Thanks for your insight.
Currently the user registry, with 1,000,000 registered users is based on a Relational Database. They need to be moved to an LDAP server, managed by ISVA. The LDAP server won't be MS AD, but IBM SDS configured with high availability in a master-master configuration.
In fact, I never had in mind having 1,000,000 users in ISVA local database. But, I have the option of configuring the Policy Server to use a local or a remote LDAP server. I can also configure a federated user registry.
The issue was, which is the best practice. I am now convinced that the best option is in fact, creating a remote LDAP server, and there is no need to federate the user registry.
Here is the reasoning, and please correct me if I'm wrong:
If I federate a remote LDAP using the Full User model, all users will be copied to the ISVA LDAP registry, and the federated repository will be synchronized with the ISVA LDAP. So, I would have 2 LDAP servers the users replicated.
If I don't federate I will only get 1 copy of the LDAP server.
Having the ISVA configured with a local LDAP registry, would mean that all 1,000,000 be inside ISVA, which takes a lot of space, but with your insight, it is not even advisable or recommended, and I agree with you.
So, I think I found the answer to my question!
Again, please correct me in any way if you believe my arguments are not correct!
------------------------------
Joao Goncalves
Pyxis, Lda.
Sintra
+351 91 721 4994
------------------------------
Original Message:
Sent: Mon January 25, 2021 06:24 AM
From: Franz Wolfhagen
Subject: Remote LDAP best practices
Let me add a couple of non-technical considerations more focusing on the user population and their lifecycle requirements. I am primarily a Identity Management expert so I really do not want to dispute the technical pro and cons of using the different options.
But you should carefully consider the challenges of the lifecycle of a user - just because they need to be in your ldap it does not necessarily mean that you want to have them included in ISVA - and more problematic the other way around - i.e. there may be users that will need to be in ISVA but not in your corporate ldap.
The problem is specifically common in MS AD organizations because MS promotes the view of AD to be THE enterprise registry - but this is seldom the reality...
I always try to make clients aware of good old security practices when discussing the - i.e. uncoupling of lifecycle from infrastructure (that is the above thing) and separating backend and frontend security - e.g. it is probably a good solution to have your MS AD being integrated directly via ad groups for most enduser application - but what about highly privileged services - both accounts/application - it is important to adhere to good practices here to limit an intruder to traverse laterally which is very simple if you put all eggs into the MS AD basket...
------------------------------
Franz Wolfhagen
IAM Technical Architect for Europe - Certified Consulting IT Specialist
IBM Security Expert Labs
Original Message:
Sent: Mon January 25, 2021 05:41 AM
From: Joao Goncalves
Subject: Remote LDAP best practices
The number of users in LDAP server will be around 1,000,000.
I am planning to provide SCIM interface to allow self registration, changing personal data, password, and more. I believe this cannot be achieved if I use Basic Users. Or can changes to users through SCIM, is supported on basic users?
SecAuthority=Default will only be used by internal ISVA users and policy server (could be local or remote LDAP), but Application users, using a separate baseDN, will be in a remote LDAP server. If I use SecAuthority in ISVA local LDAP, creating Full users, I would have a replication of them in the local LDAP which I believe would be a bad choice. Creating a remote LDAP in ISVA, for full users, would likely be a better choice.
------------------------------
Joao Goncalves
Pyxis, Lda.
Sintra
+351 91 721 4994
Original Message:
Sent: Sun January 24, 2021 07:42 PM
From: Scott Exton
Subject: Remote LDAP best practices
Joao,
Generally I would recommend to use basic users instead of full users as this does simplify your deployment and dependency on user registries. You do lose certain capabilities (e.g. user based ACLs, user based password policy), but most customers generally don't use these capabilities anyway. Are you sure that you need the full user capability?
If you do need the full user capability the recommended approach really comes down to your environment and the size of your user population. If your user population is relatively small you could use the embedded LDAP server and federate against the user registry, but this is not usually recommended for a production environment. Out of the other two options, it is entirely up to you and your environment. Some customers like the clear separation of using a different user registry for 'secAuthority=Default', while others don't like this approach as it means that they have to manage yet another user registry.
I hope that this helps.
Scott A. ExtonSenior Software Engineer
Chief Programmer - IBM Security Verify AccessIBM Master Inventor
|
Phone: 61-7-5552-4008 E-mail: scotte@au1.ibm.com | 1 Corporate Court Bundall, QLD 4217 Australia |
Original Message:
Sent: 1/24/2021 10:43:00 AM
From: Joao Goncalves
Subject: Remote LDAP best practices
The policy server uses the SecAuthrorityInfo object class in LDAP, which will contain some critical Policy Server information.
In most cases, organizations already have and user registry configured based on some LDAP server.
Assuming we want to configure Full Users when configuring ISVA, we can choose to configure ISVA LDAP server as local or remote. So we are faced with 3 different options. Which one is the recommendation?
- Use a local LDAP for SecAuthorityInfo and federate with the remote organization user registry LDAP server
- Use a remote LDAP for SecAuthorityInfo (based for example on SDS) and federate with the remote organization user registry LDAP server
- Use the remote organization user registry for both SecAuthorityInfo and its users. In this case, we do not need to federate anything.
------------------------------
Joao Goncalves
Pyxis, Lda.
Sintra
+351 91 721 4994
------------------------------