SlideShare a Scribd company logo
Actuate Security
                             Enterprise class, Standards based,
                                    Robust and Flexible

                                  Ambareesh Kulkarni, Director



1
© Actuate Corporation 2008
Anatomy of an Actuate Application




            `

                `

                    `        FW1                FW2               FW3




                                                   Application
                                   Web Server     Server farm       Actuate iServer   Actuate
                                     Farm        running Active         nodes         Encycl.
                                                     Portal




2
© Actuate Corporation 2008
Features of Actuate Security
     AuthN & AuthZ

           • Authentication -Verify if users are who they claim to
             be
           • Authorization -Users can only access what the
             security policy allows
           • Role-based access control -Grant access based on
             the user’s role in the organization
           • Data privacy -Data integrity & reliability
           • User Registration -External and Internal
           • Audit information -Usage and exceptions
           • Transport Security -Secure delivery of information


3
© Actuate Corporation 2008
Features of Actuate Security
     AuthN & AuthZ

         • Non-repudiation on actions -Important user
           actions carry proof of execution to prevent
           denial
         • Session security -User sessions are uniquely
           identifiable and not subject to masquerading
         • Session time-out -Session inactivity leads to
           session termination
         • Audit logs -All actions are logged for audit
           use.
         • Single sign-on -Usage of multiple systems or
           services does not require additional
           credentials.


4
© Actuate Corporation 2008
Features of Actuate Security
     AuthN & AuthZ

            • Robust authentication & authorization capabilities
                     • Supports both Internal and External Authentication
                     • Can use a combination of UserID/Password for authentication
                     • Optionally:
                             • trust credentials passed to it
                             • Extract Userid and/or password from encrypted artifacts such as
                               (e.g. token, logon ticket etc.)
            • Granular authorization
                     • Fast and easy mapping of business rules to authorization policy
                     • Course, medium and fine-grained authorization
            • An open, interoperable Java-based architecture with data
              source flexibility
                     • Plug-n-play integration with Web, application and directory
                       services
                     • Supports LDAP, RDBMS and any custom data sources

5
© Actuate Corporation 2008
External User Registration and Authentication
     process flow
                                                  Business Process
                                              2   Workflow

      1

                                                            3
                                                                
                                                                Automated Access Approval



   End
                                 Portal            Server
   Users
                                          5                          Data Store


                             4                6               Data
                                                            Repository

                                                                               Actuate  8
                                                                               Authentication/Revalidation
                                              7                                Services


                                                            9            Actuate


6
© Actuate Corporation 2008
Authorization Controls
     What can you protect??


  • Server Controls
            • Resource –
              Universal
              Resource
              Indicator…
            • Applications –
              group of
              resources…
            • Dynamic Content –
              EJB’s, JSP’s,
              Servlets…
            • Method-level
              Protection –
              Access, Get, Post
            • Wild-Card Control
              – *, /*/, *.*

7
© Actuate Corporation 2008
Authorization & Privilege Management Levels


                                              Limits access at the URL
                             Coarse-grained
                                              level to protect machines
      Coarse
                                              and their contents

                                              Provides conditional
                             Medium-grained   access to Actuate Folders
                                              and files based on access
                                              control lists and user roles

                                              Controls what data users
          Fine               Fine-grained     see once they have access
                                              to the report (Page Level
                                              Security)

8
© Actuate Corporation 2008
Usage Logging
     What have you accessed?
                                             • Provides records required to
                                               meet security policy and
                                               compliance requirements
                             Usage logging   • Helps pinpoint problem areas
                                               against policies
                                             • Captures “contextual”
      Actuate usage log                        information for better
        captures ALL                           diagnosing issues
         User Activity




9
© Actuate Corporation 2008
Actuate Security
     Scalable and Flexible



                             Key Server Dispatcher     Enforcement
                                                     (Agent or Proxy)
                                                                           End
                                                                           Users


                                 Authentication
                              Authorization Engine




    Actuate iServer              Centralized
                               Logging Engine




                                                                        Browser-based
                                                      Web/App
                                                                        Administration
                                                       Server
                              Entitlements Engine
10
© Actuate Corporation 2008
Security Extensions

         iPortal Security Extension (iPSE)
           • For Single Sign-on
         Report Server Security Extension
         (RSSE)
           • For any external data store
             including LDAP & Microsoft Active
             Directory integration




