Oracle Analytics Security Everything you always wanted to know

Christian Berg
Christian BergOwner at Dimensionality GmbH
www.dimensionality.ch @Nephentur freenode | obihackers slide 1
Oracle Analytics Security
Everything you always wanted to know
Episode 2 – May 4th-6th 2020 – The ACEs Strike Back
www.dimensionality.ch @Nephentur freenode | obihackers slide 2
SECURITY
www.dimensionality.ch @Nephentur freenode | obihackers slide 3
• Oracle ACE Director Business Analytics
• Oracle Analytics since 2001
• Speaker at OpenWorld, KScope,
User Groups and open-source conferences
• Blogger on Analytics, DWH, Data Science
http://dimensionality.ch
• Telegram/IRC #obihackers moderator
• ODC and OCCC community advocate
• Trainer for Oracle University since 2006
Christian Berg
www.dimensionality.ch @Nephentur freenode | obihackers slide 4
• Wife; Mother of 3 (ages 18, 15, and 11);
• ODTUG Analytics Community Leader / ODTUG Board Director
• Oracle ACE
• Managing Director of Analytics at US-Analytics
• 15+ years in IT
• Email: bwagner@us-analytics.com
• Twitter: @Bec_Wagner
• LinkedIn: https://www.linkedin.com/in/becky-wagner/
• IRC Channel (Telegram): #obihackers
• http://bec-wagner.com
Becky Wagner
www.dimensionality.ch @Nephentur freenode | obihackers slide 5
Becky Wagner
3 Membership Tiers
• Oracle ACE Director
• Oracle ACE
• Oracle ACE Associate
bit.ly/OracleACEProgram
500+ Technical Experts
Helping Peers Globally
Connect:
Nominate yourself or someone you know: acenomination.oracle.com
@oracleace
Facebook.com/oracleaces
oracle-ace_ww@oracle.com
www.dimensionality.ch @Nephentur freenode | obihackers slide 7
Outline
• Global Context
• Covered Products and Areas
• Security Concepts
• IDCS added to the mix
• Nit-picking: Technical deep-dive SSO with OAC
www.dimensionality.ch @Nephentur freenode | obihackers slide 8
Outline
• Global Context
• Covered Products and Areas
• Security Concepts
• IDCS added to the mix
• Nit-picking: Technical deep-dive SSO with OAC
www.dimensionality.ch @Nephentur freenode | obihackers slide 9
Global Context
https://www.google.com/search?q=vast+and+complex
www.dimensionality.ch @Nephentur freenode | obihackers slide 10
Global Context
Less options
On / Off
Very high level
(Too) Many
options
Highly
configurable
Every single
object/entity
Competitors vs Oracle – What do you choose?
Departmental
/ user focus
Corporate, 3rd Party,
Department, User
www.dimensionality.ch @Nephentur freenode | obihackers slide 11
Historical growth
www.dimensionality.ch @Nephentur freenode | obihackers slide 12
NQuire era 1997 - 2001
• Core BI Server
• Core BI Presentation Server
• Administration Tool with the RPD
• Catalog Manager with the presentation catalog
• Scheduler and Agents
• Core APIs runcat, admintool.exe, NQS calls
• Core list of supported sources
www.dimensionality.ch @Nephentur freenode | obihackers slide 13
Siebel era 2001 - 2006
• Catalog Groups
• Marketing integration
• Action Framework
• Source extensions
www.dimensionality.ch @Nephentur freenode | obihackers slide 14
Oracle era 2006 - today
• BI Publisher integration
• Web Services
• MBeans
• Weblogic integration
• Essbase + other Hyperion products
• Scorecarding and Strategy Management
• Source extensions
• Dat Visualization (ex Visual Analyzer)
• Data Flows
• Data Engineering
• External Data Sets (XSA)
• ...
www.dimensionality.ch @Nephentur freenode | obihackers slide 15
Outline
• Global Context
• Covered Products and Areas
• Security Concepts
• IDCS added to the mix
• Nit-picking: Technical deep-dive SSO with OAC
www.dimensionality.ch @Nephentur freenode | obihackers slide 16
Covered Products
* 12.2.1.4 * OAC 5.5 * OAS 5.5
www.dimensionality.ch @Nephentur freenode | obihackers slide 17
Covered Areas
• Basic OA* Security Concepts
• Corporate Security to App Security
• “Back-end” and “front-end” parts
• Details galore
www.dimensionality.ch @Nephentur freenode | obihackers slide 18
How deep can we actually go with this
www.dimensionality.ch @Nephentur freenode | obihackers slide 19
Outline
• Global Context
• Covered Products and Areas
• Security Concepts
• IDCS added to the mix
• Nit-picking: Technical deep-dive SSO with OAC
www.dimensionality.ch @Nephentur freenode | obihackers slide 20
Security Concepts Simplified
Authentication
Component Access
Object-level Access
Functional Access
Metadata-level
Access
Data-level
Access
www.dimensionality.ch @Nephentur freenode | obihackers slide 21
Security Principals Simplified
Users
Groups
Application
Roles
www.dimensionality.ch @Nephentur freenode | obihackers slide 22
Catalog groups (for completeness)
• The “other application role”
– OBIEE 10g
– Siebel Analytics 7.x and 6.x
• Existed for backwards
compatibility.
• Dead and buried!
• Please upgrade ASAP
www.dimensionality.ch @Nephentur freenode | obihackers slide 23
Authentication
www.dimensionality.ch @Nephentur freenode | obihackers slide 24
Authentication
www.dimensionality.ch @Nephentur freenode | obihackers slide 25
Authentication
TO THE APPLICATION WORLD
WLS
LDAP
any
LDAP
DB tables
=
=
Application
Corporate
Weblogic “principals”
www.dimensionality.ch @Nephentur freenode | obihackers slide 26
“Back-end” vs “front-end”
Turning structure into access and action
Productizing security
+
Structural, base-line
www.dimensionality.ch @Nephentur freenode | obihackers slide 27
Component Access
“Which parts of the platform am I allowed to use?”
