SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Downloaden Sie, um offline zu lesen
New Security Features in IDS

                           Yoram Benchetrit
                yoram.benchetrit@fr.ibm.com


                  Mardi 30 novembre 2010
                  User Group Informix France
Agenda

   Mapped Users

   Trusted Context

   Selective Row Level Auditing

                     User Group Informix France
Agenda



   Mapped Users




                  User Group Informix France
Why do we need this feature ?
    Local Account Look-up Availability
    – Although IDS has supported PAM since 9.40.xC2, users have
      had to enable look up of the user account on the host
      Operating System

    Redundant Password Comparaison
    – Even though PAM or Windows AD has authenticated the users,
      IDS obtains the users' hashed password and does a redundant
      password comparison
        • The users password (encrypted) must be accessible to IDS
        • LDAP users have had to enable the password property for the
          LDAP “proxy” user
        • Where customers use Windows AD, they have had to turn on Unix
          password property for the users.


    Customers unhappy to do either of the two
                                 User Group Informix France
User Story
    Microsoft Active Directory (LDAP)
    – As a DBSA, I need to allow users identified in MS Active
      Directory (AD) to connect to IDS without being forced to create
      a Unix login account for the users


    Users with PCs
    – We use PAM to authenticate our users. Why do we need to
      create accounts in the local operating system?


    Administrator Roles for External Users
    – As a DBSA, I should be able to grant an externally
      authenticated users server administrator roles



                                       User Group Informix France
Feature Quick Reference
    Authenticate external users without an OS account
    – Database users no longer need
        • An account Look-up in the local OS
        • Enable password properties for external authenticators


    The DBSA “maps” an external user to:
        • An existing OS user or
        • A database defined UIG/GID pair


    Uses an extension to the GRANT/REVOKE SQL statement

    Requires PAM or SSO authentication

    Traditional password based authentication is still available

    Windows support is pending
                                               User Group Informix France
Feature Details – 1-2-3!!!

      Enable USERMAPPING in ONCONFIG

      Setup PAM or SSO via SQLHosts

      GRANT ACCESS TO <users> PROPERTIES


                   That is it...!!


                              User Group Informix France
Feature Details – ONCONFIG
    New ONCONFIG parameter

    USERMAPPING { OFF | BASIC | ADMIN }

       • OFF
         This feature is turned off – this is the default

       • BASIC
         IDS non-privileged users – not DBSA, DBSSO or AAO

       • ADMIN
         Enabled privileged users



                                         User Group Informix France
Feature Details – Syntax
    Extension to GRANT statement

    – GRANT ACCESS TO {username} PROPERTIES
       [ USER   OS_username       | UID uid ]
       GROUP      (OS_groupname | gid),
       HOMEDIR    ‘homedir’,
       AUTHORIZATION (userauth);

    – 'userauth' is an OR pattern of DBSA, DBSSO, AAO,
      BARGROUP




                                    User Group Informix France
Feature Details – Syntax (cont)
   Examples
   – GRANT ACCESS TO user1 PROPERTIES USER ravik;

   – GRANT ACCESS TO user2 PROPERTIES UID 100, GROUP (200);

   – GRANT ACCESS TO user3 PROPERTIES USER ravik, HOME
     '/home/user4’;

   – GRANT ACCESS TO user4 PROPERTIES USER ravik
     AUTHORIZATION (dbsa);

   – GRANT ACCESS TO PUBLIC PROPERTIES USER ravik;


                                 User Group Informix France
Feature Details – Syntax (cont)
   Extension to REVOKE statement

   – REVOKE ACCESS FROM { PUBLIC | <username> }



   Example

   – REVOKE ACCESS FROM user1;


   To alter a user mapping revoke and re-grant access
   – Error: -26107 User name (%s) has already been granted


                                       User Group Informix France
Feature Details - Capabilities
   OS processes
    – SYSTEM commands in a procedure will run as the surrogate user


   OS Files
    – Sqexplain Files will be created as the surrogate user
    – Debug Files will be created as the surrogate user
    – Unload and Output Files will be created as the surrogate user


   Home Directory (optional)
    – If the home directory is not specified, IDS will create a directory for user file in
      $INFORMIXDIR/users/uid.<id_number>
    – If user is mapped to non-existent uid/gid pair, file will be created using that
      UID/GID only if the directory is publicly writable


   Role Separation
    – IXUSERS group in $INFORMIXDIR/dbssodir/seccfg
        • A Mapped User cannot be part of IXUSERS group if surrogate user is invalid:
          Error -25571 “cannot create a user thread”.
                                                      User Group Informix France
Example Setup
   ONCONFIG
    ####################################################################
    # USERMAPPING - Control access to IDS for users without operating
    #         system accounts.
    ####################################################################
    # OFF - users without operating system accounts cannot use IDS
    # BASIC - users without operating system accounts can use IDS but
    #      not as privileged users
    # ADMIN - users without operating system accounts can use IDS as
    #      privileged users
    ####################################################################

    USERMAPPING BASIC



   PAM Configuration /etc/pam.d/idspam
    # LDAP authentication
        auth    required pam_ldap.so
        account required pam_ldap.so

   SQLHosts
    idsserver onsoctcp linx idsservice s=4, pam_serv=(idspam), pamauth=(challenge)

                                                    User Group Informix France
Example – LDAP Mapped User
 LDAP Configuration /etc/ldap.conf
  # LDAP server
   host ldapserver
   ...
   # The distinguished name of the search base
   base dc=yobldap-domain,dc=com

 User Mapping Definition
 [informix@linx]$ dbaccess stores_demo <<EOF
 GRANT ACCESS TO ldap_user PROPERTIES
 USER yob;
 EOF

 IDS Connection
 [informix@linx ]$ dbaccess - -
 > connect to ‘stores_demo@idsserver’ user 'ldap_user'
 > Password:       <- type ldap password
 Connected.


                                                   User Group Informix France
Open Admin Tool Support (OAT)
  GUI Interface support is provided through Open Admin Tool
  – Server Administration
     • User Privileges
         – Add, Edit, Delete, Show SQL




                                     User Group Informix France
System Tables
   New system tables in 'sysuser' database

    – SYSUSERMAP
    – SYSSURROGATES
    – SYSSURROGATEGROUPS

   DBSA should use the GRANT ACCESS TO / REVOKE
   ACCESS FROM statements to manage the system
   tables as there are cross-references !




