SlideShare a Scribd company logo
1 of 4
Download to read offline
QLIKVIEW MOBILE SECURITY
QlikView Technical Brief
qlikview.com
Published: March, 2011
QlikView Mobile Security | Page 2
QlikView Mobile Security
Mobile devices are convenient, versatile and, for many employees, they are indispensable.
High adoption rates and reliance on mobile devices makes safe mobile data analysis a
critical concern. However, mobile devices can easily be lost and that’s why QlikView mobile
clients have robust security means to secure sensitive business data.
QlikView’s mobile clients leverage the entire security infrastructure of a typical QlikView
enterprise deployment. This Technical Brief takes a look at the security features of the
QlikView iPad touch-enabled Ajax client and uses an example implementation to explain
some of the technical details.
This Technical Brief is a companion document to the QlikView Security Overview
Technology White Paper, which deals in detail how a typical QlikView deployment
addresses the question of security.
This brief will discuss the QlikView iPad client’s security at these levels:
•	 Device
•	 Transmission
•	 Authentication and Authorization
It also includes an example implementation using Double Authentication
Device Security
One of the main security considerations for mobile BI solutions is not to store any business
data on the device. QlikView mobile clients do not store data on the device. As such, there
is no local copy to lose if the mobile device is stolen and the data only resides on QlikView
servers within a secure enterprise environment, with access permitted only over the network
for the correctly authenticated and authorized users.
Transmission Security
Transmission security refers to protection of data from unauthorized interception. The
QlikView iPad client supports VPN connections where the communication between the
client and the QlikView server, including the username and password, are encrypted.
The QlikView iPad client also supports HTTPS/SSL communication protocols. In the
implementation example described below, HTTPS and Secure Sockets Layer (SSL) is used
with server certificates installed on the IIS web server. In this specific case, tunneling is also
enabled to encrypt the communication between IIS web server and QlikView server.
QlikView Mobile Security | Page 3
Authentication and Authorization
Authentication refers to the act of establishing or confirming the user as true or authentic.
Authorization refers to the act of specifying access rights to control access of information
to users. The QlikView iPad client leverages the existing authentication and authorization
methods provided by QlikView Server (as described in the QlikView Security Overview
Technology White Paper). There is nothing different from the iPad experience from a
security perspective than a desktop browser.
For Authentication, the QlikView Server requires that users be authenticated by some
external process, and that credentials granted by that process be communicated to
the QlikView Server. QlikView supports authentication via Active Directory, third-party
single sign-on (SSO) solutions (such as CA Site Minder or IBM WebSeal), as well as via
digital certificates.
Once the user is authenticated, there are two authorization modes available: NTFS & DMS.
NTFS mode relies on security features built in with Windows on the server side to secure
access to QlikView documents through the iPad client. In NTFS mode, administrators control
access to QlikView documents from the operating system itself rather than from QlikView.
By contrast, DMS mode allows administrators to control access to QlikView documents
centrally, within QlikView. (A detailed description of the differences between NTFS and
DMS modes is contained within the QlikView Security Overview Technology White Paper).
Example Implementation — Double Authentication
The implementation example below demonstrates a real use case where security was
applied to a QlikView deployment covering iPad devices. The security requirement is to
achieve double authentication (i.e. using both user certificates and basic authentication
against Microsoft Active Directory) with HTTPS/SSL connection. This is just one way to
achieve a secure iPad implementation. There are other methods that could be used based
on other security requirements. Figure 1 illustrates the Double Authentication example
described below.
First Authentication
iPad supports digital certificates, giving business users secure access to corporate services.
A digital certificate is composed of a public and private key pair, along with other information
about the user and the certificate authority that issued the certificate. Digital certificates are
a form of identification that enables authentication, data integrity, and encryption.
In this implementation example, digital certificates are used to securely authenticate users
to corporate services. A Microsoft IIS web server in the ‘De-Militarized Zone’ (DMZ) domain
is setup to provide one-to-one certificate mapping. When a user connects to the IIS site,
IIS will request a user certificate which is already created on the iPad. The user will be
prompted for a certificate and its public key is then submitted to the IIS server. The IIS
server will compare this public key with the available public keys of which the administrator
has granted access. Based on the result, IIS will either allow or disallow the user access to
the QlikView Server.
QlikView Mobile Security | Page 4
If the user is allowed, IIS will encrypt the contents using a user public key and sends it back
to the user. Now that the user has both keys, they will decrypt the contents sent by IIS using
their own private key and will be able to start communication with the IIS server.
Second Authentication
The next step in this example is the second authentication. QlikView can be configured to
provide a second layer of authentication to make sure that the user requesting access to the
QlikView Server can be authenticated against the corporate security system (such as Active
Directory or another LDAP, for example). As is normal, the user gets challenged for their
credentials to be authenticated against the security system.
Authorization
The final step in the process is to give the authenticated user access to the authorized
documents. This process is handled by the QlikView Server and is described in detail in the
QlikView Security Overview Technology White Paper.
Figure 1: Double Authentication in a Mobile Environment
QvSWEB
SERVER
4. User is prompted
for User Name and
password
3. IIS server compares the
public key with available
public keys granted by
admin, authenticates the
user and grants access
1. User is prompted for certificate
5. User gets authenticated
against AD
7. Authorized
QV docs are
available to
the user
2. User selects the
certificate and Public
Key is submitted
6. Authenticated
user name is
passed to QvS
Encrypted communication
via tunneling
Source: QlikTech
FIRST AUTHENTICATION SECOND AUTHENTICATION
© 2010 QlikTech International AB. All rights reserved. QlikTech, QlikView, Qlik, Q, Simplifying Analysis for Everyone, Power of Simplicity, New Rules, The Uncontrollable Smile and
other QlikTech products and services as well as their respective logos are trademarks or registered trademarks of QlikTech International AB. All other company names, products
and services used herein are trademarks or registered trademarks of their respective owners. The information published herein is subject to change without notice. This publication
is for informational purposes only, without representation or warranty of any kind, and QlikTech shall not be liable for errors or omissions with respect to this publication. The only
warranties for QlikTech products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should
be construed as constituting any additional warranty.