• Several places
– Enterprise Manager: Application Policies
– Application Administration
– Historical reasons
• IDCS too, for cloud
• Never think “one place rules all”
www.dimensionality.ch @Nephentur freenode | obihackers slide 28
Application roles
www.dimensionality.ch @Nephentur freenode | obihackers slide 29
Application Policies
www.dimensionality.ch @Nephentur freenode | obihackers slide 30
Application Policy Control
• Only WLS principals can be tied to policies
• RPD Management
• Essbase (since 11.1.1.7 and dropped after 12c)
• BI Publisher
• Data Visualization (initially Visual Analyzer)
• Data Flows
• Don’t forget these!
• IDCS does things a little bit differently again
www.dimensionality.ch @Nephentur freenode | obihackers slide 31
Functional Access
+
www.dimensionality.ch @Nephentur freenode | obihackers slide 32
Functional Access
www.dimensionality.ch @Nephentur freenode | obihackers slide 33
Functional and Data Access - Hybrid
“Based on which data am I allowed to BUILD things?”
www.dimensionality.ch @Nephentur freenode | obihackers slide 34
Functional Access Summary
• What the user is allowed to access as functionality inside of OBIEE
• Exception: data security related to each subject area permission
– Double security with the RPD presentation layer
– Defines for which subject areas a principal can create new content
(analyses, filters, KPIs, prompts etc.)
• Only 2 values:
– Deny: no access at all to the feature
– Grant: allow user to access the feature
• Pay attention to not wrongly use the system role “authenticated-
user”!
www.dimensionality.ch @Nephentur freenode | obihackers slide 35
Functional Access Summary
• “Deny” is stronger than “Grant”
– If multiple conflicting rights are defined (users
associated with multiple application roles with
different privileges) you DO NOT have access
(keep this one in mind of later…)
• By default (if not defined) it’s a “Deny”
www.dimensionality.ch @Nephentur freenode | obihackers slide 36
Object-level Access
“Which analytical objects am I allowed to CRUD?”
• Web catalog permissions
• Secure structure and content
– Folders
– Contained objects
• File system permissions
• Note: OAS and OAC store the
catalog in the DB!
www.dimensionality.ch @Nephentur freenode | obihackers slide 37
Object-level Access
• Very detailed permissions
– Read (Open)
– Traverse
– Write
– Delete
– Change Permissions
– Set Ownership
– Run Publisher Report
– Schedule Publisher Report
– View Publisher Output
www.dimensionality.ch @Nephentur freenode | obihackers slide 38
Object-level Access
Predefined groups of permissions
www.dimensionality.ch @Nephentur freenode | obihackers slide 39
Object-level Access
• “No access” always wins
– Overwrites any explicit access granted otherwise
– Even “Full Control” for BI Administrator loses
– Yes, you can lock yourself out of parts of the catalog!
• In all other cases, more permissive wins
– “Write” plus “Read/Open” = “Write”
www.dimensionality.ch @Nephentur freenode | obihackers slide 40
DV Object-level Access – Projects
www.dimensionality.ch @Nephentur freenode | obihackers slide 41
DV Object-level Access – Data Sets
• OAC Data Sets are another hybrid
• Line between object and data gets blurred
• Often the price to pay with self-service
• Expect more of this blurring!
www.dimensionality.ch @Nephentur freenode | obihackers slide 42
Metadata-level Access
• Controlled in Presentation Layer
• Only 4 values
– Read
– Read/Write (require setup in BMM)
– No access
– Default (see next slide)
• “Read” stronger than “No access”
– Conflicts resolve to more permissive
• Warning: Opposite of front-end behaviour
• Where RPD may let you through, front-end cuts you off
www.dimensionality.ch @Nephentur freenode | obihackers slide 43
Metadata-level Access
• “Default” for Subject Areas:
– Same permission as “Authenticated User”
• All other objects
– Inherit from parent object
www.dimensionality.ch @Nephentur freenode | obihackers slide 44
Metadata-level Access
www.dimensionality.ch @Nephentur freenode | obihackers slide 45
Data-level Access
What people think of…
www.dimensionality.ch @Nephentur freenode | obihackers slide 46
Data-level Access
What it really is…
• Dynamic
• Fully baked in
• Security-based
• Rules, rules, rules rules
• Pretty much all in the RPD
www.dimensionality.ch @Nephentur freenode | obihackers slide 47
Data-level Access
RPD data filters for application roles and users
Not even the filter criteria is static!
www.dimensionality.ch @Nephentur freenode | obihackers slide 48
Data-level Access – RPD data filters
Objects are focus. Everything else follows.