                           User Group Informix France
System Tables (cont)
    SYSUSERMAP

    Column name    Type                Nulls

    username       nchar(32)           yes
    surrogate_id   integer             yes




                               User Group Informix France
System Tables (cont)
    SYSSURROGATES

    Column name    Type                     Nulls

    surrogate_id    serial                   no
    os_username    nchar(32)                 yes
    uid            integer                   yes
    gid            integer                   yes
    groupname      nchar(32)                 yes
    homedir        nvarchar(255)             yes
    userauth       char(10)                  yes




                                   User Group Informix France
System Tables (cont)
    'userauth' Entry in SYSSURROGATES
     – An OR pattern of
         •   Position 1: s = DBSA
         •   Position 2: o = DBSSO
         •   Position 3: a = AAO
         •   Position 4: b = BARGROUP
         •   Other positions reserved for future use
         •   Attributes in lower case only


    Example
        s--b------          The user is a DBSA and belongs to BARGROUP
        -o--------          The user is an AAO


    If the 'userauth' entry is not specified, the user is non-privileged
                                             User Group Informix France
System Tables (cont)
    SYSSURROGATEGROUPS

    Column name    Type               Nulls

    surrogate_id    integer          yes
    gid            integer           yes
    groupname      nchar(32)         yes
    groupseq       smallint          yes




                               User Group Informix France
Agenda



   Trusted Context




                     User Group Informix France
Why do we need this feature ?
 In a 3-tiers architecture, the middle-tier's user must have all the
 privileges needed to execute all the requests from all users

 There is a security issue of accessing resources on behalf of
 users if the middle-tier's user is compromised

 There is a lost of information when auditing needs to
 distinguish end-users from middle-tier's user

 Establishing new connection may suffer performance drop
 which is also the case when using connection pool


                                      User Group Informix France
Feature Quick Reference
   This feature allow to reuse a connection for a different user without the
   need to establish a new connection

   The purpose is to avoid connection overhead when there is a need to
   connect on behalf of new users, which is the case in application server

   This also provide higher security level and better auditing granularity,
   as each user connect and switch on a trusted connection with their
   own credentials and privilege

   New SQL statement are provided and/or enhanced to create trusted
   context, establish trusted connection and provide connection switch
   capabilities

   All users properties are reported for the switched connection user
   when established
                                          User Group Informix France
Trusted Context Object
  A Trusted Context is a database object created by the
  database security administrator (DBSECADM) that defines a
  set of properties for a connection that when met, allow that
  connection to be a “trusted connection” with special
  properties.
   – The connection must be established by a specific user.
   – The connection must come from a trusted client machine.
   – The port over which the connection is made must have the
     required encryption.

  If these criteria are met, the connection will allow changes in
  userid and privileges as defined in the trusted context.

                                     User Group Informix France
Trusted Context Setup
    Step1 : Create Trusted Context Object
    –   Created at database level
    –   Must be created by DBSECADM
    –   Can use OS users or Mapped Users
    –   Provision to Switch User


    Step 2: Establish Trusted Connections
    – Use SQL statement to establish trusted connection
    – Must satisfy criteria defined in Trusted Context


    Step 3: Switch Connections
    – Use SQL Statement to switch user over a trusted connection
    – New operations performed for the switched user
                                     User Group Informix France
Trusted Context Syntax
  Syntax (simplified)
  – CREATE TRUSTED CONTEXT <ctx>
    BASED UPON CONNECTION USING SYSTEM AUTHID <user>
    ATTRIBUTES (ADDRESS <host>, WITH ENCRYPTION <value>)
    DEFAULT ROLE <role>
    WITH USE FOR <user list> [WITH | WITHOUT] AUTHENTIFICATION
    ENABLE | DISABLE


  Users with DBSECADM role can perform following
  operations
  – CREATE TRUSTED CONTEXT
  – ALTER TRUSTED CONTEXT
  – DROP TRUSTED CONTEXT

                                  User Group Informix France
Trusted Context Creation
    New SQL statement to create a trusted context
         CREATE TRUSTED CONTEXT mytcx
         BASED UPON CONNECTION USING SYSTEM AUTHID yob
         DEFAULT ROLE employee
         ATTRIBUTES (ADDRESS 'linx.swglab.fr.ibm.com')
         WITH USE FOR PUBLIC WITHOUT AUTHENTICATION
         ENABLE


    –   Creates an Trusted Context object named 'mytcx'
    –   The connection can be established by user 'yob'
    –   Will allow connections from 'linx.swglab.fr.ibm.com'
    –   Can switch to any users (PUBLIC) once Trusted
        Connection established


                                   User Group Informix France
Trusted Connection Establishment
    New keyword in the “connect” SQL statement to
    establish a trusted connection

     – EXEC SQL CONNECT TO “stores_demo@ids1170” TRUSTED
     – Detail in online.log
        • 18:21:07 TESTMODE: trust context address 9.101.46.52 matched
        • 18:23:12 listener-thread: err = -28021: oserr = 0: errstr = : Trusted
          Connection request rejected.



    Front-End API Support
     – ESQL/C
     – ODBC
     – JDBC
                                            User Group Informix France
Trusted Connection Switch
  There is a SQL statement to switch over a trusted
  connection
   – EXEC SQL SET SESSION AUTHORIZATION to <user> [ USING <passwd> ]
   – EXEC SQL SET SESSION AUTHORIZATION to “joe”


  Switch to any user defined in the Trusted Context
  Object scope

  Audit records will show the switched user as the
  originator of the operations

  Need to commit or rollback before switching to a
  new user when using transactions
                                     User Group Informix France
Open Admin Tool Support (OAT)
  GUI Interface support is provided through Open Admin Tool
  – Server Administration
     • Trusted context
         – Create, Modify, Delete, Enable, Show SQL




                                     User Group Informix France
Trusted Context Wizard (OAT)
  Trusted Context > View




                           User Group Informix France
Trusted Context Wizard (OAT)
  Trusted Context > Create
   – STEP 1




