Previous Topic: DomainsNext Topic: Rules


Realms

This section contains the following topics:

Realms Overview

Confidence Levels Introduced

Identify a Resource by Agent, Realm, and Rule

Nested Realms

Realms in Request Processing

Configure a Realm

Modify a Realm

Delete a Realm

Configure a Nested Realm

Flush a Single Realm from the Resource Cache

Realms Overview

Complex sets of resources must be logically grouped so that security policies can be created. The basic CA SiteMinder® groupings for resources are realms.

A realm is a cluster of resources within a policy domain grouped according to security requirements. A realm is usually defined for resources that reside in a common location on your network. For example, marketing information that resides in a /marketing directory on your network might be configured as a realm in a policy domain controlled by an administrator in your company’s marketing organization.

The contents of a realm are protected by Agents. When users request resources within a realm, the associated Agent handles authentication and authorization of the user. The realm determines the method of authentication.

The following diagram shows the contents of two realms.

Grapic showing the contents of Engineering Realm and Marketing Realm

Each of the realms contains resources, such as HTML files, forms, or applications. In addition, each realm is associated with an Agent and an authentication scheme.

Confidence Levels Introduced

If CA SiteMinder® is integrated with a supported risk analysis engine, you can configure a realm with a confidence level. A confidence level represents credential assurance, which is the likelihood that the user requesting the protected resource is legitimate.

Consider the following items:

More information:

CA Arcot WebFort and RiskFort

Configure Advanced Policy Components for Applications

CA Arcot A-OK

Identify a Resource by Agent, Realm, and Rule

The resources protected by CA SiteMinder® are identified by the following:

[Agent] [Realm Resource Filter] [Rule Resource]

Agent

An Agent monitors a server that contains one or more realms of protected resources.

Realm Resource Filter

A string, such as a relative path to a directory, that specifies the resources covered by the realm. If the realm is a top-level realm, specify the resources relative to the server that serves up the files or application. If the realm is nested, specify the resources relative to the parent realm.

For example, the realm might cover the contents of a directory that is immediately below the document root of a Web server, such as:

<document_root>/HR

Here, you could specify the realm resource filter as:

/HR

Rule Resource

A string or regular expression that specifies the resources to which the rule applies. Specify the resources relative to the realm containing the resource. For example, if the realm resource filter ends with a directory name, the rule resource might include a subdirectory of the realm directory and even the name of a file in that subdirectory, such as:

/Managers/PayRanges.html

You can use wildcards to broaden the specification of a rule. For example:

/Managers/*

Combining the three elements, suppose that:

For the Policy Server, the following figure shows the effective resource.

Graphic showing the effective resources available for the Policy ServerGraphic showing the effective resources available for the Policy Server

You could configure the directory called Managers as a nested realm under the /HR realm.

To access the protected page PayRanges.html, under the Managers subdirectory, a user would need to:

  1. Specify the resource:

    http://MyHost.myorg.org/HR/Managers/PayRanges.html

  2. Provide credentials for a user authorized to access the resource. Administrators use policies to specify which users are authorized to access a resource.

More information:

Configure a Realm

Agents and Agent Groups

Rules

Unprotected Realms, Rules, and Policies

By default a realm is created in a Protected state. In most cases, you should use protected realms instead of changing a realm to an Unprotected state. In a protected realm, all resources are protected against access. To allow access, a rule must be defined, then included in a policy.

When you create a realm in an Unprotected state, you must configure rules before CA SiteMinder® protects the resources in the realm. If you create a rule for resources in the unprotected realm, only the specified resources are protected. Once the resource is protected, the rule must be added to a policy to allow users to access the resource. You may want to use an unprotected realm if only a subset of the resources in a realm need to be protected from unauthorized access.

The following is an example of the actions required when setting up an Unprotected realm:

Action

Protection State

Create unprotected realm called Realm1 with the Resource Filter: /dir.

Resources contained in /dir and subdirectories are not protected.

Create Rule1 in Realm1 for the resource:

file.html.

The file /dir/file.html is protected, but the rest of the contents of /dir are not protected.

Create Policy1 and bind Rule1 and User1 to the Policy.

