Quantcast
Channel: Micro Focus Forums
Viewing all articles
Browse latest Browse all 11924

Inadequate audit details from IDP for AG cluster logins

$
0
0
Inadequate "target URL" type detail provided from the IDP audit events in the "DataContext" column of a parsed event (using Sentinel 6.2 and 7.0).

Today, when a user accesses a protected resource on an AG cluster and is redirected to login at the IDP, after the user successfully authenticates the IDP just prints the AG cluster's ESP URL in the event -- which is too generic and not informative at all.

Code:

Severity        EventTime        EventName        Message        XDASTaxonomyName        XDASOutcomeName        InitUserName        InitUserDomain        InitUserFullName        InitUserDepartment        EffectiveUserName        InitHostName        InitIP        InitAssetFunction        InitServicePortName        TargetUserName        TargetUserDomain        TargetUserFullName        TargetUserDepartment        TargetHostName        TargetIP        TargetAssetFunction        TargetServicePortName        TargetTrustName        FileName        DataContext        ObserverHostName        ObserverIP        MSSPCustomerName        ReporterHostName        ReporterIP
0        1/21/2012 15:32        NIDS: User session was authenticated        AMDEVICEID#esp-73768320D7C25697: AMAUTHID#6A4BDE9482F944211989FDCDF4C86916: User session was authenticated: [cn=JohnSmith,o=Company]. Authentication Type: [https://beta-auth-https.MyCompany.com:443/nesp/idff/metadata] Authenticating Entity Name: [null] Contract Class or Method Name: [name/password/uri]        XDAS_AE_CREATE_SESSION        XDAS_OUT_SUCCESS                                                        192.168.218.224                Novell Access Manager        cn=JohnSmith,o=Company                                                                        metadata        https://beta-auth-https.MyCompany.com:443/nesp/idff                192.168.218.224        unknown                192.168.218.224
0        1/21/2012 15:32        NIDS: Provided an authentication to a remote consumer        AMDEVICEID#0881CFF5BBF0D19A: AMAUTHID#F7EC674AB8C2190B4ABE4E48FB272101: Provided an authentication to a remote consumer on behalf of user: [cn=JohnSmith,o=Company]. Authentication Type: [https://beta-idp.MyCompany.com/nidp/idff/metadata] Authenticating Entity Name: [https://beta-auth-https.MyCompany.com:443/nesp/idff/metadata] Contract Class or Method Name: [name/password/uri]        XDAS_AE_CREATE_SESSION        XDAS_OUT_SUCCESS                                                        192.168.218.169                Novell Access Manager        cn=JohnSmith,o=Company                                                                        metadata        https://beta-idp.MyCompany.com/nidp/idff                192.168.218.169        unknown                192.168.218.169


Obviously, the IDP knows about the exact Proxy Service / protected resource URL that the user is really going to visit because within the client browser if you View Source on the login page that the IDP itself has generated for you, there is a hidden input field called "TARGET" that has been filled in with the precise Proxy Service URL location you tried to visit before being sent to the IDP.

We have well over 100 Proxy Services, so for the IDP's to generically report back only the AG's ESP URL as the target in every audit event for authentications is practically useless information. Far better to give us an indication of where the user was actually off to go visit.


IDP URL: https://beta-idp.MyCompany.com
AG's ESP URL: https://beta-auth-https.MyCompany.com
Proxy Service URL originally accessed: https://www.mycompany.com/somepath/somefile


- Stefan

Viewing all articles
Browse latest Browse all 11924

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>