If you can find a way to bypass the security with this model please post a message. I can then patch it. Thanks.
Stephen -----Original Message----- From: Action Request System discussion list(ARSList) [mailto:[EMAIL PROTECTED] On Behalf Of Axton Sent: Thursday, October 26, 2006 3:09 PM To: arslist@ARSLIST.ORG Subject: Re: Client Application SSO (U) This is good. I didn't know whether you were relying on the web server/domain to authenticate the user or if you were using some vb command to read the username. Axton Grams On 10/26/06, Heider, Stephen <[EMAIL PROTECTED]> wrote: > Axton, > > Great questions. I tested each of these scenarios. I created a local > account with a username of an existing employee. After some testing I > then added this user to the local Admin group and also added the > employee's domain\username to the local Admin group. > > Local accounts do not have access to connect to our remedy web server, > only authenticated domain users. With each attempt the Windows login > prompt was presented. When I provided my network credentials the web > app knew that I was using my login name and not the local user. > > I then attempted to Run As IE as the local account user (logged into > Windows as me) and entered the URL in the address field. The web app > knew it was me. I then logged into Windows as the local account and > ran IE with Run As me. Same result. > > The web app checks the domain when logging in. All our employees are > in the same domain, so checking here is easy. For companies that have > multiple domains additional checks would need to be done. You could > also track a lot of details regarding the SSO web app session, such as > IP address, computer name, etc. If someone successfully spoofed a > login [to get into Remedy only] in the logging file/table tracks could > lead back to the culprit. > > The only thing I didn't try was to rename my computer to the name of > the domain. This may present the web app with domain\username, > however the Remedy web server still wouldn't allow access without a > valid domain account login. > > To spoof the web app I think that either the browser or .Net libraries > would need to be hacked. Or, if they somehow intercepted calls made > to HttpContext.Current.User.Identity.Name from the web app and > interjected a new value when sending data back to the web server it might work. > Can't say for sure, but if someone can hack into this they may also be > able to hack into LDAP authentication as well. > > > Stephen > > > > -----Original Message----- > From: Action Request System discussion list(ARSList) > [mailto:[EMAIL PROTECTED] On Behalf Of Axton > Sent: Thursday, October 26, 2006 11:52 AM > To: arslist@ARSLIST.ORG > Subject: Re: Client Application SSO (U) > > So what happens if I create a local account on my desktop that has the > same login name as some other domain account, then proceed to access > your SSO enabled web interfaces? > > Or even better, create the local account, then run iexplore.exe as > that user? > > Axton Grams > > On 10/26/06, Heider, Stephen <[EMAIL PROTECTED]> wrote: > > For inquiring minds... here is the SSO solution I implemented here. > > > > Background: > > Over the last couple months I have been researching SSO solutions > > for Remedy, initially only for Mid Tier (6.3, 7.0). There are > > several good ones that will do the job. The costs prevented us > > purchasing ($15K for a Mid Tier-only solution up to $100K+ for a > > solution for all > > > web and Windows applications including non-Remedy apps). > > > > A few weeks after the decision was made not to purchase I began > > reading more and more posts about implementing SSO. I gleaned some > > ideas from Listers and determined that I was going to find a solution. > > > It didn't take long to see that this would work. It may not be > > applicable in certain companies/organizations (ie. top secret > > government work), but I suppose it could be useful in about 90% of > Remedy installations. > > > > Goal: > > Provide seamless login (aka SSO) to our end-user Mid Tier > > application for all employees with Read/Read Restricted licenses. > > We wanted to make it easy for our employees to be able to submit and > > view their own > > > tickets. SSO makes it as simple as clicking a link on a web page. > > For those with Fixed/Floating licenses (technicians and technical > > management) it was deemed acceptable to continue having them enter > > their network password to login to the Remedy Windows application. > > > > > > Benefits: > > Employees only need to click a link on our intranet to login. It's > > quick - takes about 1/2 second extra to perform the automated login > > process. > > No changes needed on Mid Tier. > > No changes needed for any forms used by the Mid Tier application. > > > > > > Limitations: > > Users with SSO login will no longer be able to login to the Windows > > User Tool. This is not an issue here as only Fixed/Floating license > > users have the Windows User Tool installed. > > > > It is only approximately 99.9% as secure as using LDAP. It can be > > made more secure with additional programming but for our purposes it > > is more than adequate. > > > > > > Requirements: > > All employees must have a record in the User form. > > Cross-Ref Blank Password must be enabled. > > LDAP/AREA authentication must be enabled. > > LDAP/AREA authentication is not used for SSO - instead internal > > Remedy > > > passwords. > > The username of the currently logged in network user must be > > accessible to the web application. We run Windows XP on the clients > > and Windows Server 2003/IIS on the server (Anonymous access disabled > > and Integrated Windows Authentication enabled). > > > > > > How it Works: > > I added one character field to the User form to hold an encrypted > > password. > > For