SlideShare a Scribd company logo
1 of 34
Download to read offline
MQ Security
Introduction – Typical MQ
 In a Typical MQ setup there are:
● A Queue Manager
● A number of Queues and Topics
● Applications that connect to the QMGR via:
● Local Bindings
● Client connections
MQCONNX
Application (User4)
MQCONNX
Application (User2)
QMGR
Inter process
Communications
Q1..Qn
Introduction – Security Checks (Client)
 When a user Connects via Client:
CHLAUTH
BlockAddr
SSL/TLS
CHLAUTH
Mapping
Security Exit
MQCSP
UserID/Password
CHLAUTH
Block User
Authorisation
MQ v8 Only!
Authorisation
Introduction - Security Checks (Local)
 When a user Connects via Local:
MQCSP
UserID/Password
MQ v8 Only!
Authentication
Connection Authentication – Use case
 Authentication asks clients connecting to prove they are who they say they are
 Usually used in combination with authorisation to limit user's abilities
 A failure to authenticate results in an error being returned. RC=2035
 More information usually given to the MQ administrator in error logs
 Also Authorisation events written on Distributed platforms
QMGR
Connection Authentication – Use Case
Q1..Qn
Only Let Good
People Connect
(Bob = Good,
Tim = Bad)
Bob
Tim
I'm Bob
I'm Bob
PROVE IT
QMGR
Connection Authentication – Use Case
Q1..Qn
Bob
Tim
My Password is:
XXXX
Errrr....
Connection Authentication – Setting up
CHCK…
NONE
OPTIONAL
REQUIRED
REQDADMMQCONNX
Application (User4)
MQCONNX
Application (User2)
QMGR
Inter process
Communications
DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx)
CHCKLOCL(OPTIONAL)
CHCKCLNT(REQUIRED)
ALTER QMGR CONNAUTH(USE.PW)
REFRESH SECURITY TYPE(CONNAUTH)
MQRC_NOT_AUTHORIZED (2035)
MQRC_NONE (0)
User
Repository
Connection Authentication – User repositories
 User Repository?
 Currently two options:
–Machine OAM
–LDAP server
QMGR
O/S User
Repository
(z/OS + Dist)
LDAP Server (Dist only)
DEFINE AUTHINFO(USE.OS) AUTHTYPE(IDPWOS)
DEFINE AUTHINFO(USE.LDAP) AUTHTYPE(IDPWLDAP)
CONNAME(‘ldap1(389),ldap2(389)’)
LDAPUSER(‘CN=QMGR1’)
LDAPPWD(‘passw0rd’) SECCOMM(YES)
MQCONNX
User1 + pwd1
Application (User2)
Assist applications that are unchanged to participate
in authentication.
Consists of:
• Client channel
security exit to
insert uid/passwd
• Command line tool
to protect passwords
in a config file
Exit: mqccred
Connection Authentication – Client-side security exit
MQCONN
Application
QMgrQMA
Network
Communications
AllQueueManagers:
User=abc
OPW=%^&aervrgtsr
QueueManager:
Name=QMA
User=user1
OPW=H&^dbgfh
AllQueueManagers:
User=abc
password=newpw
QueueManager:
Name=QMA
User=user1
password=passw0rd
Tool: runmqccred
mqccred.ini
mqccred.ini
File
permissions
MQ Security – Authentication via PAM
 For Unix platforms
 Configure authentication to go via PAM modules
 Gives more flexibility in mechanisms for verification and account validation
• For example, use in conjunction with nsswitch to store Unix account information in Active
Directory
 Requires queue manager command level to be updated
• Similar to NEWFUNC on z/OS
 AUTHENMD(OS|PAM) as attribute on AUTHINFO(IDPWOS) New in
FP3
strmqm –e CMDLEVEL=802 QMgr
Authorisation
Authorisation – Use Case
 Authorisation limits what connected users and inbound messages can do
• Allowed to put messages, set context fields, subscribe to topics etc
 Authority rules (ACLs) are assigned to a specific user or group.
 If a user or group does not have authority to do what they are trying to do, they get
blocked
• Permissions apply to administrative actions and to MQI operations
 Some authorisation checks are made based on the UserId in a message
• The ability to set that field during MQPUT is itself controlled by a permission
 On Distributed platforms, authorisations are controlled through an MQ component, OAM
• On z/OS, queue manager calls external security managers such as RACF via a public interface
Controlling authorisations on Distributed platforms
 Use the setmqaut command to make adjustments
 Also have SET AUTHREC equivalent in MQSC
• Client-mode runmqsc makes it easy to set ACLs on remote queue managers
MQ Security - Authorisation using LDAP
 Fixpack 2 for Unix/Linux/i builds on LDAP authentication feature
 User and group information can now be centrally located in LDAP
• No need to define OS users/groups other than mqm
• And "mqm" group loses a lot of its automatic power
 Extended attributes on AUTHINFO/IDPWLDAP object show how to discover groups
• Very similar to the authentication attributes for discovery of identities
 Requires queue manager command level to be updated
• Similar to NEWFUNC on z/OS
 Authorities can be set for individual users
• Does not use "primary groups"
setmqaut –t qmgr –p "cn=User 1,ou=users,o=ibm,c=uk" +connect
setmqaut –t qmgr –g "cn=Group 1,ou=groups,o=ibm,c=uk" +connect
strmqm –e CMDLEVEL=801 QMgr
New
in FP2
Adding administrators
 Users do not need to be in the 'mqm' group to do most MQ administration
 Create ACLs for other groups instead