                             User Group Informix France
Trusted Context Wizard (OAT)
  Trusted Context > Create
   – STEP 2




                             User Group Informix France
Trusted Context Wizard (OAT)
  Trusted Context > Create
   – STEP 3




                             User Group Informix France
Trusted Context Wizard (OAT)
  Trusted Context > Create
   – STEP 4




                             User Group Informix France
System Tables
   New Tables In Database ‘sysuser’
   – table systrustedcontext (
       contextid       serial,
       contextname varchar(128),
       database        char(128),
       authid         char(32),
       defaultrole     char(32),
       enabled         char(1) not null,
       encryption      char(1));

   – table systcxattributes (
        contextid integer not null,
        address char(64),
        encryption char(1));

   – table systcxusers (
       contextid      integer not null,
       username char(32),
       usertype      char(1),
       userrole      char(32),
       authreq        char(1));
                                           User Group Informix France
System Table Query
   Trusted Context Definition in 'sysuser' database
    –   [root@linx trustedContext]# cat sel_trusted_ctx.sql

        SELECT a.contextid, contextname, database, authid, defaultrole, enabled, a.encryption,
              address, username, usertype, userrole, authreq
        FROM   systrustedcontext a, systcxattributes b, systcxusers c
        WHERE a.contextid = b.contextid AND b.contextid = c.contextid

    –   [root@linx trustedContext]# dbaccess sysuser sel_trusted_ctx.sql
        Database selected.

        contextid   1
        contextname mytcx1
        database    stores_demo
        authid      informix
        defaultrole
        enabled     Y
        encryption N
        address     9.101.46.52
        username    PUBLIC
        usertype    G
        userrole
        authreq      N

        1 row(s) retrieved.
        Database closed.                                      User Group Informix France
Agenda



   Selective Row Level Auditing




                    User Group Informix France
Why do we need this feature ?
    Row level auditing produce huge amount of useless
    data because audited tables are not all important to
    system security.

    Some Customer have reported 30% database
    performance drop when turning on row level auditing for
    insert/update/delete operation

    The information in the current row-level audit records
    contains table_id and row_id. These can change over
    time which can make looking back at audit records
    meaningless.

                                  User Group Informix France
Feature Quick Reference
   This feature allow to specify which tables are audited at row
   level
   The purpose is to avoid performance drop during auditing
   whenever all tables and rows are audited
   This feature is turned on by setting ADTROWS in adtcfg file, or
   dynamically with onaudit -R <value>
    – Backward compatibility
   New SQL command are provided to define which tables are
   audited at row level
   An audit trail file is generated and filtered with onshowaudit
   utility



                                    User Group Informix France
Audit Event
   IDS 11.70 has 159 Audit Event
   Audit Event Naming Convention
   – 'aaoo'
       • with 'aa' : 2 letter code for action
       •      'oo' : 2 letter code for the object
   There is a mapping for audit event id to event
   mnemonic
   The feature is implemented for 4 audit event mnemonic
   –   INRW : Insert Row
   –   UPRW : Update Row
   –   DLRW : Delete Row
   –   RDRW : Select Row


                                         User Group Informix France
SRLA Setup
 There is a new parameter called ADTROWS in adtcfg file

  – 0: old behavior i.e. no changes in row level auditing (default)
  – 1: SRLA is enabled and only "audit" enabled tables
              will generate row-level audit records.
  – 2: SRLA + include integer-primary key in the audit records


 The feature can be turned on dynamically
  – onaudit -R 1




                                         User Group Informix France
Audit SQL Syntax
   There is new SQL statements to specify which
   table to audit
    – CREATE TABLE {existing syntax} | with AUDIT
    – ALTER TABLE {existing syntax} [ add | drop ] AUDIT


   Anyone with RESOURCE or DBA permission
   can either
    – Create the table «WITH AUDIT »
    – Alter the table to « ADD AUDIT »


   Only a DBSSO can « DROP AUDIT » on a
   table.
                                     User Group Informix France
Example
   Setup Auditing with SRLA feature in adtcfg file
   Setup Audit Event with onaudit utility
   Add a table audit property to enable auditing on
   a specific table
   Execute a select statement against the specific
   table
   Monitor auditing file to verify only specific table
   is beeing audited



                              User Group Informix France
Example (cont)
    $INFORMIXDIR/aaodir/adtcfg configuration file
         ADTMODE               1                       # auditing mode
         ADTPATH               /opt/informix/aaodir    # audit trails file
         ADTSIZE               50000                   # Max size of any single audit trail file
         ADTERR                0                       # Error handling modes.
         ADTROWS               2                       # 0 - For legacy auditing
                                                       # 1 - log audit tables
                                                       # 2 - 1+log primary key


    Enable auditing and mask definition
         [informix@linx]$ onaudit -R 2
         [informix@linx]$ onaudit -p /opt/informix/aaodir
         [informix@linx]$ onaudit -l 1
         [informix@linx]$ onaudit -a -u yob -e +INRW,UPRW,DLRW,RDRW


    Setup table property for auditing
         [informix@linx]$ echo 'alter table customer add audit' | dbaccess stores_demo



                                                      User Group Informix France
Example (cont)
    Audit Event caught for table read
    [yob@linx ~]$ echo 'select * from customer' | dbaccess stores_demo

    [informix@linx aaodir]$ cat ids.0
    ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:257:101
    ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:258:102
    ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:259:103
    ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:260:104
    ...
    ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:525:127
    ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:526:128


    Audit Record Format
     –   Fixed Part
           • tag, date, host, pid, informixserver, user
     –   Variable Part :
           • errno, event, database, tabid, partnum, rowid, primary key




                                                       User Group Informix France
Merci

              Yoram Benchetrit
   yoram.benchetrit@fr.ibm.com


     Mardi 30 novembre 2010
     User Group Informix France

Weitere ähnliche Inhalte

Andere mochten auch

Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1Khazret Sapenov
 
Security marketing portfolio
Security marketing portfolioSecurity marketing portfolio
Security marketing portfolioJerome Simmons
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring SecurityChris Mullins
 
Climate Security Report - Climate Change and Global Security
Climate Security Report - Climate Change and Global SecurityClimate Security Report - Climate Change and Global Security
Climate Security Report - Climate Change and Global SecurityAmerican Security Project
 
