Previous Topic: SiteMinder PolicyNext Topic: Password Policy Considerations


EPM Application

SiteMinder r12.0 introduced the EPM application. EPM is an application–centric access management model. EPM presents access management in the context of securing an application.

To protect an application, you are only required to provide data for configuration settings that do not have defaults. Modifying other settings is optional, and although not required, you can manage additional SiteMinder settings to modify EPM settings beyond the default settings to define more fine–grained protection.

If you are familiar with the core SiteMinder objects, there is a relationship between the application–oriented concepts and the underlying SiteMinder components. The following table summarizes this relationship.

Application Dialogs and Group Boxes

Underlying SiteMinder Component

General settings

Defines the SiteMinder policy domain and the root location of the protected resources.

Components

Defines the realm and the location of the resources within the application that share the same security requirements.

Resource

Specifies the rule and the required authentication or authorization actions.

Application Roles

Replaces the function of user directory lookups.

Unlike a SiteMinder policy object, you do not have to create the individual domain, realm, and rule objects. When you create the application, SiteMinder creates the objects automatically and binds them to identify resources, user populations, and the required actions when SiteMinder grants or denies access to the resource. As such, configuring an application does not require an understanding of these core objects.

Note: For more information about EPM applications, see the Policy Server Configuration Guide.

Identify the Applications to Secure

Which applications are you planning to secure? How do they map to the SiteMinder access management models?

Begin thinking about the individual applications in the organization and the individual resources (URLs) within each application that require the same level of protection. We recommend identifying the following:

Grouping resources in this way helps you map applications to the SiteMinder access management models.

When gathering information about each application, use a resource table similar to the following to help organization information:

Resource

Domain/Application Resource Filter

Realm/Component Resource Filter

Example: Corporate Portal

Example: Performance Management application

Example: Manager resources

Note: Identifying the applications that require protection also aids in capacity planning.

More information:

Capacity Planning Introduced

Ignore Extensions Parameter

Group Resources into Domains or EPM Applications

Defining a SiteMinder policy domain or an EPM application depends on identifying logical groups of resources, often an individual application, that are associated with one or more user populations. Grouping resources at this level helps you to identify the sets of individual resources (URLs) within an application that share the same security requirements.

Note: For more information about a SiteMinder policy domain or an EPM application, see the Policy Server Configuration Guide.

A strategy for determining these requirements is to review a site map of the organization.

For example, a fictitious company, has a corporate intranet that the following site map represents:

Graphic showing resources grouped into Domains or EPM Applications

In this example, the corporate portal is separated into the following logical groups of resources:

The resource table for the corporate intranet looks like the following:

Resource

Domain/EPM Application Filter

Realm/Component Filter

Corporate Intranet

intranet.example.com

N/A

Learning

intranet.example.com/learning

N/A

Performance Management

intranet.example.com/performance

N/A

Support

intranet.example.com/support

N/A

Business Tools

intranet.example.com/tools

N/A

Corporate

intranet.example.com/corporate

N/A

More information:

Domains and Authentication Performance

Group Resources into Realms or EPM Components

Defining a SiteMinder policy realm or an EPM component depends on identifying sets of individual resources (URLs) that share the same security or personalization requirements within a SiteMinder policy domain or EPM application. The contents of a realm or EPM component share the same authentication scheme. As a result, identifying these resources early in the process can help you determine the authentication schemes required to meet individual security requirements.

Note: For more information about SiteMinder policy realms and EPM components, see the Policy Server Configuration Guide.

For example, although the Performance Management and Business Tools applications each let a specific user population access the root of the application, each application contains additional SiteMinder policy realms or EPM components to provide a level of security or personalization appropriate for the resource:

Note: Although not illustrated, SiteMinder policy rules and EPM resources are used to control specific Web Agent, authentication, and authorization events. For more information, see the Policy Server Configuration Guide.

Graphic showing resources grouped into realms or EPM components

The resource table for the applications looks like the following:

Resource

Domain/EPM Application Filter

Realm/Component Filter

Corporate Intranet

intranet.example.com

N/A

Learning

intranet.example.com/learning

N/A

Performance Management

intranet.example.com/performance

/employee

/manager

 

 

Support

intranet.example.com/support

N/A

Business Tools

intranet.example.com/tools

/engineering

/marketing

 

 

Corporate

intranet.example.com/corporate

N/A

Identify User Stores

SiteMinder can authenticate and authorize users through one or more connections to existing user stores in your enterprise network. After you identify the applications to secure, consider the following questions:

Identifying the stores each application uses helps you to:

When gathering information about each application, use a table similar to the following to organize information:

User Store Name

User Store Type

Authentication?

Authorization?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Identify Authentication Methods

SiteMinder supports multiple authentication methods to meet the varying levels of protection your resources require:

  • Basic
  • MIT Kerberos
  • Forms-based user ID and password
  • Server-based, such as RADIUS and SafeWord
  • Hardware and software token-based, such as RSA® Ace/SecurID®
  • X.509 Certificate-based
  • Integrated Windows Authentication (IWA)
  • Custom Authentication schemes created using the SiteMinder SDK
  • Information Card Authentication Schemes (ICAS), such as Microsoft Windows CardSpace

 

After you identify the applications to secure, in which we recommend identifying sets of resources (URLs) that share the same security requirements, consider the following questions:

Answering these types of questions helps you to

When gathering information about each resource, we recommend organizing your information by the applications you plan on securing. For example, the following table assumes that an application is grouped into individual domains and realms, as detailed in applications to secure.

Resource

URL

Realm

Authentication Method

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Identify Password Management Options

Do any security policies require your organization to manage user passwords? Do you anticipate managing user passwords in the future?

You can use SiteMinder password policies to enforce the password requirements of your enterprise. A password policy can validate the user's password against any of the following types of characteristics before accepting it:

Composition

Verifies the minimum or maximum length, the types of characters allowed, and if or how often any of those characters can be repeated in a password.

Age

Verifies the time limits for how long the same password can be used, how long a password can remain inactive before it must be changed, and how long or how often before an expired password can be reused. You can specify one of the following responses for users with expired passwords:

Attempts

Records the number of times the user has previously entered an incorrect password, and takes one of the following actions when that number is exceeded:

Note: For more information, see the SiteMinder Policy Server Configuration Guide.