Previous Topic: Global PoliciesNext Topic: Allowable IP Addresses for Global Policies


How to Configure Global Policies

A global policy is comprised of global rule objects and global response objects, including response attributes. The following process lists the procedures for creating a global policy:

  1. Create a Global Rule for Authentication Events or Create a Global Rule for Authorization Events
  2. Configure a Global Response
  3. Configure a Global Web Agent Response Attribute
  4. Configure the Global Policy

Important! You can configure both global policies and domain-specific policies that affect the same resources. For example, you can configure domain-specific policies for access control, and global policies that provide a standard set of responses. However, in order for global policies to function, the realms included in the domain-specific policies must be configured to allow event processing.

Global Rules

The global rules are the part of a global policy that defines a resource and events that trigger the processing of a global policy. These global rules are similar to domain-specific rules. A global rule must be associated with an authentication or authorization event. No global allow/deny access rules are allowed.

Global Rules for Authentication Events

Global rules that include authentication events let you control what occurs when users authenticate to gain access to a resource (On-Auth event).

Note: OnAuth event results are per realm, so for example, if a user goes from realm A to realm B and had an OnAuthAccept header in realm A, it will not be available in realm B. When the user goes back to realm A, the header will be set again.

The following is a list of possible On-Auth events:

On-Auth-Accept

Occurs if an authentication was successful. This event can be used to redirect a user after a successful authentication.

On-Auth-Reject

Occurs if an authentication failed for a user that is bound to a policy containing an On-Auth-Reject rule. This event can be used to redirect the user after a failed authentication.

OnAuthAccept and OnAuthReject events fire both at authentication time (when the user enters a username and password) and at validation time (when the cookie of the user is read). However, there are certain special actions that only occur at authentication time:

Realm timeout override (unless EnforceRealmTimeouts is used).

Unless you have a version of the Web Agent that supports the EnforceRealmTimeouts option and that option is enabled, the Idle and Max Timeouts for the user will stay at the values for the realm in which the user last authenticated (only changes if the user has to reenter credentials).

Redirects.

Redirects are only allowed at authentication time for a number of reasons, but one of the most practical is that it would be very easy to configure an infinite loop of redirection if OnAuth redirection were allowed at validation time as well.

Access to the user password.

The password is not stored in the SMSESSION cookie, so the only time it is available is when the user actually enters it (authentication time).

On-Auth-Attempt

Occurs when the user was rejected since the product does not know this user (an unregistered user, for example, can be redirected to register first).

On-Auth-Challenge

Occurs when custom challenge-response authentication schemes are activated (for example, a token code).

When a user is authenticated (or rejected), the Policy Server passes any global responses that are associated with the applicable On-Auth rule back to the requesting Agent.

More information:

Global Response Objects

Create a Global Rule for Authentication Events

You can create a global rule for authentication events to control actions that occur when users authenticate to gain access to a resource.

Follow these steps:

  1. Click Policies, Global.
  2. Click Global Rules.
  3. Click Create Global Rule.
  4. Enter the global rule name.
  5. Specify agent and resource settings in Realm and Resource.

    Note: If you specify an Agent Group with domain-specific rules that are associated with the same resource, you can adversely affect system performance. Consider domain-specific rules that duplicate the responses that are generated by global rules. Only one response is returned to the Agent because the Policy Server automatically deletes duplicate responses before passing information back to the requesting Agent.

  6. Select Authentication events.
  7. Select an OnAuth event from the Action List.
  8. Click Submit.

    The global rule is saved.

Global Rules for Authorization Events

Global rules that include CA SiteMinder® authorization events allow CA SiteMinder® to call responses based on whether a user is or is not authorized for the resource the user requested. Authorization events occur after a user is authenticated, if a rule that protects a resource contains an On-Access event. When the user has been granted or denied access based on their privileges, the appropriate event is triggered.

The following is a list of possible On-Access events:

On-Access-Accept

Occurs as the result of successful authorization. This event may be used to redirect users who are authorized to access a resource.

On-Access-Reject

Occurs as the result of failed authorization. This event may be used to redirect users who are not authorized to access a resource.

When a user is authorized (or rejected), the Policy Server passes any responses associated with the applicable On-Access rule back to the requesting Agent.

Policy Considerations for OnAccessReject Rules

Consider how the Policy Server processes global policies and the special circumstances created by OnAccessReject rules when creating global rules that include OnAccessReject events.

