Planning Security
This section first discusses the security mechanisms supported by SequeLink and identifies the service attributes that must be set to configure each security mechanism. Next, two planning sections are provided-one for Windows and UNIX, and another for z/OS-that discuss the default behavior of security on each platform.
SequeLink supports security mechanisms for the following purposes:
- Verification of a user by the SequeLink Server. The Authentication security mechanism allows the SequeLink Server to verify the identity of the user.
- Defining the types of requests that are accepted by the server. The Authorization security mechanism controls whether the user can send data access requests and administrative (SequeLink Manager) requests. Server configuration settings determine whether the server can accept the requests.
- Connection to a data store using the following security mechanisms:
- Data Store Logon controls whether a user who is connected to the SequeLink Server can connect to the data store.
- Application IDs control whether a client application can connect to the data store. This mechanism adds a layer of security on top of Data Store Logon.
- TCP/IP Location Filters control whether a client application can connect to the data store based on the TCP/IP network identifier from which the connection request orginates.
- Terminal Security is supported for connections to SequeLink Servers on z/OS. It controls whether the client application requesting access to the SequeLink data access service has permission to access it based on the TCP/IP address (terminal ID) originating the request.
- Defining the types of SQL statements accepted by the data store. The ReadOnly security mechanism controls whether the data store connection is read-only.
- The privacy of the data being transmitted. The data privacy security mechanism ensures that data transmitted between the client and server is kept private using data scrambling methods and encryption using SSL. SSL is supported for the ODBC Client, JDBC Client, and ADO Client.
Authentication
Authentication allows the SequeLink Server to verify the identity of the SequeLink Client when the client connects to the SequeLink Server. If authentication fails, the SequeLink Client disconnects from the server.
You must set an authentication method separately for users who send data access requests and users who send SequeLink Manager requests. For example, you may want to use an operating system user ID and password for administrative activities and Kerberos for data access activities.
Depending on the combination of client and server platforms involved in the connection, SequeLink supports the following authentication methods:
- Anonymous. The SequeLink Server accepts connections from any SequeLink Client without verifying the client's identity.
- Operating system user ID and password. The SequeLink Server verifies the identity of the SequeLink Client using a user ID and password that must be valid for the platform on which the SequeLink Server is running. If verified, the server accepts the user ID as the identity of the client and permits the connection.
- Kerberos. Kerberos authentication uses Kerberos, a trusted third-party authentication service, to verify user identities. Kerberos authentication can take advantage of the user name and password maintained by the operating system to authenticate users to the database. This method requires knowledge of how to configure your Kerberos environment.
Integrated NT. This option is supported for connections between SequeLink Server for Windows servers and ODBC Clients, ADO Clients, and .NET Clients on Windows only. The SequeLink Server verifies the identity of the SequeLink Client using the client's Windows network logon credentials instead of a Windows user ID and password.Although a user may be able to connect to the SequeLink Server, the user does not automatically have access to the database that the SequeLink Server services.
Access to the database is controlled by:
- Authorization settings (see "Authorization")
- Data Store Logon (see "Data Store Logon")
- Application IDs (see "Application IDs")
- TCP/IP location filters (see "TCP/IP Location Filters")
- Terminal security, on z/OS only (see "Terminal Security on z/OS")
Authentication for the SequeLink Manager
You configure the authentication for data access requests and for SequeLink Manager requests separately. To configure authentication for data access, set the ServiceAuthMethods or ServiceAdminAuthMethods attributes for access to the SequeLink Agent Service. For example, to configure Kerberos authentication for data access requests, you would set the following attribute for the data access service:
To configure Kerberos authentication for SequeLink Manager requests, you would set the following attribute for the SequeLink Agent service:
On z/OS, before enabling Kerberos security for your server, do the following configuration steps:
Authorization
After the SequeLink Server has authenticated the client, SequeLink verifies that the client is authorized to perform data access activities or SequeLink Manager activities. SequeLink supports authorization for data access requests and for SequeLink Manager requests. You configure the authorization for the two types of requests separately. Authorization options depend on your SequeLink Server platform.
Authorization for Windows and UNIX
You configure the authorization for data access requests and for SequeLink Manager requests separately:
- To configure authorization for data access, set the ServiceUser attribute. If you want to configure authorization for user groups defined on Linux/UNIX/Windows, set the ServiceUserGroup attribute. These attributes should be added to data access services only.
- To configure authorization for SequeLink Manager requests, set the ServiceAdministrator attribute. If you want to configure authorization for user groups defined on Linux/UNIX/Windows, set the ServiceAdministratorGroup attribute. These attributes should be added to SequeLink Agent services only.
The ServiceUser and ServiceAdministrator attributes can have the following values:
- Everyone. The SequeLink Server will process all requests sent by the user, regardless of how the user is authenticated. For example:
ServiceUser=everyone
If you set authentication to anonymous, you must set authorization to everyone (
ServiceUser=everyone
orServiceAdministrator=everyone
).This is the default for data access services.
