10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

failure<br />

to<br />

connect<br />

to<br />

the<br />

first<br />

server—re-directs<br />

the<br />

request<br />

to<br />

another<br />

available<br />

replicated<br />

<strong>WebSEAL</strong><br />

server.<br />

Now<br />

the<br />

client<br />

has<br />

three<br />

more<br />

opportunities<br />

to<br />

attempt<br />

a<br />

successful<br />

login.<br />

For<br />

″n″<br />

attempts<br />

configured<br />

on<br />

each<br />

<strong>WebSEAL</strong><br />

server,<br />

and<br />

″m″<br />

front-end<br />

replicated<br />

<strong>WebSEAL</strong><br />

servers,<br />

you<br />

are<br />

guaranteed<br />

an<br />

initial<br />

account<br />

lock<br />

on<br />

one<br />

server<br />

after<br />

″n″<br />

attempts.<br />

You<br />

are<br />

also<br />

guaranteed<br />

″n″<br />

x<br />

″m″<br />

total<br />

attempts<br />

to<br />

log<br />

in<br />

across<br />

all<br />

configured<br />

servers.<br />

However,<br />

after<br />

″n″<br />

attempts,<br />

it<br />

is<br />

not<br />

clear<br />

whether<br />

subsequent<br />

authentication<br />

failures<br />

are<br />

due<br />

to<br />

the<br />

lock<br />

on<br />

a<br />

particular<br />

server,<br />

or<br />

due<br />

to<br />

continuing<br />

incorrect<br />

login<br />

attempts<br />

across<br />

the<br />

remaining<br />

replicated<br />

servers.<br />

The<br />

″n″<br />

x<br />

″m″<br />

calculation<br />

provides<br />

a<br />

fixed<br />

maximum<br />

upper<br />

limit<br />

on<br />

the<br />

total<br />

number<br />

of<br />

consecutive<br />

login<br />

attempts<br />

be<strong>for</strong>e<br />

a<br />

complete<br />

lockout<br />

occurs.<br />

A<br />

case<br />

can<br />

be<br />

made<br />

that<br />

this<br />

number<br />

is<br />

still<br />

probably<br />

far<br />

less<br />

than<br />

the<br />

number<br />

of<br />

attempts<br />

statistically<br />

required<br />

to<br />

″break″<br />

a<br />

password.<br />

If<br />

your<br />

<strong>business</strong><br />

security<br />

solution<br />

requires<br />

a<br />

three<br />

strikes<br />

login<br />

policy,<br />

understand<br />

the<br />

implications<br />

of<br />

a<br />

load-balanced/multiple<br />

front-end<br />

<strong>WebSEAL</strong><br />

configuration<br />

on<br />

this<br />

policy.<br />

Syntax<br />

<strong>for</strong><br />

three<br />

strikes<br />

login<br />

commands<br />

The<br />

following<br />

pdadmin<br />

commands<br />

are<br />

used<br />

to<br />

set<br />

three<br />

strikes<br />

login<br />

policy.<br />

Command<br />

Description<br />

policy<br />

set<br />

max-login-failures<br />

{|unset}<br />

[-user<br />

]<br />

policy<br />

get<br />

max-login-failures<br />

[-user<br />

]<br />

Manages<br />

the<br />

policy<br />

controlling<br />

the<br />

maximum<br />

number<br />

of<br />

failed<br />

login<br />

attempts<br />

allowed<br />

be<strong>for</strong>e<br />

a<br />

penalty<br />

is<br />

imposed.<br />

This<br />

command<br />

depends<br />

on<br />

a<br />

penalty<br />

set<br />

in<br />

the<br />

policy<br />

set<br />

disable-time-interval<br />

command.<br />

As<br />

the<br />

administrator,<br />

you<br />

can<br />

apply<br />

this<br />

policy<br />

to<br />

a<br />

specific<br />

user<br />

or<br />

apply<br />

the<br />

policy<br />

globally<br />

to<br />

all<br />

users<br />

listed<br />

in<br />

the<br />

LDAP<br />

registry.<br />

The<br />

unset<br />

parameter<br />

eliminates<br />

settings<br />

<strong>for</strong><br />

the<br />

specified<br />

user.<br />

The<br />

global<br />

policy<br />

will<br />

continue<br />

to<br />

be<br />

en<strong>for</strong>ced.<br />

The<br />

default<br />

setting<br />

is<br />

10<br />

attempts.<br />

policy<br />

set<br />

disable-time-interval<br />

{|unset|disable}<br />

[-user<br />

]<br />

policy<br />

get<br />

disable-time-interval<br />

[-user<br />

]<br />

Manages<br />

the<br />

penalty<br />

policy<br />

controlling<br />

the<br />

time<br />

period<br />

an<br />

account<br />

should<br />

be<br />

disabled<br />

if<br />

the<br />

maximum<br />

number<br />

of<br />

failed<br />

login<br />

attempts<br />

is<br />

reached.<br />

As<br />

the<br />

administrator,<br />

you<br />

can<br />

apply<br />

this<br />

penalty<br />

policy<br />

to<br />

a<br />

specific<br />

user<br />

or<br />

apply<br />

the<br />

policy<br />

globally<br />

to<br />

all<br />

users<br />

listed<br />

in<br />

the<br />

LDAP<br />

registry.<br />

The<br />

unset<br />

parameter<br />

eliminates<br />

settings<br />

<strong>for</strong><br />

the<br />

specified<br />

user.<br />

The<br />

global<br />

policy<br />

will<br />

continue<br />

to<br />

be<br />

en<strong>for</strong>ced.<br />

The<br />

default<br />

setting<br />

is<br />

180<br />

seconds.<br />

Chapter<br />

5.<br />

<strong>WebSEAL</strong><br />

security<br />

policy<br />

113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!