 Explorer Wizard makes it easy
• Shows commands so you can script
 FP2 includes real script
• amqauthg.sh
SSL/TLS
TLS – Introduction
 TLS is the follow-on to SSL
• These days, trying to just say TLS and not SSL!
 Uses public-key techniques to protect data travelling across a network
• Personal certificates, signing certificates, signing and encrypting data
 SSL protocols are deprecated after all the vulnerabilities found
 But many MQ attributes still include SSL in their name for historic reasons
TLS – Use Case
QMGR
Q1..Qn
Bob
Tim
I don't know Bob's
password so let's
find it out by
listening in!
0@;;7A//#ca
£66!j:sdw)
What the...?
CipherSpec currency
 2014-2015: Security vulnerabilities with cool names
• Heartbleed, POODLE, BEAST, FREAK, Bar Mitzvah, LogJam
• Secure protocols as well as crypto algorithms found to have vulnerabilities
 Before V8.0.0.3, 44 different CipherSpecs to choose from
• SSLv3, TLSv1.0, TLSv1.2
 With V8.0.0.3, subset of just 17 CipherSpecs
• TLSv1.0, TLSv1.2
• Predominantly Ecliptic Curve, AES and SHA-2 based
 It is possible, but not recommended, to re-enable the older CipherSpecs
• Environment variable or qm.ini
 Errors if you define or start a channel with a deprecated CipherSpec
• Changes also made to older in-service versions of MQ
More in
FP3
Channel Authentication
Channel Authentication – Use Case
 CHLAUTH rules are basically filters.
 The rules tell the queue manager to will allow or block a connection that matches the filter
 The filter can be either very specific or generic.
 Types of filters:
• SSL Distinguished Name (Issuer and Subject)
• Client User ID
• Remote Queue Manager name
• IP address/Hostname (hostname was added in V8)
Channel Authentication – Use Case
Tim
Bob
QMGR
Q1..Qn
Only Allow
connections from
129.888.2.543
IP: 129.888.2.543
IP: 126.66.6.66
Hello I am Bob and my
password is 1234
Hello Bob!
Channel Authentication – Use Case
Tim
Bob
QMGR
Q1..Qn
IP: 129.888.2.543
IP: 126.666.6.666
Hello I am Bob and my
password is 1234
DENIED!
But I did
everything right!
Channel Authentication – Side note
 Channel Authentication rules have an order of checking:
• ADDRESSMAP
• BLOCKADDR
• SSLPEERMAP
• QMGRMAP
• USERMAP
• BLOCKUSER
 In addition if a connection matches two CHLAUTH rules where one has a specific filter
and one has a generic filter then the CHLAUTH that is SPECIFIC will be used to work out
what to do.
• For example two ADDRESSMAP:
• 1, Block where address=*
• 2, Allow where address=129.12.9.9
• Connection from 129.12.9.9 will be allowed through.
Channel Authentication
 When you create a CHLAUTH rule you can specify what it should do when triggered.
 The options are:
• CHANNEL – Use the userid set in the channel MCAUSER for the future checks
• MAP - Use the userid set in this CHLAUTH MCAUSER for the future checks
• NOACCESS – Block the connection
 In addition you can raise the security of the channel by setting a higher CHCKCLNT
value on the channel
• If a user connects to CHANNEL.1 they are required to pass valid credentials
• If a user connects to CHANNEL.2 they don't have to pass valid credentials.
Channel Authentication – MQ Explorer
 To create a new Channel Authentication rule right click on the channel
authentication folder and select “New=>Channel Authentication Record...”
Channel Authentication – MQ Explorer
 Next follow the steps to set up your channel authentication rule.
 In the Channel profile screen you can put the name of a channel or a generic name
• For example: “INCOMING.CHANNEL” or “System.*”
 The next screens allow you to put the filter rules in for the CHLAUTH rule which will
cause the rule to trigger
• In ADDRESSMAP rule putting address=* will cause the rule to trigger for all addresses
Channel Authentication – Command Line
 CHLAUTH rules are added and removed using the SET command in RUNMQSC
– The difference between adding and removing is what ACTION(x) is set to
AMS
Advanced Message Security
 AMS is an end-to-end security model, messages stay signed/encrypted through the
whole lifetime of a message
• Certain types of data fall under standards compliance that requires encryption whilst 'at rest' as
well as in transit - e.g. credit card numbers (PCI), healthcare (HIPAA)
 AMS allows messages to be selectively encrypted so that even MQ administrators cannot
see the cleartext content without the right certificate
 You create policies for a queue that describe how messages should be protected when
applications put or get messages using that queue
 The policies describe whether messages should be signed or signed + encrypted.
• Signing and encryption uses digital certificates, such as those used by TLS
Recommended reading
 Lots of MQ security articles on developerworks
 MQ v8 information:
https://www.ibm.com/developerworks/community/blogs/messaging/entry/where_can_i_fin
d_mq_v8_information?lang=en
 MQ v8 Security Demo:
https://www.youtube.com/watch?v=0aKamUTS4rs&feature=youtu.be
Bob
Tim
Questions?