www.dimensionality.ch @Nephentur freenode | obihackers slide 49
Data-level Access – RPD data filters
• Data filters
– Can filter on any presentation layer or business
model layer object
– Can hence force inclusion of filtered dimensions in
any object build on a given subject area even if
that object does not reference the dimension at
all
www.dimensionality.ch @Nephentur freenode | obihackers slide 50
Data-level Access – RPD data filters
• Query limits
– Temporal restrictions
– Limitations on returned rows
– Maximum execution times
– Direct Database Request permissions
– Detailed permissions managed here win over
system-wide permissions and default settings
www.dimensionality.ch @Nephentur freenode | obihackers slide 51
Data-level Access
Logical Table Source filters
Dynamic Criteria
But inescapably
added to ALL queries
www.dimensionality.ch @Nephentur freenode | obihackers slide 52
Data-level Access
Physical options
• VPD
• Essbase filters
• Named user credentials
• Connection Scripts
We can *use* these
Outside of our control
www.dimensionality.ch @Nephentur freenode | obihackers slide 53
Data-level Access – Connection Scripts
• Yes you can code things
• We declare, we don’t code
• Very hidden
• Impact invisible in the most
query logs
• You need your DBA
• Least good choice
www.dimensionality.ch @Nephentur freenode | obihackers slide 54
Data-level Access – DV
www.dimensionality.ch @Nephentur freenode | obihackers slide 55
Data-level Access – DV
• Much more limited
• Possibilities depend on type
• Should grow
• Unsure if it reaches core “BI”
www.dimensionality.ch @Nephentur freenode | obihackers slide 56
Data-level Access – Data Sets
www.dimensionality.ch @Nephentur freenode | obihackers slide 57
Data-level Access – Data Sets
• Everything file-based = pure object access
• No additional safety net
www.dimensionality.ch @Nephentur freenode | obihackers slide 58
Data-level Access – Data Connections
• “It depends”
• List keeps growing
• Check details each release and each type
www.dimensionality.ch @Nephentur freenode | obihackers slide 59
Data-level Access – Data Connections
www.dimensionality.ch @Nephentur freenode | obihackers slide 60
Data-level Access – Data Connections
www.dimensionality.ch @Nephentur freenode | obihackers slide 61
Outline
• Global Context
• Covered Products and Areas
• Security Concepts
• IDCS added to the mix
• Nit-picking: Technical deep-dive SSO with OAC
www.dimensionality.ch @Nephentur freenode | obihackers slide 62
IDCS Security - Walkthrough
www.dimensionality.ch @Nephentur freenode | obihackers slide 63
IDCS Groups
www.dimensionality.ch @Nephentur freenode | obihackers slide 64
OAC Users and Roles
www.dimensionality.ch @Nephentur freenode | obihackers slide 65
The ugly bits
www.dimensionality.ch @Nephentur freenode | obihackers slide 66
Outline
• Global Context
• Covered Products and Areas
• Security Concepts
• IDCS added to the mix
• Nit-picking: Technical deep-dive SSO with OAC
www.dimensionality.ch @Nephentur freenode | obihackers slide 67
Outline - Deep-Dive SSO with OAC
• Customer Case
• AD Bridge
• SAML 2.0 ADFS
• Direct SSO vs Link
• Trouble Spots
www.dimensionality.ch @Nephentur freenode | obihackers slide 68
Outline
• Customer Case
• AD Bridge
• SAML 2.0 ADFS
• Direct SSO vs Link
• Trouble Spots
www.dimensionality.ch @Nephentur freenode | obihackers slide 69
Customer Case - Enterprise worthy OAC
• Global Financial Services Firm
• Security is highest priority
• Waited to start project until AD integration
• VPNaaS to Palo Alto NextGen Firewalls
• Private IP Ranges
• Access from within network only
• OAC with IDCS (Identity Cloud)
• Migrating from OBIEE 11g to OAC
• AD integration required (8000+ users, 14000+ groups)
• SSO was highly desirable
www.dimensionality.ch @Nephentur freenode | obihackers slide 70
Outline
• Customer Case
• AD Bridge
• SAML 2.0 ADFS
• Direct SSO vs Link
• Trouble Spots
www.dimensionality.ch @Nephentur freenode | obihackers slide 71
AD Bridge
• Must install on Server joined to AD Domain
• User with rights to install software
• User with the following AD rights
– Read for all users and groups in the domain
– Read for all OUs
• If you are using an AD user specifically setup for this AD Bridge, specific permissions can
be found here:
– https://docs.oracle.com/en/cloud/paas/identity-cloud/uaids/creating-bridge.html
• Tutorial for AD Bridge
– https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_id
bridge_obe/idbridge.html
www.dimensionality.ch @Nephentur freenode | obihackers slide 72
AD Bridge - Roadmap
1. Download From IDCS
2. Install On Domain-Joined Server
3. Configure Users and Groups
4. Import in IDCS
5. Verify
*Note: OAC comes with IDCS Foundation. AD Bridge is in IDCS Basic.
www.dimensionality.ch @Nephentur freenode | obihackers slide 73
AD Bridge - The More You Know
• Becomes a service. Note that this service is running and starts automatically
• Find the AD Bridge Config Utility in C:Program FilesIDBridgeIDBridgeUI.exe
• Click on View Logs – Highly important to note log locations
• Sync has a limit, will continue at the frequency until fully sync’d
• Errors will have details in the logs, like missing email or some other attribute issue
www.dimensionality.ch @Nephentur freenode | obihackers slide 74
Outline
• Customer Case
• AD Bridge
• SAML 2.0 ADFS
• Direct SSO vs Link
• Trouble Spots
www.dimensionality.ch @Nephentur freenode | obihackers slide 75
ADFS & SSO - SAML 101
Img from - https://developers.onelogin.com/assets/img/pages/saml/sso-diagram.svg
www.dimensionality.ch @Nephentur freenode | obihackers slide 76
ADFS & SSO - Steps
1. Download ADFS Metadata File
a. https://adfs.contoso.com/FederationMetadata/2007-06/FederationMetatdata.xml
b. XML files have tags, if browser doesn’t show them, right click and view source, then save
2. IDCS Identity Provider Setup
a. Add SAML IDP
b. Name, Next, Upload FederationMetadata.xml, Requested NameID – Email Addr, Next,
Finish
c. Don’t click Export – Use the following URL to download IDCS metadata XML
d. https://MYTENANT.identity.oraclecloud.com/fed/v1/metadata?adfsmode=true
Tutorial: https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_adfs_obe/adfs.html
www.dimensionality.ch @Nephentur freenode | obihackers slide 77
ADFS & SSO - Steps cont.
1. In AD FS management console add a Relying Party Trust
a. Import Metadata.xml, Next, Name, Next Next Next Next, Finish
b. Add Claim Rules
i. Send LDAP Attributes as Claims, Name - Email, Attribute Store - Active Directory, LDAP
Attribute - Email Addresses and Outgoing Claim Type – Email Address
ii. Transform an Incoming Claim, Name – Name ID, Incoming – Email Address, Outgoing
claim – Name ID, Outgoing format – Email
2. IDCS Configuration
a. Drop down – select Activate, Drop down again – select Show on Login Page
b. IDP Policies – Click Default and then Assign new ADFS
Tutorial: https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_adfs_obe/adfs.html
www.dimensionality.ch @Nephentur freenode | obihackers slide 78
Outline
• Customer Case
• AD Bridge
• SAML 2.0 ADFS
• Direct SSO vs Link
• Trouble Spots
www.dimensionality.ch @Nephentur freenode | obihackers slide 79
Direct SSO vs Link
Oracle Support Doc ID 2438952.1
OAC/OAAC: How To Disable IDCS Chooser Login Page and Get Redirected to Custom SSO Login Page Directly in Oracle Analytics Cloud(OAC)
Once everything has been confirmed working for SSO link on login page:
• IDP Policies
– Remove ADFS from ‘Default Identity Provider Policy’
• Create new IDP Policy
– Assign ADFS to Policy
– Assign OAC Application(s)
• Configure Application for Redirect URL
– Can be any URL (www.oracle.com), and doesn’t actually affect behavior
www.dimensionality.ch @Nephentur freenode | obihackers slide 80
Outline
• Customer Case
• AD Bridge
• SAML 2.0 ADFS
• Direct SSO vs Link
• Trouble Spots
www.dimensionality.ch @Nephentur freenode | obihackers slide 81
Trouble Spots and Lessons Learned
● Sometimes logs stop while
still showing Active in IDCS and
service shows running in
Windows
● Logs path not in
documentation, use ADBridge
Application and View Logs.
