Axton,

This will also be true for https right? With https the TRAFFIC is
encrypted but the URLs are not. This makes sense because you first
have to request a site (by issuing an URL) before the secure
connection can  be set up.

Kind regards,

Michiel

On 10/26/06, Axton <[EMAIL PROTECTED]> wrote:
The only other things I can think of:
If not using https
- browser will store url in history (username/pass)
- proxy server will store url (username/pass)
- username/password are visible on network in plain text

Axton Grams

On 10/26/06, Heider, Stephen <[EMAIL PROTECTED]> wrote:
> If you can find a way to bypass the security with this model please post
> a message. I can then patch it.  Thanks.
>
> Stephen
>
> -----Original Message-----
> From: Action Request System discussion list(ARSList)
> [mailto:[EMAIL PROTECTED] On Behalf Of Axton
> Sent: Thursday, October 26, 2006 3:09 PM
> To: [email protected]
> Subject: Re: Client Application SSO (U)
>
> This is good.  I didn't know whether you were relying on the web
> server/domain to authenticate the user or if you were using some vb
> command to read the username.
>
> Axton Grams
>
> On 10/26/06, Heider, Stephen <[EMAIL PROTECTED]> wrote:
> > Axton,
> >
> > Great questions.  I tested each of these scenarios.  I created a local
>
> > account with a username of an existing employee.  After some testing I
>
> > then added this user to the local Admin group and also added the
> > employee's domain\username to the local Admin group.
> >
> > Local accounts do not have access to connect to our remedy web server,
>
> > only authenticated domain users.  With each attempt the Windows login
> > prompt was presented.  When I provided my network credentials the web
> > app knew that I was using my login name and not the local user.
> >
> > I then attempted to Run As IE as the local account user (logged into
> > Windows as me) and entered the URL in the address field.  The web app
> > knew it was me.  I then logged into Windows as the local account and
> > ran IE with Run As me. Same result.
> >
> > The web app checks the domain when logging in.  All our employees are
> > in the same domain, so checking here is easy.  For companies that have
>
> > multiple domains additional checks would need to be done.  You could
> > also track a lot of details regarding the SSO web app session, such as
>
> > IP address, computer name, etc.  If someone successfully spoofed a
> > login [to get into Remedy only] in the logging file/table tracks could
>
> > lead back to the culprit.
> >
> > The only thing I didn't try was to rename my computer to the name of
> > the domain.  This may present the web app with domain\username,
> > however the Remedy web server still wouldn't allow access without a
> > valid domain account login.
> >
> > To spoof the web app I think that either the browser or .Net libraries
>
> > would need to be hacked.  Or, if they somehow intercepted calls made
> > to HttpContext.Current.User.Identity.Name from the web app and
> > interjected a new value when sending data back to the web server it
> might work.
> > Can't say for sure, but if someone can hack into this they may also be
>
> > able to hack into LDAP authentication as well.
> >
> >
> > Stephen
> >
> >
> >
> > -----Original Message-----
> > From: Action Request System discussion list(ARSList)
> > [mailto:[EMAIL PROTECTED] On Behalf Of Axton
> > Sent: Thursday, October 26, 2006 11:52 AM
> > To: [email protected]
> > Subject: Re: Client Application SSO (U)
> >
> > So what happens if I create a local account on my desktop that has the
>
> > same login name as some other domain account, then proceed to access
> > your SSO enabled web interfaces?
> >
> > Or even better, create the local account, then run iexplore.exe as
> > that user?
> >
> > Axton Grams
> >
> > On 10/26/06, Heider, Stephen <[EMAIL PROTECTED]> wrote:
> > > For inquiring minds... here is the SSO solution I implemented here.
> > >
> > > Background:
> > > Over the last couple months I have been researching SSO solutions
> > > for Remedy, initially only for Mid Tier (6.3, 7.0).  There are
> > > several good ones that will do the job.  The costs prevented us
> > > purchasing ($15K for a Mid Tier-only solution up to $100K+ for a
> > > solution for all
> >
> > > web and Windows applications including non-Remedy apps).
> > >
> > > A few weeks after the decision was made not to purchase I began
> > > reading more and more posts about implementing SSO.  I gleaned some