User1 can access /dir/file.html. All other users cannot access the protected file.

Note: If you want to track users for a realm with an Anonymous authentication scheme, the realm must be a protected realm. For information about the Anonymous scheme, see Anonymous Authentication Schemes.

Nested Realms

Realms represent groups of resources in much the same way that directories of files and folders represent a file system’s contents. Nested realms allow you to increase the protection level of resources that are lower in a directory tree. Below any existing realm, you can create a nested realm. You can then assign an authentication scheme with a higher protection level to the nested realm.

By default, to access resources in the child realm, a user must be authorized for resources in the parent realm and for resources in the child realm. You can globally change the default behavior of the Policy Server and always allow access to the resources in the child realm for users who are authorized either for the parent realm or the child realm. However, we do not recommend changing from the and logic to the or logic, which is less secure. To change to the or logic, remove the check from the Enable Nested Security check box.

Note: Do not assign the anonymous authentication scheme to any realm in a nested structure, including the top-level realm. You can’t authorize specific users for resources protected by an anonymous authentication scheme, so the and logic will fail.

The following example illustrates how nested realms can be used to provide increasing levels of security.

Graphic showing nested realms each of which is applied a diffferent authentication scheme with varied protection levels

In the realm structure shown in the previous figure, the realms mimic the file structure of the resources. Each of the nested realms has a different authentication scheme than its parent realm. Since the authentication scheme for each child realm has a higher protection level than that of the parent realm, users will need to re-authenticate when they try to access resources at lower levels of the tree. To implement this example, for each realm, you need to create a rule. Then, you need to create corresponding policies so that each policy contains a rule and users that need to access resources in a child realm can also access resources in the parent realm.

Note: Only administrators with the Manage System and Domain Objects privilege may create, edit, and delete realms. However, administrators with the Manage Domain Objects privilege may create, edit, and delete nested realms underneath existing realms in their policy domains.

Realms in Request Processing

When a user requests a resource, the Policy Server uses the longest matching realm to determine if a resource is protected, and if so, which authentication scheme must be used to establish the user’s identity. The longest matching realm consists of the resource filter that can be located in the deepest level of any group of nested realms (or a single realm if nested realms are not used) that matches the requested path to a resource.

Examples

Using the example from the previous section, a file called list2.html in the location /marketing/competitors/list2.html matches the nested realm /marketing/competitors/. When the Policy Server processes authentication for list2.html, the user authenticates via HTML Forms, since that is the authentication scheme associated with the
/marketing/competitors/ realm.

In the same example, a file called current_budget.html in the location
/marketing/budgets/current_budget.html. Since the /budget directory is not specifically called out in a nested realm, the longest matching realm for this resource is /marketing/. Therefore, the user authenticates via the Basic user name and password authentication scheme.

Configure a Realm

Realms are groupings of resources in a specific location on your network. The contents of a realm are protected by Agents. When users request resources within a realm, the associated Agent handles authentication and authorization of the user. The realm specifies the method of authentication.

You can configure realms for any type of CA SiteMinder® Agent, including Affiliate Agents.

Configure a Realm Protected by a SiteMinder Web Agent

You can configure a realm to protect a group of resources that users access through a Web Server.

Note: The following procedure assumes that you are creating an object. You can also copy the properties of an existing object to create an object.

To configure the realm

  1. Click Policies, Domain.
  2. Click Realms.

    The Realms page appears.

  3. Click Create Realm.

    The Create Realm: Select Domain page appears.

  4. Select a domain from the Domain list, and click Next.

    The Create Realm: Define Realm page appears.

    Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.

  5. Type the name and a description of the realm.
  6. Click the ellipsis button to select an agent.

    The Select an Agent page appears.

  7. Select a CA SiteMinder® Web Agent or Agent group, and click OK.
  8. Specify the remaining resource properties.
  9. Create new rules or delete existing rules.
  10. Create new sub–realms or delete existing sub–realms.
  11. Specify the session properties.
  12. Specify the directory mappings and types of events the realm must process.
  13. Specify the minimum confidence level to apply to all resources in the realm.

