SAS ® Business Intelligence Web Application Security Configuration Primer

نویسنده

  • Heesun Park
چکیده

Securing Web-based resources is one of the biggest challenges for IT today. Almost all IT organizations use security measures through authentication and authorization to protect their Web resources. Thus, it is vital for SAS Business Intelligence Web applications to integrate within a secure Web environment. This paper explores just that. SAS Business Intelligence Web applications are implemented based on the SAS Metadata Server, which typically is tied to the local OS for host authentication, but it can be integrated with an external authentication mechanism already in place for an organization’s Web space. The latter is called Web (or trusted) authentication. Web-based authentication can occur in various Web components such as Web (HTTP) server, reverse proxy security server, or application server. We will examine the pros and cons of various Web security configurations, Single SignOn (SSO) capability through third-party security packages, and how SAS Business Intelligence Web applications operate within each one. INTRODUCTION Security implementation of J2EE Web applications consists of two parts: authentication to control access to the Web application and authorization to control what operation is allowed on resources, such as servers and data, by the authenticated user. This paper mainly focuses on the authentication process for Web applications, which requires coordinating with existing Web infrastructure. J2EE-based SAS Business Intelligence Web applications use two authentication mechanisms: local OS user-registrybased host authentication, also called SAS authentication, and Web authentication, also called trusted authentication. The most popular user registry for Web authentication is an LDAP directory server, but a flat password file or DBMS is also permitted. To support Web authentication, SAS Business Intelligence Web applications must integrate with an organization’s authentication mechanism for the Web space. The choice of authentication for a Web application is configurable through a pluggable Java Authentication and Authorization Service (JAAS) login module[1]. Web authentication can occur in various Web components such as a Web (HTTP) server, a reverse proxy server, or an application server. The factors in Web security configuration of J2EE Web applications include the authentication mechanism, the location of the authentication challenges, the type of user registry, and possibly Single Sign-On (SSO) capability with a third-party security package or other Web applications. The first thing that you need to understand is the difference between the traditional Web HTTP server security mechanism and the J2EE Web application security arrangement. HTTP server security was originally designed to protect static documents. On the other hand, J2EE Web applications are fully independent Java programs that run in an application server or servlet container and include a security mechanism or standard called JAAS. Technically, an application server is more than just a servlet container, but the terms are used interchangeably in this paper. J2EE Web applications can function without the involvement of HTTP servers, but, in most cases, HTTP servers and application servers are considered an integral part of Web infrastructure. The proxy server is another important component in the Web security configuration. Its original purpose was to protect Web users from the Web by restricting access to Web domains and to enhance Web traffic performance by caching resources. A proxy server that protects Web applications and application servers from outside access is called a reverse proxy server. A reverse proxy server that provides security screening through user registry is called a reverse proxy security server (RPSS). The RPSS might be a separate process or a plug-in to the Web server, such as IBM’s WebSEAL[2,5] and CA’s eTrust SiteMinder Web Server Agent[3]. J2EE Web applications can use different authentication mechanisms and still maintain portability of the code through the configurable JAAS login module. The next section provides an example of JAAS login module usage for a Web application. SAS Presents SAS Global Forum 2009

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Hardening for SAS® 9.3 Enterprise BI Web Applications

Web configuration for SAS 9.3 Enterprise BI Web applications need to be secured according to an organization's security policy. This paper examines the Web configuration security enhancement options and the protection of Web applications from security vulnerability attacks. Security enhancements for the configuration include single sign-on, integration with a reverse proxy security server, sett...

متن کامل

"Ins" and "Outs" of Installing and Configuring the SAS® Enterprise BI Server at Blue Cross & Blue Shield of Minnesota

This paper discusses the implementation of SAS Enterprise BI Server at BlueCross BlueShield of Minnesota (BCBSM). It provides an overview of the hardware and software architecture and the deployment of SAS Enterprise BI Server within a mature enterprise-wide and external web-facing infrastructure in a multi-tier UNIX environment. This paper also provides highlights of the installation and confi...

متن کامل

Managing Content in Your SAS Business Intelligence Environment

With the release of the SAS BI Server in 2003, SAS provided a suite of tools that made the power of SAS available to everyone in an organization. As more organizations deploy these tools, questions are being asked about managing the content that’s generated with these tools in a dynamic environment. How can we move a report from the test environment to the production environment? How can we tur...

متن کامل

SAS ® : The Ultimate Dashboard Machine

Leaders want to align their organizations around strategic goals and metrics. Knowledge workers need ready access to data about what is happening right now. IT seeks to make information available and useful to the business, and yet observe appropriate security policies. For many organizations, all of these goals are coming together in a single focal point: Dashboards. SAS is known for its advan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009