● While checking OUs, be sure
to expand and check lower
levels (Default now)
● Username - Email
● IDCS uses SAML 2.0, for Win
2016 we had to get a different
ADFS xml file
● Don’t download the Export
IDCS metadata. ADFS needs a
special format. Can get from
URL:
● https://DOMAIN.oraclecloud.
com/fed/v1/metadata?adfsmo
de=true
● Security wants users to be
authenticated by AD only
● EM, RPD Admin Tool,
Weblogic Console, still direct
login – Can’t use AD users
● Configure IDP Policy
● Sign Out redirects to OAC DV,
still signed in. Can configure
ADFS global sign-out then IDCS
sign out URL
www.dimensionality.ch @Nephentur freenode | obihackers slide 82
Account Rename
www.dimensionality.ch @Nephentur freenode | obihackers slide 83
RECAP
● Security Sensitive
● IDCS Private IP
● Allows for AD and SSO integration
● Local AD Domain joined Server
● Find your logs
● Find your ADFS buddy
● Sign Out – redirects to DV
● Claim Rules only worked with Email
● Remove IDCS Chooser Page
● Still need local login for EM and Weblogic
Console and RPD Admin Tool
Getting Fancy: HA AD Bridge – Docker style
https://www.oracle.com/technetwork/articles/idm/gutierrez-idcs-idbridge-3960710.html
www.dimensionality.ch @Nephentur freenode | obihackers slide 84
Resources
• Full deck with videos – https://www.slideshare.net/secret/qERdzGtv9SZTpj
• Blog about ADFS lab setup – http://bec-wagner.com/2018-10-26-ADFS-and-OAC-lab/
• AD Bridge Tutorial –
https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_idbridge_ob
e/idbridge.html
• ADFS/SSO Tutorial –
https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_adfs_obe/ad
fs.html
• Direct Access Oracle Doc – Oracle Support Doc ID 2438952.1
www.dimensionality.ch @Nephentur freenode | obihackers slide 85
Thank You! What’s Next?
bwagner@us-analytics.com
@Bec_Wagner
https://www.linkedin.com/in/becky-
wagner/
Telegram: #obihackers
christian.berg@dimensionality.ch
@Nephentur
Telegram: #obihackers
1 of 85

Recommended

OAC - From Cloud Entry to Data Engineering to Data Science by
OAC - From Cloud Entry to Data Engineering to Data ScienceOAC - From Cloud Entry to Data Engineering to Data Science
OAC - From Cloud Entry to Data Engineering to Data ScienceChristian Berg
2.9K views59 slides
50 Shades Of Fail Geneva by
50 Shades Of Fail Geneva50 Shades Of Fail Geneva
50 Shades Of Fail GenevaChristian Berg
208 views76 slides
Oracle Open World Neos Voyage _2014 by
Oracle Open World Neos Voyage _2014Oracle Open World Neos Voyage _2014
Oracle Open World Neos Voyage _2014Christian Berg
321 views49 slides
Back2 basics - A Day In The Life Of An Oracle Analytics Query by
Back2 basics - A Day In The Life Of An Oracle Analytics QueryBack2 basics - A Day In The Life Of An Oracle Analytics Query
Back2 basics - A Day In The Life Of An Oracle Analytics QueryChristian Berg
4.1K views77 slides
50 Shades of Fail KScope16 by
50 Shades of Fail KScope1650 Shades of Fail KScope16
50 Shades of Fail KScope16Christian Berg
912 views52 slides
ChatGPT and the Future of Work - Clark Boyd by
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
28K views69 slides

More Related Content

Recently uploaded

LIVE OAK MEMORIAL PARK.pptx by
LIVE OAK MEMORIAL PARK.pptxLIVE OAK MEMORIAL PARK.pptx
LIVE OAK MEMORIAL PARK.pptxms2332always
7 views6 slides
Lack of communication among family.pptx by
Lack of communication among family.pptxLack of communication among family.pptx
Lack of communication among family.pptxahmed164023
15 views10 slides
Inawsidom - Data Journey by
Inawsidom - Data JourneyInawsidom - Data Journey
Inawsidom - Data JourneyPhilipBasford
8 views38 slides
DGST Methodology Presentation.pdf by
DGST Methodology Presentation.pdfDGST Methodology Presentation.pdf
DGST Methodology Presentation.pdfmaddierlegum
7 views9 slides
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf by
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf10urkyr34
7 views259 slides
META.pptx by
META.pptxMETA.pptx
META.pptxvasanthan19012003
6 views10 slides

Recently uploaded(20)

LIVE OAK MEMORIAL PARK.pptx by ms2332always
LIVE OAK MEMORIAL PARK.pptxLIVE OAK MEMORIAL PARK.pptx
LIVE OAK MEMORIAL PARK.pptx
ms2332always7 views
Lack of communication among family.pptx by ahmed164023
Lack of communication among family.pptxLack of communication among family.pptx
Lack of communication among family.pptx
ahmed16402315 views
DGST Methodology Presentation.pdf by maddierlegum
DGST Methodology Presentation.pdfDGST Methodology Presentation.pdf
DGST Methodology Presentation.pdf
maddierlegum7 views
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf by 10urkyr34
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf
10urkyr347 views
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P... by DataScienceConferenc1
[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
CRM stick or twist.pptx by info828217
CRM stick or twist.pptxCRM stick or twist.pptx
CRM stick or twist.pptx
info82821711 views
K-Drama Recommendation Using Python by FridaPutriassa
K-Drama Recommendation Using PythonK-Drama Recommendation Using Python
K-Drama Recommendation Using Python
FridaPutriassa5 views
Enhancing Financial Sentiment Analysis via Retrieval Augmented Large Language... by patiladiti752
Enhancing Financial Sentiment Analysis via Retrieval Augmented Large Language...Enhancing Financial Sentiment Analysis via Retrieval Augmented Large Language...