each Read/Read Restricted user I generate a separate GUID and > > store it in the regular Password field, and also an encrypted copy > > of the new password in the new SSO Password field. > > > > When the web application runs it captures the current network > > username, retrieves the encrypted password from the User form, > > decrypts the password, formats a URL containing the username and > > password, then finally redirects the web page to the new URL. User > > is > > > logged in. The password does not appear in the Browser Address > > field (or if it does, it's only displayed for 1/4 second). > > > > If the employee that clicked the link has a Fixed/Floating license > > then the web page is redirected to the standard web login page. > > > > > > Security: > > No-one with direct access to the User form, either in Remedy or at > > the > > > DB, can use the encrypted password. The encryption/decryption key > > is stored "somewhere" on the server. There are numerous methods and > > locations for storing and retrieving encrypted encryption/decryption > > keys. With the Windows and .Net cryptography APIs a key could > > actually be generated and not known by any human, even the Remedy > Administrator. > > > > The encrypted passwords in the User form can be scheduled to be > > automatically changed every night. So even if an employee was able > > to > > > discover their Remedy password it would only be good for one day. > > The > > > users don't know or need to know what their password is, as long as > > it > > > matches what Remedy has. > > > > > > Technologies Used: > > ASP.Net 2.0 > > VB.Net 2005 > > > > > > Related Stuff: > > Because the initial caching of Remedy forms (in this case the > > end-user > > application) takes a long time, I wrote a .Net app that pre-caches all > > forms used by the end-user and technician applications. The app is > > scheduled to run each morning on the Mid Tier server - it first runs > > IISReset (forces Mid Tier to clear its cache), then proceeds to load > > each form in a list of forms (list is stored in a text file that can > > be updated without recompiling the app). Now, all web applications > > load quickly as each form is freshly cached each morning. > > > > > > What's Next: > > SSO for the Windows User Tool. A couple of months ago I looked into > > creating an application that provides SSO functionality for WUT. I > > spent a little time developing a .Net solution. I had to switch > > gears > > > because this was not an immediate requirement. What I did discover > > after experimenting is that I am about 90% sure it can be > accomplished. > > I hope to pick this back up in a few months. I also need to brush > > up on programming global hooks. BTW, if anyone out there is an > > expert in > > > .Net hook programming please contact me off list. Thanks. > > > > > > Stephen > > > > > > ________________________________ > > > > From: Action Request System discussion list(ARSList) > > [mailto:[EMAIL PROTECTED] On Behalf Of McKenzie, James J C-E LCMC > > HQISEC/L3 > > Sent: Wednesday, October 18, 2006 5:09 PM > > To: arslist@ARSLIST.ORG > > Subject: Re: Client Application SSO (U) > > > > > > ** > > > > Sandra: > > > > Don't be so greedy. Let Stephen share with everybody.... > > > > James McKenzie > > L-3 GSI > > Innovative Solutions - Extraordinary Results > > > > ________________________________ > > > > From: Action Request System discussion list(ARSList) > > [mailto:[EMAIL PROTECTED] On Behalf Of Hennigan, Sandra H CTR > > OSD-CIO > > > > Sent: Wednesday, October 18, 2006 1:56 PM > > To: arslist@ARSLIST.ORG > > Subject: Re: Client Application SSO (U) > > > > > > ** > > UNCLASSIFIED > > > > Sounds very interesting - we are investigating single login. Please > > communicate off user group. Thanks. > > > > > > > > Sandra Hennigan > > > > OSD Remedy Administrator > > > > Office # 703-602-2525 x251 > > > > CACI - Ever Vigilant(tm) > > > > Apparently, there is nothing that cannot happen today. Mark Twain > > > > -----Original Message----- > > From: Action Request System discussion list(ARSList) > > [mailto:[EMAIL PROTECTED] On Behalf Of Heider, Stephen > > Sent: Wednesday, October 18, 2006 4:50 PM > > To: arslist@ARSLIST.ORG > > Subject: Client Application SSO > > > > > > ** > > The development is just about complete. You can test the > single > > sign on now with the link below. The SSO application is presently > > located on my computer but logs into the regular Client application on > > remedyweb. The SSO application only works for employees/agents who > do > > not have a Remedy license... So we will need to test with other > > employee numbers. > > > > > > For our testing (only) you can pass in one parameter - User. > > This simulates that person being logged into Windows on your computer. > > Obviously when deployed to production no parameters will be > > processed by the SSO application - only the current Windows username > > will be > used. > > > > > > Just change the employee or agent number to login as someone > > else. > > > > > > __20060125_______________________This posting was submitted with > > HTML in it___ > > > > ____________________________________________________________________ > > __ _________ UNSUBSCRIBE or access ARSlist Archives at > > http://www.wwrug.org > > > > ______________________________________________________________________ > __ > _______ > UNSUBSCRIBE or access ARSlist Archives at http://www.wwrug.org > > ______________________________________________________________________ > _________ UNSUBSCRIBE or access ARSlist Archives at > http://www.wwrug.org > ________________________________________________________________________ _______ UNSUBSCRIBE or access ARSlist Archives at http://www.wwrug.org _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at http://www.wwrug.org