- Authenticated. The SequeLink Server will process all requests sent by the user if the user can be authenticated (authentication is set by the ServiceAuthMethods and ServiceAdminAuthMethods attributes). For example:
ServiceAdminAuthMethods=authenticated
- User_id. The SequeLink Server will process all requests sent by a designated user if the user ID has been specified as authorized. For example, to configure permission for the user ID marym to send data access requests, you would set the following attribute for the data access service:
ServiceUser=marym
And, to configure permission for this user ID to send SequeLink Manager requests, you would set the following attribute for the SequeLink Agent service:
ServiceAdministrator=marym
User_id is the default for ServiceAdministrator. You specify a user ID as the default administrator ID during the installation of the SequeLink Server.
NOTES:
Authorization for z/OS
On z/OS, you can configure authentication with or without additional authorization for SequeLink data access services, SequeLink data sources, and SequeLink management activities. If you configure additional authorization, you must specify a security class and a security resource by setting the following attributes:
For more information about the values for the authorization attributes, refer to the SequeLink Administrator's Guide.
Data Store Logon
Once a connection is established, authentication is complete, and the type of requests accepted by the server has been established, a connection from the SequeLink Server to the database can be established by using either of the following methods:
- Specifying data store logon information (a valid DBMS user ID and password). This is the default for Windows and UNIX (
DataSourceLogonMethod=DBMSLogon(UID,PWD)
).- Allowing the database to inherit the logon user ID that was established during the authentication process. This method must be used for z/OS, but it also can be used for Windows and UNIX (
DataSourceLogonMethod=OSIntegrated
).Application IDs
Application IDs are alphanumeric strings passed by a SequeLink Client that identify the client application to a SequeLink service that has been configured to accept connections only from specific application IDs.
Application IDs add another layer of security for the connection to the data store beyond that provided by the Data Store Logon security mechanism. Data Store Logon allows all users of client applications to access the data store if they meet the qualifications set by Data Store Logon. Using application IDs, you can restrict connections to the data store to only those client applications that identify themselves to the SequeLink Server through an application ID.
The service attributes that control application IDs are DataSourceApplId and DataSourceAutoApplId.
TCP/IP Location Filters
Using TCP/IP network identifiers, such as TCP/IP host names (for example, burner.ddtek.com) or a range of TCP/IP addresses (for example, 192.16.*.*), TCP/IP location filters allow you to specify which clients can access a SequeLink data access service or SequeLink agent service.
The service attributes that control TCP/IP location filters are ServiceAuthorizedClient and ServiceAuthorizedAdminClient.
Terminal Security on z/OS
When terminal security is enabled, through activating the RACF TERMINAL security class, the SequeLink Server verifies that the client application requesting access to the SequeLink data access service has permission to access it based on the TCP/IP address (terminal ID) originating the request. You can use terminal security to make sure that:
- Only specific TCP/IP addresses can be used by specific users to connect to the SequeLink Server.
- Only specific groups of users can use specific TCP/IP addresses to connect to the SequeLink Server. For example, you may want to make sure that a user ID associated with an application running on an application server can only log on to the SequeLink Server from a specific TCP/IP address.
Terminal security is controlled by activating the RACF TERMINAL security class instead of setting a service attribute.
Read Only
SequeLink allows you to configure the types of SQL statements the data store connection will accept:
The service attribute that controls this functionality is DataSourceReadOnly.
Data Privacy
SequeLink provides data scrambling to ensure the privacy of data. In addition, you can use data encryption to provide a more secure transmission of data across the network. For example, you may want to use data encryption in the following scenarios:
NOTE: Data encryption may adversely affect performance because of the additional overhead (mainly CPU usage) required to encrypt and decrypt data.
Data Scrambling
Data scrambling ensures that no cleartext messages are transmitted between the client and server over the network. SequeLink provides the following implementations of data scrambling:
Data scrambling does not provide the same level of security as data encryption and is not enabled by default.
NOTE: Even if you choose not to use a data scrambling method, user IDs and passwords are never sent as cleartext.
To configure SequeLink to use DES, 3DES, or byteswap, set the ServiceEncryptionAlgorithm service attribute, for example,
ServiceEncryptionAlgorithm=DES
. The default is none, which means cleartext messages are transmitted between the client and server over the network.Data Encryption
Secure Sockets Layer (SSL) is an industry-standard protocol for sending encrypted data over database connections. SSL secures the integrity of your data by encrypting information and providing client/server authentication.
SequeLink supports SSL for the following types of data transfers:
- Between a SequeLink Client and a SequeLink Server. SequeLink uses SSL for data encryption. For an SSL connection to be successful, both the SequeLink Server and SequeLink Client must be configured for SSL encryption. If a SequeLink Client that is not configured for SSL attempts to connect to a SequeLink Server configured for SSL, the SequeLink Server rejects the connection request and returns the following error message:
TCP/IP, connection reset by peer
.NOTE: The SequeLink Server for DB2 for z/OS cannot be configured for SSL encryption. Use the SequeLink Proxy Server to provide SSL encryption in your DB2 for z/OS environment.
- Between a SequeLink Client for JDBC and the SequeLink Proxy Server. SequeLink uses SSL for data encryption and authentication.
The SequeLink Server is configured for SSL by setting the ServiceSSLEnabled service attribute to true. For details on configuring SSL for the SequeLink Server and for configuring SSL over the SequeLink Proxy Server, refer to the SequeLink Administrator's Guide.