Google Search Appliance Security Manual de usuario

Busca en linea o descarga Manual de usuario para Software Google Search Appliance Security. Google Search Appliance Security User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir

Indice de contenidos

Pagina 1 - Google Search Appliance

1 Google Search Appliance Security May 2014 © 2014 Google

Pagina 2 - Security

10 Although not as commonly used as Per-URL ACLs, it is a very flexible tool that can come in handy in unique situation. For example, if there is

Pagina 3 - Contents

11 SAML authorizations can be managed in batches, so that the search appliance can send a list of URLs for authorization per request, which can spe

Pagina 4

12 All authorization mechanisms require User ID except Head Requests. The following table lists authentication mechanisms that would result in a U

Pagina 5 - Information Gathering

13 Authentication Mechanism when user ID is not required (Head Requests) Cookie This is the most common situation; the search appliance forwards

Pagina 6

14 there are clear rules on what rules can or cannot be used together: ● Per-URL ACL ○ The ACLs are part of the index that can not be added or r

Pagina 7 - Content Acquisition

15 Chapter 2 Using Out of box features In this chapter, we will look at the details of some of the authentication and authorization mechanisms. We

Pagina 8

16 Kerberos The Kerberos protocol is used by default in Windows networks. The search appliance can be configured to enable Kerberos so that the aut

Pagina 9

17 ● Groups database(beta). Starting from release 7.2, the search appliance includes an internal database that stores ACLs. This is still a beta

Pagina 10

18 John Smith's first identity, jsmith, is from the company-wide Active Directory. Of course, there are AD Groups that jsmith is a member of.

Pagina 11

19 Connectors using Per-URL ACL Local Namespace The Connector Framework introduced the concept of "Local Namespace." Note that this is a

Pagina 12

2 Security Security is a key consideration when designing and implementing solutions that integrate data from different sources for enterprise sea

Pagina 13

20 Connector 4.0(beta) Working with Per-URL ACL The indexing of ACLs by Connector 4.0 differs from that of previous versions: ● ACLs are not sen

Pagina 14 - Summary

21 Authorization The “Authorization” in this section refers to late binding when using connector 4.0. In order to configure this, you need to perfo

Pagina 15 - Silent authentication

22 Here are some unique behaviors and deployment best practices: ● The connector will run for a long time—it could be days if the Active Directo

Pagina 16

23 Public document Secure document ● Public crawled document ● Feed document with no security ● Content from a secure content source that has been

Pagina 17

24 Authorization When we try to come up with a solution, you need to start with authorization. It’s obvious that we should use Per-URL ACL for Sha

Pagina 18

25 Flexible Authorization Rules In general, for most deployments, we can leave the first 3 entries of Flexible Authorization alone: PER_URL_ACL, CA

Pagina 19 - Connectors using Per-URL ACL

26 Chapter 3 Authentication for Developers Whenever possible in your deployments, you should try to use existing products, either supported by Goog

Pagina 20 - Connector 4.0

27 Key considerations If you want to achieve a silent authentication experience with your SSO system, consider the following items: ● A session co

Pagina 21

28 SAML The search appliance supports SAML 2.0, an XML based protocol for an external identity provider. There might be cases where you will need t

Pagina 22 - Perimeter security

29 binding from scratch, it could be more complex as it requires an extra service (Artifact Resolver URL). There are some open source frameworks li

Pagina 23 - Secure Search Example

3 Contents About this document Chapter 1 Designing Security in the GSA Overview Information Gathering Content Acquisition Single vs. Multiple iden

Pagina 24

30 Cookie cracking vs. SAML If you need to customize your authentication process, it’s important to differentiate between cookie cracking and SAML

Pagina 25

31 When the connector is intended to provide both authentication and group resolution, the implementation can ignore what the GSA passes to it thr

Pagina 26

32 Trusted Application(beta) A very common use case is for the GSA to be deployed behind a portal to provide a search service. The search UI is pro

Pagina 27

33 8. When the trusted user session expires (cookie expired based on Session timeout setting under Secure Search -> Access Control), the GSA wi

Pagina 28

34 Chapter 4 Authorization for Developers Overview An enterprise search engine must return relevant results to the user, but only those that the us

Pagina 29

35 The attribute “inheritance-type” makes it possible to model the different security mechanisms of various content systems. In an inheritance cha

Pagina 30 - Cookie cracking vs. SAML

36 “Free” ACL example <group> <acl url='http://dummyhost.corp.google.com/' inheritance-type="child-overrides"

Pagina 31

37 Connector Framework for Authorization Another option for modeling security is implementing a custom connector. As it’s explained in this paper a

Pagina 32 - Trusted Application

38 Web proxy The options described above are the most common platforms used to implement the security side of the interconnection with a content s

Pagina 33 - Connector 4.0 Authentication

39 Summary In this paper, we have reviewed the process of designing security for your enterprise search project with the Google Search Appliance.

Pagina 34 - Per-URL ACLs

4 Chapter 1 Designing Security in the GSA Overview Enterprise search projects integrate data from different sources to enable users to find inform

Pagina 35

40 Appendix A Sample Trusted Application client code in C# using System; using System.Collections.Generic; using System.Linq; using System.Net;

Pagina 36 - SAML authorization

41 request.ContentType = "application/x-www-form-urlencoded"; ServicePointManager.ServerCertificateValidationCallback = n

Pagina 37 - Connector 4.0 Authorization

42 iRetry++; goto Initiate; } else throw e; //if still fails, it might be s

Pagina 38 - Web proxy

5 accommodate different applications when acquiring contents. The process generally involves using a system or super user account with broad access

Pagina 39

6 Use the following table to model each content source. Include information about security in the Security Mechanisms field. System Info Name of t

Pagina 40 - Appendix A

7 Content Acquisition The acquisition generally comes in the following forms. Note that the authentication protocol used would have to be what’s s

Pagina 41

8 Selecting an authorization mechanism Serve time authentication and authorization are tightly connected. As mentioned previously, although serve t

Pagina 42

9 With early binding, authorization is fully managed by the search appliance itself. Early binding requires authorization rules to be known to GSA.

Comentarios a estos manuales

Sin comentarios