More Related Content

What's hot

What's new in IBM MQ Messaging
What's new in IBM MQ MessagingWhat's new in IBM MQ Messaging
What's new in IBM MQ MessagingMarkTaylorIBM
 
Hhm 3479 mq clustering and shared queues for high availability
Hhm 3479 mq clustering and shared queues for high availabilityHhm 3479 mq clustering and shared queues for high availability
Hhm 3479 mq clustering and shared queues for high availabilityPete Siddall
 
IBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersIBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersDavid Ware
 
Building a Highly available messaging hub using the IBM MQ Appliance
Building a Highly available messaging hub using the IBM MQ ApplianceBuilding a Highly available messaging hub using the IBM MQ Appliance
Building a Highly available messaging hub using the IBM MQ ApplianceAnthony Beardsmore
 
Where is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneWhere is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneMorag Hughson
 
IBM MQ Clustering (2017 version)
IBM MQ Clustering (2017 version)IBM MQ Clustering (2017 version)
IBM MQ Clustering (2017 version)MarkTaylorIBM
 
WebSphere MQ V7 API Enhancements
WebSphere MQ V7 API EnhancementsWebSphere MQ V7 API Enhancements
WebSphere MQ V7 API EnhancementsMorag Hughson
 
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...Matt Leming
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
 
IBM MQ: Using Publish/Subscribe in an MQ Network
IBM MQ: Using Publish/Subscribe in an MQ NetworkIBM MQ: Using Publish/Subscribe in an MQ Network
IBM MQ: Using Publish/Subscribe in an MQ NetworkDavid Ware
 
MQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMarkTaylorIBM
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveMorag Hughson
 
DataPower-MQ Integration Deep Dive
DataPower-MQ Integration Deep DiveDataPower-MQ Integration Deep Dive
DataPower-MQ Integration Deep DiveMorag Hughson
 
Secure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message SecuritySecure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message SecurityMorag Hughson
 
What's New in IBM MQ - Version 8
What's New in IBM MQ - Version 8What's New in IBM MQ - Version 8
What's New in IBM MQ - Version 8MarkTaylorIBM
 
What's New in IBM Messaging
What's New in IBM MessagingWhat's New in IBM Messaging
What's New in IBM MessagingMorag Hughson
 
IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0Matthew White
 
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Robert Parker
 
Websphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentalsWebsphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentalsBiju Nair
 

What's hot (20)

What's new in IBM MQ Messaging
What's new in IBM MQ MessagingWhat's new in IBM MQ Messaging
What's new in IBM MQ Messaging
 
Hhm 3479 mq clustering and shared queues for high availability
Hhm 3479 mq clustering and shared queues for high availabilityHhm 3479 mq clustering and shared queues for high availability
Hhm 3479 mq clustering and shared queues for high availability
 
IBM MQ V8 Security
IBM MQ V8 SecurityIBM MQ V8 Security
IBM MQ V8 Security
 
IBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersIBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
 
Building a Highly available messaging hub using the IBM MQ Appliance
Building a Highly available messaging hub using the IBM MQ ApplianceBuilding a Highly available messaging hub using the IBM MQ Appliance
Building a Highly available messaging hub using the IBM MQ Appliance
 
Where is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneWhere is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have Done
 
IBM MQ Clustering (2017 version)
IBM MQ Clustering (2017 version)IBM MQ Clustering (2017 version)
IBM MQ Clustering (2017 version)
 
WebSphere MQ V7 API Enhancements
WebSphere MQ V7 API EnhancementsWebSphere MQ V7 API Enhancements
WebSphere MQ V7 API Enhancements
 
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changes
 
IBM MQ: Using Publish/Subscribe in an MQ Network
IBM MQ: Using Publish/Subscribe in an MQ NetworkIBM MQ: Using Publish/Subscribe in an MQ Network
IBM MQ: Using Publish/Subscribe in an MQ Network
 
MQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 level
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep Dive
 
DataPower-MQ Integration Deep Dive
DataPower-MQ Integration Deep DiveDataPower-MQ Integration Deep Dive
DataPower-MQ Integration Deep Dive
 
Secure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message SecuritySecure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message Security
 
What's New in IBM MQ - Version 8
What's New in IBM MQ - Version 8What's New in IBM MQ - Version 8
What's New in IBM MQ - Version 8
 
What's New in IBM Messaging
What's New in IBM MessagingWhat's New in IBM Messaging
What's New in IBM Messaging
 
IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0
 
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
 
Websphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentalsWebsphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentals
 

Viewers also liked

Mq light, mq, and bluemix web sphere user group july 2015
Mq light, mq, and bluemix   web sphere user group july 2015Mq light, mq, and bluemix   web sphere user group july 2015
Mq light, mq, and bluemix web sphere user group july 2015matthew1001
 
UK Integration WebSphere User Group - MultiSpeed IT
UK Integration WebSphere User Group - MultiSpeed ITUK Integration WebSphere User Group - MultiSpeed IT
UK Integration WebSphere User Group - MultiSpeed ITAndyHumphreys
 
IBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplifiedIBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplifiedAnthony Beardsmore
 
WebSphere Connectivity & Integration: What's New in the Messaging Family?
WebSphere Connectivity & Integration: What's New in the Messaging Family?WebSphere Connectivity & Integration: What's New in the Messaging Family?
WebSphere Connectivity & Integration: What's New in the Messaging Family?IBM Sverige
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...Leif Davidsen
 
InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)
InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)
InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)Kevin Sutter
 