Hospital security officer performance appraisal
Hospital security officer performance appraisalHospital security officer performance appraisal
Hospital security officer performance appraisalBigBang789
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012SkylerWeisenburger
 
Improved cross-platform accessibility of a flagship application for world's l...
Improved cross-platform accessibility of a flagship application for world's l...Improved cross-platform accessibility of a flagship application for world's l...
Improved cross-platform accessibility of a flagship application for world's l...Mindtree Ltd.
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security SoftwareJohn ILIADIS
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Automated Validation of Internet Security Protocols and Applications (AVISPA)
Automated Validation of Internet Security Protocols and Applications (AVISPA) Automated Validation of Internet Security Protocols and Applications (AVISPA)
Automated Validation of Internet Security Protocols and Applications (AVISPA) Krassen Deltchev
 

Andere mochten auch (13)

Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Security marketing portfolio
Security marketing portfolioSecurity marketing portfolio
Security marketing portfolio
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
THE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth PordesTHE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth Pordes
 
Climate Security Report - Climate Change and Global Security
Climate Security Report - Climate Change and Global SecurityClimate Security Report - Climate Change and Global Security
Climate Security Report - Climate Change and Global Security
 
Hospital security officer performance appraisal
Hospital security officer performance appraisalHospital security officer performance appraisal
Hospital security officer performance appraisal
 
Finding Patterns in Data Breaches
Finding Patterns in Data BreachesFinding Patterns in Data Breaches
Finding Patterns in Data Breaches
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012
 
Improved cross-platform accessibility of a flagship application for world's l...
Improved cross-platform accessibility of a flagship application for world's l...Improved cross-platform accessibility of a flagship application for world's l...
Improved cross-platform accessibility of a flagship application for world's l...
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security Software
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Next in security
Next in securityNext in security
Next in security
 
Automated Validation of Internet Security Protocols and Applications (AVISPA)
Automated Validation of Internet Security Protocols and Applications (AVISPA) Automated Validation of Internet Security Protocols and Applications (AVISPA)
Automated Validation of Internet Security Protocols and Applications (AVISPA)
 

Ähnlich wie UGIF 12 2010 - new security features in IDS - nov 2010

UGIF 12 2010 - features11.70
UGIF 12 2010 - features11.70UGIF 12 2010 - features11.70
UGIF 12 2010 - features11.70UGIF
 
Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7
Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7
Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7Nicolas Desachy
 
Data Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your DatabaseData Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your DatabaseMichael Rosenblum
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLEDB
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLEDB
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLEDB
 
Addressing the Top 10 IBM i Security Threats
Addressing the Top 10 IBM i Security ThreatsAddressing the Top 10 IBM i Security Threats
Addressing the Top 10 IBM i Security ThreatsPrecisely
 
Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...
Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...
Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...Identity Days
 
BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...
BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...
BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...Krzysztof Adamski
 
Security best practices for informix
Security best practices for informixSecurity best practices for informix
Security best practices for informixIBM_Info_Management
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3jemtallon
 
Centralizing users’ authentication at Active Directory level 
Centralizing users’ authentication at Active Directory level Centralizing users’ authentication at Active Directory level 
Centralizing users’ authentication at Active Directory level Hossein Sarshar
 
Creating a fortress in your active directory environment
Creating a fortress in your active directory environmentCreating a fortress in your active directory environment
Creating a fortress in your active directory environmentDavid Rowe
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Cognitive data capture with Elis - Rossum's technical webinar
Cognitive data capture with Elis - Rossum's technical webinarCognitive data capture with Elis - Rossum's technical webinar
Cognitive data capture with Elis - Rossum's technical webinarPetr Baudis
 
Top Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i VulnerableTop Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i VulnerablePrecisely
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administratorAisha Talat
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003rafiq123
 
Ibm informix security functionality overview
Ibm informix security functionality overviewIbm informix security functionality overview
Ibm informix security functionality overviewBeGooden-IT Consulting
 

Ähnlich wie UGIF 12 2010 - new security features in IDS - nov 2010 (20)

UGIF 12 2010 - features11.70
UGIF 12 2010 - features11.70UGIF 12 2010 - features11.70
UGIF 12 2010 - features11.70
 
Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7
Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7
Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7
 
Data Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your DatabaseData Tracking: On the Hunt for Information about Your Database
Data Tracking: On the Hunt for Information about Your Database
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Addressing the Top 10 IBM i Security Threats
Addressing the Top 10 IBM i Security ThreatsAddressing the Top 10 IBM i Security Threats
Addressing the Top 10 IBM i Security Threats
 
Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...
Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...
Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...
 
BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...
BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...
BigDataTech 2016 How to manage authorization rules on Hadoop cluster with Apa...
 
Security best practices for informix
Security best practices for informixSecurity best practices for informix
Security best practices for informix
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Centralizing users’ authentication at Active Directory level 
Centralizing users’ authentication at Active Directory level Centralizing users’ authentication at Active Directory level 
Centralizing users’ authentication at Active Directory level 
 
Creating a fortress in your active directory environment
Creating a fortress in your active directory environmentCreating a fortress in your active directory environment
Creating a fortress in your active directory environment
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Cognitive data capture with Elis - Rossum's technical webinar
Cognitive data capture with Elis - Rossum's technical webinarCognitive data capture with Elis - Rossum's technical webinar
Cognitive data capture with Elis - Rossum's technical webinar
 
Top Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i VulnerableTop Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i Vulnerable
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
 
Ibm informix security functionality overview
Ibm informix security functionality overviewIbm informix security functionality overview
Ibm informix security functionality overview
 

Mehr von UGIF

UGIF 09 2013 Fy13 q3, corporate presentation the inflection point in the ap...
UGIF 09 2013 Fy13 q3, corporate presentation   the inflection point in the ap...UGIF 09 2013 Fy13 q3, corporate presentation   the inflection point in the ap...
UGIF 09 2013 Fy13 q3, corporate presentation the inflection point in the ap...UGIF
 
Ugif 09 2013 open source - session tech
Ugif 09 2013   open source - session techUgif 09 2013   open source - session tech
Ugif 09 2013 open source - session techUGIF
 
