I have personally always modified the login.jsp to not prompt for the
authentication field, mainly because it confuses most users, so in my
solutions, they don't have the ability to do a 'post' to the login servlet
via my jsp pages and provide the proper 'key'....that is of course assuming
they know what the key is (which I guess wouldn't be that hard to get with
fiddler....but the community sso DOES provide a provision for you to limit
the SSO to specific IP's...so even if someone were to know the key, and try
to post from their own server...it would be rejected based on not being on
the white list...so I consider that 'relatively secure'

In regard to delegating sso to something else....you don't then have a
problem with IIS providing the user name to the plugin?  Is there anything
inherently insecure with using the getRemoteUser method for obtaining a
user name?  I remember some postings in the past where you discussed that
it's not the proper way of doing it...but I don't recall the exact verbiage.

I have personally found that the 'roll your own' is likely quite often MORE
expensive than a purchased solution...but the problem that you end up with
is the fact that a company is quite often willing to continue paying
'person x' to do that rolling because their pay check is already in the
budget, whereas even something as moderate as a few thousand dollars for a
OTS solution is outside the realm of being paid for.

Now...because I don't really know much about AtriumSSO, other than what I
have heard from you in various forms, can you tell me what its shortcomings
are vs other solutions?


On Thu, May 30, 2013 at 12:36 PM, John Baker <[email protected]
> wrote:

> Lj
>
> You raise good points. On postings to BMC DN I often mention the open
> source solution, and suggest that if one does not want to pay for a
> solution, then the open source solution plus some other external tool is a
> good step forward versus wrestling with a rebranded OpenSSO.
>
> One of the downsides with the open source solution is, the last time I
> looked, it uses a fixed string for authentication. This means users can go
> to the standard BMC login page and login as anyone if they know the fixed
> string. Maybe it has changed - has it?
>
> You mention IIS. Yes, this can be used in conjunction with the above but
> from a pure security point of view, we are now delegating SSO to IIS and we
> leave Tomcat open to attack by some other means. This means one has to take
> additional measures to secure Tomcat and only allow access from IIS.
>
> I'm pleased you recognised that I wasn't pushing our own product. I tried
> to stick to the facts. But the reason people buy it is because the cost of
> building a bespoke, less mature, often poorly supported solution is not too
> much different to purchasing an SSO Plugin license. And the product offers
> vastly more than just SSO.
>
> So as I always maintain: building a solution is entirely achievable and
> given the community SSO solution plus additional measures, it can be made
> to work. Sorry if I forgot to add this point :)
>
> Note, JSS is not the only vendor of a third party solution. But the others
> tend not to put it on a website and allow anyone to download.
>
>
> John
>
>
> _______________________________________________________________________________
> UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
> "Where the Answers Are, and have been for 20 years"
>

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to