setupfiles.cmd (Windows) to update LDAP entries into the authentication_policy.properties file from the authentication_policy.properties.in file. 9. Start Sterling Integrator.
57
The changes to the authentication_policy.properties file are applied and you can now begin using your LDAP server to authenticate users. After startup, the application identifies LDAP servers from the authentication_policy.properties file. The application authenticates external users when the users log in to the application.
58
User News
User News
The User News feature enables you to post messages to the Admin Console Home pages. User news makes it possible to inform users about changes to or to remind them of important events and tasks. Messages can be posted: For all users For a specific user Multiple users The news item is displayed based on an effective date and expiration date. You can also set the message up as: (GRAPHICS NEED TO BE IMPORTED LATER for the SYMBOLS)
Message Type Notice Alert Symbol Description Provides announcement information of general or low priority. Provided announcement information of high priority.
You must have write permissions for Accounts to create user news messages. Deleting old messages reduces storage requirements and the amount of effort required to retrieve specific messages. User News tasks include: Create a User News Message for Specific Users Create a User News Message for All Users Search for a User News Message Edit a User News Message Delete a User News Message
59
1. From the Administration Menu, select Accounts > User News. 2. Next to New Message, click Go! 3. Enter the Type. 4. Enter Subject. 5. Enter Message. 6. Click Next. 7. Select ALL Users and click Next. 8. Enter the Effective Date of the message (yyyy-mm-dd). 9. Enter the Expiration Date of the message (yyyy-mm-dd). 10. Click Next. 11. Review the News Message Settings. 12. Click Finish.
1. 2. 3. 4.
From the Administration Menu, select Accounts > User News. Next to New Message, click Go! Enter the Type. Enter the Subject.
60
5. Enter the Message. 6. Click Next. 7. Select Selected Users. 8. Select each user's name that you want to receive this message. 9. Click Next. 10. Enter the Effective Date of the message (yyyy-mm-dd). 11. Enter the Expiration Date of the message (yyyy-mm-dd). 12. Click Next. 13. Review the News Message Settings. 14. Click Finish.
3. Click Go! The User News page list all of the messages that match your search criteria.
61
9. Click Next. 10. Review the News Message Settings. 11. Click Finish.
62
Document Encryption
Document Encryption Feature Overview
Document encryption is a feature provided with Sterling Integrator. This feature allows for the configuration of an additional layer of security beyond the traditional file and database permissions. If you have integrated Sterling File Gateway with Sterling Integrator, it uses the same document encryption feature for protecting data at rest. Sterling File Gateway is a managed file transfer product that is used for secure and automated edge communications with trading partners. The document encryption feature is intended to protect data at rest from being viewed by an unauthorized user. The feature allows you to encrypt the payload data stored in the database and/or the file system. It is also designed to prevent someone outside the system from viewing the payload data by directly accessing the database or file system. Important aspects of document encryption: The default configuration at installation is no encryption. If you want to have your documents encrypted, you will need to turn on this feature. You can turn this feature on at any time, but only documents received after encryption is turned on are encrypted. Once you turn on this feature, encryption is for all payloads across the entire system. Only the document payload data is encrypted, not the meta data. The same encryption key is used to encrypt and decrypt. The system uses a predefined certificate (doccrypto) to encrypt documents. You can create a different system certificate. If you do you must update the value of CERT_NAME in the customer_overrides.properties file. While performance is impacted when encryption is enabled, each customer will see different performance impacts depending on hardware, the number and size of documents being processed, and the relative amount of processing time spent by a given server doing document persistence and retrieval against other activities.
