Verifyaccess - Productoverview
Verifyaccess - Productoverview
Version 10.0.1
December 2020
Product overview
IBM
Contents
Index.................................................................................................................. 39
iii
iv
Accessibility features for Security Verify Access
Accessibility features assist users who have a disability, such as restricted mobility or limited vision, to
use information technology content successfully.
Accessibility features
Security Verify Access includes the following major accessibility features:
Accessibility features
Supports interfaces commonly used by screen readers. This feature applies to applications on Windows
operating systems only.
Supports customization of display attributes such as color, contrast, and font size.
Supports interfaces commonly used by screen magnifiers. This feature applies to applications on
Windows operating systems only.
Allows the user to access the interfaces without inducing seizures due to photosensitivity.
Security Verify Access uses the latest W3C Standard, WAI-ARIA 1.0 (http://www.w3.org/TR/wai-aria/), to
ensure compliance to US Section 508 (http://www.access-board.gov/guidelines-and-standards/
communications-and-it/about-the-section-508-standards/section-508-standards), and Web Content
Accessibility Guidelines (WCAG) 2.0 (http://www.w3.org/TR/WCAG20/). To take advantage of accessibility
features, use the latest release of your screen reader in combination with the latest web browser that is
supported by this product.
The Security Verify Access online product documentation in IBM® Knowledge Center is enabled for
accessibility. The accessibility features of IBM Knowledge Center are described at https://www.ibm.com/
support/knowledgecenter/help?view=kc#accessibility.
Keyboard navigation
This product uses standard navigation keys.
Interface information
The Security Verify Access user interfaces do not have content that flashes 2 - 55 times per second.
The Security Verify Access web user interfaces and the IBM Knowledge Center rely on cascading style
sheets to render content properly and to provide a usable experience. The application provides an
equivalent way for low-vision users to use a user’s system display settings, including high-contrast mode.
You can control font size by using the device or web browser settings.
The Security Verify Access web user interface includes WAI-ARIA navigational landmarks that you can
use to quickly navigate to functional areas in the application.
Related accessibility information
In addition to standard IBM help desk and support websites, IBM has established a TTY telephone
service for use by deaf or hard of hearing customers to access sales and support services:
vi IBM Security Verify Access Version 10.0.1 December 2020: Product overview
Chapter 1. Documentation for getting started
The IBM Knowledge Center provides documentation that can help you get started with the IBM Security
Verify Access product.
IBM Security Verify Access is available from Passport Advantage. You can use this distribution to either
configure a new deployment or upgrade a previous version of the product.
1. If you are upgrading from a previous version of IBM Security Verify Access for Web 8.*, IBM Security
Verify Access for Mobile 8.*, or IBM Security Verify Access 9.0 be sure to review Chapter 6, “Upgrading
to the current version,” on page 13. If applicable, you must complete these steps before you
configure the product.
2. See Product activations overview to review the features you can use when you activate the Security
Verify Access Platform, the Advanced Access Control Module, or the Federation Module.
3. Configure the appliance by using the instructions in Getting Started.
4. Complete the initial setup of your Security Verify Access appliance deployment by following the
instructions in Initial configuration.
5. (Advanced Access Control Module only) Complete the initial setup of this module by following the
instructions in Getting Started with Advanced Access Control.
Security Verify Access Platform includes an optional Java ADK, available for download. To install the Java
ADK, see Intalling IBM Security Verify Access Runtime for Java.
See Administering Web Reverse Proxy for instructions on how to use the local management interface on
the appliance to configure and administer Security Verify Access Platform.
2 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
Chapter 2. What's new in this release
IBM Security Verify Access provides new features and extended functions for Version 10.0.1.
4 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
• Support for Apple Platform (FIDO2) Attestation
FIDO2/WebAuthn registration and authentication has been extended to include support for Apple
platform authenticators (TouchID and FaceID) using Safari. This also includes the support for validating
the Apple Platform Attestation Statement Format.