Big Data: InterConnect 2016 Session on Getting Started with Big Data Analytics
Big Data:  InterConnect 2016 Session on Getting Started with Big Data AnalyticsBig Data:  InterConnect 2016 Session on Getting Started with Big Data Analytics
Big Data: InterConnect 2016 Session on Getting Started with Big Data AnalyticsCynthia Saracco
 
IBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Sverige
 
IBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platformsIBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platformsMarkTaylorIBM
 
IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016Leif Davidsen
 
IBM InterConnect 2016: Security for DevOps in an Enterprise
IBM InterConnect 2016: Security for DevOps in an Enterprise IBM InterConnect 2016: Security for DevOps in an Enterprise
IBM InterConnect 2016: Security for DevOps in an Enterprise Sanjeev Sharma
 
Understanding mq deployment choices and use cases
Understanding mq deployment choices and use casesUnderstanding mq deployment choices and use cases
Understanding mq deployment choices and use casesLeif Davidsen
 
Iib v10 performance problem determination examples
Iib v10 performance problem determination examplesIib v10 performance problem determination examples
Iib v10 performance problem determination examplesMartinRoss_IBM
 
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016Leif Davidsen
 
DevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQDevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQStuart Feasey
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
IBM MQ Disaster Recovery
IBM MQ Disaster RecoveryIBM MQ Disaster Recovery
IBM MQ Disaster RecoveryMarkTaylorIBM
 

Viewers also liked (20)

Ibm mq appliance slideshare
Ibm mq appliance slideshareIbm mq appliance slideshare
Ibm mq appliance slideshare
 
Mq light, mq, and bluemix web sphere user group july 2015
Mq light, mq, and bluemix   web sphere user group july 2015Mq light, mq, and bluemix   web sphere user group july 2015
Mq light, mq, and bluemix web sphere user group july 2015
 
UK Integration WebSphere User Group - MultiSpeed IT
UK Integration WebSphere User Group - MultiSpeed ITUK Integration WebSphere User Group - MultiSpeed IT
UK Integration WebSphere User Group - MultiSpeed IT
 
Ame 4166 ibm mq appliance
Ame 4166 ibm mq applianceAme 4166 ibm mq appliance
Ame 4166 ibm mq appliance
 
IBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplifiedIBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplified
 
WebSphere Connectivity & Integration: What's New in the Messaging Family?
WebSphere Connectivity & Integration: What's New in the Messaging Family?WebSphere Connectivity & Integration: What's New in the Messaging Family?
WebSphere Connectivity & Integration: What's New in the Messaging Family?
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...
 
InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)
InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)
InterConnect 2016, OpenJPA and EclipseLink Usage Scenarios (PEJ-5303)
 
Big Data: InterConnect 2016 Session on Getting Started with Big Data Analytics
Big Data:  InterConnect 2016 Session on Getting Started with Big Data AnalyticsBig Data:  InterConnect 2016 Session on Getting Started with Big Data Analytics
Big Data: InterConnect 2016 Session on Getting Started with Big Data Analytics
 
IBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Connectivity and Integration
IBM Connectivity and Integration
 
IBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platformsIBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platforms
 
IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016
 
IBM InterConnect 2016: Security for DevOps in an Enterprise
IBM InterConnect 2016: Security for DevOps in an Enterprise IBM InterConnect 2016: Security for DevOps in an Enterprise
IBM InterConnect 2016: Security for DevOps in an Enterprise
 
Understanding mq deployment choices and use cases
Understanding mq deployment choices and use casesUnderstanding mq deployment choices and use cases
Understanding mq deployment choices and use cases
 
Iib v10 performance problem determination examples
Iib v10 performance problem determination examplesIib v10 performance problem determination examples
Iib v10 performance problem determination examples
 
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
Expanding your options with the IBM MQ Appliance - IBM InterConnect 2016
 
DevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQDevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQ
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
IBM MQ Disaster Recovery
IBM MQ Disaster RecoveryIBM MQ Disaster Recovery
IBM MQ Disaster Recovery
 
