SlideShare a Scribd company logo
e-Xpert Gate e-Xpert Solutions SA [email_address] 2 mars 2001
e-Xpert Gate ? Access  your  applications from  everywhere  with strong  confidentiality  and authentication
About your need Access internal information from everywhere Access information with high security  No specific client software Simple to use No dedicated station Cost effective solution
Solution ? Use your favorite browser
Why my browser ? Very good « footprint » Standard sofware client Free Very good level of security (with SSL) PKI enabled application
But  how to solve security issue  ? Web-based Internal  Resources What should I do ? Firewall Dmz Browser
Direct access with http or https ? Firewall Dmz Browser Web-based Internal  Resources Why not ?
Direct access drawback Direct access using HTTP Clear traffic (password and content snifing) No authentication No data integrity Direct access to internal content servers Permit attacks DoS Direct access to internal networks Permit to access other resources if server compromised
Secure access with e-Xpert Gate Firewall Dmz Browser Web-based Internal  Resources E-Xpert Gate SSL
Secure access thrue e-Xpert Gate Use SSL technology (PKI) Provide authentication (server and client) Provide confidentiality Provide data integrity No direct access to internal ressources URL content checking and blocking Permit content analysis with IDS system
Reverse Proxy Technology Server within a firewall The proxy server appears to be the content server A client computer on the Internet sends a request to the proxy server Firewall CACHE The proxy server uses a regular mapping to forward the client request to the internal content server You can configure the firewall router to allow a specific server on a specific port (in this case, the proxy on its assigned port) to have access through the firewall without allowing any other machine in or out. https (SSL) http  or  https
SSL/TLS Technology S ecure  S ockets  L ayer TCP/IP socket encryption Provides end-to-end protection of communications sections Confidentiality protection via encryption Integrity protection with MAC’s Can authenticate client (option)
SSL/TLS Technology The SSL protocol runs above TCP/IP The SSL protocol runs below higher-level protocols such as HTTP or IMAP
Applications that use SSL  or TLS e- C ommerce – orders  – e-Banking protects contents of forms sent to server protects sensitive personal data provides authentication Secure web-based intranet access ensures secure transmission of confidential content provides authentication Etc.
SSL/TLS history SSL v1 designed by Netscape in 1994 SSL v2 shipped with Navigator 1.0 and 2.0 SSL v3 latest version TLS v1 developed by IETF  aka SSL v3.1
About authentication ? Your business is on the line.  But do you really know  who’s on the other end?
Two-factor User Authentication
One-Factor User  Authentication Drawback Users choose weak password Easy to guess (Brute force, dictionary) Easy to use a key logger or sniffer Learn password by « Social Engineering »
e-Xpert Gate’s Authentication method Native RSA SecurID authentication SSL Client authentication (PKI) Certificate store on SmartCard or iKey Certificate store on a file External authentication with firewall Radius, Tacacs, Ldap Basic HTTP authentication* * Method not recommended
RSA SecurID implementation Dmz Web-based Internal  Resources E-Xpert Gate
RSA tokens
How it works ? Seed Time 482392 ACE/Server Token Algorithm Seed Time 482392 Algorithm Same Seed Same Time
SecurID exemple
SSL client authentication implementation Dmz Web-based Internal  Resources PKI architecture Client X509 Certificate E-Xpert Gate
What is a certificate
X509 Authentication Uses SSL client X.509 certificate Provides strong authentication (“something you have, something you know”) Requires a Certificate authority (Public or Private) Certificate can be stored on local host or on smart card  or IKey
Client side authentication Web Client Web Server Challenge Client Certificate Request Challenge answer Client Certificate
How secure is the private key ? How does the  user get access? Where is it stored? Smart Card PIN Password Local Browser store Private key
SmartCard and iKey Provides strong authentication  (protect the private key) Serial, PCMCIA, USB Requires smart card reader...
e-Xpert Gate Applications Consults Email system like Microsoft Exchange, Lotus, Netscape, etc… Accesses Intranet  applications E-Banking solution (front-end) Extranet applications with partners Etc.
Lotus access with e-Xpert Gate
Outlook Web Access
e-Xpert Gate ’s key features Authentication method RSA SecurID SSL client authentication Basic HTTP External authentication with firewall PKI enabled application Support Revocation CRL Ldap
e-Xpert Gate ’s key features Security protocols SSL version 2.0, 3.0 TLS version 1.0 Ciphers and Algorithms Key exchange: RSA Symmetric ciphers: DES 56, 3DES 168, RC4, RC2, IDEA 128 Hashes: MD5, SHA-1
e-Xpert Gate ’s key features Fully supports Verisign Global Server IDs (128 bits for every browser) Supports hardware cryptographic accelerators Rainbow
e-Xpert Gate ’s key features Secure OS (Linux or Solaris) FIA with Tripwire Management with SSH server Secure file transfer with SSH Syslog messages Appliance solution IBM Sun Microsystems
Questions ?