> > > ideas from Listers and determined that I was going to find a
> solution.
> >
> > > It didn't take long to see that this would work.  It may not be
> > > applicable in certain companies/organizations (ie. top secret
> > > government work), but I suppose it could be useful in about 90% of
> > Remedy installations.
> > >
> > > Goal:
> > > Provide seamless login (aka SSO) to our end-user Mid Tier
> > > application for all employees with Read/Read Restricted licenses.
> > > We wanted to make it easy for our employees to be able to submit and
>
> > > view their own
> >
> > > tickets.  SSO makes it as simple as clicking a link on a web page.
> > > For those with Fixed/Floating licenses (technicians and technical
> > > management) it was deemed acceptable to continue having them enter
> > > their network password to login to the Remedy Windows application.
> > >
> > >
> > > Benefits:
> > > Employees only need to click a link on our intranet to login.  It's
> > > quick - takes about 1/2 second extra to perform the automated login
> > > process.
> > > No changes needed on Mid Tier.
> > > No changes needed for any forms used by the Mid Tier application.
> > >
> > >
> > > Limitations:
> > > Users with SSO login will no longer be able to login to the Windows
> > > User Tool.  This is not an issue here as only Fixed/Floating license
>
> > > users have the Windows User Tool installed.
> > >
> > > It is only approximately 99.9% as secure as using LDAP.  It can be
> > > made more secure with additional programming but for our purposes it
>
> > > is more than adequate.
> > >
> > >
> > > Requirements:
> > > All employees must have a record in the User form.
> > > Cross-Ref Blank Password must be enabled.
> > > LDAP/AREA authentication must be enabled.
> > > LDAP/AREA authentication is not used for SSO - instead internal
> > > Remedy
> >
> > > passwords.
> > > The username of the currently logged in network user must be
> > > accessible to the web application.  We run Windows XP on the clients
>
> > > and Windows Server 2003/IIS on the server (Anonymous access disabled
>
> > > and Integrated Windows Authentication enabled).
> > >
> > >
> > > How it Works:
> > > I added one character field to the User form to hold an encrypted
> > > password.
> > > For each Read/Read Restricted user I generate a separate GUID and
> > > store it in the regular Password field, and also an encrypted copy
> > > of the new password in the new SSO Password field.
> > >
> > > When the web application runs it captures the current network
> > > username, retrieves the encrypted password from the User form,
> > > decrypts the password, formats a URL containing the username and
> > > password, then finally redirects the web page to the new URL.  User
> > > is
> >
> > > logged in.  The password does not appear in the Browser Address
> > > field (or if it does, it's only displayed for 1/4 second).
> > >
> > > If the employee that clicked the link has a Fixed/Floating license
> > > then the web page is redirected to the standard web login page.
> > >
> > >
> > > Security:
> > > No-one with direct access to the User form, either in Remedy or at
> > > the
> >
> > > DB, can use the encrypted password.  The encryption/decryption key
> > > is stored "somewhere" on the server.  There are numerous methods and
>
> > > locations for storing and retrieving encrypted encryption/decryption
>
> > > keys.  With the Windows and .Net cryptography APIs a key could
> > > actually be generated and not known by any human, even the Remedy
> > Administrator.
> > >
> > > The encrypted passwords in the User form can be scheduled to be
> > > automatically changed every night.  So even if an employee was able
> > > to
> >
> > > discover their Remedy password it would only be good for one day.
> > > The
> >
> > > users don't know or need to know what their password is, as long as
> > > it
> >
> > > matches what Remedy has.
> > >
> > >
> > > Technologies Used:
> > > ASP.Net 2.0
> > > VB.Net 2005
> > >
> > >
> > > Related Stuff:
> > > Because the initial caching of Remedy forms (in this case the
> > > end-user
> > > application) takes a long time, I wrote a .Net app that pre-caches
> all
> > > forms used by the end-user and technician applications.   The app is
> > > scheduled to run each morning on the Mid Tier server - it first runs
>
> > > IISReset (forces Mid Tier to clear its cache), then proceeds to load
>
> > > each form in a list of forms (list is stored in a text file that can
