securing your ems environment · 4. specify the ems-specific active directory user account outlined...

21
#EMSLIVE17 #EMSLIVE17 SECURING YOUR EMS ENVIRONMENT EMS Software, Customer Support Manager October 18 th , 2017 Securing EMS database & Securing EMS applications Lana Jaff

Upload: trinhhuong

Post on 23-Dec-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

EMSLIVE17EMSLIVE17

SECURING YOUR EMS ENVIRONMENT

EMS Software Customer Support Manager

October 18th 2017

Securing EMS database amp Securing EMS applications

Lana Jaff

EMSLIVE17EMSLIVE17

Securing EMS Database ndash Best Practices

EMSLIVE17

bull EMS employs an application-level security model All

EMS end-user accounts are provisioned within the EMS

application

bull Connectivity between the EMS database and all EMS

components can be managed in one of two ways

bull SQL Server Authentication ndash using ldquoEMSUserrdquo that is created

during the EMS database installation process

bull Windows Authentication mode

EMS and Database Authentication

EMSLIVE17

Fixed EMS SQL Server user account (EMSUser) is created during the EMS database

installation process

bull Pre-requisite for using SQL Server Authentication

bull This security model requires that the server authentication for the Microsoft SQL Server that your EMS database resides on

must be set to a mixed mode (SQL Server and Windows Authentication mode) Note If you select Windows Authentication during setup Setup creates the sa account for SQL Server Authentication but it is disabled

bull When selecting Mixed Mode Authentication during SQL server setup you must provide and then confirm a strong password for the built-in SQL Server system administrator account named sa

bull The sa account connects by using SQL Server Authentication

bull Any Windows or SQL Server account can be configured as a system administrator Because the sa account is well

known and often targeted by malicious users do not enable the sa account unless your application requires it

Never set a blank or weak password for the sa account

Connecting Through SQL Server Authentication

EMSLIVE17

bull If a user is a Windows domain user who has a login and password for Windows heshe must

still provide another (SQL Server) login and password to connect Keeping track of multiple

names and passwords is difficult for many users Having to provide SQL Server credentials

every time that one connects to the database can be annoying

bull SQL Server Authentication cannot use Kerberos security protocol Kerberos authentication

ensures that the client can verify the SQL Server is legitimate (which you cant do with SQL

Server authentication)

bull Windows offers additional password policies that are not available for SQL Server logins

bull The encrypted SQL Server Authentication login password must be passed over the network

at the time of the connection Some applications that connect automatically will store the

password at the client These are additional attack points

Disadvantages of SQL Server Authentication

EMSLIVE17

bull For example consider the scenario in which a trusted database

administrator leaves your organization on unfriendly terms

bull If you use Windows authentication mode revoking that userrsquos access

takes place automatically when you disable or remove the DBArsquos

Active Directory account

bull If you use mixed authentication mode you not only need to disable the

DBArsquos Windows account but you also need to comb through the local

user listings on each database server to ensure that no local accounts

exist in which the DBA may know the password Thatrsquos a lot of work

Disadvantages of SQL Server Authentication

EMSLIVE17

bull When a user connects through a Windows user

account SQL Server validates the account name and

password using the Windows principal token in the

operating system

bull This means that the user identity is confirmed by

Windows SQL Server does not ask for the password

and does not perform the identity validation

Connecting Through Windows Authentication

EMSLIVE17

bull Windows authentication is handled by the operating system and passes a token to SQL for authentication No

password is sent across the network

bull Windows authentication can use Kerberos security protocol if set up correctly while SQL authentication canrsquot

Kerberos security protocol provides password policy enforcement with regard to complexity validation for

strong passwords provides support for account lockout and supports password expiration

bull Windows authentication can handle more complex password policies and in SQL Authentication the DBA can

actually turn off the password policies

bull Using windows authentication allows for an easier separation of duties A security team can handle the Active

Directory users and passwords while all the SQL Server admin has to do is grant the existing ID necessary

permissions

bull Brute force attack SQL will accept ndashas per design- and try to authenticate -depending on the server-

thousands or more new connections request by second The SQL account will not be locked even for invalid

credentials ButhellipThe AD will lock the account after a number of invalid attempts when using Windows Auth