63
5. Save and close the customer_overrides.properties file. 6. Stop and restart Sterling Integrator.
5. Save and close the customer_overrides.properties file. 6. Stop and restart Sterling Integrator.
64 Security for Sterling Integrator
5. Save and close the customer_overrides.properties file. 6. Stop and restart Sterling Integrator.
5. Save and close the customer_overrides.properties file. 6. Stop and restart Sterling Integrator.
65
66
Certficates
Digital Certificates
Sterling Integrator provides a Certificate Wizard to help you manage your digital certificates. The system uses the following types of digital certificates: CA and trusted certificates Digital certificates for which the system does not have the private keys. These certificates are stored in standard DER format. System certificates A digital certificate for which the private key is maintained in the system. These certificates are stored with the private key in a secure format. The following is some basic information about how digital certificates are used: Every organization exchanging secure documents must have a certificate. You can use the Certificate Wizard to generate the certificate or it can be generated externally. Every trading profile for a trading partner with whom you exchange signed and encrypted documents must have a certificate. An organization or trading profile can have only one active certificate at a time. In the case of dual certificates, an organization can have one active pair of certificates; one for signature, one for encryption. An organization or trading profile must have an active certificate to successfully exchange signed and encrypted documents. An organization or trading profile can have multiple valid certificates. Certificates can be used to sign documents you transmit by all transport methods. The key length for a certificate does not have to be the same as that of a trading partner certificate. Before you set the validity period for the certificate, it is recommended you read and apply the best practice recommendations from the Microsoft PKI Quick Guide. For information about the best practice recommendations for using certificates, see http://www.windowsecurity.com/articles/Microsoft-PKI-Quick-Guide-Part3.html.
67
A self-signed certificate is a digital certificate that is signed with the private key that corresponds to the public key in the certificate, demonstrating that the issuer has the private key that corresponds to the public key in the certificate. A CA-signed certificate is a digital certificate that is signed using keys maintained by certificate authorities. Before issuing a certificate, the CA typically evaluates a certificate requestor to determine that the requestor is in fact the certificate holder referenced in the certificate.
CA Certificates
A CA certificate is a digital certificate issued by a certificate authority (CA). The CA verifies trusted certificates for trusted roots. Trusted roots are the foundation upon which chains of trust are built in certificates. In the application, trusting a CA root means that you trust all certificates issued by that CA. If you elect not to trust a CA root, Sterling Integrator does not trust any certificates issued by that CA. CA certificates contain a public key corresponding to a private key. The CA owns the private key and uses it to sign the certificates it issues. To validate a trusted certificate, you must first check in a CA certificate. Root certificates from common CAs are contained in a Java keystore (JKS) in the JVM that ships with Sterling Integrator. This allows users to establish some authority-based trust relationships more easily than if they had to search for and obtain the certificates from a CA Web site. CA certificates are stored separately from trusted certificates in the product. From the user interface, you can check in CA root certificates that originate from any of the following sources: Common CA root certificates shipped with Sterling Integrator in the JKS keystore. Only certificates and trusted certificates are recognized. Certificates and private keys are not visible to the UI. SSL certificates imported from trading partners. Other certificates obtained externally. Based on security policies at your site, CA certificates in the JKS keystore can also be checked in through the console. Although CA certificates are public documents, you must be careful about who has rights to add them. Someone could maliciously add a false CA certificate in order to verify false end-user certificates.
CA Certificate Names
The CA certificate name is not part of the content of the certificate. They are generally built from the issuer Relative Distinguished Name (RDN) and serial number of the certificate. However, certificates from the JKS keystore are named with an arbitrary string. Because the certificate name is stored in the system database and is used as the alias to refer to the certificate in the GUI, you may want to rename CA certificates with shorter or more meaningful names based on your file naming conventions. Certificates can be renamed when checked in or when edited.
You can easily create self-signed certificates using Sterling Integrator. However, these self-signed certificates are not verified by a trusted third party. The primary advantage of using certificates from a CA is that the identity of the certificate holder is verified by a trusted third party. The disadvantages include extra cost and administrative effort. If you decide to use a third-party certificate, obtain it from a CA. A CA provides a centralized source for posting and obtaining information about certificates, including information about revoked certificates. By default, the system trusts all CA certificates and self-signed certificates generated by the application. You can, however, specify whether all or some certificates issued by a specific CA should be trusted. You can also explicitly not trust a self-signed certificate of a trading partner.
certname Certtype
69
Name of the PKCS12 file to import. Store passphrase used for the generation of the PKCS12 file. Valid passphrase for the PKCS12 file. PIN for the slot on the Eracom device where the keystore resides. System passphrase.