>
> > > be updated without recompiling the app).  Now, all web applications
> > > load quickly as each form is freshly cached each morning.
> > >
> > >
> > > What's Next:
> > > SSO for the Windows User Tool.  A couple of months ago I looked into
>
> > > creating an application that provides SSO functionality for WUT.  I
> > > spent a little time developing a .Net solution.  I had to switch
> > > gears
> >
> > > because this was not an immediate requirement.  What I did discover
> > > after experimenting is that I am about 90% sure it can be
> > accomplished.
> > > I hope to pick this back up in a few months.  I also need to brush
> > > up on programming global hooks.  BTW, if anyone out there is an
> > > expert in
> >
> > > .Net hook programming please contact me off list. Thanks.
> > >
> > >
> > > Stephen
> > >
> > >
> > > ________________________________
> > >
> > > From: Action Request System discussion list(ARSList)
> > > [mailto:[EMAIL PROTECTED] On Behalf Of McKenzie, James J C-E LCMC
> > > HQISEC/L3
> > > Sent: Wednesday, October 18, 2006 5:09 PM
> > > To: [email protected]
> > > Subject: Re: Client Application SSO (U)
> > >
> > >
> > > **
> > >
> > > Sandra:
> > >
> > > Don't be so greedy.  Let Stephen share with everybody....
> > >
> > > James McKenzie
> > > L-3 GSI
> > > Innovative Solutions - Extraordinary Results
> > >
> > > ________________________________
> > >
> > > From: Action Request System discussion list(ARSList)
> > > [mailto:[EMAIL PROTECTED] On Behalf Of Hennigan, Sandra H CTR
> > > OSD-CIO
> > >
> > > Sent: Wednesday, October 18, 2006 1:56 PM
> > > To: [email protected]
> > > Subject: Re: Client Application SSO (U)
> > >
> > >
> > > **
> > > UNCLASSIFIED
> > >
> > > Sounds very interesting - we are investigating single login.  Please
>
> > > communicate off user group.  Thanks.
> > >
> > >
> > >
> > > Sandra Hennigan
> > >
> > > OSD Remedy Administrator
> > >
> > > Office # 703-602-2525 x251
> > >
> > > CACI - Ever Vigilant(tm)
> > >
> > > Apparently, there is nothing that cannot happen today.  Mark Twain
> > >
> > >        -----Original Message-----
> > >        From: Action Request System discussion list(ARSList)
> > > [mailto:[EMAIL PROTECTED] On Behalf Of Heider, Stephen
> > >        Sent: Wednesday, October 18, 2006 4:50 PM
> > >        To: [email protected]
> > >        Subject: Client Application SSO
> > >
> > >
> > >        **
> > >        The development is just about complete.  You can test the
> > single
> > > sign on now with the link below.   The SSO application is presently
> > > located on my computer but logs into the regular Client application
> on
> > > remedyweb.   The SSO application only works for employees/agents who
> > do
> > > not have a Remedy license... So we will need to test with other
> > > employee numbers.
> > >
> > >
> > >        For our testing (only) you can pass in one parameter - User.
> > > This simulates that person being logged into Windows on your
> computer.
> > > Obviously when deployed to production no parameters will be
> > > processed by the SSO application - only the current Windows username
>
> > > will be
> > used.
> > >
> > >
> > >        Just change the employee or agent number to login as someone
> > > else.
> > >
> > >
> > > __20060125_______________________This posting was submitted with
> > > HTML in it___
> > >
> > > ____________________________________________________________________
> > > __ _________ UNSUBSCRIBE or access ARSlist Archives at
> > > http://www.wwrug.org
> > >
> >
> > ______________________________________________________________________
> > __
> > _______
> > UNSUBSCRIBE or access ARSlist Archives at http://www.wwrug.org
> >
> > ______________________________________________________________________
> > _________ UNSUBSCRIBE or access ARSlist Archives at
> > http://www.wwrug.org
> >
>
> ________________________________________________________________________
> _______
> UNSUBSCRIBE or access ARSlist Archives at http://www.wwrug.org
>
> 
_______________________________________________________________________________
> UNSUBSCRIBE or access ARSlist Archives at http://www.wwrug.org
>

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
ARSlist:"Where the Answers Are", sponsored by: www.wwrug.org
_______________________________________________________________________________


_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the Answers 
Are"

Reply via email to