Ugif 09 2013 new environment and dynamic setting in ids 12.10
Ugif 09 2013   new environment and dynamic setting in ids 12.10Ugif 09 2013   new environment and dynamic setting in ids 12.10
Ugif 09 2013 new environment and dynamic setting in ids 12.10UGIF
 
Ugif 09 2013 open source
Ugif 09 2013   open sourceUgif 09 2013   open source
Ugif 09 2013 open sourceUGIF
 
Ugif 09 2013
Ugif 09 2013Ugif 09 2013
Ugif 09 2013UGIF
 
Ugif 09 2013 psm
Ugif 09 2013   psmUgif 09 2013   psm
Ugif 09 2013 psmUGIF
 
Ugif 09 2013 friug 201309 axional web studio
Ugif 09 2013 friug 201309   axional web studioUgif 09 2013 friug 201309   axional web studio
Ugif 09 2013 friug 201309 axional web studioUGIF
 
Ugif 10 2012 ppt0000001
Ugif 10 2012 ppt0000001Ugif 10 2012 ppt0000001
Ugif 10 2012 ppt0000001UGIF
 
Ugif 10 2012 informix pssc-benchmark -l.revel_oct2012
Ugif 10 2012 informix pssc-benchmark -l.revel_oct2012Ugif 10 2012 informix pssc-benchmark -l.revel_oct2012
Ugif 10 2012 informix pssc-benchmark -l.revel_oct2012UGIF
 
Ugif 10 2012 beauty ofifmxdiskstructs ugif
Ugif 10 2012 beauty ofifmxdiskstructs ugifUgif 10 2012 beauty ofifmxdiskstructs ugif
Ugif 10 2012 beauty ofifmxdiskstructs ugifUGIF
 
Ugif 10 2012 lycia2 introduction in 45 minutes
Ugif 10 2012 lycia2 introduction in 45 minutesUgif 10 2012 lycia2 introduction in 45 minutes
Ugif 10 2012 lycia2 introduction in 45 minutesUGIF
 
Ugif 10 2012 genero ugif october 3, 2012 ibm france, français
Ugif 10 2012 genero   ugif october 3, 2012  ibm france, français Ugif 10 2012 genero   ugif october 3, 2012  ibm france, français
Ugif 10 2012 genero ugif october 3, 2012 ibm france, français UGIF
 
Ugif 10 2012 iiug paris-business-update
Ugif 10 2012 iiug paris-business-updateUgif 10 2012 iiug paris-business-update
Ugif 10 2012 iiug paris-business-updateUGIF
 
Ugif 10 2012 ppt0000002
Ugif 10 2012 ppt0000002Ugif 10 2012 ppt0000002
Ugif 10 2012 ppt0000002UGIF
 
Ugif 12 2011-smart meters-11102011
Ugif 12 2011-smart meters-11102011Ugif 12 2011-smart meters-11102011
Ugif 12 2011-smart meters-11102011UGIF
 
Ugif 12 2011-informix iwa
Ugif 12 2011-informix iwaUgif 12 2011-informix iwa
Ugif 12 2011-informix iwaUGIF
 
Ugif 12 2011-ibm cap-seine
Ugif 12 2011-ibm cap-seineUgif 12 2011-ibm cap-seine
Ugif 12 2011-ibm cap-seineUGIF
 
Ugif 12 2011-france ug12142011-tech_ts
Ugif 12 2011-france ug12142011-tech_tsUgif 12 2011-france ug12142011-tech_ts
Ugif 12 2011-france ug12142011-tech_tsUGIF
 
Ugif 12 2011-four js primer presentation - new graphic charter - short versio...
Ugif 12 2011-four js primer presentation - new graphic charter - short versio...Ugif 12 2011-four js primer presentation - new graphic charter - short versio...
Ugif 12 2011-four js primer presentation - new graphic charter - short versio...UGIF
 
Ugif 12 2011-discover informix keynote 2012
Ugif 12 2011-discover informix keynote 2012Ugif 12 2011-discover informix keynote 2012
Ugif 12 2011-discover informix keynote 2012UGIF
 

Mehr von UGIF (20)

UGIF 09 2013 Fy13 q3, corporate presentation the inflection point in the ap...
UGIF 09 2013 Fy13 q3, corporate presentation   the inflection point in the ap...UGIF 09 2013 Fy13 q3, corporate presentation   the inflection point in the ap...
UGIF 09 2013 Fy13 q3, corporate presentation the inflection point in the ap...
 
Ugif 09 2013 open source - session tech
Ugif 09 2013   open source - session techUgif 09 2013   open source - session tech
Ugif 09 2013 open source - session tech
 
Ugif 09 2013 new environment and dynamic setting in ids 12.10
Ugif 09 2013   new environment and dynamic setting in ids 12.10Ugif 09 2013   new environment and dynamic setting in ids 12.10
Ugif 09 2013 new environment and dynamic setting in ids 12.10
 
Ugif 09 2013 open source
Ugif 09 2013   open sourceUgif 09 2013   open source
Ugif 09 2013 open source
 
Ugif 09 2013
Ugif 09 2013Ugif 09 2013
Ugif 09 2013
 
Ugif 09 2013 psm
Ugif 09 2013   psmUgif 09 2013   psm
Ugif 09 2013 psm
 
Ugif 09 2013 friug 201309 axional web studio
Ugif 09 2013 friug 201309   axional web studioUgif 09 2013 friug 201309   axional web studio
Ugif 09 2013 friug 201309 axional web studio
 
Ugif 10 2012 ppt0000001
Ugif 10 2012 ppt0000001Ugif 10 2012 ppt0000001
Ugif 10 2012 ppt0000001
 
Ugif 10 2012 informix pssc-benchmark -l.revel_oct2012
Ugif 10 2012 informix pssc-benchmark -l.revel_oct2012Ugif 10 2012 informix pssc-benchmark -l.revel_oct2012
Ugif 10 2012 informix pssc-benchmark -l.revel_oct2012
 
Ugif 10 2012 beauty ofifmxdiskstructs ugif
Ugif 10 2012 beauty ofifmxdiskstructs ugifUgif 10 2012 beauty ofifmxdiskstructs ugif
Ugif 10 2012 beauty ofifmxdiskstructs ugif
 