More Related Content

More from Data IQ Argentina

Revista Information Technology Julio Agosto 2020
Revista Information Technology Julio Agosto 2020Revista Information Technology Julio Agosto 2020
Revista Information Technology Julio Agosto 2020
Data IQ Argentina
 
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
Data IQ Argentina
 

More from Data IQ Argentina (20)

Revista Information Technology Julio Agosto 2020
Revista Information Technology Julio Agosto 2020Revista Information Technology Julio Agosto 2020
Revista Information Technology Julio Agosto 2020
 
Prensario TI Latin America Septiembre 2020
Prensario  TI Latin America Septiembre 2020 Prensario  TI Latin America Septiembre 2020
Prensario TI Latin America Septiembre 2020
 
Data IQ ocupa el puesto 26 en el ranking Mejores Empleadores de Apertura
Data IQ ocupa el puesto 26 en el ranking Mejores Empleadores de AperturaData IQ ocupa el puesto 26 en el ranking Mejores Empleadores de Apertura
Data IQ ocupa el puesto 26 en el ranking Mejores Empleadores de Apertura
 
Neurona Buenos Aires - Modelos BI en la Tesorería General de la Provincia
Neurona Buenos Aires - Modelos BI en la Tesorería General de la ProvinciaNeurona Buenos Aires - Modelos BI en la Tesorería General de la Provincia
Neurona Buenos Aires - Modelos BI en la Tesorería General de la Provincia
 
Revista apertura enero 2020
Revista apertura enero 2020Revista apertura enero 2020
Revista apertura enero 2020
 
Prensario TI Latin América
Prensario TI Latin AméricaPrensario TI Latin América
Prensario TI Latin América
 
La Visión de los Líderes 2019 - El Cronista
La Visión de los Líderes 2019 - El CronistaLa Visión de los Líderes 2019 - El Cronista
La Visión de los Líderes 2019 - El Cronista
 
APERTURA - Mejores Empleadores 2017
APERTURA - Mejores Empleadores 2017APERTURA - Mejores Empleadores 2017
APERTURA - Mejores Empleadores 2017
 
InfoTechnology - Negocios de Familia
InfoTechnology - Negocios de FamiliaInfoTechnology - Negocios de Familia
InfoTechnology - Negocios de Familia
 
What’s New @ Qlik®
What’s New @ Qlik®What’s New @ Qlik®
What’s New @ Qlik®
 
Toma de decisiones impulsada por datos en radiología: Rochester Regional Heal...
Toma de decisiones impulsada por datos en radiología: Rochester Regional Heal...Toma de decisiones impulsada por datos en radiología: Rochester Regional Heal...
Toma de decisiones impulsada por datos en radiología: Rochester Regional Heal...
 