Certificate Wizard
Sterling Certificate Wizard
The Sterling Certificate Wizard is a Web-deployed application. The wizard enables you to create the following files: Certificate Signing Requests (CSRs) A file to be sent by e-mail to a certificate authority to request an X.509 certificate. Key certificates A combination of an ASCII-encoded certificate and an ASCII-encoded PKCS12 encrypted private key (key cert.txt). If you generate key certificates using the standard format (default) with certain cipers, the output certificate will error when imported into the Sterling Integrator. It is recommended that you use the PKCS12 Format for the key certificates. Trusted root files The trusted root file (trusted.txt) contains a list of trusted sources that enable the certificate wizard to validate a key certificate and ensure a secure connection. See the wizard online help for information on generating a Certificate Signing Request (CSR), creating a key certificate, and validating a key certificate.
9. In the File Download dialog box, click Save. 10. When the Save As dialog box opens, specify the location to save the file. If the web browser adds a number in brackets to the downloaded file (CertWizard .v1300.Unix.tar[1].z), then you need to rename the file before you download it. 11. Use the instructions in the Release Notes to install the Sterling Certificate Wizard.
Passphrase must not be more than 20 characters in length. 13. Enter the passphase a second time in Confirm Passphrase. 14. Click Next. 15. Enter the Key file name. Either accept the default directory or click Browse and select another directory to save the PKCS12-formatted private key (privkey.txt is the default file name) file. 16. Enter theCSR file name Either accept the default directory or click Browse to select another directory to save the CSR (csr.txt is the default file name) file. 17. Review the information. 18. Click Next to create the CSR.
5. Click Verify. A message displays that includes the verification results for each file you selected.
72
Certificate Tasks
Create a Self-Signed Certificate
To create a self-signed certificate: 1. 2. 3. 4. 5. 6. From the Administration Menu, select Trading Partner > Digital Certificates > System. Next to Create Self-signed Certificate, click Go! Enter the Name of the self-signed certificate. Enter the name of the originating Organization. Select the Country or origin of the self-signed certificate. Enter a contact e-mail address for the person responsible for certificates in the organization and then click Next. 7. Enter the Serial Number for the certificate. The serial number is the number you want to assign to the self-signed certificate. 8. Enter the number of days (Duration) that the self-signed certificate is valid. 9. Enter the IP addresses of the network interfaces you want to associate with the certificate as the SubjectAltName field. 10. Enter the DNS Names of the network interfaces you want to associate with the certificate as the SubjectAltName field. 11. Select the Key Length. Select one of the following key lengths: 512 1024 (The key length 1024 provides a good balance between security, interoperability, and efficiency. The key length 2048 is the most secure, but also the slowest, and may not work with some applications.) 2048 12. Select the Signing Algorithm. 13. Select the Validate When Used option. Validation options are: Validity Verifies dates in the validity period of the certificate are still in effect. If the dates are not in effect, the certificate is not used. Auth Chain Constructs a chain of trust for certificates that are not self-signed. If a chain of trust cannot be constructed using valid certificates, the certificate is not used. If the certificate is self-signed, this option verifies only the certificate signature. 14. Set the Certificate Signing Bit by selecting the checkbox. 15. Click Next. 16. Review the information about the self-signed certificate. 17. Click Finish.
73
To display more than one additional hash, separate the values with commas. For example:
AddtlCertThumbprintAlgs=SHA384,SHA512
Parameter hash_algorithm Description Name of a hash algorithm to be applied to the certificate thumbprint. Valid values are: SHA-256 SHA-384 SHA-512
74
Status
Although this information applies to summary information for a CA certificate, similar fields appear in summary and confirmation screens for other types of certificates.