Enhancing Financial Sentiment Analysis via Retrieval Augmented Large Language...
patiladiti7528 views
OPPOTUS - Malaysians on Malaysia 3Q2023.pdf by Oppotus
OPPOTUS - Malaysians on Malaysia 3Q2023.pdfOPPOTUS - Malaysians on Malaysia 3Q2023.pdf
OPPOTUS - Malaysians on Malaysia 3Q2023.pdf
Oppotus31 views
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init... by DataScienceConferenc1
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...

Featured

How to have difficult conversations by
How to have difficult conversations How to have difficult conversations
How to have difficult conversations Rajiv Jayarajah, MAppComm, ACC
5.6K views19 slides
Introduction to Data Science by
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceChristy Abraham Joy
82.6K views51 slides
Time Management & Productivity - Best Practices by
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
169.8K views42 slides
The six step guide to practical project management by
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
36.7K views27 slides
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright... by
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
12.7K views21 slides
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present... by
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
55.5K views138 slides

Featured(20)

Time Management & Productivity - Best Practices by Vit Horky
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky169.8K views
The six step guide to practical project management by MindGenius
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius36.7K views
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright... by RachelPearson36
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson3612.7K views
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present... by Applitools
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools55.5K views
12 Ways to Increase Your Influence at Work by GetSmarter
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter401.7K views
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G... by DevGAMM Conference
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference3.6K views
Barbie - Brand Strategy Presentation by Erica Santiago
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
Erica Santiago25.1K views
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well by Saba Software
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software25.3K views
Introduction to C Programming Language by Simplilearn
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
Simplilearn8.5K views
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr... by Palo Alto Software
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
Palo Alto Software88.4K views
9 Tips for a Work-free Vacation by Weekdone.com
9 Tips for a Work-free Vacation9 Tips for a Work-free Vacation
9 Tips for a Work-free Vacation
Weekdone.com7.2K views
How to Map Your Future by SlideShop.com
How to Map Your FutureHow to Map Your Future
How to Map Your Future
SlideShop.com275.1K views
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -... by AccuraCast
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...
AccuraCast3.4K views
Exploring ChatGPT for Effective Teaching and Learning.pptx by Stan Skrabut, Ed.D.
Exploring ChatGPT for Effective Teaching and Learning.pptxExploring ChatGPT for Effective Teaching and Learning.pptx
Exploring ChatGPT for Effective Teaching and Learning.pptx
Stan Skrabut, Ed.D.57.7K views

Oracle Analytics Security Everything you always wanted to know

  • 1. www.dimensionality.ch @Nephentur freenode | obihackers slide 1 Oracle Analytics Security Everything you always wanted to know Episode 2 – May 4th-6th 2020 – The ACEs Strike Back
  • 2. www.dimensionality.ch @Nephentur freenode | obihackers slide 2 SECURITY
  • 3. www.dimensionality.ch @Nephentur freenode | obihackers slide 3 • Oracle ACE Director Business Analytics • Oracle Analytics since 2001 • Speaker at OpenWorld, KScope, User Groups and open-source conferences • Blogger on Analytics, DWH, Data Science http://dimensionality.ch • Telegram/IRC #obihackers moderator • ODC and OCCC community advocate • Trainer for Oracle University since 2006 Christian Berg
  • 4. www.dimensionality.ch @Nephentur freenode | obihackers slide 4 • Wife; Mother of 3 (ages 18, 15, and 11); • ODTUG Analytics Community Leader / ODTUG Board Director • Oracle ACE • Managing Director of Analytics at US-Analytics • 15+ years in IT • Email: bwagner@us-analytics.com • Twitter: @Bec_Wagner • LinkedIn: https://www.linkedin.com/in/becky-wagner/ • IRC Channel (Telegram): #obihackers • http://bec-wagner.com Becky Wagner
  • 5. www.dimensionality.ch @Nephentur freenode | obihackers slide 5 Becky Wagner
  • 6. 3 Membership Tiers • Oracle ACE Director • Oracle ACE • Oracle ACE Associate bit.ly/OracleACEProgram 500+ Technical Experts Helping Peers Globally Connect: Nominate yourself or someone you know: acenomination.oracle.com @oracleace Facebook.com/oracleaces oracle-ace_ww@oracle.com
  • 7. www.dimensionality.ch @Nephentur freenode | obihackers slide 7 Outline • Global Context • Covered Products and Areas • Security Concepts • IDCS added to the mix • Nit-picking: Technical deep-dive SSO with OAC
  • 8. www.dimensionality.ch @Nephentur freenode | obihackers slide 8 Outline • Global Context • Covered Products and Areas • Security Concepts • IDCS added to the mix • Nit-picking: Technical deep-dive SSO with OAC
  • 9. www.dimensionality.ch @Nephentur freenode | obihackers slide 9 Global Context https://www.google.com/search?q=vast+and+complex
  • 10. www.dimensionality.ch @Nephentur freenode | obihackers slide 10 Global Context Less options On / Off Very high level (Too) Many options Highly configurable Every single object/entity Competitors vs Oracle – What do you choose? Departmental / user focus Corporate, 3rd Party, Department, User
  • 11. www.dimensionality.ch @Nephentur freenode | obihackers slide 11 Historical growth
  • 12. www.dimensionality.ch @Nephentur freenode | obihackers slide 12 NQuire era 1997 - 2001 • Core BI Server • Core BI Presentation Server • Administration Tool with the RPD • Catalog Manager with the presentation catalog • Scheduler and Agents • Core APIs runcat, admintool.exe, NQS calls • Core list of supported sources
  • 13. www.dimensionality.ch @Nephentur freenode | obihackers slide 13 Siebel era 2001 - 2006 • Catalog Groups • Marketing integration • Action Framework • Source extensions
  • 14. www.dimensionality.ch @Nephentur freenode | obihackers slide 14 Oracle era 2006 - today • BI Publisher integration • Web Services • MBeans • Weblogic integration • Essbase + other Hyperion products • Scorecarding and Strategy Management • Source extensions • Dat Visualization (ex Visual Analyzer) • Data Flows • Data Engineering • External Data Sets (XSA) • ...