11
© Actuate Corporation 2008
Single Cluster supports diverse and disparate
     security systems

      • Actuate integrates with
        all major security
        systems and services
        providers
               • RSA, Netegrity,
                     Kerberos, SAP,
                     Tivoli, BMC, SAML,
                     etc.
      • Leverages
        investments in
        enterprise security
        models
               • Centralizes the
                 administration of
                 common user
                 information
      • Supports multiple
        authentication and
        authorization sources
        from a single iServer
        cluster


12
© Actuate Corporation 2008
Java RSSE Architecture




                                                                                                                     Interface Implementation
                                                                                            (Published by Actuate)
                                       iServer Endpoint   HTTP request




                                                                          RSSE Endpoint
                                                                                                                                                DB Access API




                                                                                                Java Interface
                                                              SOAP                                                                                                3rd party
                                                                                                                                                                 database
                                                          HTTP response                                                                                         (e.g. LDAP)


                             iServer


                                                                                          RSSE Service




13
© Actuate Corporation 2008
Transport Security


                                                 Web Tier                      J2EE Server Farm(e.g. WebSphere)                   Report Server Farm



             SSl Encrypted Web Browser session              Internal traffic                                SOAP/http
                                                                                                     Optionally Encrypted using
                                                                                                         Stunnel or IPSEC




                `

                    `

                        `    FW1                                 FW2                                           FW3




                                                                                       Application
                                            Web Server                                Server farm                             Actuate iServer          Actuate
                                              Farm                                   running Active                               nodes                Encycl.
                                                                                         Portal




14
© Actuate Corporation 2008
Microsoft IIS Web Tier Integration

            • Reverse HTTP Proxy – using AJP plug-in
                     • Supports IIS forwarding requests to iPortal
                     • AJP plug-in configured with Microsoft IIS




                  Microsoft
                     IIS                                      Oracle
                                          Actuate              Oracle
                                                          Containers for
                                AJP 13
                                           HTTP            Containers for or
                                                            iServer Cluster
                                                               J2EE
               AJP connector               Server               J2EE
                                                             iServer Express




15
© Actuate Corporation 2008
How It Works: ASP.net Forms Authentication & SSO
     with Actuate
                                                                                      Active Directory

                         1                   Microsoft
                                           IIS /ASP.NET
                          2                                                                                 RSSE
                                                                     4                   8

                         3                                    4. App authentication

                         5

                         6

                                                                                      Actuate               Oracle
                                                                                                             Oracle
                                                                     7                 HTTP              Containers for
                                          AJP connector                                Server
                                                                                                          Containers for or
                                                                                                          iServer Cluster
                                                                                                             J2EE
                                                                                                              J2EE
                                                                                                           iServer Express



    1. GET default.aspx HTTP/1.1                    7. Submit Actuate URL from ASP
                                                         page
    2. 302 Redirect
         Location: login.aspx                       8. Report Server Security Extension
                                                         provides external authentication
    3. POST default.aspx HTTP/1.1
                                                         & registration services
         <form data containing credentials>

    5. 200 OK
         Set-Cookie: .ASPXAUTH Auth Ticket

    6. GET default.aspx HTTP/1.1
16           Cookie: .ASPXAUTH
                            Auth Ticket
© Actuate Corporation 2008
Seamless Access to Actuate




17
© Actuate Corporation 2008
Seamless Access to Actuate




18
© Actuate Corporation 2008

More Related Content

PDF
Security in a Cloudy Architecture
PPTX
Oracle Database Firewall - Pierre Leon
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
PDF
Oracle a TBIZ2011
PDF
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
PDF
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
PPSX
Ppt dbsec-oow2013-avdf
PDF
IT Rationalization: Leveraging Service-Oriented Abstraction
Security in a Cloudy Architecture
Oracle Database Firewall - Pierre Leon
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Oracle a TBIZ2011
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Ppt dbsec-oow2013-avdf
IT Rationalization: Leveraging Service-Oriented Abstraction

What's hot (20)