Ugif 10 2012 lycia2 introduction in 45 minutes
Ugif 10 2012 lycia2 introduction in 45 minutesUgif 10 2012 lycia2 introduction in 45 minutes
Ugif 10 2012 lycia2 introduction in 45 minutes
 
Ugif 10 2012 genero ugif october 3, 2012 ibm france, français
Ugif 10 2012 genero   ugif october 3, 2012  ibm france, français Ugif 10 2012 genero   ugif october 3, 2012  ibm france, français
Ugif 10 2012 genero ugif october 3, 2012 ibm france, français
 
Ugif 10 2012 iiug paris-business-update
Ugif 10 2012 iiug paris-business-updateUgif 10 2012 iiug paris-business-update
Ugif 10 2012 iiug paris-business-update
 
Ugif 10 2012 ppt0000002
Ugif 10 2012 ppt0000002Ugif 10 2012 ppt0000002
Ugif 10 2012 ppt0000002
 
Ugif 12 2011-smart meters-11102011
Ugif 12 2011-smart meters-11102011Ugif 12 2011-smart meters-11102011
Ugif 12 2011-smart meters-11102011
 
Ugif 12 2011-informix iwa
Ugif 12 2011-informix iwaUgif 12 2011-informix iwa
Ugif 12 2011-informix iwa
 
Ugif 12 2011-ibm cap-seine
Ugif 12 2011-ibm cap-seineUgif 12 2011-ibm cap-seine
Ugif 12 2011-ibm cap-seine
 
Ugif 12 2011-france ug12142011-tech_ts
Ugif 12 2011-france ug12142011-tech_tsUgif 12 2011-france ug12142011-tech_ts
Ugif 12 2011-france ug12142011-tech_ts
 
Ugif 12 2011-four js primer presentation - new graphic charter - short versio...
Ugif 12 2011-four js primer presentation - new graphic charter - short versio...Ugif 12 2011-four js primer presentation - new graphic charter - short versio...
Ugif 12 2011-four js primer presentation - new graphic charter - short versio...
 
Ugif 12 2011-discover informix keynote 2012
Ugif 12 2011-discover informix keynote 2012Ugif 12 2011-discover informix keynote 2012
Ugif 12 2011-discover informix keynote 2012
 

Kürzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

UGIF 12 2010 - new security features in IDS - nov 2010

  • 1. New Security Features in IDS Yoram Benchetrit yoram.benchetrit@fr.ibm.com Mardi 30 novembre 2010 User Group Informix France
  • 2. Agenda Mapped Users Trusted Context Selective Row Level Auditing User Group Informix France
  • 3. Agenda Mapped Users User Group Informix France
  • 4. Why do we need this feature ? Local Account Look-up Availability – Although IDS has supported PAM since 9.40.xC2, users have had to enable look up of the user account on the host Operating System Redundant Password Comparaison – Even though PAM or Windows AD has authenticated the users, IDS obtains the users' hashed password and does a redundant password comparison • The users password (encrypted) must be accessible to IDS • LDAP users have had to enable the password property for the LDAP “proxy” user • Where customers use Windows AD, they have had to turn on Unix password property for the users. Customers unhappy to do either of the two User Group Informix France
  • 5. User Story Microsoft Active Directory (LDAP) – As a DBSA, I need to allow users identified in MS Active Directory (AD) to connect to IDS without being forced to create a Unix login account for the users Users with PCs – We use PAM to authenticate our users. Why do we need to create accounts in the local operating system? Administrator Roles for External Users – As a DBSA, I should be able to grant an externally authenticated users server administrator roles User Group Informix France
  • 6. Feature Quick Reference Authenticate external users without an OS account – Database users no longer need • An account Look-up in the local OS • Enable password properties for external authenticators The DBSA “maps” an external user to: • An existing OS user or • A database defined UIG/GID pair Uses an extension to the GRANT/REVOKE SQL statement Requires PAM or SSO authentication Traditional password based authentication is still available Windows support is pending User Group Informix France
  • 7. Feature Details – 1-2-3!!! Enable USERMAPPING in ONCONFIG Setup PAM or SSO via SQLHosts GRANT ACCESS TO <users> PROPERTIES That is it...!! User Group Informix France
  • 8. Feature Details – ONCONFIG New ONCONFIG parameter USERMAPPING { OFF | BASIC | ADMIN } • OFF This feature is turned off – this is the default • BASIC IDS non-privileged users – not DBSA, DBSSO or AAO • ADMIN Enabled privileged users User Group Informix France
  • 9. Feature Details – Syntax Extension to GRANT statement – GRANT ACCESS TO {username} PROPERTIES [ USER OS_username | UID uid ] GROUP (OS_groupname | gid), HOMEDIR ‘homedir’, AUTHORIZATION (userauth); – 'userauth' is an OR pattern of DBSA, DBSSO, AAO, BARGROUP User Group Informix France
  • 10. Feature Details – Syntax (cont) Examples – GRANT ACCESS TO user1 PROPERTIES USER ravik; – GRANT ACCESS TO user2 PROPERTIES UID 100, GROUP (200); – GRANT ACCESS TO user3 PROPERTIES USER ravik, HOME '/home/user4’; – GRANT ACCESS TO user4 PROPERTIES USER ravik AUTHORIZATION (dbsa); – GRANT ACCESS TO PUBLIC PROPERTIES USER ravik; User Group Informix France
  • 11. Feature Details – Syntax (cont) Extension to REVOKE statement – REVOKE ACCESS FROM { PUBLIC | <username> } Example – REVOKE ACCESS FROM user1; To alter a user mapping revoke and re-grant access – Error: -26107 User name (%s) has already been granted User Group Informix France
  • 12. Feature Details - Capabilities OS processes – SYSTEM commands in a procedure will run as the surrogate user OS Files – Sqexplain Files will be created as the surrogate user – Debug Files will be created as the surrogate user – Unload and Output Files will be created as the surrogate user Home Directory (optional) – If the home directory is not specified, IDS will create a directory for user file in $INFORMIXDIR/users/uid.<id_number> – If user is mapped to non-existent uid/gid pair, file will be created using that UID/GID only if the directory is publicly writable Role Separation – IXUSERS group in $INFORMIXDIR/dbssodir/seccfg • A Mapped User cannot be part of IXUSERS group if surrogate user is invalid: Error -25571 “cannot create a user thread”. User Group Informix France
  • 13. Example Setup ONCONFIG #################################################################### # USERMAPPING - Control access to IDS for users without operating # system accounts. #################################################################### # OFF - users without operating system accounts cannot use IDS # BASIC - users without operating system accounts can use IDS but # not as privileged users # ADMIN - users without operating system accounts can use IDS as # privileged users #################################################################### USERMAPPING BASIC PAM Configuration /etc/pam.d/idspam # LDAP authentication auth required pam_ldap.so account required pam_ldap.so SQLHosts idsserver onsoctcp linx idsservice s=4, pam_serv=(idspam), pamauth=(challenge) User Group Informix France
  • 14. Example – LDAP Mapped User LDAP Configuration /etc/ldap.conf # LDAP server host ldapserver ... # The distinguished name of the search base base dc=yobldap-domain,dc=com User Mapping Definition [informix@linx]$ dbaccess stores_demo <<EOF GRANT ACCESS TO ldap_user PROPERTIES USER yob; EOF IDS Connection [informix@linx ]$ dbaccess - - > connect to ‘stores_demo@idsserver’ user 'ldap_user' > Password: <- type ldap password Connected. User Group Informix France
  • 15. Open Admin Tool Support (OAT) GUI Interface support is provided through Open Admin Tool – Server Administration • User Privileges – Add, Edit, Delete, Show SQL User Group Informix France
  • 16. System Tables New system tables in 'sysuser' database – SYSUSERMAP – SYSSURROGATES – SYSSURROGATEGROUPS DBSA should use the GRANT ACCESS TO / REVOKE ACCESS FROM statements to manage the system tables as there are cross-references ! User Group Informix France
  • 17. System Tables (cont) SYSUSERMAP Column name Type Nulls username nchar(32) yes surrogate_id integer yes User Group Informix France
  • 18. System Tables (cont) SYSSURROGATES Column name Type Nulls surrogate_id serial no os_username nchar(32) yes uid integer yes gid integer yes groupname nchar(32) yes homedir nvarchar(255) yes userauth char(10) yes User Group Informix France
  • 19. System Tables (cont) 'userauth' Entry in SYSSURROGATES – An OR pattern of • Position 1: s = DBSA • Position 2: o = DBSSO • Position 3: a = AAO • Position 4: b = BARGROUP • Other positions reserved for future use • Attributes in lower case only Example s--b------ The user is a DBSA and belongs to BARGROUP -o-------- The user is an AAO If the 'userauth' entry is not specified, the user is non-privileged User Group Informix France
  • 20. System Tables (cont) SYSSURROGATEGROUPS Column name Type Nulls surrogate_id integer yes gid integer yes groupname nchar(32) yes groupseq smallint yes User Group Informix France
  • 21. Agenda Trusted Context User Group Informix France
  • 22. Why do we need this feature ? In a 3-tiers architecture, the middle-tier's user must have all the privileges needed to execute all the requests from all users There is a security issue of accessing resources on behalf of users if the middle-tier's user is compromised There is a lost of information when auditing needs to distinguish end-users from middle-tier's user Establishing new connection may suffer performance drop which is also the case when using connection pool User Group Informix France
  • 23. Feature Quick Reference This feature allow to reuse a connection for a different user without the need to establish a new connection The purpose is to avoid connection overhead when there is a need to connect on behalf of new users, which is the case in application server This also provide higher security level and better auditing granularity, as each user connect and switch on a trusted connection with their own credentials and privilege New SQL statement are provided and/or enhanced to create trusted context, establish trusted connection and provide connection switch capabilities All users properties are reported for the switched connection user when established User Group Informix France