More Related Content

PPT
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
PPTX
Let's get started with passwordless authentication using windows hello in you...
PPT
X 509 Certificates How And Why In Vb.Net
PDF
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Implementing Public-Key-Infrastructures
PPTX
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
PPTX
Certificate pinning in android applications
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Let's get started with passwordless authentication using windows hello in you...
X 509 Certificates How And Why In Vb.Net
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
CRYPTOGRAPHY AND NETWORK SECURITY
Implementing Public-Key-Infrastructures
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Certificate pinning in android applications

What's hot (20)

PPTX
How to do right cryptography in android part 3 / Gated Authentication reviewed
PPTX
Flak+technologies
DOC
Certification authority
PPTX
How to do Cryptography right in Android Part One
PPTX
The Rise of Secrets Management
PDF
Authentication techniques
PPTX
Transport Layer Security (TLS)
PPTX
How to do Cryptography right in Android Part Two
PDF
020618 Why Do we Need HTTPS
PPTX
Final ppt ecommerce
PPTX
public key infrastructure
PPTX
Public key infrastructure
PDF
PKI Industry growth in Bangladesh
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PPT
PKI and Applications
PPTX
x.509-Directory Authentication Service
PDF
Federated Identity for IoT with OAuth2
PDF
18CS2005 Cryptography and Network Security
How to do right cryptography in android part 3 / Gated Authentication reviewed
Flak+technologies
Certification authority
How to do Cryptography right in Android Part One
The Rise of Secrets Management
Authentication techniques
Transport Layer Security (TLS)
How to do Cryptography right in Android Part Two
020618 Why Do we Need HTTPS
Final ppt ecommerce
public key infrastructure
Public key infrastructure
PKI Industry growth in Bangladesh
Ch12 Cryptographic Protocols and Public Key Infrastructure
PKI and Applications
x.509-Directory Authentication Service
Federated Identity for IoT with OAuth2
18CS2005 Cryptography and Network Security
Ad

Viewers also liked (8)

PDF
Xpert- MTB-RIF Data _Biman
PPTX
Standards for TB care in India, RNTCP challenges: India, Maharashtra & Mumbai...
PPTX
molecular detection of tuberculosis and rifampin resistance.
PPTX
Tuberculosis Diagnosis
PPT
Cbnaat ppt by Dr. Samrat Abhishek
PPTX
RECENT ADVANCES IN DIAGNOSIS OF TUBERCULOSIS
PPTX
Xpert MTB/RIF Ultra newer technology past to future DIAGNOSIS OF TUBERCULOSIS
PPTX
Lpa and Genexpert/CBNAAT/Xpert MTB/Rif
Xpert- MTB-RIF Data _Biman
Standards for TB care in India, RNTCP challenges: India, Maharashtra & Mumbai...
molecular detection of tuberculosis and rifampin resistance.
Tuberculosis Diagnosis
Cbnaat ppt by Dr. Samrat Abhishek
RECENT ADVANCES IN DIAGNOSIS OF TUBERCULOSIS
Xpert MTB/RIF Ultra newer technology past to future DIAGNOSIS OF TUBERCULOSIS
Lpa and Genexpert/CBNAAT/Xpert MTB/Rif
Ad