  • 15. www.dimensionality.ch @Nephentur freenode | obihackers slide 15 Outline • Global Context • Covered Products and Areas • Security Concepts • IDCS added to the mix • Nit-picking: Technical deep-dive SSO with OAC
  • 16. www.dimensionality.ch @Nephentur freenode | obihackers slide 16 Covered Products * 12.2.1.4 * OAC 5.5 * OAS 5.5
  • 17. www.dimensionality.ch @Nephentur freenode | obihackers slide 17 Covered Areas • Basic OA* Security Concepts • Corporate Security to App Security • “Back-end” and “front-end” parts • Details galore
  • 18. www.dimensionality.ch @Nephentur freenode | obihackers slide 18 How deep can we actually go with this
  • 19. www.dimensionality.ch @Nephentur freenode | obihackers slide 19 Outline • Global Context • Covered Products and Areas • Security Concepts • IDCS added to the mix • Nit-picking: Technical deep-dive SSO with OAC
  • 20. www.dimensionality.ch @Nephentur freenode | obihackers slide 20 Security Concepts Simplified Authentication Component Access Object-level Access Functional Access Metadata-level Access Data-level Access
  • 21. www.dimensionality.ch @Nephentur freenode | obihackers slide 21 Security Principals Simplified Users Groups Application Roles
  • 22. www.dimensionality.ch @Nephentur freenode | obihackers slide 22 Catalog groups (for completeness) • The “other application role” – OBIEE 10g – Siebel Analytics 7.x and 6.x • Existed for backwards compatibility. • Dead and buried! • Please upgrade ASAP
  • 23. www.dimensionality.ch @Nephentur freenode | obihackers slide 23 Authentication
  • 24. www.dimensionality.ch @Nephentur freenode | obihackers slide 24 Authentication
  • 25. www.dimensionality.ch @Nephentur freenode | obihackers slide 25 Authentication TO THE APPLICATION WORLD WLS LDAP any LDAP DB tables = = Application Corporate Weblogic “principals”
  • 26. www.dimensionality.ch @Nephentur freenode | obihackers slide 26 “Back-end” vs “front-end” Turning structure into access and action Productizing security + Structural, base-line
  • 27. www.dimensionality.ch @Nephentur freenode | obihackers slide 27 Component Access “Which parts of the platform am I allowed to use?” • Several places – Enterprise Manager: Application Policies – Application Administration – Historical reasons • IDCS too, for cloud • Never think “one place rules all”
  • 28. www.dimensionality.ch @Nephentur freenode | obihackers slide 28 Application roles
  • 29. www.dimensionality.ch @Nephentur freenode | obihackers slide 29 Application Policies
  • 30. www.dimensionality.ch @Nephentur freenode | obihackers slide 30 Application Policy Control • Only WLS principals can be tied to policies • RPD Management • Essbase (since 11.1.1.7 and dropped after 12c) • BI Publisher • Data Visualization (initially Visual Analyzer) • Data Flows • Don’t forget these! • IDCS does things a little bit differently again
  • 31. www.dimensionality.ch @Nephentur freenode | obihackers slide 31 Functional Access +
  • 32. www.dimensionality.ch @Nephentur freenode | obihackers slide 32 Functional Access
  • 33. www.dimensionality.ch @Nephentur freenode | obihackers slide 33 Functional and Data Access - Hybrid “Based on which data am I allowed to BUILD things?”
  • 34. www.dimensionality.ch @Nephentur freenode | obihackers slide 34 Functional Access Summary • What the user is allowed to access as functionality inside of OBIEE • Exception: data security related to each subject area permission – Double security with the RPD presentation layer – Defines for which subject areas a principal can create new content (analyses, filters, KPIs, prompts etc.) • Only 2 values: – Deny: no access at all to the feature – Grant: allow user to access the feature • Pay attention to not wrongly use the system role “authenticated- user”!
  • 35. www.dimensionality.ch @Nephentur freenode | obihackers slide 35 Functional Access Summary • “Deny” is stronger than “Grant” – If multiple conflicting rights are defined (users associated with multiple application roles with different privileges) you DO NOT have access (keep this one in mind of later…) • By default (if not defined) it’s a “Deny”
  • 36. www.dimensionality.ch @Nephentur freenode | obihackers slide 36 Object-level Access “Which analytical objects am I allowed to CRUD?” • Web catalog permissions • Secure structure and content – Folders – Contained objects • File system permissions • Note: OAS and OAC store the catalog in the DB!
  • 37. www.dimensionality.ch @Nephentur freenode | obihackers slide 37 Object-level Access • Very detailed permissions – Read (Open) – Traverse – Write – Delete – Change Permissions – Set Ownership – Run Publisher Report – Schedule Publisher Report – View Publisher Output
  • 38. www.dimensionality.ch @Nephentur freenode | obihackers slide 38 Object-level Access Predefined groups of permissions
  • 39. www.dimensionality.ch @Nephentur freenode | obihackers slide 39 Object-level Access • “No access” always wins – Overwrites any explicit access granted otherwise – Even “Full Control” for BI Administrator loses – Yes, you can lock yourself out of parts of the catalog! • In all other cases, more permissive wins – “Write” plus “Read/Open” = “Write”
  • 40. www.dimensionality.ch @Nephentur freenode | obihackers slide 40 DV Object-level Access – Projects
  • 41. www.dimensionality.ch @Nephentur freenode | obihackers slide 41 DV Object-level Access – Data Sets • OAC Data Sets are another hybrid • Line between object and data gets blurred • Often the price to pay with self-service • Expect more of this blurring!
