If you want to use a SiteMinder form together with an ACE authentication scheme, do one of the following:
web_agent_home\samples_default\forms\smaceauth.fcc
@smacefcc=1
If you protect legacy applications that do not confirm to RFC 2396 with a forms-based authentication scheme, and you need the protocol portions of URLs to be lowercase, then set the following parameter:
Specifies whether the scheme (protocol) portion of a redirect URL uses only lowercase characters. This configuration parameter accommodates legacy applications that do not confirm to RFC 2396. This RFC states that applications must handle the protocol portion of a URL in both uppercase and lowercase. Change this parameter in any of the following situations:
Default: No (uppercase characters are used HTTP, HTTPS).
Example: Yes (lowercase characters are used http, https).
To specify lowercase protocols for the URLs in your environment, set the value of the LowerCaseProtocolSpecifier parameter to yes.
The SiteMinder Forms Credential Collector (FCC) is designed to enable CA Services to trigger custom authentication schemes securely. As such, the FCC can authenticate users against any authentication scheme. However, the FCC does not authenticate against Windows authentication schemes by default. This behavior prevents an attacker from exploiting the FCC to generate a SiteMinder session for any valid Windows user in certain configurations.
If your environment requires the FCC to authenticate against the Windows authentication scheme, you can enable it by specifying the EnableFCCWindowsAuth agent configuration parameter. However, before you enable FCC support for Windows authentication, review the risks of doing so and be aware of configurations that expose the vulnerability.
By default, the FCC does not authenticate against Windows authentication schemes. You can enable the FCC to allow Windows authentication. However, doing so exposes a vulnerability whereby an attacker could use an FCC to generate a SiteMinder session for any valid Windows user in certain configurations.
The vulnerability is present in configurations in which the same SiteMinder Agent name or Agent group name is used in both an HTML Forms-protected realm and a Windows-protected realm. For example, a configuration in which a single Web Agent is configured to protect different realms that are configured with HTML Forms and Windows authentication.
Consider the following example scenario:
The attack occurs as follows:
The result is a SiteMinder session returned to the user which enables single sign-on for all following requests where the new session is considered valid. The attacker is now impersonating the user whose Windows username was submitted to the FCC.
You configure the FCC to allow Windows authentication by specifying the following agent configuration parameter:
Specifies whether an agent, acting as an FCC, can authenticate users against resources that the SiteMinder Windows authentication scheme protects.
This parameter uses the following values:
Important! When this parameter is set to Yes, an attacker can potentially exploit the FCC to impersonate Windows users without providing required credentials.
Default: No
Copyright © 2012 CA.
All rights reserved.
|
|