Scenario: Using certificates for external authentication
In this scenario, you lean when and how to use certificates as an authentication mechanism to protect and limit access by public users to public or extranet resources and applications.
Situation
You work for the MyCo, Inc insurance company and are responsible for maintaining different applications on your company's intranet and extranet sites. One particular application for which you are responsible is a rate-calculating application that allows hundreds of independent agents to generate quotes for their clients. Because the information that this application provides is somewhat sensitive, you want to make sure that only registered agents can use it. Further, you want to eventually provide a more secure method of user authentication to the application than your current user name and password method. You are concerned additionally that unauthorized users might capture this information when it is transmitted over an untrusted network. Also, you have concerns that different agents might share this information with each other without authorization to do so.
After some research, you decide that using digital certificates can provide you with the security that you need to protect the sensitive information entered into and retrieved from this application. The use of certificates allows you to use Secure Sockets Layer (SSL) to protect the transmission of the rate data. Although eventually you want all agents to use a certificate to access the application, you know that your company and your agents may need some time before this goal can be achieved. In addition to the use of certificate client authentication, you plan to continue the current use of user name and password authentication because SSL protects the privacy of this sensitive data in transmission.
Based on the type of application and its users and your future goal of certificate authentication for all users, you decide to use a public certificate from a well known Certificate Authority (CA) to configure SSL for your application.
Scenario advantages
This scenario has the following advantages:
- Using digital certificates to configure SSL access to your rate calculation application ensures that the information transmitted between the server and client is protected and private.
- Using digital certificates whenever possible for client authentication provides a more secure method of identifying authorized users. Even where the use of digital certificates is not possible, client authentication by means of user name and password authentication is protected and kept private by the SSL session, making the exchange of such sensitive data more secure.
- Using public digital certificates to authenticate users to your applications and data in the manner that this scenario describes is a practical choice under these or similar conditions:
- Your data and applications require varying degrees of security.
- There is a high rate of turnover among your trusted users.
- You provide public access to applications and data, such as an Internet Web site, or an extranet application.
- You do not want to operate your own Certificate Authority (CA) based on administrative reasons, such as a large number of outside users who access your applications and resources.
- Using a public certificate to configure the rate calculating application for SSL in this scenario decreases the amount of configuration that users must perform to access the application securely. Most client software contains CA certificates for most well-known CAs.
Objectives
In this scenario, MyCo, Inc. wants to use digital certificates to protect the rate calculating information that their application provides to authorized public users. The company also wants a more secure method of authenticating those users who are allowed to access this application when possible.
The objectives of this scenario are as follows:
- Company public rate calculating application must use SSL to protect the privacy of the data that it provides to users and receives from users.
- SSL configuration must be accomplished with public certificates from a well-known public Internet Certificate Authority (CA).
- Authorized users must provide a valid user name and password to access the application in SSL mode. Eventually, authorized users must be able to use one of two methods of secure authentication to be granted access to the application. Agents must present either a public digital certificate from a well-known Certificate Authority (CA) or a valid user name and password if a certificate is unavailable.
class="scenariobar">Details
The following figure illustrates the network configuration in this scenario:
The figure illustrates the following information about the situation for this scenario:
Company public server – System A
- System A is the server that hosts the company's rate calculating application.
- System A runs i5/OS® Version 5 Release 4 (V5R4).
- System A has Digital Certificate Manager (i5/OS option 34) and IBM® HTTP Server for i5/OS (5722–DG1) installed and configured.
- System A runs the rate calculating application, which is configured such that it:
- Requires SSL mode.
- Uses a public certificate from a well-known Certificate Authority (CA) to authenticate itself to initialize an SSL session.
- Requires user authentication by user name and password.
- System A presents its certificate to initiate an SSL session when Clients B and C access the rate calculating application.
- After initializing the SSL session, System A requests that Clients B and C provide a valid user name and password before allowing access to the rate calculating application.
Agent client systems – Client B and Client C
- Clients B and C are independent agents who access the rate calculating application.
- Clients B and C client software has an installed copy of the well-known CA certificate that issued the application certificate.
- Clients B and C access the rate calculating application on System A, which presents its certificate to their client software to authenticate its identity and initiate an SSL session.
- Client software on Clients B and C is configured to accept the certificate from System A for the purpose of initializing an SSL session.
- After the SSL session begins, Clients B and C must provide a valid user name and password before System A grants access to the application.
class="scenariobar">Prerequisites and assumptions
This scenario depends on the following prerequisites and assumptions:
- The rate calculating application on System A is a generic application that can be configured to use SSL. Most applications, including many System i™ applications, provide SSL support. SSL configuration steps vary widely among applications. Consequently, this scenario does not provide specific instructions for configuring the rate calculating application to use SSL. This scenario provides instructions for configuring and managing the certificates that are necessary for any application to use SSL.
- The rate calculating application may provide the capability of requiring certificates for client authentication. This scenario provides instructions for how to use Digital Certificate Manager (DCM) to configure certificate trust for those applications that provide this support. Because the configuration steps for client authentication vary widely among applications, this scenario does not provide specific instructions for configuring certificate client authentication for the rate calculating application.
- System A meets the DCM set up requirements for installing and using Digital Certificate Manager (DCM)
- No one has previously configured or used DCM on System A.
- Whoever uses DCM to perform the tasks in this scenario must have *SECADM and *ALLOBJ special authorities for their user profile.
- System A does not have an IBM Cryptographic Coprocessor installed.
class="scenariobar">Configuration tasks
- Completing planning work sheets
- Creating a server or client certificate request
- Configuring applications to use SSL
- Importing and assigning the signed public certificate
- Starting applications in SSL mode
- (Optional): Defining a CA trust list for an application that requires
Parent topic:
DCM scenariosRelated tasks
Starting Digital Certificate Manager