Advantages of Windows Authentication

EMSLIVE17

bull Specifying Windows authentication does not disable SQL Server

logins Use the ALTER LOGIN DISABLE Transact-SQL statement

to disable highly-privileged SQL Server logins

bull We recommend using Windows authentication wherever

possible Windows authentication uses a series of encrypted

messages to authenticate users in SQL Server

Other points to Note

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17EMSLIVE17

Securing EMS Database ndash Best Practices

EMSLIVE17

bull EMS employs an application-level security model All

EMS end-user accounts are provisioned within the EMS

application

bull Connectivity between the EMS database and all EMS

components can be managed in one of two ways

bull SQL Server Authentication ndash using ldquoEMSUserrdquo that is created

during the EMS database installation process

bull Windows Authentication mode

EMS and Database Authentication

EMSLIVE17

Fixed EMS SQL Server user account (EMSUser) is created during the EMS database

installation process

bull Pre-requisite for using SQL Server Authentication

bull This security model requires that the server authentication for the Microsoft SQL Server that your EMS database resides on

must be set to a mixed mode (SQL Server and Windows Authentication mode) Note If you select Windows Authentication during setup Setup creates the sa account for SQL Server Authentication but it is disabled

bull When selecting Mixed Mode Authentication during SQL server setup you must provide and then confirm a strong password for the built-in SQL Server system administrator account named sa

bull The sa account connects by using SQL Server Authentication

bull Any Windows or SQL Server account can be configured as a system administrator Because the sa account is well

known and often targeted by malicious users do not enable the sa account unless your application requires it

Never set a blank or weak password for the sa account

Connecting Through SQL Server Authentication

EMSLIVE17

bull If a user is a Windows domain user who has a login and password for Windows heshe must

still provide another (SQL Server) login and password to connect Keeping track of multiple

names and passwords is difficult for many users Having to provide SQL Server credentials

every time that one connects to the database can be annoying

bull SQL Server Authentication cannot use Kerberos security protocol Kerberos authentication

ensures that the client can verify the SQL Server is legitimate (which you cant do with SQL

Server authentication)

bull Windows offers additional password policies that are not available for SQL Server logins

bull The encrypted SQL Server Authentication login password must be passed over the network

at the time of the connection Some applications that connect automatically will store the

password at the client These are additional attack points

Disadvantages of SQL Server Authentication

EMSLIVE17

bull For example consider the scenario in which a trusted database

administrator leaves your organization on unfriendly terms

bull If you use Windows authentication mode revoking that userrsquos access

takes place automatically when you disable or remove the DBArsquos

Active Directory account

bull If you use mixed authentication mode you not only need to disable the

DBArsquos Windows account but you also need to comb through the local

user listings on each database server to ensure that no local accounts

exist in which the DBA may know the password Thatrsquos a lot of work

Disadvantages of SQL Server Authentication

EMSLIVE17

bull When a user connects through a Windows user

account SQL Server validates the account name and

password using the Windows principal token in the

operating system

bull This means that the user identity is confirmed by

Windows SQL Server does not ask for the password

and does not perform the identity validation

Connecting Through Windows Authentication

EMSLIVE17

bull Windows authentication is handled by the operating system and passes a token to SQL for authentication No

password is sent across the network

bull Windows authentication can use Kerberos security protocol if set up correctly while SQL authentication canrsquot

Kerberos security protocol provides password policy enforcement with regard to complexity validation for

strong passwords provides support for account lockout and supports password expiration

bull Windows authentication can handle more complex password policies and in SQL Authentication the DBA can

actually turn off the password policies

bull Using windows authentication allows for an easier separation of duties A security team can handle the Active

Directory users and passwords while all the SQL Server admin has to do is grant the existing ID necessary

permissions

bull Brute force attack SQL will accept ndashas per design- and try to authenticate -depending on the server-

thousands or more new connections request by second The SQL account will not be locked even for invalid

credentials ButhellipThe AD will lock the account after a number of invalid attempts when using Windows Auth

Advantages of Windows Authentication

EMSLIVE17

bull Specifying Windows authentication does not disable SQL Server

logins Use the ALTER LOGIN DISABLE Transact-SQL statement

to disable highly-privileged SQL Server logins

bull We recommend using Windows authentication wherever

possible Windows authentication uses a series of encrypted

messages to authenticate users in SQL Server

Other points to Note

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull EMS employs an application-level security model All