• FIDO compatibility with WebAuthn L2
Enhancements have been made to FIDO capabilities to be compatible with the Level 2 specification of
WebAuthn. All changes are backwards compatible with clients which only support the Level 1
specification. The example JavaScript FIDO2 mediator has also been updated with demonstration
scenarios using Level 2 features.
• HTTP response headers in an InfoMap Authentication Mechanism
A new JavaScript context variable "responseHeaders" is now added to InfoMap Authentication. By using
this variable, an InfoMap author has been added to set custom HTTP response headers. The complete
list of available context parameters can be found here: Available Parameters in Info Map.
• AAC runtime server HTTP port update for Docker
When you are running IBM Security Verify Access on docker the AAC runtime server is now available via
HTTP using port 80. See Scenario - AAC/Federation Runtime Configuration.
• RSA SecurID Authentication
A new RSA SecurID authentication mechanism has been provided which utilizes the new 'RSA SecurID
Authentication API' when communicating with the RSA Authentication Manager. See Configuring an RSA
SecurID one-time password mechanism.
Federation
• Federation User Registry – Group management
Federation user registry groups can now be managed. See Managing User Registries.
• Runtime monitoring support using Prometheus
Support for runtime monitoring can now be enabled with Prometheus. See Runtime monitoring using
Prometheus.
Table 1. Security Verify Access Supporting Components functions and topic links
Function Topic
Appliance Management: Local Management Appliance Management
Interface
Appliance Management: REST APIs REST API documentation
Policy Server Policy server administration tasks
Embedded LDAP server Embedded LDAP server management
Authorization Server Authorization servers
Federation Module
This module is an add-on feature that requires an activation key.
Related information
Product activations overview
10 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
Chapter 5. Secure deployment considerations
When you deploy the IBM Security Verify Access appliance, consider the following points.
• The Security Verify Access embedded user registry should only be used in the following scenarios:
– Proof of Technology deployments
– Deployments with a low number of Security Verify Access users (< 5000)
– When using federated directories with the Security Verify Access basic user feature
• Choose the suitable Security Verify Access user authentication mode for your environment.
– Use basic user for all scenarios unless GSO lock-box, user based ACLs, or account-valid/password-
valid features are required.
– Only use the full user model if basic user is not suitable. Basic user only supports minimal mode.
• The appliance has management and application interfaces. Network separation between the
management and application interfaces must be maintained.
• Any Security Verify Access web reverse proxies that are hosted in the corporate DMZ network zone
should be configured as restricted nodes.
• The Security Verify Access appliance that hosts the Policy Server component should be hosted in a
secure network zone and not exposed to the internet.
• If the embedded user registry is used, it should be hosted on the same appliance as the Security Verify
Access Policy Server in a secure network zone. The embedded user registry port (636) should not be
routable from the internet.
• Security Verify Access clustering is recommended to provide a highly available solution. Two Security
Verify Access appliances performing the primary and secondary roles respectively should be used.
These should be hosted in the secure network zone with Security Verify Access runtime replication
enabled.
• If advanced authentication/authorization is required, the Security Verify Access authentication service
in the Advanced Access Control (AAC) component should be used. This should be hosted on the
Security Verify Access primary and secondary appliances in the secure network zone. This service
should not be routable from the internet.
• Second factor or multi-factor authentication should be considered to increase assurance of user
identity.
• Enable Network Time Protocol (NTP) on all appliances to synchronize the time correctly. This is to
ensure that the appliance works correctly with distributed components.
• Do not use self-signed certificates for any public facing services. Always obtain certificates issued by an
appropriate certificate authority.
• All non-TLS communication should be disabled:
– Only use port 636 for LDAP communication.
– Only use HTTPS 443 application interfaces.
– Only use TLS for junction communication.
• Enable the Security Verify Access Web Application Firewall (WAF) feature on all appliances hosting the
Security Verify Access reverse proxy.
• Session affinity should be enabled between all Security Verify Access components for performance and
scalability reasons.