Similar to e-Xpert Gate / Reverse Proxy - WAF 1ere génération (20)

PDF
Ssl tls-beginners-guide
PDF
Implementing Application Security
PPTX
Internet security
PPT
Security
PPT
Web security
PPTX
Ssl Vpn presentation at CoolTech club
ODP
Lotusphere 2011 SHOW104
PPTX
Secure socket layer
 
PPTX
Ecommerce final ppt
PPT
PPTX
Internet .ppt
PPT
Introduction to Secure Sockets Layer
PDF
BAIT1103 Chapter 4
PDF
How to Gain Visibility into Encrypted Threats
PPT
SSL.ppt
PPSX
Secure electronic transaction
PPTX
Information Security Engineering
PPT
Introduction to distributed security concepts and public key infrastructure m...
PPT
Ssl Https Server
ODP
Inro to Secure Sockets Layer: SSL
Ssl tls-beginners-guide
Implementing Application Security
Internet security
Security
Web security
Ssl Vpn presentation at CoolTech club
Lotusphere 2011 SHOW104
Secure socket layer
 
Ecommerce final ppt
Internet .ppt
Introduction to Secure Sockets Layer
BAIT1103 Chapter 4
How to Gain Visibility into Encrypted Threats
SSL.ppt
Secure electronic transaction
Information Security Engineering
Introduction to distributed security concepts and public key infrastructure m...
Ssl Https Server
Inro to Secure Sockets Layer: SSL

More from Sylvain Maret (20)

PDF
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
PDF
factsheet_4g_critical_comm_en_vl
PDF
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
PDF
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
PDF
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
PDF
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
PDF
Strong Authentication State of the Art 2012 / Sarajevo CSO
PDF
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
PDF
Threat Modeling / iPad
PDF
Strong Authentication in Web Application #SCS III
PDF
Strong Authentication in Web Applications: State of the Art 2011
PDF
Strong Authentication in Web Application / ConFoo.ca 2011
PPT
Authentication and strong authentication for Web Application
PDF
Geneva Application Security Forum 2010
PDF
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
PPTX
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
PPTX
Digital identity trust & confidence
PDF
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
PDF
Geneva Application Security Forum: Vers une authentification plus forte dans ...
PDF
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
factsheet_4g_critical_comm_en_vl
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Strong Authentication State of the Art 2012 / Sarajevo CSO
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
Threat Modeling / iPad
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Application / ConFoo.ca 2011
Authentication and strong authentication for Web Application
Geneva Application Security Forum 2010
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Digital identity trust & confidence
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf

e-Xpert Gate / Reverse Proxy - WAF 1ere génération

  • 1. e-Xpert Gate e-Xpert Solutions SA [email_address] 2 mars 2001
  • 2. e-Xpert Gate ? Access your applications from everywhere with strong confidentiality and authentication
  • 3. About your need Access internal information from everywhere Access information with high security No specific client software Simple to use No dedicated station Cost effective solution
  • 4. Solution ? Use your favorite browser
  • 5. Why my browser ? Very good « footprint » Standard sofware client Free Very good level of security (with SSL) PKI enabled application
  • 6. But how to solve security issue ? Web-based Internal Resources What should I do ? Firewall Dmz Browser
  • 7. Direct access with http or https ? Firewall Dmz Browser Web-based Internal Resources Why not ?
  • 8. Direct access drawback Direct access using HTTP Clear traffic (password and content snifing) No authentication No data integrity Direct access to internal content servers Permit attacks DoS Direct access to internal networks Permit to access other resources if server compromised
  • 9. Secure access with e-Xpert Gate Firewall Dmz Browser Web-based Internal Resources E-Xpert Gate SSL
  • 10. Secure access thrue e-Xpert Gate Use SSL technology (PKI) Provide authentication (server and client) Provide confidentiality Provide data integrity No direct access to internal ressources URL content checking and blocking Permit content analysis with IDS system
  • 11. Reverse Proxy Technology Server within a firewall The proxy server appears to be the content server A client computer on the Internet sends a request to the proxy server Firewall CACHE The proxy server uses a regular mapping to forward the client request to the internal content server You can configure the firewall router to allow a specific server on a specific port (in this case, the proxy on its assigned port) to have access through the firewall without allowing any other machine in or out. https (SSL) http or https
  • 12. SSL/TLS Technology S ecure S ockets L ayer TCP/IP socket encryption Provides end-to-end protection of communications sections Confidentiality protection via encryption Integrity protection with MAC’s Can authenticate client (option)
  • 13. SSL/TLS Technology The SSL protocol runs above TCP/IP The SSL protocol runs below higher-level protocols such as HTTP or IMAP
  • 14. Applications that use SSL or TLS e- C ommerce – orders – e-Banking protects contents of forms sent to server protects sensitive personal data provides authentication Secure web-based intranet access ensures secure transmission of confidential content provides authentication Etc.
  • 15. SSL/TLS history SSL v1 designed by Netscape in 1994 SSL v2 shipped with Navigator 1.0 and 2.0 SSL v3 latest version TLS v1 developed by IETF aka SSL v3.1
  • 16. About authentication ? Your business is on the line. But do you really know who’s on the other end?
  • 18. One-Factor User Authentication Drawback Users choose weak password Easy to guess (Brute force, dictionary) Easy to use a key logger or sniffer Learn password by « Social Engineering »
  • 19. e-Xpert Gate’s Authentication method Native RSA SecurID authentication SSL Client authentication (PKI) Certificate store on SmartCard or iKey Certificate store on a file External authentication with firewall Radius, Tacacs, Ldap Basic HTTP authentication* * Method not recommended
  • 20. RSA SecurID implementation Dmz Web-based Internal Resources E-Xpert Gate
  • 22. How it works ? Seed Time 482392 ACE/Server Token Algorithm Seed Time 482392 Algorithm Same Seed Same Time
  • 24. SSL client authentication implementation Dmz Web-based Internal Resources PKI architecture Client X509 Certificate E-Xpert Gate
  • 25. What is a certificate
  • 26. X509 Authentication Uses SSL client X.509 certificate Provides strong authentication (“something you have, something you know”) Requires a Certificate authority (Public or Private) Certificate can be stored on local host or on smart card or IKey
  • 27. Client side authentication Web Client Web Server Challenge Client Certificate Request Challenge answer Client Certificate
  • 28. How secure is the private key ? How does the user get access? Where is it stored? Smart Card PIN Password Local Browser store Private key
  • 29. SmartCard and iKey Provides strong authentication (protect the private key) Serial, PCMCIA, USB Requires smart card reader...
  • 30. e-Xpert Gate Applications Consults Email system like Microsoft Exchange, Lotus, Netscape, etc… Accesses Intranet applications E-Banking solution (front-end) Extranet applications with partners Etc.
  • 31. Lotus access with e-Xpert Gate
  • 33. e-Xpert Gate ’s key features Authentication method RSA SecurID SSL client authentication Basic HTTP External authentication with firewall PKI enabled application Support Revocation CRL Ldap
  • 34. e-Xpert Gate ’s key features Security protocols SSL version 2.0, 3.0 TLS version 1.0 Ciphers and Algorithms Key exchange: RSA Symmetric ciphers: DES 56, 3DES 168, RC4, RC2, IDEA 128 Hashes: MD5, SHA-1
  • 35. e-Xpert Gate ’s key features Fully supports Verisign Global Server IDs (128 bits for every browser) Supports hardware cryptographic accelerators Rainbow
  • 36. e-Xpert Gate ’s key features Secure OS (Linux or Solaris) FIA with Tripwire Management with SSH server Secure file transfer with SSH Syslog messages Appliance solution IBM Sun Microsystems