  • 42. www.dimensionality.ch @Nephentur freenode | obihackers slide 42 Metadata-level Access • Controlled in Presentation Layer • Only 4 values – Read – Read/Write (require setup in BMM) – No access – Default (see next slide) • “Read” stronger than “No access” – Conflicts resolve to more permissive • Warning: Opposite of front-end behaviour • Where RPD may let you through, front-end cuts you off
  • 43. www.dimensionality.ch @Nephentur freenode | obihackers slide 43 Metadata-level Access • “Default” for Subject Areas: – Same permission as “Authenticated User” • All other objects – Inherit from parent object
  • 44. www.dimensionality.ch @Nephentur freenode | obihackers slide 44 Metadata-level Access
  • 45. www.dimensionality.ch @Nephentur freenode | obihackers slide 45 Data-level Access What people think of…
  • 46. www.dimensionality.ch @Nephentur freenode | obihackers slide 46 Data-level Access What it really is… • Dynamic • Fully baked in • Security-based • Rules, rules, rules rules • Pretty much all in the RPD
  • 47. www.dimensionality.ch @Nephentur freenode | obihackers slide 47 Data-level Access RPD data filters for application roles and users Not even the filter criteria is static!
  • 48. www.dimensionality.ch @Nephentur freenode | obihackers slide 48 Data-level Access – RPD data filters Objects are focus. Everything else follows.
  • 49. www.dimensionality.ch @Nephentur freenode | obihackers slide 49 Data-level Access – RPD data filters • Data filters – Can filter on any presentation layer or business model layer object – Can hence force inclusion of filtered dimensions in any object build on a given subject area even if that object does not reference the dimension at all
  • 50. www.dimensionality.ch @Nephentur freenode | obihackers slide 50 Data-level Access – RPD data filters • Query limits – Temporal restrictions – Limitations on returned rows – Maximum execution times – Direct Database Request permissions – Detailed permissions managed here win over system-wide permissions and default settings
  • 51. www.dimensionality.ch @Nephentur freenode | obihackers slide 51 Data-level Access Logical Table Source filters Dynamic Criteria But inescapably added to ALL queries
  • 52. www.dimensionality.ch @Nephentur freenode | obihackers slide 52 Data-level Access Physical options • VPD • Essbase filters • Named user credentials • Connection Scripts We can *use* these Outside of our control
  • 53. www.dimensionality.ch @Nephentur freenode | obihackers slide 53 Data-level Access – Connection Scripts • Yes you can code things • We declare, we don’t code • Very hidden • Impact invisible in the most query logs • You need your DBA • Least good choice
  • 54. www.dimensionality.ch @Nephentur freenode | obihackers slide 54 Data-level Access – DV
  • 55. www.dimensionality.ch @Nephentur freenode | obihackers slide 55 Data-level Access – DV • Much more limited • Possibilities depend on type • Should grow • Unsure if it reaches core “BI”
  • 56. www.dimensionality.ch @Nephentur freenode | obihackers slide 56 Data-level Access – Data Sets
  • 57. www.dimensionality.ch @Nephentur freenode | obihackers slide 57 Data-level Access – Data Sets • Everything file-based = pure object access • No additional safety net
  • 58. www.dimensionality.ch @Nephentur freenode | obihackers slide 58 Data-level Access – Data Connections • “It depends” • List keeps growing • Check details each release and each type
  • 59. www.dimensionality.ch @Nephentur freenode | obihackers slide 59 Data-level Access – Data Connections
  • 60. www.dimensionality.ch @Nephentur freenode | obihackers slide 60 Data-level Access – Data Connections
  • 61. www.dimensionality.ch @Nephentur freenode | obihackers slide 61 Outline • Global Context • Covered Products and Areas • Security Concepts • IDCS added to the mix • Nit-picking: Technical deep-dive SSO with OAC
  • 62. www.dimensionality.ch @Nephentur freenode | obihackers slide 62 IDCS Security - Walkthrough
  • 63. www.dimensionality.ch @Nephentur freenode | obihackers slide 63 IDCS Groups
  • 64. www.dimensionality.ch @Nephentur freenode | obihackers slide 64 OAC Users and Roles
  • 65. www.dimensionality.ch @Nephentur freenode | obihackers slide 65 The ugly bits
  • 66. www.dimensionality.ch @Nephentur freenode | obihackers slide 66 Outline • Global Context • Covered Products and Areas • Security Concepts • IDCS added to the mix • Nit-picking: Technical deep-dive SSO with OAC
  • 67. www.dimensionality.ch @Nephentur freenode | obihackers slide 67 Outline - Deep-Dive SSO with OAC • Customer Case • AD Bridge • SAML 2.0 ADFS • Direct SSO vs Link • Trouble Spots
  • 68. www.dimensionality.ch @Nephentur freenode | obihackers slide 68 Outline • Customer Case • AD Bridge • SAML 2.0 ADFS • Direct SSO vs Link • Trouble Spots
  • 69. www.dimensionality.ch @Nephentur freenode | obihackers slide 69 Customer Case - Enterprise worthy OAC • Global Financial Services Firm • Security is highest priority • Waited to start project until AD integration • VPNaaS to Palo Alto NextGen Firewalls • Private IP Ranges • Access from within network only • OAC with IDCS (Identity Cloud) • Migrating from OBIEE 11g to OAC • AD integration required (8000+ users, 14000+ groups) • SSO was highly desirable
  • 70. www.dimensionality.ch @Nephentur freenode | obihackers slide 70 Outline • Customer Case • AD Bridge • SAML 2.0 ADFS • Direct SSO vs Link • Trouble Spots
  • 71. www.dimensionality.ch @Nephentur freenode | obihackers slide 71 AD Bridge • Must install on Server joined to AD Domain • User with rights to install software • User with the following AD rights – Read for all users and groups in the domain – Read for all OUs • If you are using an AD user specifically setup for this AD Bridge, specific permissions can be found here: – https://docs.oracle.com/en/cloud/paas/identity-cloud/uaids/creating-bridge.html • Tutorial for AD Bridge – https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_id bridge_obe/idbridge.html
  • 72. www.dimensionality.ch @Nephentur freenode | obihackers slide 72 AD Bridge - Roadmap 1. Download From IDCS 2. Install On Domain-Joined Server 3. Configure Users and Groups 4. Import in IDCS 5. Verify *Note: OAC comes with IDCS Foundation. AD Bridge is in IDCS Basic.
