IBM Datapower Gateway The Security Gateway <Pierre Richelle/> – {“title”: [“Technical”,”Specialist”,”Integration”]} © 2015 IBM Corporation Agenda ► IBM Datapower Gateway Introduction & Concept ► Capabilities ► Use Cases ► Wrap-up Silos of security & control are impeding business agility Business Channels B2B Users Security & Control Solutions PARTNERS B2B GATEWAY SOA PARTNERS DEVELOPERS SOA GATEWAY DEVELOPERS API GATEWAY Application Applications and Systems Middleware WEB MOBILE APIS ESB CONSUMERS CONSUMERS EMPLOYEES EMPLOYEES MOBILE GATEWAY WEB ACCESS PROXY Service z System CLOUD ALL CLOUD GATEWAY Reduce cost + improve security & control with a single gateway Business Channels B2B Users PARTNERS SOA PARTNERS DEVELOPERS WEB MOBILE APIS DEVELOPERS CONSUMERS CONSUMERS EMPLOYEES EMPLOYEES DataPower Gateway Security & Control Solutions Physical appliance Virtual appliance Application Applications and Systems Middleware ESB Service z System CLOUD ALL Reduce cost + improve security & control with a single gateway Business Channels B2B Users PARTNERS PARTNERS DEVELOPERS WEB MOBILE APIS SOA DEVELOPERS CONSUMERS CONSUMERS EMPLOYEES EMPLOYEES DataPower Gateway Security & Control Solutions Physical appliance Virtual appliance Application Applications Protect and Systems Control Middleware ESB Service Integrate z System CLOUD ALL IBM DataPower DNA DataPower’s True Network Device config configuration WebGUI CLI SOMA WebSphere DataPower Digitally Signed and Encrypted Firmware IBM Optimized Embedded Operating Environment XML Acceleration Crypto Acceleration Flash Memory Hardware Flexible deployment IBM DataPower Gateway IBM DataPower Gateway Appliance Virtual Edition DataPower Configuration DataPower Configuration Agenda ► IBM Datapower Gateway Introduction & Concept ► Capabilities ► Use Cases ► Wrap-up IBM DataPower Gateway capabilities ISAM Proxy Module Integration Module B2B Module AO Module TIBCO EMS Module HSM Protect Control Integrate Threats Encryption AAA Validation Service Level Management Transformation Routing XML/JSON Threats Protection Protect XML / JSON Threat Protection Cryptographic Operations Authentication Authorization Audit • Entity Expansion/Recursion Attacks • Content Validation (XML / JSON) • XML / JSON : Size, Width, Depth attacks • Public Key DoS • XML Flood • Resource Hijack • Dictionary Attack • Replay Attack • Message/Data Tampering • Message Snooping • XPath or SQL Injection • XML Encapsulation • XML Virus • …many others Cryptographic Operations XML-Encryption (http://www.w3.org/TR/xmlenc-core/) Protect Data confidentiality Encrypt data ◦ The whole message ◦ Specific fields (document crypto map) Decrypt data XML / JSON Threat Protection XML-DSig (http://www.w3.org/TR/xmldsig-core/) Cryptographic Operations Data Integrity Authentication Authorization Audit Non-repudiation of data Digital signature ◦ Define elements on which the signature is based (document crypto map) Signature verification Employ flexible AAA (Authenticate, Authorize, Audit) Policies Protect XML / JSON Threat Protection Cryptographic Operations Authentication Authorization Audit Service Level Management – Protect your system Control from over-utilization Frequency based on concurrency based on messages per time period (rate) Take action when exceeding a custom threshold: ◦ Notify (or log) Service Level Management ◦ Shape (or delay) ◦ Throttle (or reject) High Availability Control load distribution Control Combine SLM with Routing to make intelligent failover decisions Use alternate servers