An OnAccessReject rule will not fire if it is in the same policy as a GET / POST rule. When a user is authenticated, CA SiteMinder® resolves the identity of the user. Therefore, if the OnAccessReject rule and the GET / POST rule are in the same policy, then a user who is allowed access to a resource is the same user who should be redirected on an OnAccessReject event. Since the user is allowed access, the reject event never applies.

To resolve this discrepancy, create a separate policy for the OnAccessReject rule, which may include other event rules, and specify the users for which it should apply.

For example, in an LDAP user directory, User1 should have access to a resource and everyone else in the group, ou=People, o=company.com, should be redirected to an OnAccessReject page. Two policies are required:

Policy1

Includes a GET / POST rule that allows access for User1.

Policy2

Includes the OnAccessReject rule and a Redirect response, and specifies the group ou=People, o=company.com.

Since User1 is authorized, the OnAccessReject rule will not fire when User1 access the resource. However, the OnAccessReject rule will fire for all other users in the group, ou=People, o=company.com, because they are not authorized to access the resource.

Create a Global Rule for Authorization Events

You create a global rule for authorization events to control actions that occur when users authenticate to gain access to a resource.

Follow these steps:

  1. Click Policies, Global.
  2. Click Global Rules.
  3. Click Create Global Rule.
  4. Enter the global rule name.
  5. Specify agent and resource settings in Realm and Resource.

    Note: If you specify an Agent Group with domain-specific rules that are associated with the same resource, you can adversely affect system performance. Consider domain-specific rules that duplicate the responses that are generated by global rules. Only one response is returned to the Agent because the Policy Server automatically deletes duplicate responses before passing information back to the requesting Agent.

  6. Select Authorization events.
  7. Select an OnAccess event from the Action List.
  8. Click Submit.

More information:

Responses and Response Groups

Resource Matching and Regular Expressions

Enable and Disable Global Rules

You enable a global rule to ensure the rule fires when a user accesses the specified resource. Disable a global rule prevent the rule from firing the rule when a user accesses the specified resource.

Follow these steps:

  1. Open the global rule.
  2. Do one of the following tasks:
  3. Click Submit.

    The rule is saved.

Add Time Restrictions to Global Rules

Add time restrictions to a global policy enforce it at specific times. When a user attempts to access a resource outside of the specified time period, the policy is not enforced.

Follow these steps:

  1. Open the global policy.
  2. Click Set in the Time Restrictions group box.
  3. Specify starting and expiration dates.
  4. Specify time restrictions in the Hourly Restrictions table.

    Note: Each check box represents one hour. Selecting a check box fires the rule during that hour. The rule applies to the specified resources. Clearing a check box means that the rule does not fire during that hour. The rule does not apply to the specified resources.

  5. Click OK.

More information:

Add Time Restrictions to Rules

Configure an Active Global Rule

You configure an active rule for dynamic authorization that is based on external business logic. The Policy Server invokes a function in a customer-supplied shared library. This shared library must conform to the interface specified by the Authorization API, which is available in the Software Development Kit.

Follow these steps:

  1. Specify the library name, function name, and function parameters in the fields on the Active Rule group box.

    The active rule string is displayed in the Active Rule field.

  2. Click Submit.

    The active rule is saved.

Delete a Global Rule

Deleting global rules automatically removes the rule from any global policies that use it. The global policies remain on your system. Verify that the global policies function without the deleted rule.

All global policies must contain at least one global rule.

Global Response Objects

The global responses are parts of global policies that define the attributes to be returned to a user. These attributes are returned after a user triggers the authentication or authorization event that is specified in a global rule.

Note: You can use global responses in domain policies. In order to be returned, a global response must be added to a domain-specific or global policy. Within the policies, the global response is processed like a domain-specific response.

Configure a Global Response

You can configure a global response to define the attributes that are returned after the authentication or authorization event occurs in an associated global rule.

Follow these steps:

  1. Click Policies, Global.
  2. Click Global Responses.
  3. Click Create Global Response.
  4. Enter the global response name.
  5. Select an Agent type from the Agent type list.
  6. Click Submit.

    The global response is saved. You can now add response attributes to the response.

Response Attributes for Global Responses

Each CA SiteMinder® global response may contain one or more response attributes. Response attributes identify the pieces of information that the Policy Server passes to a CA SiteMinder® Agent. Each CA SiteMinder® Agent type can accept different response attributes.