EMS end-user accounts are provisioned within the EMS

application

bull Connectivity between the EMS database and all EMS

components can be managed in one of two ways

bull SQL Server Authentication ndash using ldquoEMSUserrdquo that is created

during the EMS database installation process

bull Windows Authentication mode

EMS and Database Authentication

EMSLIVE17

Fixed EMS SQL Server user account (EMSUser) is created during the EMS database

installation process

bull Pre-requisite for using SQL Server Authentication

bull This security model requires that the server authentication for the Microsoft SQL Server that your EMS database resides on

must be set to a mixed mode (SQL Server and Windows Authentication mode) Note If you select Windows Authentication during setup Setup creates the sa account for SQL Server Authentication but it is disabled

bull When selecting Mixed Mode Authentication during SQL server setup you must provide and then confirm a strong password for the built-in SQL Server system administrator account named sa

bull The sa account connects by using SQL Server Authentication

bull Any Windows or SQL Server account can be configured as a system administrator Because the sa account is well

known and often targeted by malicious users do not enable the sa account unless your application requires it

Never set a blank or weak password for the sa account

Connecting Through SQL Server Authentication

EMSLIVE17

bull If a user is a Windows domain user who has a login and password for Windows heshe must

still provide another (SQL Server) login and password to connect Keeping track of multiple

names and passwords is difficult for many users Having to provide SQL Server credentials

every time that one connects to the database can be annoying

bull SQL Server Authentication cannot use Kerberos security protocol Kerberos authentication

ensures that the client can verify the SQL Server is legitimate (which you cant do with SQL

Server authentication)

bull Windows offers additional password policies that are not available for SQL Server logins

bull The encrypted SQL Server Authentication login password must be passed over the network

at the time of the connection Some applications that connect automatically will store the

password at the client These are additional attack points

Disadvantages of SQL Server Authentication

EMSLIVE17

bull For example consider the scenario in which a trusted database

administrator leaves your organization on unfriendly terms

bull If you use Windows authentication mode revoking that userrsquos access

takes place automatically when you disable or remove the DBArsquos

Active Directory account

bull If you use mixed authentication mode you not only need to disable the

DBArsquos Windows account but you also need to comb through the local

user listings on each database server to ensure that no local accounts

exist in which the DBA may know the password Thatrsquos a lot of work

Disadvantages of SQL Server Authentication

EMSLIVE17

bull When a user connects through a Windows user

account SQL Server validates the account name and

password using the Windows principal token in the

operating system

bull This means that the user identity is confirmed by

Windows SQL Server does not ask for the password

and does not perform the identity validation

Connecting Through Windows Authentication

EMSLIVE17

bull Windows authentication is handled by the operating system and passes a token to SQL for authentication No

password is sent across the network

bull Windows authentication can use Kerberos security protocol if set up correctly while SQL authentication canrsquot

Kerberos security protocol provides password policy enforcement with regard to complexity validation for

strong passwords provides support for account lockout and supports password expiration

bull Windows authentication can handle more complex password policies and in SQL Authentication the DBA can

actually turn off the password policies

bull Using windows authentication allows for an easier separation of duties A security team can handle the Active

Directory users and passwords while all the SQL Server admin has to do is grant the existing ID necessary

permissions

bull Brute force attack SQL will accept ndashas per design- and try to authenticate -depending on the server-

thousands or more new connections request by second The SQL account will not be locked even for invalid

credentials ButhellipThe AD will lock the account after a number of invalid attempts when using Windows Auth

Advantages of Windows Authentication

EMSLIVE17

bull Specifying Windows authentication does not disable SQL Server

logins Use the ALTER LOGIN DISABLE Transact-SQL statement

to disable highly-privileged SQL Server logins

bull We recommend using Windows authentication wherever

possible Windows authentication uses a series of encrypted

messages to authenticate users in SQL Server

Other points to Note

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

Fixed EMS SQL Server user account (EMSUser) is created during the EMS database

installation process

bull Pre-requisite for using SQL Server Authentication

bull This security model requires that the server authentication for the Microsoft SQL Server that your EMS database resides on

must be set to a mixed mode (SQL Server and Windows Authentication mode) Note If you select Windows Authentication during setup Setup creates the sa account for SQL Server Authentication but it is disabled

bull When selecting Mixed Mode Authentication during SQL server setup you must provide and then confirm a strong password for the built-in SQL Server system administrator account named sa

bull The sa account connects by using SQL Server Authentication

bull Any Windows or SQL Server account can be configured as a system administrator Because the sa account is well

known and often targeted by malicious users do not enable the sa account unless your application requires it