when a threshold is exceeded Service Level Management High Availability Advanced Load Balancing algorithms simplify your architecture First Available (Weighted) Round Robin (Weighted) Least Connections Hash active / active Load balancer Control active / standby Service Level Management V I P High Availability HSRP / VRRP active / active w/AO V I P Load balancer No dependencies between inbound “front-side” and outbound “back-side” Integrate disparate transport protocols with extreme ease Integrate Protocol & data mediation Supported Languages HTTP(s), WebSphere MQ, WebSphere JMS, Tibco EMS, SFTP, FTP(s), NFS, IMS, Database (DB2, Oracle, Sybase, SQL Server), AS1, AS2, AS3,… HTTP/S HTTP/S FTP/S FTP/S MQ MQ JMS JMS Transform the message format with ultimate flexibility Process XML and Non-XML formats in a single configuration Support synchronous, asynchronous, publish-subscribe and guaranteed-delivery message patterns Supported languages and transformation standards XSLT XSLT1.0 / XPath1.0 EXSLT DataPower extension elements and functions Integrate XQuery 1.0 JSONiq Protocol & data mediation JSON Schema Validation JavaScript (GatewayScript) Supported Languages Strict mode CommonJS ECMAScript 5 reference Binary transformation FFD (XSLT binary transformation) WebSphere Transformation eXtender Agenda ► IBM Datapower Gateway Introduction & Concept ► Capabilities ► Use Cases ► Wrap-up IBM DataPower Appliance Usage Protect, Control, Integrate Internet DMZ Trusted Domain Consumer DataPower Gateway Application or Service DataPower Gateway Middleware Consumer Trading partners 1 Mobile Gateway 2 API Gateway 3 Web Gateway 4 B2B Partner Gateway 5 SOA & API Gateway z System 6 Internal Security Enforcement 7 Web Services Governance & Management Routing Transformation Service Level Agreement Service Consumer Authorizations Exposed service invocation Authentication Service Security Gateway SOAP Service Provider Target service invocation REST Service Provider Logs (Trace & Audit) Services usage statistics & Monitoring Web Application Provider Agenda ► IBM Datapower Gateway Introduction & Concept ► Capabilities ► Use Cases ► Wrap-up IBM Datapower Gateway Values Protect Control Integrate Mobile, API, Web, SOA, B2B Using Threats protection, encryption, AAA, Validation Access to your Systems Using Service Level Management Your system of Records Using Protocol, Data transformation & routing Thank you! Questions ? Backup Slides Supported Standards & Protocols • • Data format & language • – JavaScript ‒ JSON ‒ JSON Schema ‒ JSONiq ‒ REST ‒ SOAP 1.1, 1.2 ‒ WSDL 1.1 ‒ XML 1.0 ‒ XML Schema 1.0 ‒ XPath 1.0 ‒ XPath 2.0 (XQuery only) ‒ XSLT 1.0 ‒ XQuery 1.0 Security policy enforcement • ‒ OAuth 2.0 ‒ SAML 1.0, 1.1 and 2.0, SAML Token Profile, SAML queries ‒ XACML 2.0 • ‒ Kerberos, SPNEGO ‒ RADIUS ‒ RSA SecurID OTP using RADIUS ‒ LDAP versions 2 and 3 ‒ Lightweight Third-Party Authentication (LTPA) ‒ Microsoft Active Directory ‒ FIPS 140-2 Level 3 (w/ optional HSM) • ‒ FIPS 140-2 Level 1 (w/ certified crypto module) ‒ SAF & IBM RACF® integration with z/OS ‒ Internet Content Adaptation Protocol ‒ W3C XML Encryption • ‒ W3C XML Signature ‒ S/MIME encryption and digital signature ‒ WS-Security 1.0, 1.1 ‒ WS-I Basic Security Profile 1.0, 1.1 ‒ WS-SecurityPolicy ‒ WS-SecureConversation 1.3 Transport & connectivity • – HTTP, HTTPS, WebSocket Proxy – FTP, FTPS, SFTP – WebSphere MQ – WebSphere MQ File Transfer Edition (MQFTE) – TIBCO EMS – WebSphere Java Message Service (JMS) – IBM IMS Connect, & IMS Callout – NFS – AS1, AS2, AS3, ebMS 2.0, CPPA 2.0, POP, SMTP (XB62) – DB2, Microsoft SQL Server, Oracle, Sybase, IMS Transport Layer Security ‒ SSL versions 2 and 3 ‒ TLS versions 1.0, 1.1, and 1.2 Public key infrastructure (PKI) ‒ RSA, 3DES, DES, AES, SHA, X.509, CRLs, OCSP ‒ PKCS#1, PKCS#5, PKCS#7, PKCS#8, PKCS#10, PKCS#12 ‒ XKMS for integration with Tivoli Security Policy Manager (TSPM) Management Simple Network Management Protocol (SNMP) ‒ SYSLOG ‒ IPv4, IPv6 ‒ Open File Formats ‒ Distributed Management Task Force (DMTF) Open Virtualization Format (OVF) ‒ Virtual Machine Disk Format (VMDK) ‒ Virtual Hard Disk (VHD) Web services – WS-I Basic Profile 1.0, 1.1 – WS-I Simple SOAP Basic Profile – WS-Policy Framework – WS-Policy 1.2, 1.5 – WS-Trust 1.3 – WS-Addressing – WS-Enumeration – WS-Eventing – WS-Notification – Web Services Distributed Management (WSDM) – WS-Management – WS-I Attachments Profile – SOAP Attachment Feature 1.2 – SOAP with Attachments (SwA) – Direct Internet Message Encapsulation (DIME) – Multipurpose Internet Mail Extensions (MIME) – XML-binary Optimized Packaging (XOP) – Message Transmission Optimization Mechanism (MTOM) – WS-MediationPolicy (IBM standard) – Universal Description, Discovery, and Integration (UDDI versions 2 and 3), UDDI version 3 subscription – WebSphere Service Registry and Repository (WSRR) DataPower Gateways … SECURE Mobile, API, Web, SOA, B2B and Cloud Workloads INTEGRATE Systems of Engagement with Systems of Record CONTROL & MANAGE Traffic and Service Level Agreements OPTIMIZE Data Delivery and User Experiences CONSOLIDATE & Simplify Infrastructure Footprint IBM DataPower Gateways provide a low startup cost, helping clients increase ROI and reduce TCO with specialized, consumable, dedicated gateway appliances that combine superior performance and hardened security in physical and virtual form factors 39 39 Features Secure Integrate Control Optimize Authentication, authorization, auditing Any-to-any message transformation Service level management SSL / TLS offload Security token translation Transport protocol bridging Quota enforcement, rate limiting Hardware accelerated crypto operations Message accounting JSON, XML offload Content-based routing JavaScript, JSONiq, XSLT, XQuery acceleration Threat protection Schema validation Message filtering & semantics validation Message digital signature Message encryption Message enrichment Database connectivity Mainframe connectivity B2B trading partner connectivity Failure re-routing Integration with management & visibility platforms Response caching Intelligent load distribution Simplify, offload & centralize critical functions Before DataPower Gateway Consumer After DataPower Gateway Secure Integrate Consumer Control Optimize Consumer Consumer Security Gateway Outside World DMZ HTML, JSON, XML, SOAP MME, DIME, MTOM XMLDSIG, XMLENC WS-Security Policy WS-Trust SAML OAuth 2.0 Security Gateway Incoming access control; Threat protection Domain Firewall Internet Protocol Firewall HTTP(s) SaaS Internal Network Security Gateway Outgoing access control; SAML injection etc Browsers Partner Apps Internal Consumer HTTP(s) Internal Security Packaged Apps Proprietary Apps Data ESB ACL Tivoli (TAM) MS Active Directory Any LDAP, e.g. Oracle CA SiteMinder PDP (XACML, SAML, other) Proxying and Enforcement • Terminate incoming connection Connection from client Web Service Request Consumer Basic Auth, OAuth 2.0, WS-Security UNT, etc • Terminate transport-level security (SSL/TLS offload) • Threat protection • Enforce