IBM MQ V9 Overview
IBM MQ V9 OverviewIBM MQ V9 Overview
IBM MQ V9 Overview
 

Similar to MQ Security Overview

CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...Robert Parker
 
Securing your IBM MQ environment.
Securing your IBM MQ environment.Securing your IBM MQ environment.
Securing your IBM MQ environment.Robert Parker
 
Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ SystemRobert Parker
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019Robert Parker
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data planeNetProtocol Xpert
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ systemRobert Parker
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM Systems UKI
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019Robert Parker
 
Securing MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slidesSecuring MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slidesDominik Obermaier
 
MQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapMQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapRobert Parker
 
IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017Robert Parker
 
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)PeterNiblett
 
Effectively Managing a Hybrid Messaging Environment
Effectively Managing a Hybrid Messaging EnvironmentEffectively Managing a Hybrid Messaging Environment
Effectively Managing a Hybrid Messaging EnvironmentAndrew Schofield
 
Message queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parametersMessage queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parametersHamdamboy (함담보이)
 
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...Open Mobile Alliance
 
IBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-DiveIBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-DiveMorag Hughson
 

Similar to MQ Security Overview (20)

CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...
 
Securing your IBM MQ environment.
Securing your IBM MQ environment.Securing your IBM MQ environment.
Securing your IBM MQ environment.
 
Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ System
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel Authentication
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
Securing MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slidesSecuring MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slides
 
MQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapMQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recap
 
IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017IBM MQ Security Overview MQTC 2017
IBM MQ Security Overview MQTC 2017
 
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
 
Effectively Managing a Hybrid Messaging Environment
Effectively Managing a Hybrid Messaging EnvironmentEffectively Managing a Hybrid Messaging Environment
Effectively Managing a Hybrid Messaging Environment
 
Message queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parametersMessage queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parameters
 
Lessson 3
Lessson 3Lessson 3
Lessson 3
 
Securing the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access networkSecuring the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access network
 
Web security
Web securityWeb security
Web security
 
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
 
IBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-DiveIBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-Dive
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