Never set a blank or weak password for the sa account

Connecting Through SQL Server Authentication

EMSLIVE17

bull If a user is a Windows domain user who has a login and password for Windows heshe must

still provide another (SQL Server) login and password to connect Keeping track of multiple

names and passwords is difficult for many users Having to provide SQL Server credentials

every time that one connects to the database can be annoying

bull SQL Server Authentication cannot use Kerberos security protocol Kerberos authentication

ensures that the client can verify the SQL Server is legitimate (which you cant do with SQL

Server authentication)

bull Windows offers additional password policies that are not available for SQL Server logins

bull The encrypted SQL Server Authentication login password must be passed over the network

at the time of the connection Some applications that connect automatically will store the

password at the client These are additional attack points

Disadvantages of SQL Server Authentication

EMSLIVE17

bull For example consider the scenario in which a trusted database

administrator leaves your organization on unfriendly terms

bull If you use Windows authentication mode revoking that userrsquos access

takes place automatically when you disable or remove the DBArsquos

Active Directory account

bull If you use mixed authentication mode you not only need to disable the

DBArsquos Windows account but you also need to comb through the local

user listings on each database server to ensure that no local accounts

exist in which the DBA may know the password Thatrsquos a lot of work

Disadvantages of SQL Server Authentication

EMSLIVE17

bull When a user connects through a Windows user

account SQL Server validates the account name and

password using the Windows principal token in the

operating system

bull This means that the user identity is confirmed by

Windows SQL Server does not ask for the password

and does not perform the identity validation

Connecting Through Windows Authentication

EMSLIVE17

bull Windows authentication is handled by the operating system and passes a token to SQL for authentication No

password is sent across the network

bull Windows authentication can use Kerberos security protocol if set up correctly while SQL authentication canrsquot

Kerberos security protocol provides password policy enforcement with regard to complexity validation for

strong passwords provides support for account lockout and supports password expiration

bull Windows authentication can handle more complex password policies and in SQL Authentication the DBA can

actually turn off the password policies

bull Using windows authentication allows for an easier separation of duties A security team can handle the Active

Directory users and passwords while all the SQL Server admin has to do is grant the existing ID necessary

permissions

bull Brute force attack SQL will accept ndashas per design- and try to authenticate -depending on the server-

thousands or more new connections request by second The SQL account will not be locked even for invalid

credentials ButhellipThe AD will lock the account after a number of invalid attempts when using Windows Auth

Advantages of Windows Authentication

EMSLIVE17

bull Specifying Windows authentication does not disable SQL Server

logins Use the ALTER LOGIN DISABLE Transact-SQL statement

to disable highly-privileged SQL Server logins

bull We recommend using Windows authentication wherever

possible Windows authentication uses a series of encrypted

messages to authenticate users in SQL Server

Other points to Note

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull If a user is a Windows domain user who has a login and password for Windows heshe must

still provide another (SQL Server) login and password to connect Keeping track of multiple

names and passwords is difficult for many users Having to provide SQL Server credentials

every time that one connects to the database can be annoying

bull SQL Server Authentication cannot use Kerberos security protocol Kerberos authentication

ensures that the client can verify the SQL Server is legitimate (which you cant do with SQL

