SlideShare a Scribd company logo
Securing Novell GroupWise           ®   ®



through SSL and S/Mime

Dirk Giles
GroupWise Software Engineer
dpgiles@novell.com

Mukesh Jethwani
Novell WorldWide Support Engineer
mjethwani@novell.com
Agenda

    •   LDAP authentication and Novell GroupWise
                                           ®      ®



        Post Offices

    •   Novell GroupWise Agents and SSL

         –   Certificate Generation

         –   Installing and Enabling SSL

         –   Securing GWIA and WebAccess agents

    •   Secure Internet Email with S/MIME

2   © Novell, Inc. All rights reserved.
LDAP Authentication
Why Use LDAP Authentication?

    •   Uses user's directory password
         –   Minimizes password management requirements

         –   Supports password policies (Bind Mode)

         –   Less passwords for the user to remember

    •   Can authenticate to other LDAP directories
    •   Requires that users connect to the directory
         –   Note: Directory accounts without a password will
             not require a password, even with a High Security
             Post Office

4   © Novell, Inc. All rights reserved.
LDAP Authentication Planning

    •   LDAP Server information
         –   Use SSL or not?
              >   SSL key file

         –   IP Address or name of LDAP server

         –   LDAP port for LDAP server

         –   User authentication method
              >   Bind

              >   Compare




5   © Novell, Inc. All rights reserved.
LDAP Authentication Planning                          Part 2

    •   Use proxy user?
         –   Access the directory with limited rights

         –   Need distinguished name (DN)

         –   Need password

    •   Allow users to change password?
         –   Novell GroupWise Client Change Password dialog
                           ®              ®




6   © Novell, Inc. All rights reserved.
Export LDAP Certificate
    Which One?




7   © Novell, Inc. All rights reserved.
Export LDAP Certificate
    Certificate Properties




8   © Novell, Inc. All rights reserved.
Export LDAP Certificate
    Export Wizard – No Private Key




9   © Novell, Inc. All rights reserved.
Export LDAP Certificate
     Export Wizard – Output Format and Filename




10   © Novell, Inc. All rights reserved.
LDAP Server Configuration
     Novell GroupWise System Tools
                       ®                   ®




11   © Novell, Inc. All rights reserved.
LDAP Server Configuration
     LDAP Server List




12   © Novell, Inc. All rights reserved.
LDAP Server Configuration
     LDAP Server Options




13   © Novell, Inc. All rights reserved.
Post Office Configuration
     Security Settings




14   © Novell, Inc. All rights reserved.
Post Office Configuration
     LDAP Server Selection




15   © Novell, Inc. All rights reserved.
LDAP Authentication Demonstration
Securing Novell GroupWise with SSL
              ®          ®
Novell GroupWise Security and SSL
                             ®             ®




     •   Enhances native messaging encryption

     •   Ensures secure communication between the
         Post Office Agent and clients

     •   Ensures secure communication between the
         Novell GroupWise agents

     •   Secures Web Console and WebAccess




18   © Novell, Inc. All rights reserved.
Where Do I Start?

     1. Get a certificate!
          –   Generate a Certificate Signing Request (CSR)

               >   Each separate server should have its own

               >   Agents running on the same server can share




19   © Novell, Inc. All rights reserved.
Generate Certificate Signing Request
     Novell GroupWise Generate CSR Utility (GWCSRGEN)
                     ®                     ®




20   © Novell, Inc. All rights reserved.
Request the Certificate

     •   Submit the certificate signing request to a
         certificate authority
          –   Trusted Certificate Authorities

          –   Online submission mechanisms

          –   Create your own




21   © Novell, Inc. All rights reserved.
Create a Certificate

     •   Novell Certificate Server and Novell eDirectory
                                                 ™
                                                                    ®
                                                                           ™




          –   ConsoleOne                   ®




               >   Requires the Novell Certificate Server snap-in

          –   iManager
               >   Requires the Novell Certificate Server plug-in module

     •   YaST on Linux
          –   Novell Open Enterprise Server

          –   SUSE Linux Enterprise Server
                           ®




22   © Novell, Inc. All rights reserved.
Create a Certificate using
     Novell Certificate Server               ™



     •   Enter certificate signing request

     •   Select key type and usage

     •   Select validity period

     •   Select output format and filename




23   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Issue Certificate Wizard




24   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Enter certificate signing request




25   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Select key type and usage




26   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Select validity period




27   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Select output format and filename




28   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Enter Certificate Authority




29   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Select Export to File




30   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Select output format and filename




31   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Save certificate




32   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Save key




33   © Novell, Inc. All rights reserved.
Certificate Generation Demonstration
Install the Certificate

     2. Install the certificate!
          –   Use ConsoleOne to designate the certificate
                                           ®



              and key paths
          –   Enter the password of the key file




35   © Novell, Inc. All rights reserved.
Configure Access
     Network Access Tab

     3. Enable SSL and configure access
          –   Disabled, Enabled, and Required
          –   Internal versus External




36   © Novell, Inc. All rights reserved.
Equivalent Command Line Options




37   © Novell, Inc. All rights reserved.
GWPOA Certificate
Installation Demonstration
Securing Novell GroupWise Internet Agent
              ®          ®
Securing the Novell GroupWise         ®           ®



     Internet Agent with SSL
     •   Secure Connections to other SMTP hosts

     •   Secure Connections for POP/IMAP clients

     •   Secure Connections to WebConsole
          –   SSL Enabled or Required for the above?