MQ Security Overview

  • 2. Introduction – Typical MQ  In a Typical MQ setup there are: ● A Queue Manager ● A number of Queues and Topics ● Applications that connect to the QMGR via: ● Local Bindings ● Client connections MQCONNX Application (User4) MQCONNX Application (User2) QMGR Inter process Communications Q1..Qn
  • 3. Introduction – Security Checks (Client)  When a user Connects via Client: CHLAUTH BlockAddr SSL/TLS CHLAUTH Mapping Security Exit MQCSP UserID/Password CHLAUTH Block User Authorisation MQ v8 Only!
  • 4. Authorisation Introduction - Security Checks (Local)  When a user Connects via Local: MQCSP UserID/Password MQ v8 Only!
  • 6. Connection Authentication – Use case  Authentication asks clients connecting to prove they are who they say they are  Usually used in combination with authorisation to limit user's abilities  A failure to authenticate results in an error being returned. RC=2035  More information usually given to the MQ administrator in error logs  Also Authorisation events written on Distributed platforms
  • 7. QMGR Connection Authentication – Use Case Q1..Qn Only Let Good People Connect (Bob = Good, Tim = Bad) Bob Tim I'm Bob I'm Bob PROVE IT
  • 8. QMGR Connection Authentication – Use Case Q1..Qn Bob Tim My Password is: XXXX Errrr....
  • 9. Connection Authentication – Setting up CHCK… NONE OPTIONAL REQUIRED REQDADMMQCONNX Application (User4) MQCONNX Application (User2) QMGR Inter process Communications DEFINE AUTHINFO(USE.PW) AUTHTYPE(xxxxxx) CHCKLOCL(OPTIONAL) CHCKCLNT(REQUIRED) ALTER QMGR CONNAUTH(USE.PW) REFRESH SECURITY TYPE(CONNAUTH) MQRC_NOT_AUTHORIZED (2035) MQRC_NONE (0) User Repository
  • 10. Connection Authentication – User repositories  User Repository?  Currently two options: –Machine OAM –LDAP server QMGR O/S User Repository (z/OS + Dist) LDAP Server (Dist only) DEFINE AUTHINFO(USE.OS) AUTHTYPE(IDPWOS) DEFINE AUTHINFO(USE.LDAP) AUTHTYPE(IDPWLDAP) CONNAME(‘ldap1(389),ldap2(389)’) LDAPUSER(‘CN=QMGR1’) LDAPPWD(‘passw0rd’) SECCOMM(YES) MQCONNX User1 + pwd1 Application (User2)
  • 11. Assist applications that are unchanged to participate in authentication. Consists of: • Client channel security exit to insert uid/passwd • Command line tool to protect passwords in a config file Exit: mqccred Connection Authentication – Client-side security exit MQCONN Application QMgrQMA Network Communications AllQueueManagers: User=abc OPW=%^&aervrgtsr QueueManager: Name=QMA User=user1 OPW=H&^dbgfh AllQueueManagers: User=abc password=newpw QueueManager: Name=QMA User=user1 password=passw0rd Tool: runmqccred mqccred.ini mqccred.ini File permissions
  • 12. MQ Security – Authentication via PAM  For Unix platforms  Configure authentication to go via PAM modules  Gives more flexibility in mechanisms for verification and account validation • For example, use in conjunction with nsswitch to store Unix account information in Active Directory  Requires queue manager command level to be updated • Similar to NEWFUNC on z/OS  AUTHENMD(OS|PAM) as attribute on AUTHINFO(IDPWOS) New in FP3 strmqm –e CMDLEVEL=802 QMgr
  • 14. Authorisation – Use Case  Authorisation limits what connected users and inbound messages can do • Allowed to put messages, set context fields, subscribe to topics etc  Authority rules (ACLs) are assigned to a specific user or group.  If a user or group does not have authority to do what they are trying to do, they get blocked • Permissions apply to administrative actions and to MQI operations  Some authorisation checks are made based on the UserId in a message • The ability to set that field during MQPUT is itself controlled by a permission  On Distributed platforms, authorisations are controlled through an MQ component, OAM • On z/OS, queue manager calls external security managers such as RACF via a public interface
  • 15. Controlling authorisations on Distributed platforms  Use the setmqaut command to make adjustments  Also have SET AUTHREC equivalent in MQSC • Client-mode runmqsc makes it easy to set ACLs on remote queue managers
  • 16. MQ Security - Authorisation using LDAP  Fixpack 2 for Unix/Linux/i builds on LDAP authentication feature  User and group information can now be centrally located in LDAP • No need to define OS users/groups other than mqm • And "mqm" group loses a lot of its automatic power  Extended attributes on AUTHINFO/IDPWLDAP object show how to discover groups • Very similar to the authentication attributes for discovery of identities  Requires queue manager command level to be updated • Similar to NEWFUNC on z/OS  Authorities can be set for individual users • Does not use "primary groups" setmqaut –t qmgr –p "cn=User 1,ou=users,o=ibm,c=uk" +connect setmqaut –t qmgr –g "cn=Group 1,ou=groups,o=ibm,c=uk" +connect strmqm –e CMDLEVEL=801 QMgr New in FP2
  • 17. Adding administrators  Users do not need to be in the 'mqm' group to do most MQ administration  Create ACLs for other groups instead  Explorer Wizard makes it easy • Shows commands so you can script  FP2 includes real script • amqauthg.sh
