Planning Security

This section first discusses the security mechanisms supported by SequeLink and identifies the service attributes that must be set to configure each security mechanism. Next, two planning sections are provided-one for Windows and UNIX, and another for z/OS-that discuss the default behavior of security on each platform.

SequeLink supports security mechanisms for the following purposes:

Authentication

Authentication allows the SequeLink Server to verify the identity of the SequeLink Client when the client connects to the SequeLink Server. If authentication fails, the SequeLink Client disconnects from the server.

You must set an authentication method separately for users who send data access requests and users who send SequeLink Manager requests. For example, you may want to use an operating system user ID and password for administrative activities and Kerberos for data access activities.

Depending on the combination of client and server platforms involved in the connection, SequeLink supports the following authentication methods:

Although a user may be able to connect to the SequeLink Server, the user does not automatically have access to the database that the SequeLink Server services.

Access to the database is controlled by:

Authentication for the SequeLink Manager

You configure the authentication for data access requests and for SequeLink Manager requests separately. To configure authentication for data access, set the ServiceAuthMethods or ServiceAdminAuthMethods attributes for access to the SequeLink Agent Service. For example, to configure Kerberos authentication for data access requests, you would set the following attribute for the data access service:

ServiceAuthMethods=kerberos 

To configure Kerberos authentication for SequeLink Manager requests, you would set the following attribute for the SequeLink Agent service:

ServiceAdminAuthMethods=kerberos 

On z/OS, before enabling Kerberos security for your server, do the following configuration steps:

Authorization

After the SequeLink Server has authenticated the client, SequeLink verifies that the client is authorized to perform data access activities or SequeLink Manager activities. SequeLink supports authorization for data access requests and for SequeLink Manager requests. You configure the authorization for the two types of requests separately. Authorization options depend on your SequeLink Server platform.

Authorization for Windows and UNIX

This information pertains to Windows and UNIX environments.

You configure the authorization for data access requests and for SequeLink Manager requests separately:

The ServiceUser and ServiceAdministrator attributes can have the following values:

Authorization for z/OS

On z/OS, you can configure authentication with or without additional authorization for SequeLink data access services, SequeLink data sources, and SequeLink management activities. If you configure additional authorization, you must specify a security class and a security resource by setting the following attributes:

For more information about the values for the authorization attributes, refer to the SequeLink Administrator's Guide.

Data Store Logon

Once a connection is established, authentication is complete, and the type of requests accepted by the server has been established, a connection from the SequeLink Server to the database can be established by using either of the following methods:

Application IDs

Application IDs are alphanumeric strings passed by a SequeLink Client that identify the client application to a SequeLink service that has been configured to accept connections only from specific application IDs.

Application IDs add another layer of security for the connection to the data store beyond that provided by the Data Store Logon security mechanism. Data Store Logon allows all users of client applications to access the data store if they meet the qualifications set by Data Store Logon. Using application IDs, you can restrict connections to the data store to only those client applications that identify themselves to the SequeLink Server through an application ID.

The service attributes that control application IDs are DataSourceApplId and DataSourceAutoApplId.

TCP/IP Location Filters

Using TCP/IP network identifiers, such as TCP/IP host names (for example, burner.ddtek.com) or a range of TCP/IP addresses (for example, 192.16.*.*), TCP/IP location filters allow you to specify which clients can access a SequeLink data access service or SequeLink agent service.

The service attributes that control TCP/IP location filters are ServiceAuthorizedClient and ServiceAuthorizedAdminClient.

Terminal Security on z/OS

When terminal security is enabled, through activating the RACF TERMINAL security class, the SequeLink Server verifies that the client application requesting access to the SequeLink data access service has permission to access it based on the TCP/IP address (terminal ID) originating the request. You can use terminal security to make sure that:

Terminal security is controlled by activating the RACF TERMINAL security class instead of setting a service attribute.

Read Only

SequeLink allows you to configure the types of SQL statements the data store connection will accept:

The service attribute that controls this functionality is DataSourceReadOnly.

Data Privacy

SequeLink provides data scrambling to ensure the privacy of data. In addition, you can use data encryption to provide a more secure transmission of data across the network. For example, you may want to use data encryption in the following scenarios:

NOTE: Data encryption may adversely affect performance because of the additional overhead (mainly CPU usage) required to encrypt and decrypt data.

Data Scrambling

Data scrambling ensures that no cleartext messages are transmitted between the client and server over the network. SequeLink provides the following implementations of data scrambling:

Data scrambling does not provide the same level of security as data encryption and is not enabled by default.

NOTE: Even if you choose not to use a data scrambling method, user IDs and passwords are never sent as cleartext.

To configure SequeLink to use DES, 3DES, or byteswap, set the ServiceEncryptionAlgorithm service attribute, for example, ServiceEncryptionAlgorithm=DES. The default is none, which means cleartext messages are transmitted between the client and server over the network.

Data Encryption

Secure Sockets Layer (SSL) is an industry-standard protocol for sending encrypted data over database connections. SSL secures the integrity of your data by encrypting information and providing client/server authentication.

SequeLink supports SSL for the following types of data transfers:

The SequeLink Server is configured for SSL by setting the ServiceSSLEnabled service attribute to true. For details on configuring SSL for the SequeLink Server and for configuring SSL over the SequeLink Proxy Server, refer to the SequeLink Administrator's Guide.