    Note: Applying a confidence level to a realm requires that you integrate CA SiteMinder® with a supported risk analysis engine and enable confidence level support. For more information, see the Implementation Guide.

  14. Click Finish.

    The Realm associated with the selected CA SiteMinder® Web Agent or Agent group is created.

More information:

Duplicate Policy Server Objects

Configure a Realm Protected by a RADIUS Agent

You can configure a realm to protect a group of resources that users access through a Web Server.

Note: The Administrative UI lets you configure realms protected by a RADIUS Agent. These realms do not require all of the same information that is required for a CA SiteMinder® Web Agent realm.

Note: The following procedure assumes that you are creating an object. You can also copy the properties of an existing object to create an object.

To configure the realm

  1. Click Policies, Domain.
  2. Click Realms.

    The Realms page appears.

  3. Click Create Realm.

    The Create Realm: Select Domain page appears.

  4. Select a domain from the Domain list, and click Next.

    The Create Realm: Define Realm page appears.

    Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.

  5. Type the name and a description of the realm.
  6. Click the ellipsis button to select an agent.

    The Select an Agent page appears.

  7. Select a RADIUS Agent or Agent group, and click OK.
  8. Specify the remaining resource properties.
  9. Create new rules or delete existing rules.
  10. Specify the session properties.
  11. Click Finish.

    The Realm associated with the selected RADIUS Agent or Agent group is created.

More Information:

Duplicate Policy Server Objects

Modify a Realm

When you modify an existing realm you cannot make changes to the following:

Note: More information about modifying and deleting Policy Server objects exists in Manage Policy Server Objects.

Delete a Realm

When you delete a realm, all nested realms that are associated with the realm are also deleted. In addition, all rules that are associated with the deleted realm and its nested realms are also deleted. Only delete the parent realm to remove all the associated nested realms. Do not select the individual nested realms for deletion.

Note: More information about modifying and deleting Policy Server objects exists in Manage Policy Server Objects.

Configure a Nested Realm

Administrators who have privileges to Manage Domain Objects can create a nested realm within a parent realm, as long as the parent realm is associated with a domain within the administrator's scope.

Note: You can only create nested realms under a realm that is protected by CA SiteMinder® Web Agents.

To create a nested realm

  1. Click Policies, Domain.
  2. Click Realms.

    The Realms page appears.

  3. Specify search criteria, and click Search.

    A list of realms that match the search criteria appears.

  4. Click the name of a realm that you want to modify.

    The View Realm page appears.

  5. Click Modify.

    The settings and controls become active.

  6. In Sub-Realms, click Create Sub-Realm.

    The Create Realm page appears.

  7. Type the name and a description of the realm.
  8. Type the path of the resource filter.

    Note: The resource filter of the nested realm is added to the resource filter of the parent realm. For example, if the parent realm's filter is /marketing, and the nested realm's filter is /data, the entire filter is: <agent_of_the_parent_realm>/marketing/data.

    Note: Asterisk (*) and question mark (?) characters are treated as literal characters in resource filters, not wildcards.

  9. Specify the session properties.
  10. Specify the following advanced settings:
  11. Click OK.

    The newly created Sub-Realm is added to the parent Realm.

  12. Click Submit.

    A Realm associated with the newly created sub-realm is created.

More information:

Nested Realms

Flush a Single Realm from the Resource Cache

CA SiteMinder® caches realm information when users access protected resources. This allows CA SiteMinder® to improve network performance by keeping track of recently used resources. However, if you change the security requirements or contents of a realm, you must flush the realm from the CA SiteMinder® resource cache.

Note: If you have the Manage System and Domain Objects administrative permission, you can flush all realms from the resource cache using the Cache Management dialog. For more information, see the Policy Server Administration Guide.

To flush a single realm from the resource cache

  1. Click Policies, Domain.
  2. Click Realms.

    The Realms page appears.

  3. Specify search criteria, and click Search.

    A list of realms that match the search criteria appears.

  4. Click the name of a Realm that you want to modify.

    The View Realm page appears.

  5. Click Modify.

    The settings and controls become active.

  6. In Flush Resources in Realm, click Flush.

    CA SiteMinder® flushes the realm from the resource cache.