Banner overview Authentication Party Apps Authorization Party Apps to Banner & 3rd to Banner & 3rd Section 1 Higher Education Enterprise Resource Planning (ERP) system. Original vendor – SunGard Higher Ed › Now supported by Ellucian › Ellucian serves 2,400+ higher education institutions globally Banner INB – Internet Native Banner The functional user Interface for accounting, human resources, and other administrative staff Banner SSB – Self Service Banner The web-based interface to Banner functionality for students & Finance reporting functionality Includes multiple distinct “systems” or modules: › Finance › Human Resources › Financial Aid › Advancement List above is not exhaustive! Distributed architecture generally includes: › Application Server › Database Server › Job Scheduling Server › Web Server (Luminis) This is not meant to be a comprehensive list – only the basics Application Server Oracle Database Many available for varied purposes Common 3rd Party Apps: › SciQuest E-Procurement › Touchnet U.Commerce Authentication The process of identifying a user – usually by a user name and password Authorization The function of specifying or granting access rights to resources in information systems Section 2 When a user connects to Banner, that user also connects to the Oracle database All Banner INB accounts require individual Oracle database accounts. Banner SSB accounts do not work the same way. Banner INB authentication & authorization use Oracle database info & processes › Security is configured by granting privileges to a User Profile in Oracle Oracle uses a User Name & Password to identify a user › Stored encrypted in the SYS.USER$ Table Authentication requires one Oracle privilege: CREATE_SESSION Step 1 Step 2 • Enter user name/password • Oracle checks credentials • Oracle checks privileges/security rights: Step 3 • Default Role(s) • Directly granted privileges • PUBLIC account privileges (granted to everyone) Method 1: Direct Login VS Method 2: Web-Facing Portal › Oracle Database › Directory Service › Login to App Server › Login to Luminis Password Profiles directly via web browser Password Policies web server first, then connect to App Server Banner Direct Login Page Oracle Credentials Uses the internet browser and Oracle Fusion Middleware Forms Service a Java JRE Plug-in to display the Banner Forms in an Oracle Java Applet Example URL: http://APPPRD.ExampleCollege.edu:## #0/forms/frmservlet?config=prod Active Directory Credentials or LDAP Luminis Web Server Login Banner Direct Login Page Oracle Credentials Luminis Web Server can use a directory service for user authentication › Login requires directory service credentials › Possible to configure as Single Sign-On or as another layer of network security. Direct login via Oracle credentials may still be required! All paths to authentication should have proper controls if both methods are used! Method 1 Banner INB Method 2 DBA_PROFILES PROFILE DEFAULT DEFAULT DEFAULT DEFAULT DEFAULT DEFAULT DEFAULT RESOURCE_NAME FAILED_LOGIN_ATTEMPTS PASSWORD_LIFE_TIME PASSWORD_REUSE_TIME PASSWORD_REUSE_MAX PASSWORD_VERIFY_FUNCTION PASSWORD_LOCK_TIME PASSWORD_GRACE_TIME RESOURCE LIMIT PASSWORD UNLIMITED PASSWORD UNLIMITED PASSWORD UNLIMITED PASSWORD UNLIMITED PASSWORD NULL PASSWORD UNLIMITED PASSWORD UNLIMITED PW Verify Function › “IF” Function for password complexity V$PARAMETERS includes other security settings such as case sensitivity. UAC can override other group policy settings › Codes to consider: Value Description 512 544 66048 66080 Enabled Account Enabled, Password Not Required Enabled, Password Doesn’t Expire Enabled, Password Doesn’t Expire & Not Required Authentication for each 3rd party application can vary. Must inquire about how authentication & security are configured. Also, consider network security such as Virtual Private Networks (VPN) SciQuest can be synchronized with Active Directory. › Uses AD credentials for authentication Touchnet generally uses built-in security and authentication. › Unique login URL for each user › Unique Touchnet user IDs and passwords › Touchnet has its own password controls Look before you leap! › Identifying relevant control points is key. Determine the layers of network security All Banner INB accounts can access the Oracle database directly – increases risk! Section 3 Your system administrator has determined that your current activity is providing a level of enjoyment beyond that which is allowed on company time. Your enjoyment will now be disabled. You may continue with this activity, but you may not enjoy it. See your system administrator for more information. Oracle database security structures