La gestión y análisis del DATO en las empresas españolas
La gestión y análisis del DATO en las empresas españolasLa gestión y análisis del DATO en las empresas españolas
La gestión y análisis del DATO en las empresas españolas
 
CÓMO ADMINISTRAR UNA TELCO MULTINACIONAL USANDO QLIK®: Virgin Mobile en Qonne...
CÓMO ADMINISTRAR UNA TELCO MULTINACIONAL USANDO QLIK®: Virgin Mobile en Qonne...CÓMO ADMINISTRAR UNA TELCO MULTINACIONAL USANDO QLIK®: Virgin Mobile en Qonne...
CÓMO ADMINISTRAR UNA TELCO MULTINACIONAL USANDO QLIK®: Virgin Mobile en Qonne...
 
APERTURA Tecno - Edición Especial 2017
APERTURA Tecno - Edición Especial 2017APERTURA Tecno - Edición Especial 2017
APERTURA Tecno - Edición Especial 2017
 
Construyendo confianza y abandonando las zonas de confort en las organizacion...
Construyendo confianza y abandonando las zonas de confort en las organizacion...Construyendo confianza y abandonando las zonas de confort en las organizacion...
Construyendo confianza y abandonando las zonas de confort en las organizacion...
 
La transformación digital impulsada por los datos en la industria de servicio...
La transformación digital impulsada por los datos en la industria de servicio...La transformación digital impulsada por los datos en la industria de servicio...
La transformación digital impulsada por los datos en la industria de servicio...
 
Conocé los casos de éxito de Qonnections 2017: Qantas
Conocé los casos de éxito de Qonnections 2017: QantasConocé los casos de éxito de Qonnections 2017: Qantas
Conocé los casos de éxito de Qonnections 2017: Qantas
 
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
 
Descubra más valor en sus datos de IoT
Descubra más valor en sus datos de IoTDescubra más valor en sus datos de IoT
Descubra más valor en sus datos de IoT
 
Conocé los casos de éxito de Qonnections 2017: Johns Hopkins
Conocé los casos de éxito de Qonnections 2017: Johns HopkinsConocé los casos de éxito de Qonnections 2017: Johns Hopkins
Conocé los casos de éxito de Qonnections 2017: Johns Hopkins
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