• The Security Verify Access Distributed Session Cache (DSC) or failover cookie should be used to provide
a highly available solution across multiple reverse proxy instances.
• If the DSC is deployed, it should be hosted in the secure network zone.
• Configure the reverse proxy cookie jar feature to prevent application cookies from being returned to
clients unnecessarily.
• Connection pooling for junctions should be enabled to optimize performance of the solution. This
capability is disabled by default.
• FIPS should be enabled if appropriate.
• Enable these security headers in the reverse proxy configuration:
– strict-transport-security
– content-security-policy
• Minimize access to unauthenticated resources using standard Security Verify Access ACL policy.
• Host the Security Verify Access runtime database on an external Database. This database is used for
federation and/or AAC features. The runtime database should be hosted in a secure network zone and
should not be routable from the internet.
• Use a highly available solution for the external Security Verify Access runtime database. This service is
critical to Security Verify Access operation.
• Best practice is to use the Security Verify Access REST APIs for automated deployment to allow:
– Rapid recovery
– Consistent and repeatable deployment configuration
• Don’t use Basic Authentication (BA) for authentication to Security Verify Access REST APIs when
automating deployment and management of the Security Verify Access appliance. Certificate
authentication should be used.
• Standard network security guidelines should be applied. Network access and administrative credentials
to the appliance should only be available to authorized administrators on appropriate networks.
• Minimize on-board storage of logs by configuring remote syslog to store log and audit archives in a
protected network zone. A separate logging server/service should be used to store logs.
• An appropriate patch process should be implemented to:
– Subscribe to, and monitor IBM support site for Security Verify Access appliance patches
– Apply all patches promptly when released
• Set the sps.setCookiesAsSecure parameter to Secure to flag the cookies set by Security Verify
Access.
12 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
Chapter 6. Upgrading to the current version
Complete this task if you are upgrading an existing Security Verify Access for Web, Security Verify Access
for Mobile, or Security Verify Access installation to the current version.
Procedure
Choose one of the following upgrade methods and complete the steps:
Use the online update server.
a. Meet the following conditions:
• A valid license is installed on the appliance.
• The appliance has network connectivity to the online update server.
b. Log in to the local management interface. If you are upgrading a cluster, log in to the local
management interface of the primary master first.
c. Select System > Updates and Licensing > Available Updates.
d. Click Refresh.
e. Select the firmware update.
f. Click Install. The firmware update might take a long time to complete, depending on the
bandwidth that is available to the appliance. After the update is successfully applied, the appliance
automatically restarts.
g. If you use any external databases, download the dbupdate9.zip file from File Downloads area
of the appliance and upgrade the external databases.
h. If you are upgrading a cluster, complete the following steps:
1) Repeat steps “1.b” on page 13 through “1.f” on page 14 on each node in the cluster starting
with the secondary master.
Note: If you use internal databases, do not subsequently reboot the primary master until the
secondary master has been upgraded.
2) Wait for the cluster to synchronize. The firmware for each appliance in the cluster is now
upgraded and the cluster is operational.
Note: Although the secondary master remains present and the embedded runtime database fails
over to the secondary master when the primary master is down during the migration, you cannot
avoid down time by leveraging this failover mechanism. This is due to the fact that the database
changes made to the secondary master while the primary master is being migrated will likely be
discarded and replaced by the upgraded databases from the primary master after it begins
operating again after the migration.
Use the local management interface for a single appliance not in a cluster.
a. Download the .pkg file.
b. Log in to the local management interface.
c. Select System > Updates and Licensing > Available Updates.
d. Click Upload. The New Update window opens.
e. Click Select Update.
f. Browse to the .pkg file.
g. Click Open.
h. Click Save Configuration. The upload process might take several minutes.
i. Select the new firmware and click Install. The installation of the new firmware takes a few
minutes. After the update is successfully applied, the appliance restarts automatically.