serve as “building blocks” Oracle security configuration can either strengthen or undermine security Banner uses “Role-based” security Banner “Roles” = Oracle Roles › Containers for Oracle system privileges › Can be password-protected A Banner “Class” is used to group Roles & database objects together in one container Banner CLASS Role (Oracle Privs.) OBJECTS However, Banner objects can also be directly granted outside of a class; increases risk of security being undermined. BANNER CLASS Role Access Level Banner Object/Form BAN_DEFAULT_M Read/Write FOMPROF BAN_DEFAULT_M Read/Write FAAINVE BAN_DEFAULT_Q Read Only GSASECR Banner Classes are containers for Role/Object assignments Users are assigned to Classes to streamline security management Banner Class User User User User Oracle roles are used in two different capacities in Banner (1) Banner Classes When associated with “objects” in a Banner Class For Navigational Security “BAN_DEFAULT” (2) Default Roles Controls “default” privileges upon login Oracle security construct “USR_DEFAULT” Banner roles for Classes & Navigational Security: › BAN_DEFAULT_M* Full read/write access › BAN_DEFAULT_Q* Read-only access *These roles are created upon Banner installation with an encrypted password that no human knows! Banner-created Default Roles › USR_DEFAULT_M Full read/write access › USR_DEFAULT_Q Read-only access › USR_DEFAULT_CONNECT Ability to connect to the database/Banner only; provides no navigational access *Note – none of these roles are password protected; more on that soon! USR/BAN_DEFAULT_M USR/BAN_DEFAULT_Q USR_DEFAULT_CONNECT CREATE SESSION CREATE SESSION CREATE SESSION SELECT ANY TABLE SELECT ANY TABLE EXECUTE ANY PROCEDURE SELECT ANY SEQUENCE UPDATE ANY TABLE SELECT ANY DICTIONARY DELETE ANY TABLE INSERT ANY TABLE LOCK ANY TABLE These privileges provide full “write” access. Connect Only “Read only” Access Step 1 • Navigate to a Banner form • Banner Checks for an Oracle role Step 2 • E.g. BAN_DEFAULT_M Step 3 • Banner Checks for the “object” • Banner Decrypts Oracle Role Password Step 4 • This “activates” the role’s privileges only for that object • Access to object granted based on Role’s privileges Step 5 • E.g. BAN_DEFAULT_M = full read/write access Banner security manuals recommend that all users be assigned one Default Role › USR_DEFAULT_CONNECT Assigning powerful roles as “Default” can create security risks Roles that are Password Protected in Oracle (11g) must be invoked at an SQL prompt, even if assigned as DEFAULT › SET ROLE Statement with the password No user can manually invoke the BAN_DEFAULT roles because no one knows the system-generated passwords. BAN_DEFAULT_M as a Default Role? Low Risk! BAN_DEFAULT roles are passwordprotected w/ system-generated, encrypted passwords. USR_DEFAULT_M as a user’s default role? Risky! Grants the user full write access to everything in Banner/Oracle that is not protected within another “schema” › A Schema is “owned” by a database user & has the same name as that user. BANSECR = default Banner security administration account Only BANSECR can access or execute the GSASECR (Security Maintenance) form › “Distributed Security Administrators” can also access GSASECR Depends upon the application! Example: › Touchnet & SciQuest use internal security structure Obtain security data for Banner/Oracle › Key Tables Include: Table Name Description DBA_USERS Listing of Database Accounts/Status DBA_ROLE_PRIVS All database accounts/default roles GUVUACC “Object Access by User View” = All Banner Accounts, Classes, Objects, & Roles Obtain 3rd Party App security data › May require coordination with the vendor Determine who has access to BANSECR Evaluate accounts assigned USR_DEFAULT_M or _Q as a Default Role Evaluate users with access to make changes on other security forms like FOMPROF, Finance Security Maintenance Form User Authorization Documentation › Consider how the entity documents user access: By Role/Object or by Class? › Consider whether specific “access levels” (i.e. classes) are requested and that requests are not for access “like” an existing user. Periodic Review/Reauthorizatioin › Consider auditing how management monitors Banner access: Review of classes granted to users Review of terminated user access Review of objects granted directly to users Banner & Oracle are “tightly coupled” – creates security enhancements & risks. Banner security can be bypassed through poor Oracle database security Third-party applications may require extra audit effort to understand; don’t forget about SOC/SSAE 16 Audit Reports! Questions? Jeff White – Jeff.White@cot.tn.gov Timothy Hollar – Tim.Hollar@cot.tn.gov