PDF
分会场九Altiris终端管理套件和服务器管理套件现在及远景
PDF
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
PDF
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
PDF
Datapowercommonusecases 130509114200-phpapp02
PDF
Juniper Enterprise Guest Access
PDF
NetIQ sessie Boudewijn van Lith
PDF
Whats new in data power
PPTX
Managing Windows RT devices in the Enterprise
PPTX
Oracle security-formula
PDF
Manpower group idm-platform
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
PDF
Oracle Enterprise Manager
PDF
IBM DataPower Gateway appliances feature & virtual edition comparison
PDF
Sun java-access-manager-siebel-80-final
PDF
Introduction To OSGi
PDF
03 300364 2
PDF
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
PDF
Identity management11gr2launch finalv2
PDF
Intel Cloud Summit: Greg Brown McAfee
PDF
Tablet Access to Business Applications
分会场九Altiris终端管理套件和服务器管理套件现在及远景
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Datapowercommonusecases 130509114200-phpapp02
Juniper Enterprise Guest Access
NetIQ sessie Boudewijn van Lith
Whats new in data power
Managing Windows RT devices in the Enterprise
Oracle security-formula
Manpower group idm-platform
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Oracle Enterprise Manager
IBM DataPower Gateway appliances feature & virtual edition comparison
Sun java-access-manager-siebel-80-final
Introduction To OSGi
03 300364 2
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
Identity management11gr2launch finalv2
Intel Cloud Summit: Greg Brown McAfee
Tablet Access to Business Applications
Ad

Viewers also liked (9)

PPTX
Get Your Shift Together: Aligning Everyone to KPIs that Matter
PPTX
Accenture Security Services: Defending and empowering the resilient digital b...
PPTX
Sei pronto a passare al continuous delivery?
PDF
A case study on Accenture
PPTX
Unlocking the True Benefit of Software Defined Networking
PPTX
Making the business case for DevOps
PDF
Fundamental Review of the Trading Book (FRTB) – Data Challenges
PPT
The New World of As a Service
PDF
Developing a Roadmap for Digital Transformation
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Accenture Security Services: Defending and empowering the resilient digital b...
Sei pronto a passare al continuous delivery?
A case study on Accenture
Unlocking the True Benefit of Software Defined Networking
Making the business case for DevOps
Fundamental Review of the Trading Book (FRTB) – Data Challenges
The New World of As a Service
Developing a Roadmap for Digital Transformation
Ad

Similar to Enterprise Security & SSO (20)

PDF
License Management
PDF
OpenStack Security
PDF
Overview of Identity and Access Management Product Line
PDF
Real User Experience Insight
PDF
Real User Experience Insight
PDF
Real User Experience Insight
PDF
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
PPT
Compliance and Governance Through Complex Entitlement Management
PDF
License Management Overview
PDF
5 Keys to Delivering Storage-as-a-Service Without Losing Control
PDF
Wallix AdminBastion - Privileged User Management &amp; Access Control
PDF
HyTrust-FISMA Compliance in the Virtual Data Center
PDF
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
PDF
Tänased võimalused turvalahendustes - Tarvi Tara
PDF
Integrating Novell Access Governance Suite with Novell Identity Manager
PDF
Cisco Study: State of Web Security
PDF
What's New in Novell Identity Manager 4.0
PDF
Troubleshooting Novell Access Manager 3.1
PDF
59264945-Websphere-Security.pdf
PPTX
Eucalyptus-AWS Hybrid Using RightScale myCloud
License Management
OpenStack Security
Overview of Identity and Access Management Product Line
Real User Experience Insight
Real User Experience Insight
Real User Experience Insight
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
Compliance and Governance Through Complex Entitlement Management
License Management Overview
5 Keys to Delivering Storage-as-a-Service Without Losing Control
Wallix AdminBastion - Privileged User Management &amp; Access Control
HyTrust-FISMA Compliance in the Virtual Data Center
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
Tänased võimalused turvalahendustes - Tarvi Tara
Integrating Novell Access Governance Suite with Novell Identity Manager
Cisco Study: State of Web Security
What's New in Novell Identity Manager 4.0
Troubleshooting Novell Access Manager 3.1
59264945-Websphere-Security.pdf
Eucalyptus-AWS Hybrid Using RightScale myCloud