Server authentication)

bull Windows offers additional password policies that are not available for SQL Server logins

bull The encrypted SQL Server Authentication login password must be passed over the network

at the time of the connection Some applications that connect automatically will store the

password at the client These are additional attack points

Disadvantages of SQL Server Authentication

EMSLIVE17

bull For example consider the scenario in which a trusted database

administrator leaves your organization on unfriendly terms

bull If you use Windows authentication mode revoking that userrsquos access

takes place automatically when you disable or remove the DBArsquos

Active Directory account

bull If you use mixed authentication mode you not only need to disable the

DBArsquos Windows account but you also need to comb through the local

user listings on each database server to ensure that no local accounts

exist in which the DBA may know the password Thatrsquos a lot of work

Disadvantages of SQL Server Authentication

EMSLIVE17

bull When a user connects through a Windows user

account SQL Server validates the account name and

password using the Windows principal token in the

operating system

bull This means that the user identity is confirmed by

Windows SQL Server does not ask for the password

and does not perform the identity validation

Connecting Through Windows Authentication

EMSLIVE17

bull Windows authentication is handled by the operating system and passes a token to SQL for authentication No

password is sent across the network

bull Windows authentication can use Kerberos security protocol if set up correctly while SQL authentication canrsquot

Kerberos security protocol provides password policy enforcement with regard to complexity validation for

strong passwords provides support for account lockout and supports password expiration

bull Windows authentication can handle more complex password policies and in SQL Authentication the DBA can

actually turn off the password policies

bull Using windows authentication allows for an easier separation of duties A security team can handle the Active

Directory users and passwords while all the SQL Server admin has to do is grant the existing ID necessary

permissions

bull Brute force attack SQL will accept ndashas per design- and try to authenticate -depending on the server-

thousands or more new connections request by second The SQL account will not be locked even for invalid

credentials ButhellipThe AD will lock the account after a number of invalid attempts when using Windows Auth

Advantages of Windows Authentication

EMSLIVE17

bull Specifying Windows authentication does not disable SQL Server

logins Use the ALTER LOGIN DISABLE Transact-SQL statement

to disable highly-privileged SQL Server logins

bull We recommend using Windows authentication wherever

possible Windows authentication uses a series of encrypted

messages to authenticate users in SQL Server

Other points to Note

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull For example consider the scenario in which a trusted database

administrator leaves your organization on unfriendly terms

bull If you use Windows authentication mode revoking that userrsquos access

takes place automatically when you disable or remove the DBArsquos

Active Directory account

bull If you use mixed authentication mode you not only need to disable the

DBArsquos Windows account but you also need to comb through the local

user listings on each database server to ensure that no local accounts

exist in which the DBA may know the password Thatrsquos a lot of work

Disadvantages of SQL Server Authentication

EMSLIVE17

bull When a user connects through a Windows user

account SQL Server validates the account name and

password using the Windows principal token in the

operating system

bull This means that the user identity is confirmed by

Windows SQL Server does not ask for the password

and does not perform the identity validation

Connecting Through Windows Authentication

EMSLIVE17

bull Windows authentication is handled by the operating system and passes a token to SQL for authentication No

password is sent across the network

bull Windows authentication can use Kerberos security protocol if set up correctly while SQL authentication canrsquot

Kerberos security protocol provides password policy enforcement with regard to complexity validation for

strong passwords provides support for account lockout and supports password expiration

bull Windows authentication can handle more complex password policies and in SQL Authentication the DBA can

actually turn off the password policies

bull Using windows authentication allows for an easier separation of duties A security team can handle the Active

Directory users and passwords while all the SQL Server admin has to do is grant the existing ID necessary

permissions

bull Brute force attack SQL will accept ndashas per design- and try to authenticate -depending on the server-

thousands or more new connections request by second The SQL account will not be locked even for invalid

credentials ButhellipThe AD will lock the account after a number of invalid attempts when using Windows Auth

Advantages of Windows Authentication

EMSLIVE17

bull Specifying Windows authentication does not disable SQL Server

logins Use the ALTER LOGIN DISABLE Transact-SQL statement

to disable highly-privileged SQL Server logins

bull We recommend using Windows authentication wherever

possible Windows authentication uses a series of encrypted

messages to authenticate users in SQL Server

Other points to Note

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull When a user connects through a Windows user

account SQL Server validates the account name and

password using the Windows principal token in the

operating system

bull This means that the user identity is confirmed by

Windows SQL Server does not ask for the password

and does not perform the identity validation

Connecting Through Windows Authentication

EMSLIVE17

bull Windows authentication is handled by the operating system and passes a token to SQL for authentication No

password is sent across the network

bull Windows authentication can use Kerberos security protocol if set up correctly while SQL authentication canrsquot