Use the local management interface for a cluster of appliances.
a. Download the .pkg file.
b. Log in to the local management interface of the primary master.
c. Upload and install the firmware .pkg file on the primary master. This step includes the automatic
restart of the appliance. If you use internal databases, do not subsequently reboot the primary
master until the secondary master has been upgraded.
d. If you use any external databases, download the dbupdate9.zip file from File Downloads area
of the primary master and upgrade the external databases.
e. Upload and install the firmware .pkg file on each node in the cluster starting with the secondary
master if present.
f. Wait for the cluster to synchronize. The firmware for each node in the cluster is now upgraded and
the cluster is operational.
Note: Although the secondary master remains present and the embedded runtime database fails over
to the secondary master when the primary master is down during the migration, you cannot avoid
down time by leveraging this failover mechanism. This is due to the fact that the database changes
made to the secondary master while the primary master is being migrated will likely be discarded and
replaced by the upgraded databases from the primary master after it begins operating again after the
migration.
14 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
Use a USB drive. (Only for upgrading a hardware appliance.)
a. Download the .pkg file.
b. Copy the firmware update from the .pkg file to a USB flash drive.
c. Insert the USB flash drive into the hardware appliance.
d. Log in to the appliance console as admin or use Secure Shell.
e. Type updates and press Enter.
f. Type install and press Enter.
g. Select the following options:
1) Type 1 for a firmware update.
2) Type 1 to install the update from a USB drive.
3) Type YES to confirm that the USB drive is plugged into the appliance.
4) Type the index number to select the appliance firmware from the list.
5) Type YES to confirm the update and start the update process.
Note: The firmware update takes a few minutes to complete and the appliance automatically
restarts.
What to do next
• If you are using an external database to store the runtime or configuration data, you also need to update
the database schema. This can be achieved by downloading the database update utility from the
appliance and running this utility against the external database. For more details, see Upgrading
external databases with the dbupdate tool (for appliance at version 9.0.0.0 and later).
• If you are upgrading an existing appliance, your Security Verify Access Platform is ready to use.
• If you are upgrading an existing Security Verify Access for Mobile appliance or Advanced Access Control
module to the current version, continue with the Upgrading configuration instructions.
• If you are upgrading an existing Federation module to the current version, continue with the Upgrading
configuration instructions.
In this case, a virtual host junction type must be adopted to negate the limitations associated with the
use of standard junction script filtering.
Tooltips display issue
Tooltips might not display if you use the keyboard (for example, the Tab key) to navigate to a field.
Tooltips are displayed properly when you use a mouse to navigate to the field.
Creating PIP resource when the server connection for database and LDAP is not available returns the
wrong response.
For example, when you use the following command:
curl -k -b whatigot -s -S --ciphers "DES-CBC3-SHA" -X "POST" -H
"Accept:application/json" -H "Content-Type: application/json" --data-binary
"{\"name\":\"tldap1234\",\"description\":\"\"\"attributes\":[{\"name
\":\"trusteer.pinpoint.csid\",\"selector\":\"wrongtestLdap\"}]\"type
\":\"LDAP\",\"predefined\":false,\"properties\":[{\"datatype\":\"String
\",\"readOnly\":false,\"sensitive\":false,\"value\":\"objectclass=abc
\",\"key\":\"searchBaseDN\"},{\"datatype\":\"String\",\"readOnly
\":false,\"sensitive\":false,\"value\":\"cn=*\",\"key\":\"searchFilter\"},
{\"datatype\":\"String\",\"readOnly\":false,\"sensitive\":false,\"value
\":\"0cdebb0c-49d9-4179-a47a-52f759a4ff57\",\"key\":\"dataSource\"}]}" --
user admin:admin -D whatigot "https://{appliance_host}/iam/access/v8/pips/"
The expected response is as follows:
The error message "illegal character" when you modify an SSO rule is always displayed in
English.
The error message "illegal character" is always displayed in English no matter which locale your
browser uses.
Audit events cannot be sent to the remote syslog server if certain information is not provided.
