27.12.2013 Views

SAS® Integration Technologies: Administrator's Guide (LDAP Version)

SAS® Integration Technologies: Administrator's Guide (LDAP Version)

SAS® Integration Technologies: Administrator's Guide (LDAP Version)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Security<br />

For the <strong>LDAP</strong> server and SAS <strong>Integration</strong> <strong>Technologies</strong>, you can implement security using authentication and<br />

authorization mechanisms. Authentication is the process of verifying that a person is who they say they are.<br />

Authorization is the process of evaluating whether a given user has permission to perform a task (such as read or<br />

write) on a given resource.<br />

SAS <strong>Integration</strong> <strong>Technologies</strong> 9.1 supports Sun ONE Directory Server <strong>Version</strong> 5.1, Netscape Directory Server 4.12<br />

(also owned by Sun Microsystems, and previously sold under the name iPlanet Directory Server), and IBM<br />

Secureway Server <strong>Version</strong> 3.2.2.<br />

To implement security for SAS <strong>Integration</strong> <strong>Technologies</strong>, follow these steps:<br />

Security<br />

1. Define Person Entries for Authentication. To enable authentication against the <strong>LDAP</strong> server, you must set<br />

up your person entries on the <strong>LDAP</strong> server. For details, see Defining Person Entries<br />

2. Implement Server Security (optional). If you are using an IOM Bridge server, you can use a SAS Login<br />

definition to ensure that only authorized users obtain access to SAS data and processes. The login definition<br />

specifies which specific users or groups of users can access the server. For more information, see Defining a<br />

SAS Login.<br />

3. Define Access Controls for Authorization. You can update access controls on the <strong>LDAP</strong> server.<br />

Authorization in SAS <strong>Integration</strong> <strong>Technologies</strong> is accomplished using access control information (ACI) rules<br />

(for the Sun ONE Directory Server and Netscape Directory Server) and access control permissions (for the<br />

IBM Secureway Directory Server).<br />

For general information about access control, see Sun ONE and Netscape Directory Server Access Control<br />

Overview and Secureway Directory Server Access Control Overview. You can also refer to the Sun Product<br />

Documentation Web site. (The Sun ONE Directory Server is referred to as iPlanet Directory Server on this<br />

page.)<br />

For information about using the <strong>Integration</strong> <strong>Technologies</strong> Administrator to specify ACI rules for the iPlanet<br />

Directory Server, see Setting Access Permissions for an Object and Specifying Bind Rules. For information<br />

about using the <strong>Integration</strong> <strong>Technologies</strong> Administrator to set access control for the Secureway Directory<br />

Server, see Setting Access Control for Objects.<br />

Security 226

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!