Global Response Attribute Types

CA SiteMinder® supports different types of response attributes. The types of response attributes determine where the Policy Server finds the proper values for the response attributes. The types of response attributes that you can configure for a global response are identical to the types of response attributes you can configure for a domain-specific response.

Configure a Global Web Agent Response Attribute

You can configure a response attribute to store the pieces of information that the Policy Server passes to a CA SiteMinder® Agent. Web Agent response attributes support HTTP header variables, cookie variables, redirections to other resources, text, and timeout values. More information on Web Agent response attribute types exists in the Web Agent Configuration Guide.

Note: If you have purchased CA SOA Security Manager, you can find information about the WebAgent-SAML-Session-Ticket-Variable response attribute type in the CA SOA Security Manager Policy Configuration Guide.

Follow these steps:

  1. Click Create Response Attribute.
  2. Select a response attribute.
  3. Select an attribute type.

    The details in the Attribute Fields are updated to match the specified attribute type.

  4. Complete the details in the Attribute Fields.

    Note: A list of automatically generated CA SiteMinder® user attributes that you can use in responses exists in SiteMinder Generated User Attributes.

  5. (Optional) Edit the attribute in the Script field.

    Note: The Attribute Setup section closes when you edit the attribute on the Advanced section.

  6. Specify Cache Value or Recalculate value every ... seconds.

    Note: The maximum time limit that can be entered is 3600 seconds.

  7. Click Submit.

    The Create Response Attribute Task is submitted for processing, and the response attribute is added to the Attribute List on the Response page.

More information:

Global Response Attribute Types

How to Configure Global Policy Objects

Configuring a global policy requires you to complete the following procedures:

  1. Create the Global Policy
  2. Add Global Rules to the Global Policy
  3. (Optional) Associate a Global Rule with a Response
Create the Global Policy

You can create a global policy to define how users interact with resources.

Follow these steps:

  1. Click Policies, Global.
  2. Click Global Policies.
  3. Click Create Global Policy.
  4. Enter the global policy name.
  5. Add global rules and global responses.
  6. Click Submit.
Add Global Rules to a Global Policy

The global rules indicate the specific resources that are included in a global policy. Add at least one global rule to a global policy.

Follow these steps:

  1. Click the Rules tab.

    The Rules group box opens.

  2. Click Add Rule.

    The Available Rules pane opens and lists the available global rules.

    Note: If the global rule you require does not appear, click New Rule. Rules that you create in this manner are added to the global policy.

  3. Select the global rules that you want to add, and click OK.

    The Rules group box lists the selected rules and rule groups.

  4. (Optional) Associate the rule with a response or response group.
Associate a Global Rule with a Response

The global responses indicate the actions that occur when the rule fires. When the rule fires, the associated response also fires.

Follow these steps:

  1. Click Add Response for the global rule for which you want to associate a response.
  2. Select a response, response group, or global response, and click OK.

    Note: If the response you require does not exist, click New Response to create the response.

Enable and Disable Global Policies

The Administrative UI allows you to enable and disable global policies. By default, when you create a global policy, the policy is enabled. Any Global rules that are contained in the global policy fire when users attempt to access the resources that are specified in those rules.

If you disable a global policy, the rules that are contained in the policy do not fire.

Follow these steps:

  1. Open the policy in the Administrative UI.
  2. Select or clear the Enabled check box.

    If the check box is selected, the policy is enabled. If the check box is cleared, the policy is disabled. A disabled policy does not fire.

  3. Click Submit.

    The policy is saved.

Configure a Global Active Policy

An active policy is used for dynamic authorization based on external business logic. An active policy is included in the authorization decision by having the Policy Server invoke a function in a customer-supplied shared library.

This shared library must conform to the interface specified by the Authorization API (available separately with the Software Development Kit.

Note: More information exists in API Reference Guide for C.

The process for configuring active policies for global policies is identical to the process for configuring active policies for domain-specific policies.

Follow these steps:

  1. Open the global policy.
  2. Select the Edit Active Policy check box in the Advanced Group box.

    Active policy settings appear.

  3. Enter the name of the shared library in the Library Name field.
  4. Enter the name of the function in the shared library that is to implement the active policy.
  5. Click Submit.

    The policy is saved.