If you choose to send the audit events to a remote machine, you must specify the correct details on
the Audit Configuration page for host, port, protocol, and certificates. Otherwise, the audit events
cannot be sent to the remote machine.
Attribute sources that are being used by a federation or partner is deletable.
Users can accidentally delete attribute sources that are in use by a federation or partner. Such
operation causes errors to the federation. You must ensure that an attribute source is not in use
before you delete it.
22 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
Federation Module: The email address name ID format requires a mapping rule
If you use an email address name ID format in a SAML 2.0 federation, you must set the type of STS
Universal User attribute, whose name is "name", to:
"urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress"
Personal certificates are not included in the list of selections when you choose certificates to use for
encryption or signature validation with the SAML 2.0 partner management GUI
If you use the local management interface to choose certificates to be used for encryption or
signature validation, only signer certificates are available for selection. Personal certificates are not
included in the list of selections. A work-around is to use the REST API for such operations.
Federation module: The RSA-OAEP key encryption algorithm is not supported with HSM keys
IBM Security Verify Access does not support decryption of SAML 2.0 messages using the RSA Optional
Asymmetric Encryption Padding (RSA-OAEP) key transport algorithm with Hardware Security Module
(HSM) keys. The RSA-OAEP algorithm is supported with software (non-HSM) keys. For more
information on RSA-OAEP, see http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p.
The upgrade from Security Access Manager 8.0, 8.0.0.1, and 8.0.0.2 does not correctly migrate the
authentication module policies for Security Verify Access for Mobile.
The work-around is to create the default set of authentication policies with the local management
interface or REST API.
The following link creates a customized query of the live Support knowledge base for items specific to
IBM® Security Verify Access, Version 10.0, and its fix packs.
IBM Security Access Manager technical documents
You can also create your own search query on the IBM Support Portal. For example:
1. Go to the IBM Support Portal:http://www.ibm.com/support/entry/portal/support
2. In the Search field, enter: Verify Access.
Identity Provider and Service Provider is not recommended to be configured as partners on the same
appliance or on the same external HVDB
Identity Provider and Service Provider is not recommended to be configured as partners on the same
appliance or on the same external HVDB. This might lead to several features not functioning correctly.
The following problems (but not limited to) might be encountered:
• HTTP Artifact binding SAML single sign flows does not work due to key conflict in storing the
messages in runtime database.
• The STS chain mapping created internally for Identity Provider and Service Provider will have
identical ‘issuer’ and ‘applies to’ which can lead to unexpected behavior during runtime flow.
• Leads to database contention as the DMAP entries could be inserted or modified simultaneously by
Identity provider and Service provider.
It is recommended that the Identity Provider and Service Provider that are partners reside in separate
appliances configured with separate external HVDB.
Synchronization of WebSEAL data is unable to handle deleted junctions
The current WebSEAL sync functionality is designed to pick up new entries or junctions and
modifications to existing entries or junctions. However, it is currently unable to detect a deleted
junction or entry. This limitation applies to both configuration entries and junctions.
24 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
Chapter 10. Security Verify Access appliance
FRU/CRU documentation
Read the IBM Security Verify Access Field Replacement Unit (FRU) parts and Customer Replacement Unit
(CRU) parts documentation before you replace the relevant parts.
Supported appliances
The instructions in this document support IBM Security Verify Access (IBM Part Number: 01LK905).
Figure 1. Location of the storage drive assembly on the front of the appliance
Procedure
1. Shut down the appliance by using the local management interface (LMI) or the command-line interface
(CLI).
2. Unplug all of the power cords that are attached to the appliance.
3. Press the release button on the right side of the storage drive assembly to release the assembly lock.
4. Pull the drive handle lever to the left to pull the storage drive assembly from the drive bay, as shown in
the following figure:
Figure 2. Removing the storage drive assembly from the drive bay
What to do next
Turn on the appliance, and then reimage it.
Important: You must reimage the appliance after you replace the storage drive. If you do not reimage the
appliance, the appliance can become inoperable.