More from Ambareesh Kulkarni (20)

PPT
Travel Management Dashboard application
PDF
Carlson Wagonlit: Award winning application
PDF
Analyze Optimize Realize - Business Value Analysis
PPTX
Evolution of Client Services functions
PPTX
Building the Digital Bank
PPT
Packaged Dashboard Reporting Solution
PDF
Actuate Certified Business Solutions for SAP
PDF
Professional Services Project Delivery Methodology
PPTX
Windows 10 Migration
PPT
Actuate BI implementation for MassMutual's SAP BW
PDF
Professional Services packaged solutions for SAP
PPT
SAP R3 SQL Query Builder
PPTX
Zero Touch Operating Systems Deployment
PPTX
Ambareesh Kulkarni, Professional background
PPTX
Professional Services Roadmap 2011 and beyond
PPTX
1E and Servicenow integration
PPTX
Enterprise BI & SOA
PPTX
Professional Services Automation
PPT
Storage Provisioning for Enterprise Information Applications
PPTX
Professional Services Sales Techniques & Methodology
Travel Management Dashboard application
Carlson Wagonlit: Award winning application
Analyze Optimize Realize - Business Value Analysis
Evolution of Client Services functions
Building the Digital Bank
Packaged Dashboard Reporting Solution
Actuate Certified Business Solutions for SAP
Professional Services Project Delivery Methodology
Windows 10 Migration
Actuate BI implementation for MassMutual's SAP BW
Professional Services packaged solutions for SAP
SAP R3 SQL Query Builder
Zero Touch Operating Systems Deployment
Ambareesh Kulkarni, Professional background
Professional Services Roadmap 2011 and beyond
1E and Servicenow integration
Enterprise BI & SOA
Professional Services Automation
Storage Provisioning for Enterprise Information Applications
Professional Services Sales Techniques & Methodology

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
A Presentation on Artificial Intelligence
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Getting Started with Data Integration: FME Form 101
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Approach and Philosophy of On baking technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
Programs and apps: productivity, graphics, security and other tools
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A Presentation on Artificial Intelligence
A comparative analysis of optical character recognition models for extracting...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Getting Started with Data Integration: FME Form 101
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Digital-Transformation-Roadmap-for-Companies.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Approach and Philosophy of On baking technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Assigned Numbers - 2025 - Bluetooth® Document
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Tartificialntelligence_presentation.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf

Enterprise Security & SSO

  • 1. Actuate Security Enterprise class, Standards based, Robust and Flexible Ambareesh Kulkarni, Director 1 © Actuate Corporation 2008
  • 2. Anatomy of an Actuate Application ` ` ` FW1 FW2 FW3 Application Web Server Server farm Actuate iServer Actuate Farm running Active nodes Encycl. Portal 2 © Actuate Corporation 2008
  • 3. Features of Actuate Security AuthN & AuthZ • Authentication -Verify if users are who they claim to be • Authorization -Users can only access what the security policy allows • Role-based access control -Grant access based on the user’s role in the organization • Data privacy -Data integrity & reliability • User Registration -External and Internal • Audit information -Usage and exceptions • Transport Security -Secure delivery of information 3 © Actuate Corporation 2008
  • 4. Features of Actuate Security AuthN & AuthZ • Non-repudiation on actions -Important user actions carry proof of execution to prevent denial • Session security -User sessions are uniquely identifiable and not subject to masquerading • Session time-out -Session inactivity leads to session termination • Audit logs -All actions are logged for audit use. • Single sign-on -Usage of multiple systems or services does not require additional credentials. 4 © Actuate Corporation 2008
  • 5. Features of Actuate Security AuthN & AuthZ • Robust authentication & authorization capabilities • Supports both Internal and External Authentication • Can use a combination of UserID/Password for authentication • Optionally: • trust credentials passed to it • Extract Userid and/or password from encrypted artifacts such as (e.g. token, logon ticket etc.) • Granular authorization • Fast and easy mapping of business rules to authorization policy • Course, medium and fine-grained authorization • An open, interoperable Java-based architecture with data source flexibility • Plug-n-play integration with Web, application and directory services • Supports LDAP, RDBMS and any custom data sources 5 © Actuate Corporation 2008
  • 6. External User Registration and Authentication process flow Business Process 2 Workflow 1 3  Automated Access Approval End Portal Server Users 5 Data Store 4 6 Data Repository Actuate 8 Authentication/Revalidation 7 Services 9 Actuate 6 © Actuate Corporation 2008
  • 7. Authorization Controls What can you protect?? • Server Controls • Resource – Universal Resource Indicator… • Applications – group of resources… • Dynamic Content – EJB’s, JSP’s, Servlets… • Method-level Protection – Access, Get, Post • Wild-Card Control – *, /*/, *.* 7 © Actuate Corporation 2008
  • 8. Authorization & Privilege Management Levels Limits access at the URL Coarse-grained level to protect machines Coarse and their contents Provides conditional Medium-grained access to Actuate Folders and files based on access control lists and user roles Controls what data users Fine Fine-grained see once they have access to the report (Page Level Security) 8 © Actuate Corporation 2008
  • 9. Usage Logging What have you accessed? • Provides records required to meet security policy and compliance requirements Usage logging • Helps pinpoint problem areas against policies • Captures “contextual” Actuate usage log information for better captures ALL diagnosing issues User Activity 9 © Actuate Corporation 2008
  • 10. Actuate Security Scalable and Flexible Key Server Dispatcher Enforcement (Agent or Proxy) End Users Authentication Authorization Engine Actuate iServer Centralized Logging Engine Browser-based Web/App Administration Server Entitlements Engine 10 © Actuate Corporation 2008
  • 11. Security Extensions iPortal Security Extension (iPSE) • For Single Sign-on Report Server Security Extension (RSSE) • For any external data store including LDAP & Microsoft Active Directory integration 11 © Actuate Corporation 2008
  • 12. Single Cluster supports diverse and disparate security systems • Actuate integrates with all major security systems and services providers • RSA, Netegrity, Kerberos, SAP, Tivoli, BMC, SAML, etc. • Leverages investments in enterprise security models • Centralizes the administration of common user information • Supports multiple authentication and authorization sources from a single iServer cluster 12 © Actuate Corporation 2008
  • 13. Java RSSE Architecture Interface Implementation (Published by Actuate) iServer Endpoint HTTP request RSSE Endpoint DB Access API Java Interface SOAP 3rd party database HTTP response (e.g. LDAP) iServer RSSE Service 13 © Actuate Corporation 2008
  • 14. Transport Security Web Tier J2EE Server Farm(e.g. WebSphere) Report Server Farm SSl Encrypted Web Browser session Internal traffic SOAP/http Optionally Encrypted using Stunnel or IPSEC ` ` ` FW1 FW2 FW3 Application Web Server Server farm Actuate iServer Actuate Farm running Active nodes Encycl. Portal 14 © Actuate Corporation 2008
  • 15. Microsoft IIS Web Tier Integration • Reverse HTTP Proxy – using AJP plug-in • Supports IIS forwarding requests to iPortal • AJP plug-in configured with Microsoft IIS Microsoft IIS Oracle Actuate Oracle Containers for AJP 13 HTTP Containers for or iServer Cluster J2EE AJP connector Server J2EE iServer Express 15 © Actuate Corporation 2008
  • 16. How It Works: ASP.net Forms Authentication & SSO with Actuate Active Directory 1 Microsoft IIS /ASP.NET 2 RSSE 4 8 3 4. App authentication 5 6 Actuate Oracle Oracle 7 HTTP Containers for AJP connector Server Containers for or iServer Cluster J2EE J2EE iServer Express 1. GET default.aspx HTTP/1.1 7. Submit Actuate URL from ASP page 2. 302 Redirect Location: login.aspx 8. Report Server Security Extension provides external authentication 3. POST default.aspx HTTP/1.1 & registration services <form data containing credentials> 5. 200 OK Set-Cookie: .ASPXAUTH Auth Ticket 6. GET default.aspx HTTP/1.1 16 Cookie: .ASPXAUTH Auth Ticket © Actuate Corporation 2008
  • 17. Seamless Access to Actuate 17 © Actuate Corporation 2008
  • 18. Seamless Access to Actuate 18 © Actuate Corporation 2008