75
1. From the Administration Menu, select Trading Partner > Digital Certificates > CA. 2. Next to Check in New Certificate, click Go! 3. Select a method to import certificates:
Import method Import from JVM Imports from the JKS keystore Next Steps 1. Click Import from JVM. 2. Accept the default password that appears in the password field and click Next. The default keystore password is supplied by Sun Microsystems. If the password field is empty, the system still uses the default password. Import from File Imports certificates 1. Click Import from File. saved as a file on a local drive 2. Enter the Filename or click Browse to select a CA certificate file. Click Next. You may ignore the password that appears in the password field. There is no need to erase the entry.
Available certificates are listed with a summary of identifying information. All certificates are selected by default. 4. Click the checkboxes to the left of each entry to select or de-select certificates to import. 5. For each certificate selected, accept the suggested Certificate Name or edit it based on your file naming conventions. 6. Select the Validate When Used option and click Next. Validation options are: Validity Verifies dates in the validity period of the certificate are still in effect. If the dates are not in effect, the certificate is not used. Auth Chain Attempts to construct a chain of trust up to the root for certificates that are not self-signed. If a chain of trust cannot be constructed using valid certificates, the certificate is not used. If the certificate is self-signed, this option verifies only the certificate signature. 7. If you receive a message stating that the certificate duplicates a certificate already in the database, enter Y or N to indicate whether to import the duplicate. This check is done on single certificates only. It does not take place when checking in one or more certificates from a file. Certificates are identified by SHA1 hash for purposes of determining duplicates. More than one copy of a certificate can be present in the database, since each will populate a different row and have a distinct object ID. The existing certificate is not overwritten. 8. Review the CA certificate information. 9. Click Finish.
76
To import certificates into the Sterling Integrator trusted repository, modify the command at /install_dir/install/bin/ImportCACerts.sh (UNIX) or \install_dir\install\bin\ImportCACerts.cmd (Windows). Before you begin, save any CA certificates obtained externally to a local file. To check in a CA certificate at the console: 1. Navigate to the installation directory. 2. Navigate to the bin directory. 3. Enter this command: (UNIX) ./ImportCACerts.sh (Windows) ImportCACerts.cmd All certificates in the file are listed, one at a time, with these exceptions: Entries containing symmetric or private keys are not processed or listed. Only the first certificate in a DER-format file is processed and listed. 4. Following the prompts, enter Y (not case-sensitive) for any certificate you want to import. 5. For each certificate accepted, accept the suggested Certificate Name or edit it based on your file naming conventions. 6. If the certificate label duplicates a label already in the database, enter Y or N (not case-sensitive) to indicate if you want to change the label. Tip: Although certificates are not generally identified by label and the database allows label duplicates, some services look up certificates by label. Avoid duplicate labels to avoid the possibility of unexpected behavior. 7. If the certificate duplicates a certificate already in the database (as indicated by the SHA1 hash of the certificate, specify with Y or N whether you want to import the duplicate. Certificates are identified by SHA1 hash for purposes of determining duplicates. More than one copy of a certificate can be present in the database, since each will populate a different row and have a distinct object ID. The existing certificate is not overwritten.
Edit CA Certificates
To edit a CA certificate: 1. 2. 3. 4. 5. From the Administration Menu, select Trading Partner > Digital Certificates > CA. Using either Search or List, locate the CA certificate you want to edit and click Go! Next to the CA certificate you want to edit, click edit. Enter the Certificate Name. Select the Validate When Used option and click Next. Validation options are: Validity Verifies dates in the validity period of the certificate are still in effect. If the dates are not in effect, the certificate is not used. Auth Chain Constructs a chain of trust for certificates that are not self-signed. If a chain of trust cannot be constructed using valid certificates, the certificate is not used. If the certificate is self-signed, this option verifies only the certificate signature.