26 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
• Verify that the new fan module is working correctly
Important: Before you proceed with these instructions, review the IBM Systems Safety Notices provided
in the IBM Media Terms and Conditions CD that is included with your appliance model.
Note: The illustrations in this document might differ slightly from your appliance model.
Supported appliances
The instructions in this document support IBM Security Verify Access (IBM Part Number: 01LK905).
During normal operation, the LED for the fan module is not illuminated. If one of the fan modules
experiences a failure, the LED for the failed fan module is illuminated in amber.
Procedure
1. Pinch the orange retention clip on the fan module to release the fan assembly from the chassis.
2. Pull the fan assembly out of the chassis, as shown in the following figure:
Results
The fan module LED is not illuminated in amber and the fan starts to circulate air.
Supported appliances
The instructions in this document support IBM Security Verify Access (IBM Part Number: 01LK905).
28 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
Figure 5. Location of the network interface modules on the front of the appliance
Procedure
1. Turn off the appliance by using the local management interface (LMI) or the command-line interface
(CLI).
2. Unplug all of the power cords that are attached to the appliance.
3. Grasp the blue latch on the front of the appliance and pull it toward you.
4. Pull the lever on the failed module toward you, and then pull module from the chassis, as shown in
the following figure:
Figure 6. Removing a network interface module from the front of the appliance
5. Set aside the failed module.
Attention: As you unpack the replacement module, make sure that you do not touch the gold
connectors on the back of the module, and do not let the gold connectors come in contact
with the packing material. In addition, do not let these gold connectors touch the appliance
while you are inserting the replacement module into the chassis. The gold connectors are
extremely fragile and can be damaged if they touch anything.
6. Unpack the replacement module.
7. Carefully align the replacement module with the chassis, and then push the module into the chassis
until the module is in place.
8. Push the blue latch on the front of appliance into place.
9. Plug in all of the power cords that are attached to the appliance.
10. Turn on the appliance by pressing the power button on the front.
11. Verify that the LCD panel on the front of the appliance is illuminated.
What to do next
Check whether the new module is working correctly by logging in to the appliance LMI and verifying that
the new module was recognized by the appliance.
Supported appliances
The instructions in this document support IBM Security Verify Access (IBM Part Number: 01LK905).
CAUTION: The power control button on the device and the power switch on the power supply do
not turn off the electrical current supplied to the device. The device also might have more than one
power cord. To remove all current from the device, ensure that all power cords are disconnected
from the power source.
CAUTION: Never remove the cover on a power supply or any part that has the following label
attached.
Hazardous voltage, current, and energy levels are present inside any component that has this label
attached. There are no serviceable parts inside these components. If you suspect a problem with
one of these parts, contact a service technician.
30 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
Figure 7. Power supply LED
The following table indicates the potential problems that can occur with the power supply:
Procedure
1. Remove the failed power supply from the power supply bay by pinching the side clip and pulling the
failed power supply from the bay, as shown in Figure 2.
Important:
During normal operation, each power supply bay must contain either a power supply or a power supply
blank for proper cooling.
Figure 8. Removing the power supply from the back of the appliance
32 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
2. Slide the AC power supply into the bay until the retention latch clicks into place. Make sure that the
power supply connects firmly to the power supply connector.
3. Connect the power cord for the new AC power supply to the power cord connector on the power
supply. The AC power supply connectors on the back of the appliance are shown in the following
figure:
What to do next
Make sure that the AC power LED and the DC power LED on the AC power supply are illuminated, which
indicates that the power supply is operating correctly. The two power LEDs are to the left of the power
cord connector.
A
accessibility features for this product v
APARs fixed 17
D
documentation updates 21
F
fixes
APARs 17
G
getting started 1
K
known limitations 21
N
new features 3
S
Security Verify Access
features 3
V
Verify Access
features 3
W
what's new 3
Index 39
40 IBM Security Verify Access Version 10.0.1 December 2020: Product overview
IBM®