Service Level Agreement policies • Inspect message content and filter (Schema validate) • Enforce security policies on message content (Encrypt/decrypt, Verify/sign digital signatures) • Authentication, Authorization, Auditing (AAA) • Call out to virus checker • Transform content & enrich message • Translate security token • Dynamically route based on content and load balance (Establish a new connection to pass results) • Cache data on-box or in centralized, shared grid ACL Virus Scanner New connection to target Web Service Request SAML, LTPA, Kerberos Provider Protection of data plus XML & JSON threat protection Use DataPower to help resolve PCI compliance issues Easily sign, verify, encrypt, decrypt any content Configurable XML Encryption and Digital Signatures – Message-level, Field-level, Headers Security standards: OAuth, WS-Security, WS-Policy, WSSecurityPolicy, SAML, XACML, WS-Trust, … XML Threat Protection • Entity Expansion/Recursion Attacks Message/Data Tampering • Public Key DoS Message Snooping • XML Flood XPath or SQL Injection • Resource Hijack XML Encapsulation • Dictionary Attack XML Virus • Replay Attack …many others JSON Threat Protection • Label - Value Pairs ‒ Label String Length (characters) ‒ Value String Length (characters) ‒ Number Length (characters) • Threat Protection ‒ Maximum nesting depth (levels) ‒ Maximum document size (bytes) DataPower security is policy driven Use WS-SecurityPolicy to define security requirements for your web services – DataPower natively consumes and enforces WS-SecurityPolicy statements • Integrity & Confidentiality, SupportingTokens, Message/Transport Protection Use XACML to define access and authorization policies for your web services – DataPower natively consumes and enforces XACML policies • Resource-based Authorization • PEP, PDP AAA : Authentication Authorization Auditing HTTP Headers WS-Security Tokens WS-SecureConversation WS-Trust Kerberos X.509/SSL SAML Assertion IP Address LTPA Token HTML Form OAuth Custom Extract Identity LDAP/Active Directory System/z NSS (RACF, SAF) IBM Security Access Manager Kerberos WS-Trust Netegrity SiteMinder RADIUS SAML LTPA Verify Signature Custom Authenticate Map Identity input LDAP/ActiveDirectory System/z NSS IBM Security Access Manager Netegrity SiteMinder SAML XACML OAuth Custom Authorize Extract Resource Add WS-Security Generate z/OS ICRX Token Generate Kerberos Generate Spnego Generate SAML Generate LTPA Map Tivoli Federated Identity Audit & Post-Process Map Resource URL XPath SOAP Operation HTTP Operation Custom External Access Control Server or Onboard Identity Management Store output IBM Datapower Gateway Values Cryptographic Operations Threats Protection Recursion Attacks Data confidentiality Content Validation XML encryption XML / JSON : Size, Width, Depth attacks Data Integrity Digital Signature XML Flood Dictionary Attack Replay Attack Signature verification XPath or SQL Injection XML Encapsulation XML Virus … Non-repudiation of Data Crypto Treatments with Hardware Component (appliance) Authenticate LDAP, Tivoli Access Management, Kerberos, WS-Trust, SAML, LTPA, OAuth2, … Authorize LDAP, XACML, SAML, Custom, … Audit & Post Process Logs, SNMP, WSManagement Add WS-Security Generate LTPA, SAML, … Routing & Transformation Service Level Management AAA Throttle Shape (delay) Reject or Intelligent fail over HTTP, WMQ, FTP, AS1/2/3, WJMS,… Notify Load balancing Protocol conversion Data transformation JSON, XML, Xquery, Javascript, XSLT Hardware acceleration (appliance) Routing