77
Delete CA Certificates
To delete a CA certificate: 1. From Administration Menu, select Trading Partner > Digital Certificates > CA. 2. Next to Alphabetically, click Go! 3. Next to the CA certificate you want to delete, click delete.
78
1. From the Administration Menu, select Deployment > Services > Configuration. 2. In the List section, select the applicable service or adapter type from the by Service Type list and click Go! 3. From the list of configurations, choose the configuration. 4. Click the service name to view configuration information. 5. Review the certificate summary information.
1. 2. 3. 4.
From Administration Menu, select Trading Partner > Digital Certificates > System. Next to Alphabetically, click Go! Next to the system certificate you want to delete, click delete. Click Delete on the Confirm page.
80
6. If you have more than one trusted certificate contained in the file you selected, select the check box to the left of each certificate to check in each certificate. 7. Select the Validate When Used option and click Next. Validation options are: Validity Verifies dates in the validity period of the certificate are still in effect. If the dates are not in effect, the certificate is not used. Auth Chain Attempts to construct a chain of trust up to the root for certificates that are not self-signed. If a chain of trust cannot be constructed using valid certificates, the certificate is not used. If the certificate is self-signed, this option verifies only the certificate signature. CRL cache Controls whether the CRL Cache is consulted each time the system certificate is used. 8. Review the trusted certificate information. 9. Click Finish.
81
CRL cache Controls whether the CRL Cache is consulted each time the system certificate is used. 6. Review the certificate information. 7. Click Finish.
5. Enter the Key Store Password. This is the password for the PKCS12 object. It may be the same as the private key password. 6. Enter the Filename or click Browse to select the file name of the PKCS12 certificate, and then click Next. 7. Select the Validate When Used option and then click Next. Validation options are: Validity Verifies dates in the validity period of the certificate are still in effect. If the dates are not in effect, the certificate is not used. Auth Chain Constructs a chain of trust for certificates that are not self-signed. If a chain of trust cannot be constructed using valid certificates, the certificate is not used. If the certificate is self-signed, this option verifies only the certificate signature. 8. Review the PKCS12 system certificate information.
82
9. Click Finish.
5. Enter the Filename or click Browse to select the file name of the key certificate and click Next. 6. Select the Validate When Used option and click Next. Validation options are:
83
Validity Verifies dates in the validity period of the certificate are still in effect. If the dates are not in effect, the certificate is not used. Auth Chain Constructs a chain of trust for certificates that are not self-signed. If a chain of trust cannot be constructed using valid certificates, the certificate is not used. If the certificate is self-signed, this option verifies only the certificate signature. 7. Review the key certificate information. 8. Click Finish.
84
85
86
Proxy Servers
Proxy Servers
Proxy Servers enhance the security of your system.
87
6. Enter the Port number. 7. Enter the Retry Count. 8. Click Next. 9. Is basic authentication required for the user, select Yes or No. 10. Is SSL Required, select Yes or No. 11. Click Next. 12. If you selected basic authorization for this user, you must enter the Auth UserID and the Auth Password and click Next. If you did not require this authorization, this page is not displayed. 13. If you select Yes for SSL required, you must select the Cipher Strength, CA Certificates, and Key Certificates and click Next. If you did not require SSL, this page is not displayed. 14. Click Next. 15. Review the Proxy Server Settings. 16. Click Finish.