QlikView Mobile Security Technical Brief

  • 1. QLIKVIEW MOBILE SECURITY QlikView Technical Brief qlikview.com Published: March, 2011
  • 2. QlikView Mobile Security | Page 2 QlikView Mobile Security Mobile devices are convenient, versatile and, for many employees, they are indispensable. High adoption rates and reliance on mobile devices makes safe mobile data analysis a critical concern. However, mobile devices can easily be lost and that’s why QlikView mobile clients have robust security means to secure sensitive business data. QlikView’s mobile clients leverage the entire security infrastructure of a typical QlikView enterprise deployment. This Technical Brief takes a look at the security features of the QlikView iPad touch-enabled Ajax client and uses an example implementation to explain some of the technical details. This Technical Brief is a companion document to the QlikView Security Overview Technology White Paper, which deals in detail how a typical QlikView deployment addresses the question of security. This brief will discuss the QlikView iPad client’s security at these levels: • Device • Transmission • Authentication and Authorization It also includes an example implementation using Double Authentication Device Security One of the main security considerations for mobile BI solutions is not to store any business data on the device. QlikView mobile clients do not store data on the device. As such, there is no local copy to lose if the mobile device is stolen and the data only resides on QlikView servers within a secure enterprise environment, with access permitted only over the network for the correctly authenticated and authorized users. Transmission Security Transmission security refers to protection of data from unauthorized interception. The QlikView iPad client supports VPN connections where the communication between the client and the QlikView server, including the username and password, are encrypted. The QlikView iPad client also supports HTTPS/SSL communication protocols. In the implementation example described below, HTTPS and Secure Sockets Layer (SSL) is used with server certificates installed on the IIS web server. In this specific case, tunneling is also enabled to encrypt the communication between IIS web server and QlikView server.
  • 3. QlikView Mobile Security | Page 3 Authentication and Authorization Authentication refers to the act of establishing or confirming the user as true or authentic. Authorization refers to the act of specifying access rights to control access of information to users. The QlikView iPad client leverages the existing authentication and authorization methods provided by QlikView Server (as described in the QlikView Security Overview Technology White Paper). There is nothing different from the iPad experience from a security perspective than a desktop browser. For Authentication, the QlikView Server requires that users be authenticated by some external process, and that credentials granted by that process be communicated to the QlikView Server. QlikView supports authentication via Active Directory, third-party single sign-on (SSO) solutions (such as CA Site Minder or IBM WebSeal), as well as via digital certificates. Once the user is authenticated, there are two authorization modes available: NTFS & DMS. NTFS mode relies on security features built in with Windows on the server side to secure access to QlikView documents through the iPad client. In NTFS mode, administrators control access to QlikView documents from the operating system itself rather than from QlikView. By contrast, DMS mode allows administrators to control access to QlikView documents centrally, within QlikView. (A detailed description of the differences between NTFS and DMS modes is contained within the QlikView Security Overview Technology White Paper). Example Implementation — Double Authentication The implementation example below demonstrates a real use case where security was applied to a QlikView deployment covering iPad devices. The security requirement is to achieve double authentication (i.e. using both user certificates and basic authentication against Microsoft Active Directory) with HTTPS/SSL connection. This is just one way to achieve a secure iPad implementation. There are other methods that could be used based on other security requirements. Figure 1 illustrates the Double Authentication example described below. First Authentication iPad supports digital certificates, giving business users secure access to corporate services. A digital certificate is composed of a public and private key pair, along with other information about the user and the certificate authority that issued the certificate. Digital certificates are a form of identification that enables authentication, data integrity, and encryption. In this implementation example, digital certificates are used to securely authenticate users to corporate services. A Microsoft IIS web server in the ‘De-Militarized Zone’ (DMZ) domain is setup to provide one-to-one certificate mapping. When a user connects to the IIS site, IIS will request a user certificate which is already created on the iPad. The user will be prompted for a certificate and its public key is then submitted to the IIS server. The IIS server will compare this public key with the available public keys of which the administrator has granted access. Based on the result, IIS will either allow or disallow the user access to the QlikView Server.
  • 4. QlikView Mobile Security | Page 4 If the user is allowed, IIS will encrypt the contents using a user public key and sends it back to the user. Now that the user has both keys, they will decrypt the contents sent by IIS using their own private key and will be able to start communication with the IIS server. Second Authentication The next step in this example is the second authentication. QlikView can be configured to provide a second layer of authentication to make sure that the user requesting access to the QlikView Server can be authenticated against the corporate security system (such as Active Directory or another LDAP, for example). As is normal, the user gets challenged for their credentials to be authenticated against the security system. Authorization The final step in the process is to give the authenticated user access to the authorized documents. This process is handled by the QlikView Server and is described in detail in the QlikView Security Overview Technology White Paper. Figure 1: Double Authentication in a Mobile Environment QvSWEB SERVER 4. User is prompted for User Name and password 3. IIS server compares the public key with available public keys granted by admin, authenticates the user and grants access 1. User is prompted for certificate 5. User gets authenticated against AD 7. Authorized QV docs are available to the user 2. User selects the certificate and Public Key is submitted 6. Authenticated user name is passed to QvS Encrypted communication via tunneling Source: QlikTech FIRST AUTHENTICATION SECOND AUTHENTICATION © 2010 QlikTech International AB. All rights reserved. QlikTech, QlikView, Qlik, Q, Simplifying Analysis for Everyone, Power of Simplicity, New Rules, The Uncontrollable Smile and other QlikTech products and services as well as their respective logos are trademarks or registered trademarks of QlikTech International AB. All other company names, products and services used herein are trademarks or registered trademarks of their respective owners. The information published herein is subject to change without notice. This publication is for informational purposes only, without representation or warranty of any kind, and QlikTech shall not be liable for errors or omissions with respect to this publication. The only warranties for QlikTech products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting any additional warranty.