  • 19. TLS – Introduction  TLS is the follow-on to SSL • These days, trying to just say TLS and not SSL!  Uses public-key techniques to protect data travelling across a network • Personal certificates, signing certificates, signing and encrypting data  SSL protocols are deprecated after all the vulnerabilities found  But many MQ attributes still include SSL in their name for historic reasons
  • 20. TLS – Use Case QMGR Q1..Qn Bob Tim I don't know Bob's password so let's find it out by listening in! 0@;;7A//#ca £66!j:sdw) What the...?
  • 21. CipherSpec currency  2014-2015: Security vulnerabilities with cool names • Heartbleed, POODLE, BEAST, FREAK, Bar Mitzvah, LogJam • Secure protocols as well as crypto algorithms found to have vulnerabilities  Before V8.0.0.3, 44 different CipherSpecs to choose from • SSLv3, TLSv1.0, TLSv1.2  With V8.0.0.3, subset of just 17 CipherSpecs • TLSv1.0, TLSv1.2 • Predominantly Ecliptic Curve, AES and SHA-2 based  It is possible, but not recommended, to re-enable the older CipherSpecs • Environment variable or qm.ini  Errors if you define or start a channel with a deprecated CipherSpec • Changes also made to older in-service versions of MQ More in FP3
  • 23. Channel Authentication – Use Case  CHLAUTH rules are basically filters.  The rules tell the queue manager to will allow or block a connection that matches the filter  The filter can be either very specific or generic.  Types of filters: • SSL Distinguished Name (Issuer and Subject) • Client User ID • Remote Queue Manager name • IP address/Hostname (hostname was added in V8)
  • 24. Channel Authentication – Use Case Tim Bob QMGR Q1..Qn Only Allow connections from 129.888.2.543 IP: 129.888.2.543 IP: 126.66.6.66 Hello I am Bob and my password is 1234 Hello Bob!
  • 25. Channel Authentication – Use Case Tim Bob QMGR Q1..Qn IP: 129.888.2.543 IP: 126.666.6.666 Hello I am Bob and my password is 1234 DENIED! But I did everything right!
  • 26. Channel Authentication – Side note  Channel Authentication rules have an order of checking: • ADDRESSMAP • BLOCKADDR • SSLPEERMAP • QMGRMAP • USERMAP • BLOCKUSER  In addition if a connection matches two CHLAUTH rules where one has a specific filter and one has a generic filter then the CHLAUTH that is SPECIFIC will be used to work out what to do. • For example two ADDRESSMAP: • 1, Block where address=* • 2, Allow where address=129.12.9.9 • Connection from 129.12.9.9 will be allowed through.
  • 27. Channel Authentication  When you create a CHLAUTH rule you can specify what it should do when triggered.  The options are: • CHANNEL – Use the userid set in the channel MCAUSER for the future checks • MAP - Use the userid set in this CHLAUTH MCAUSER for the future checks • NOACCESS – Block the connection  In addition you can raise the security of the channel by setting a higher CHCKCLNT value on the channel • If a user connects to CHANNEL.1 they are required to pass valid credentials • If a user connects to CHANNEL.2 they don't have to pass valid credentials.
  • 28. Channel Authentication – MQ Explorer  To create a new Channel Authentication rule right click on the channel authentication folder and select “New=>Channel Authentication Record...”
  • 29. Channel Authentication – MQ Explorer  Next follow the steps to set up your channel authentication rule.  In the Channel profile screen you can put the name of a channel or a generic name • For example: “INCOMING.CHANNEL” or “System.*”  The next screens allow you to put the filter rules in for the CHLAUTH rule which will cause the rule to trigger • In ADDRESSMAP rule putting address=* will cause the rule to trigger for all addresses
  • 30. Channel Authentication – Command Line  CHLAUTH rules are added and removed using the SET command in RUNMQSC – The difference between adding and removing is what ACTION(x) is set to
  • 31. AMS
  • 32. Advanced Message Security  AMS is an end-to-end security model, messages stay signed/encrypted through the whole lifetime of a message • Certain types of data fall under standards compliance that requires encryption whilst 'at rest' as well as in transit - e.g. credit card numbers (PCI), healthcare (HIPAA)  AMS allows messages to be selectively encrypted so that even MQ administrators cannot see the cleartext content without the right certificate  You create policies for a queue that describe how messages should be protected when applications put or get messages using that queue  The policies describe whether messages should be signed or signed + encrypted. • Signing and encryption uses digital certificates, such as those used by TLS
  • 33. Recommended reading  Lots of MQ security articles on developerworks  MQ v8 information: https://www.ibm.com/developerworks/community/blogs/messaging/entry/where_can_i_fin d_mq_v8_information?lang=en  MQ v8 Security Demo: https://www.youtube.com/watch?v=0aKamUTS4rs&feature=youtu.be