  • 73. www.dimensionality.ch @Nephentur freenode | obihackers slide 73 AD Bridge - The More You Know • Becomes a service. Note that this service is running and starts automatically • Find the AD Bridge Config Utility in C:Program FilesIDBridgeIDBridgeUI.exe • Click on View Logs – Highly important to note log locations • Sync has a limit, will continue at the frequency until fully sync’d • Errors will have details in the logs, like missing email or some other attribute issue
  • 74. www.dimensionality.ch @Nephentur freenode | obihackers slide 74 Outline • Customer Case • AD Bridge • SAML 2.0 ADFS • Direct SSO vs Link • Trouble Spots
  • 75. www.dimensionality.ch @Nephentur freenode | obihackers slide 75 ADFS & SSO - SAML 101 Img from - https://developers.onelogin.com/assets/img/pages/saml/sso-diagram.svg
  • 76. www.dimensionality.ch @Nephentur freenode | obihackers slide 76 ADFS & SSO - Steps 1. Download ADFS Metadata File a. https://adfs.contoso.com/FederationMetadata/2007-06/FederationMetatdata.xml b. XML files have tags, if browser doesn’t show them, right click and view source, then save 2. IDCS Identity Provider Setup a. Add SAML IDP b. Name, Next, Upload FederationMetadata.xml, Requested NameID – Email Addr, Next, Finish c. Don’t click Export – Use the following URL to download IDCS metadata XML d. https://MYTENANT.identity.oraclecloud.com/fed/v1/metadata?adfsmode=true Tutorial: https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_adfs_obe/adfs.html
  • 77. www.dimensionality.ch @Nephentur freenode | obihackers slide 77 ADFS & SSO - Steps cont. 1. In AD FS management console add a Relying Party Trust a. Import Metadata.xml, Next, Name, Next Next Next Next, Finish b. Add Claim Rules i. Send LDAP Attributes as Claims, Name - Email, Attribute Store - Active Directory, LDAP Attribute - Email Addresses and Outgoing Claim Type – Email Address ii. Transform an Incoming Claim, Name – Name ID, Incoming – Email Address, Outgoing claim – Name ID, Outgoing format – Email 2. IDCS Configuration a. Drop down – select Activate, Drop down again – select Show on Login Page b. IDP Policies – Click Default and then Assign new ADFS Tutorial: https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_adfs_obe/adfs.html
  • 78. www.dimensionality.ch @Nephentur freenode | obihackers slide 78 Outline • Customer Case • AD Bridge • SAML 2.0 ADFS • Direct SSO vs Link • Trouble Spots
  • 79. www.dimensionality.ch @Nephentur freenode | obihackers slide 79 Direct SSO vs Link Oracle Support Doc ID 2438952.1 OAC/OAAC: How To Disable IDCS Chooser Login Page and Get Redirected to Custom SSO Login Page Directly in Oracle Analytics Cloud(OAC) Once everything has been confirmed working for SSO link on login page: • IDP Policies – Remove ADFS from ‘Default Identity Provider Policy’ • Create new IDP Policy – Assign ADFS to Policy – Assign OAC Application(s) • Configure Application for Redirect URL – Can be any URL (www.oracle.com), and doesn’t actually affect behavior
  • 80. www.dimensionality.ch @Nephentur freenode | obihackers slide 80 Outline • Customer Case • AD Bridge • SAML 2.0 ADFS • Direct SSO vs Link • Trouble Spots
  • 81. www.dimensionality.ch @Nephentur freenode | obihackers slide 81 Trouble Spots and Lessons Learned ● Sometimes logs stop while still showing Active in IDCS and service shows running in Windows ● Logs path not in documentation, use ADBridge Application and View Logs. ● While checking OUs, be sure to expand and check lower levels (Default now) ● Username - Email ● IDCS uses SAML 2.0, for Win 2016 we had to get a different ADFS xml file ● Don’t download the Export IDCS metadata. ADFS needs a special format. Can get from URL: ● https://DOMAIN.oraclecloud. com/fed/v1/metadata?adfsmo de=true ● Security wants users to be authenticated by AD only ● EM, RPD Admin Tool, Weblogic Console, still direct login – Can’t use AD users ● Configure IDP Policy ● Sign Out redirects to OAC DV, still signed in. Can configure ADFS global sign-out then IDCS sign out URL
  • 82. www.dimensionality.ch @Nephentur freenode | obihackers slide 82 Account Rename
  • 83. www.dimensionality.ch @Nephentur freenode | obihackers slide 83 RECAP ● Security Sensitive ● IDCS Private IP ● Allows for AD and SSO integration ● Local AD Domain joined Server ● Find your logs ● Find your ADFS buddy ● Sign Out – redirects to DV ● Claim Rules only worked with Email ● Remove IDCS Chooser Page ● Still need local login for EM and Weblogic Console and RPD Admin Tool Getting Fancy: HA AD Bridge – Docker style https://www.oracle.com/technetwork/articles/idm/gutierrez-idcs-idbridge-3960710.html
  • 84. www.dimensionality.ch @Nephentur freenode | obihackers slide 84 Resources • Full deck with videos – https://www.slideshare.net/secret/qERdzGtv9SZTpj • Blog about ADFS lab setup – http://bec-wagner.com/2018-10-26-ADFS-and-OAC-lab/ • AD Bridge Tutorial – https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_idbridge_ob e/idbridge.html • ADFS/SSO Tutorial – https://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/idcs/idcs_adfs_obe/ad fs.html • Direct Access Oracle Doc – Oracle Support Doc ID 2438952.1
  • 85. www.dimensionality.ch @Nephentur freenode | obihackers slide 85 Thank You! What’s Next? bwagner@us-analytics.com @Bec_Wagner https://www.linkedin.com/in/becky- wagner/ Telegram: #obihackers christian.berg@dimensionality.ch @Nephentur Telegram: #obihackers