Kerberos security protocol provides password policy enforcement with regard to complexity validation for

strong passwords provides support for account lockout and supports password expiration

bull Windows authentication can handle more complex password policies and in SQL Authentication the DBA can

actually turn off the password policies

bull Using windows authentication allows for an easier separation of duties A security team can handle the Active

Directory users and passwords while all the SQL Server admin has to do is grant the existing ID necessary

permissions

bull Brute force attack SQL will accept ndashas per design- and try to authenticate -depending on the server-

thousands or more new connections request by second The SQL account will not be locked even for invalid

credentials ButhellipThe AD will lock the account after a number of invalid attempts when using Windows Auth

Advantages of Windows Authentication

EMSLIVE17

bull Specifying Windows authentication does not disable SQL Server

logins Use the ALTER LOGIN DISABLE Transact-SQL statement

to disable highly-privileged SQL Server logins

bull We recommend using Windows authentication wherever

possible Windows authentication uses a series of encrypted

messages to authenticate users in SQL Server

Other points to Note

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull Windows authentication is handled by the operating system and passes a token to SQL for authentication No

password is sent across the network

bull Windows authentication can use Kerberos security protocol if set up correctly while SQL authentication canrsquot

Kerberos security protocol provides password policy enforcement with regard to complexity validation for

strong passwords provides support for account lockout and supports password expiration

bull Windows authentication can handle more complex password policies and in SQL Authentication the DBA can

actually turn off the password policies

bull Using windows authentication allows for an easier separation of duties A security team can handle the Active

Directory users and passwords while all the SQL Server admin has to do is grant the existing ID necessary

permissions

bull Brute force attack SQL will accept ndashas per design- and try to authenticate -depending on the server-

thousands or more new connections request by second The SQL account will not be locked even for invalid

credentials ButhellipThe AD will lock the account after a number of invalid attempts when using Windows Auth

Advantages of Windows Authentication

EMSLIVE17

bull Specifying Windows authentication does not disable SQL Server

logins Use the ALTER LOGIN DISABLE Transact-SQL statement

to disable highly-privileged SQL Server logins

bull We recommend using Windows authentication wherever

possible Windows authentication uses a series of encrypted

messages to authenticate users in SQL Server

Other points to Note

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull Specifying Windows authentication does not disable SQL Server

logins Use the ALTER LOGIN DISABLE Transact-SQL statement

to disable highly-privileged SQL Server logins

bull We recommend using Windows authentication wherever

possible Windows authentication uses a series of encrypted

messages to authenticate users in SQL Server

Other points to Note

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17EMSLIVE17

How to implement Windows Authentication

in your EMS Environment

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

Pre-requisites

bull An EMS-specific Active Directory security group that contains all of your EMS desktop client users is required This group will be granted explicit permissions

to your EMS and EMS_Master databases

bull An EMS-specific Active Directory user account that is a member of the Active Directory security group outlined above is required This account will be used

to configure this database authentication option for EMS web based products

Steps to configure

1 Using Microsoft SQL Server Management Studio add a login for the EMS Active Directory security group outlined above

2 Under the User Mapping area map the login to your ldquoEMSrdquo database

3 Add the db_datareader and db_datawriter roles

4 Using Microsoft SQL Server Management Studio execute the following statement against your EMS database

sp_addrolemember EMS_Role securitygrouprsquo

Note Replace securitygroup with the name of your EMS Active Directory security group

5 Repeat steps 2 - 4 for ldquoEMS_Masterrdquo database

MS SQL Configuration for Windows Authentication

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

1 Go to EMS Desktop client userrsquos PC and open the Registry Editor

2 Locate and expand HKEY_CURRENT_USER

3 Locate and expand Software

4 Locate and expand EMS Software

5 Highlight your EMSx product folder

6 Right-click and add a DWORD (32-bit) Value

7 Rename the New Value 1 entry to UseAuthentication

8 Modify the Value data field to 1

EMS Desktop Client Configuration for Windows Authentication

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

1 Access Internet Information Services (IIS) Manager on your Web Server

2 Create a new Application Pool that will be used by your EMS web based application(s) installed on this web server

3 Change the Application Pool Identity to run under a Custom account

4 Specify the EMS-specific Active Directory user account outlined in the Pre-Installation Requirements section

5 Change the Application Pool in your EMS web based application to the pool defined above

6 Open the webconfig file for the EMS web based product and disable the EMSUser as shown below

ltadd name=deaConnection useEmsUser=False useDetailedLogging=true defaultCommandTimeout=20gt