  • 24. Trusted Context Object A Trusted Context is a database object created by the database security administrator (DBSECADM) that defines a set of properties for a connection that when met, allow that connection to be a “trusted connection” with special properties. – The connection must be established by a specific user. – The connection must come from a trusted client machine. – The port over which the connection is made must have the required encryption. If these criteria are met, the connection will allow changes in userid and privileges as defined in the trusted context. User Group Informix France
  • 25. Trusted Context Setup Step1 : Create Trusted Context Object – Created at database level – Must be created by DBSECADM – Can use OS users or Mapped Users – Provision to Switch User Step 2: Establish Trusted Connections – Use SQL statement to establish trusted connection – Must satisfy criteria defined in Trusted Context Step 3: Switch Connections – Use SQL Statement to switch user over a trusted connection – New operations performed for the switched user User Group Informix France
  • 26. Trusted Context Syntax Syntax (simplified) – CREATE TRUSTED CONTEXT <ctx> BASED UPON CONNECTION USING SYSTEM AUTHID <user> ATTRIBUTES (ADDRESS <host>, WITH ENCRYPTION <value>) DEFAULT ROLE <role> WITH USE FOR <user list> [WITH | WITHOUT] AUTHENTIFICATION ENABLE | DISABLE Users with DBSECADM role can perform following operations – CREATE TRUSTED CONTEXT – ALTER TRUSTED CONTEXT – DROP TRUSTED CONTEXT User Group Informix France
  • 27. Trusted Context Creation New SQL statement to create a trusted context CREATE TRUSTED CONTEXT mytcx BASED UPON CONNECTION USING SYSTEM AUTHID yob DEFAULT ROLE employee ATTRIBUTES (ADDRESS 'linx.swglab.fr.ibm.com') WITH USE FOR PUBLIC WITHOUT AUTHENTICATION ENABLE – Creates an Trusted Context object named 'mytcx' – The connection can be established by user 'yob' – Will allow connections from 'linx.swglab.fr.ibm.com' – Can switch to any users (PUBLIC) once Trusted Connection established User Group Informix France
  • 28. Trusted Connection Establishment New keyword in the “connect” SQL statement to establish a trusted connection – EXEC SQL CONNECT TO “stores_demo@ids1170” TRUSTED – Detail in online.log • 18:21:07 TESTMODE: trust context address 9.101.46.52 matched • 18:23:12 listener-thread: err = -28021: oserr = 0: errstr = : Trusted Connection request rejected. Front-End API Support – ESQL/C – ODBC – JDBC User Group Informix France
  • 29. Trusted Connection Switch There is a SQL statement to switch over a trusted connection – EXEC SQL SET SESSION AUTHORIZATION to <user> [ USING <passwd> ] – EXEC SQL SET SESSION AUTHORIZATION to “joe” Switch to any user defined in the Trusted Context Object scope Audit records will show the switched user as the originator of the operations Need to commit or rollback before switching to a new user when using transactions User Group Informix France
  • 30. Open Admin Tool Support (OAT) GUI Interface support is provided through Open Admin Tool – Server Administration • Trusted context – Create, Modify, Delete, Enable, Show SQL User Group Informix France
  • 31. Trusted Context Wizard (OAT) Trusted Context > View User Group Informix France
  • 32. Trusted Context Wizard (OAT) Trusted Context > Create – STEP 1 User Group Informix France
  • 33. Trusted Context Wizard (OAT) Trusted Context > Create – STEP 2 User Group Informix France
  • 34. Trusted Context Wizard (OAT) Trusted Context > Create – STEP 3 User Group Informix France
  • 35. Trusted Context Wizard (OAT) Trusted Context > Create – STEP 4 User Group Informix France
  • 36. System Tables New Tables In Database ‘sysuser’ – table systrustedcontext ( contextid serial, contextname varchar(128), database char(128), authid char(32), defaultrole char(32), enabled char(1) not null, encryption char(1)); – table systcxattributes ( contextid integer not null, address char(64), encryption char(1)); – table systcxusers ( contextid integer not null, username char(32), usertype char(1), userrole char(32), authreq char(1)); User Group Informix France
  • 37. System Table Query Trusted Context Definition in 'sysuser' database – [root@linx trustedContext]# cat sel_trusted_ctx.sql SELECT a.contextid, contextname, database, authid, defaultrole, enabled, a.encryption, address, username, usertype, userrole, authreq FROM systrustedcontext a, systcxattributes b, systcxusers c WHERE a.contextid = b.contextid AND b.contextid = c.contextid – [root@linx trustedContext]# dbaccess sysuser sel_trusted_ctx.sql Database selected. contextid 1 contextname mytcx1 database stores_demo authid informix defaultrole enabled Y encryption N address 9.101.46.52 username PUBLIC usertype G userrole authreq N 1 row(s) retrieved. Database closed. User Group Informix France
  • 38. Agenda Selective Row Level Auditing User Group Informix France
  • 39. Why do we need this feature ? Row level auditing produce huge amount of useless data because audited tables are not all important to system security. Some Customer have reported 30% database performance drop when turning on row level auditing for insert/update/delete operation The information in the current row-level audit records contains table_id and row_id. These can change over time which can make looking back at audit records meaningless. User Group Informix France
  • 40. Feature Quick Reference This feature allow to specify which tables are audited at row level The purpose is to avoid performance drop during auditing whenever all tables and rows are audited This feature is turned on by setting ADTROWS in adtcfg file, or dynamically with onaudit -R <value> – Backward compatibility New SQL command are provided to define which tables are audited at row level An audit trail file is generated and filtered with onshowaudit utility User Group Informix France
  • 41. Audit Event IDS 11.70 has 159 Audit Event Audit Event Naming Convention – 'aaoo' • with 'aa' : 2 letter code for action • 'oo' : 2 letter code for the object There is a mapping for audit event id to event mnemonic The feature is implemented for 4 audit event mnemonic – INRW : Insert Row – UPRW : Update Row – DLRW : Delete Row – RDRW : Select Row User Group Informix France
  • 42. SRLA Setup There is a new parameter called ADTROWS in adtcfg file – 0: old behavior i.e. no changes in row level auditing (default) – 1: SRLA is enabled and only "audit" enabled tables will generate row-level audit records. – 2: SRLA + include integer-primary key in the audit records The feature can be turned on dynamically – onaudit -R 1 User Group Informix France
  • 43. Audit SQL Syntax There is new SQL statements to specify which table to audit – CREATE TABLE {existing syntax} | with AUDIT – ALTER TABLE {existing syntax} [ add | drop ] AUDIT Anyone with RESOURCE or DBA permission can either – Create the table «WITH AUDIT » – Alter the table to « ADD AUDIT » Only a DBSSO can « DROP AUDIT » on a table. User Group Informix France
  • 44. Example Setup Auditing with SRLA feature in adtcfg file Setup Audit Event with onaudit utility Add a table audit property to enable auditing on a specific table Execute a select statement against the specific table Monitor auditing file to verify only specific table is beeing audited User Group Informix France
  • 45. Example (cont) $INFORMIXDIR/aaodir/adtcfg configuration file ADTMODE 1 # auditing mode ADTPATH /opt/informix/aaodir # audit trails file ADTSIZE 50000 # Max size of any single audit trail file ADTERR 0 # Error handling modes. ADTROWS 2 # 0 - For legacy auditing # 1 - log audit tables # 2 - 1+log primary key Enable auditing and mask definition [informix@linx]$ onaudit -R 2 [informix@linx]$ onaudit -p /opt/informix/aaodir [informix@linx]$ onaudit -l 1 [informix@linx]$ onaudit -a -u yob -e +INRW,UPRW,DLRW,RDRW Setup table property for auditing [informix@linx]$ echo 'alter table customer add audit' | dbaccess stores_demo User Group Informix France
  • 46. Example (cont) Audit Event caught for table read [yob@linx ~]$ echo 'select * from customer' | dbaccess stores_demo [informix@linx aaodir]$ cat ids.0 ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:257:101 ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:258:102 ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:259:103 ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:260:104 ... ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:525:127 ONLN|2010-03-18 10:58:43.000|linx|5359|ids|yob|0:RDRW:stores_demo:100:1048976:526:128 Audit Record Format – Fixed Part • tag, date, host, pid, informixserver, user – Variable Part : • errno, event, database, tabid, partnum, rowid, primary key User Group Informix France
  • 47. Merci Yoram Benchetrit yoram.benchetrit@fr.ibm.com Mardi 30 novembre 2010 User Group Informix France