11.07.2015 Views

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> <strong>6.1</strong> Administrator’s <strong>Guide</strong>• Tracking the “high water mark.” <strong>The</strong> high water mark is a record of the last goodpasscode used for the token. <strong>The</strong> <strong>Authentication</strong> <strong>Manager</strong> accepts passcodes thatoccur after the last good passcode. <strong>The</strong> token record can still store the high watermark (as in previous releases), but you now have the option of leaving this taskentirely to the Lock <strong>Manager</strong>. To configure your <strong>Authentication</strong> <strong>Manager</strong> not torecord the high water mark in the token record, click System > Edit SystemParameters and clear Store time of last login in token records.Detecting a Replay AttackIn a replay attack, an intruder attempts to gain access with a captured passcode bysetting the server system clock back, then reusing the passcode at the appropriatesystem time. <strong>The</strong> <strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> software warns you of any change insystem time that may indicate a replay attack.When the <strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> software detects that the server system clockhas been set back, it puts the following warning message in the log database:“*** System clock setback detected”. This message can be viewed through DatabaseAdministration application Activity or Exception reports. This message is also addedby default to the Event log and can be tracked and identified with a commercialnetwork management tool.Note: Because this message may indicate a serious security breach, <strong>RSA</strong> Securityrecommends that it not be removed from the list of message types sent to the Event log.Data Encryption<strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> <strong>6.1</strong> uses data encryption in several ways to ensure thesecurity of your system:• All messages and data exchanged between the Primary and Replica are encryptedduring transmission—the more sensitive data with the secure RC5 block cipherand the less sensitive data with a DES encryption key that changes every tenminutes.• Communications between any Agent and a Primary or Replica are encryptedusing a unique key (the “node secret”) known only to the specific Agent and to the<strong>Authentication</strong> <strong>Manager</strong>. This prevents an unauthorized machine from passing foran Agent, a Primary, or Replica. For more information, see “Node Secret File” onpage 228.• Communications between separate <strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> systems(realms) are encrypted using a unique “realm secret” known only to the two<strong>Authentication</strong> <strong>Manager</strong>s participating in the exchange. For more informationabout the realm secret, see “Creating and Modifying Realms” on page 85.• Sensitive token data, for example, a user’s PIN, is encrypted so that no one,including system administrators, can view it. Token serial numbers, which are notencrypted, enable administrators to specify tokens for administrative purposes.1: Overview 19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!