22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

apply policy restrictions. Also, we only show one Proxy zone; again, there could<br />

be multiple lateral Proxy zones. In the example, we have two Data Access<br />

zones, so the host in Data Access zone 2 is isolated by a firewall from the hosts<br />

in Data Access zone 1. Another thing you should notice is that there is no direct<br />

path from the Intranet zone to the Internet. This example shows an architecture<br />

where all data flows must pass through a proxy server. Some organizations<br />

allow direct connections from Intranet workstations to Web servers in the Internet<br />

zone. If this was the case, the top-most firewall in the diagram would need a<br />

connection to one of the lower two firewall routers.<br />

4.2.5 Data access models<br />

Categorizing data flows requires us to identify the authentication requirements,<br />

the authentication entity types, and data classification and access models. We<br />

need to make these distinctions to be able to formulate our final policies for<br />

inter-zone communication. We previously discussed single-factor authentication<br />

and dual-factor authentication in 1.3.3, “Identification and authentication” on<br />

page 19. You should understand these two authentication types since they are<br />

referenced as we continue to build our security architecture model.<br />

Authentication entities<br />

Following are some additional terms needed to distinguish the authentication<br />

entity types.<br />

Client-to-server authentication<br />

We define this authentication type as a user (meaning an individual) being<br />

authenticated by the server or an application or service on the server. The<br />

authentication may consist of a challenge-response dialog method, or the client<br />

may provide credentials to the server in the form of a certificate or other verifiable<br />

token. A certificate could be an X.509 user certificate or a Notes certificate. An<br />

example of a “verifiable token” would be an LTPA token HTTP session cookie.<br />

The authentication process verifies the identity of the user. Note that this<br />

authentication may or may not provide a means for the user to verify the identity<br />

or trustworthiness of the server.<br />

Server-to-server authentication<br />

This type of authentication is the means by which one server can verify the<br />

identity of another server. It uses some form of certificate, such as X.509 or<br />

Notes. There is no password challenge-response method in this model. Note that<br />

this type of authentication may be uni-directional or bi-directional. In a<br />

bi-directional authentication, each server verifies the identity of the other.<br />

Chapter 4. Security components and layers 149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!