88
89
SSL
SSL
Secure Sockets Layer (SSL) is a protocol that provides secure communication over the Internet. It uses both symmetric and asymmetric cryptography. The SSL protocol provides server authentication and client authentication: Server authentication is performed when a client connects to the server. After the initial handshake, the server sends its digital certificate to the client. The client validates the server certificate or certificate chain. Client authentication is performed when a server sends a certificate request to a client during the handshake. If the client certificate or chain is verified and the certificate verify message is verified, the handshake proceeds further. An optional additional authentication is performed by checking the common name in the certificate against the servers fully qualified domain name from a reverse Domain Name Server (DNS) lookup where the server's fully qualified domain name can be obtained. Types of Trust Two types of trust for SSL certificates are supported: CA Trust Hierarchical trust based on a root certificate used to issue other certificates. This is the standard SSL certificate trust model. Direct Trust Direct trust of self-signed certificates assumed to be distributed through secure out-of-band mechanisms. Direct trust and self-signed certificates are not part of the SSL standards, but are frequently used in certain trading communities. SSL Certificates To communicate using the SSL protocol, configure the systems involved to support either server authentication or client/server authentication. To perform authentication against a server, you need a root Certificate Authority (CA) certificate and the set of intermediate certificates in the chain or, if the server uses a self-signed certificate, a copy of the self-signed certificate. To support client/server authentication you need a CA or self-signed certificate and a system certificate. You can obtain an SSL certificate from a trusted CA by providing a Certificate Signing Request (CSR) to the CA. The SSL certificate binds the public key and the SSL server or client.
90
If you plan to use client/server authentication, configure a system certificate. You can create system certificates in the following ways: Check in an existing key certificate file or pkcs12 file Generate a self-signed system certificate Use the Certificate Wizard to generate a CSR and get a certificate from a CA Cipher Strength Settings To implement a cipher strength setting, contact Customer Support. Earlier Versions of SSL To enable an earlier version of SSL, contact Customer Support.
91
The parameters in the following table control SSL from a server perspective. See the documentation for the specific adapter or service you are configuring.
Parameter SSL Description Whether SSL is active.
Key Certificate Passphrase Password that protects the server key certificate. This passphrase is used internally by the system to initialize the SSL libraries. CipherStrength Key Certificate (System Store) CA Certificate Strength of the algorithms used to encrypt data. Private key and certificate for server authentication. Certificate used, if any, to validate the certificate of a client.
Check in a Certificate
To support client/server authentication you need a CA or self-signed certificate and a system certificate. You can check in a CA certificate or a self-signed certificate in a CA certificate store by selecting Trading Partner > Digital Certificates > CA > Check in New Certificate from the Administration Menu.
Troubleshoot SSL
Corrupt or Unusable Certificate Error Messages If you receive the following error message:
FATAL Alert:BAD_CERTIFICATE - A corrupt or unusable certificate was received.
92
When checking in the certificate, Sterling Integrator shows a Status value of "Invalid Signature" on the naming screen. If a business process that performs an outbound HTTP POST with SSL fails on HTTP Method service with error, the following message is displayed::
HTTP Status Code: -1 HTTP Reason Phrase: Internal Error: Connection was closed from the perimeter side with error: CloseCode.CONNECTION_RESET
Obtain the appropriate CA certificate for the trading partner. If the trading partner is using a self-signed certificate, the certificate itself can be used as the CA certificate. CA and Direct Trust When Sterling Integrator is the client, if the server has a certificate issued by a CA and that certificate has the DNS name of the server in the subject Relative Distinguished Names (RDN), you can put the root CA certificate in the CA store and trust that. If SSL still does not work, try direct trust. Put the server certificate in the CA store and trust that. If the server is using a self-signed certificate, put that in the CA store and trust it. You are doing direct trust in this case as well. Use of SSL without a Certificate You cannot use SSL-enabled adapters without having the required certificate or system certificate. Disable SSL Empty Records for CBC-Mode Cipher Suite If you selected the CBC-mode cipher suite, and SSL does not work, disable SSL Empty Records: 1. Edit the tmp.sh file. 2. Find the server flag for the OS you are configuring and add:
-DDisableSSLEmptyRecords=true
93
Copyright
Additional copyright information is located on the Sterling Integrator 5.0 Documentation Library: http://www-01.ibm.com/support/docview.wss?uid=swg27023835
94