7 Launch your EMS web based product to verify connectivity

EMS Web Applications Configuration for Windows Authentication

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17EMSLIVE17

Securing EMS Applications ndash Best Practice

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data is sent between your browser and the website that you are connected to

bull HTTPS uses SSL or TLS protocol to establish encrypted links between a web server and a browser in an online communication

bull The usage of SSL TLS technology ensures that all data transmitted between the web server and browser remains encrypted

bull You can setup SSL for EMS web applications the same way as you do for any other website in IIS No configuration changes needed within EMS applications

Using HTTPS

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull Obtain a certificate for your server

bull Create a HTTPS Binding on the site level

bull The default settings for a new binding are set to HTTP on port 80

Select https in the Type drop-down list Select the self-signed

certificate you created in the previous section from the SSL

Certificate drop-down list and then click OK

bull Browse to the EMS application site using HTTPS

How to setup an HTTPS site in IIS

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull The Integrated Authentication module provides single-sign-on capability using one of the following authentication methods

bull Windows Authentication

bull LDAP Authentication

bull Portal Authentication (eg SAML)

Note You need to obtain a separate license to use this module

Integrated Authentication

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull Integrated Windows Authentication (IWA) is a built-in Microsoft Internet Information Services (IIS)

authentication protocol that can be used to automatically authenticate and sign-in a web user It can be used

for all EMS applications that use the web user accounts

bull Integrated Windows Authentication is best used on intranets where all clients accessing EMS are within a

single domain

bull When a domain user logged onto a networked PC hits the EMS site their Active Directory credentials

(DomainUser ID) are compared against corresponding DomainUser ID information recorded in the Network

ID field of your EMS Web User records If a match exists the Web User will be automatically logged-into the

EMS site

bull In IIS enable Windows Authentication on the application level and disable Anonymous

bull Populate the NetworkID field for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform Services)

Windows Authentication

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull Lightweight Directory Access Protocol (LDAP) is an application protocol for querying directory information The LDAP

Authentication method provides single-sign-on capability using your organizationrsquos LDAP environment and can be used in

both intranet and internet deployments of EMS site

bull When a user logs-into an EMS Site with their User ID and Password their credentials are authenticated against LDAP and

compared against corresponding user information recorded in the Network ID andor External Reference fields of your

EMS Web User records If a match exists the Web User will be logged-into EMS inheriting any Web Process Template

rights that their LDAP Group has been assigned to

bull Log-into Web Application with a Web User that belongs to a Web Security Template containing the Web Administrator role

(Configuration gt Web gt Web Security Templates)

bull Populate your LDAP server information in http[ServerName] EMSWebAppLDAPConfigurationaspx in this page on the

web app page and test the configuration using an account in your LDAP server

bull Populate the External referenceNetwork ID fields for your web users

bull Supported EMS Applications EMS Web application Desktop client Mobile Application (Platform services) Kiosk Campus

Planning Interface

LDAP Authentication

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17

bull The Portal Authentication method provides single sign-on capability using your organizationrsquos portal

bull When a user logged into some EMS applications a predefined user-specific variable (eg email address employeestudent ID network ID etc) captured by your portalsign-on page is compared against corresponding information recorded in the Network ID andor External Reference fields of your EMS Web User records If a match exists the Web User will be automatically logged-into EMS

bull The Field Used to Authenticate Web User web app Parameter (within System Administration gt Settings gt Parameters (Everyday user applications tab) is used by the Web App to determine which value should be used for authentication

bull Several built-in authentication methods to pass-in credentials are available including

bull Server Variable (Header Variable)

bull Session

bull Form

bull Cookie

bull Query String

bull Federated (SAML)

bull Direct users to the default EMS Web app page (http[ServerName]EMSWebAppDefaultaspx )

bull Supported EMS Applications EMS Web application Mobile Application (Platform services)

Portal Authentication

EMSLIVE17EMSLIVE17

Thank You

EMSLIVE17EMSLIVE17

Thank You