Scenario: Using certificates for external authentication

 

In this scenario, you lean when and how to use certificates as an authentication mechanism to protect and limit access by public users to public or extranet resources and applications.

 

Situation

You work for the MyCo, Inc insurance company and are responsible for maintaining different applications on your company's intranet and extranet sites. One particular application for which you are responsible is a rate-calculating application that allows hundreds of independent agents to generate quotes for their clients. Because the information that this application provides is somewhat sensitive, you want to make sure that only registered agents can use it. Further, you want to eventually provide a more secure method of user authentication to the application than your current user name and password method. You are concerned additionally that unauthorized users might capture this information when it is transmitted over an untrusted network. Also, you have concerns that different agents might share this information with each other without authorization to do so.

After some research, you decide that using digital certificates can provide you with the security that you need to protect the sensitive information entered into and retrieved from this application. The use of certificates allows you to use Secure Sockets Layer (SSL) to protect the transmission of the rate data. Although eventually you want all agents to use a certificate to access the application, you know that your company and your agents may need some time before this goal can be achieved. In addition to the use of certificate client authentication, you plan to continue the current use of user name and password authentication because SSL protects the privacy of this sensitive data in transmission.

Based on the type of application and its users and your future goal of certificate authentication for all users, you decide to use a public certificate from a well known Certificate Authority (CA) to configure SSL for your application.

 

Scenario advantages

This scenario has the following advantages:

Objectives

In this scenario, MyCo, Inc. wants to use digital certificates to protect the rate calculating information that their application provides to authorized public users. The company also wants a more secure method of authenticating those users who are allowed to access this application when possible.

The objectives of this scenario are as follows:

 

class="scenariobar">Details

The following figure illustrates the network configuration in this scenario:

The figure illustrates the following information about the situation for this scenario:

Company public server – System A

  • System A is the server that hosts the company's rate calculating application.

  • System A runs i5/OS® Version 5 Release 4 (V5R4).

  • System A has Digital Certificate Manager (i5/OS option 34) and IBM® HTTP Server for i5/OS (5722–DG1) installed and configured.

  • System A runs the rate calculating application, which is configured such that it:

    • Requires SSL mode.

    • Uses a public certificate from a well-known Certificate Authority (CA) to authenticate itself to initialize an SSL session.

    • Requires user authentication by user name and password.

  • System A presents its certificate to initiate an SSL session when Clients B and C access the rate calculating application.

  • After initializing the SSL session, System A requests that Clients B and C provide a valid user name and password before allowing access to the rate calculating application.

Agent client systems – Client B and Client C

  • Clients B and C are independent agents who access the rate calculating application.

  • Clients B and C client software has an installed copy of the well-known CA certificate that issued the application certificate.

  • Clients B and C access the rate calculating application on System A, which presents its certificate to their client software to authenticate its identity and initiate an SSL session.

  • Client software on Clients B and C is configured to accept the certificate from System A for the purpose of initializing an SSL session.

  • After the SSL session begins, Clients B and C must provide a valid user name and password before System A grants access to the application.

 

class="scenariobar">Prerequisites and assumptions

This scenario depends on the following prerequisites and assumptions:

  • The rate calculating application on System A is a generic application that can be configured to use SSL. Most applications, including many System i™ applications, provide SSL support. SSL configuration steps vary widely among applications. Consequently, this scenario does not provide specific instructions for configuring the rate calculating application to use SSL. This scenario provides instructions for configuring and managing the certificates that are necessary for any application to use SSL.

  • The rate calculating application may provide the capability of requiring certificates for client authentication. This scenario provides instructions for how to use Digital Certificate Manager (DCM) to configure certificate trust for those applications that provide this support. Because the configuration steps for client authentication vary widely among applications, this scenario does not provide specific instructions for configuring certificate client authentication for the rate calculating application.

  • System A meets the DCM set up requirements for installing and using Digital Certificate Manager (DCM)

  • No one has previously configured or used DCM on System A.

  • Whoever uses DCM to perform the tasks in this scenario must have *SECADM and *ALLOBJ special authorities for their user profile.

  • System A does not have an IBM Cryptographic Coprocessor installed.

 

class="scenariobar">Configuration tasks

 

Parent topic:

DCM scenarios