40   © Novell, Inc. All rights reserved.
Securing the GWIA with SSL
     Install the Certificate




41   © Novell, Inc. All rights reserved.
Securing the GWIA with SSL
     Enabling SSL




42   © Novell, Inc. All rights reserved.
Securing Novell GroupWise
               ®           ®



Internet Agent Demonstration
Securing Novell GroupWise WebAccess
             ®         ®
Securing WebAccess with SSL

     •   Securing WebAccess Agent - WebConsole

     •   Securing WebAccess Application (Apache/IIS)




45   © Novell, Inc. All rights reserved.
Securing WebAccess Agent
     Install Certificate




46   © Novell, Inc. All rights reserved.
Securing WebAccess Agent
     Enabling SSL




47   © Novell, Inc. All rights reserved.
Securing WebAccess Agent Demonstration
Securing WebAccess Application
     Linux - Apache

     •   Modify /etc/sysconfig/apache
          –   APACHE_SERVER_FLAGS=” SSL”
     •   Modify /etc/apache2/vhosts.d/vhost-ssl.conf




49   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Linux - Apache

     •   Restart apache2 by typing “rcapache2 restart”

     •   If the Private Key has a password restarting apache will
         ask for the password during the restart. Follow the step
         listed below to remove the password from the Key file
          –   openssl rsa -in gw.key -out gwu.key

          –   Also protect gwu.key by making sure only root can read
              gwu.key by typing “chmod 700 gwu.key”

     •   Modify the /etc/apache2/vhosts.d/vhost-ssl.conf with
         the unencrypted key file

50   © Novell, Inc. All rights reserved.
Securing Apache on Linux Demonstration
Securing WebAccess Application
     NetWare - Apache        ®




     •   Apache on NetWare by default enables SSL but uses
         the internal Certificates

     •   Follow TID 3033173 to import Certificate from a Public
         CA to Novell eDirectory           ®
                                               ™




     •   Modify SYS:APACHE2CONFHTTPD.CONF file
          –   SecureListen 443 “SSL CertificateDNS”

     •   Restart apache by typing ap2webdn and ap2webup



52   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




53   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




54   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




55   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




56   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




57   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS

     Sign the CSR using ConsoleOne and issue the
                                           ®



     certificate in a der format

     OR

     Send the CSR to the Public CA and get the Certificate




58   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




59   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




60   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Enabling SSL




61   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Enabling SSL




62   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Enabling SSL




63   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Enabling SSL




64   © Novell, Inc. All rights reserved.
Securing IIS on Windows Demonstration
Secure Internet Email with S/MIME
Secure Internet Email with S/MIME

     •   What is S/MIME
          –   Digital Signature
          –   Encryption (Symmetric vs Asymmetric)

     •   Advantages and Disadvantages

     •   Creating and Importing User Certificates (Public Key
         and Private Key)

     •   Exchanging Public Keys/Certificates

     •   Encrypting/Decrypting Mails
67   © Novell, Inc. All rights reserved.
What is S/MIME?

     •   S/MIME is an acronym for Secure/Multipurpose
         Internet Mail Extensions

     •   It is a standard for Public Key Encryption and signing
         of MIME Data. In simple terms, it is used for Digitally
         signing a message and/or Encrypting a message
          –   Digital Signature

          –   Encryption




68   © Novell, Inc. All rights reserved.
Digital Signature

     •   Signature – A signature in simple terms is a
         handwritten depiction of someone's name or a
         nickname that a person writes on documents as a
         proof of identity and intent

     •   Digital Signature is an electronic signature used to
         authenticate the identity of the sender of a message
         and possibly to ensure that the original content of
         the message or document that has been sent is
         unchanged. The ability to ensure that the original
         signed message arrived means that the sender
         cannot easily repudiate it later.

69   © Novell, Inc. All rights reserved.
Encryption

     •   Encryption – A process of transforming information
         using an information to make it unreadable to anyone
         except those possessing special knowledge

     •   Two types of Encryption
          –   Symmetric vs Asymmetric?




70   © Novell, Inc. All rights reserved.
Symmetric vs Asymmetric

     •   Symmetric
          –   Same key is used for Encryption and Decryption

     •   Asymmetric
          –   Separate keys are used for Encryption and Decryption




71   © Novell, Inc. All rights reserved.
Advantages/Disadvantages

     •   Advantages
          –   Authenticity and Protection of the Message

     •   Disadvantages
          –   Not all email software handles S/MIME signatures

          –   S/MIME Encryption is currently not available for the Novell   ®



              GroupWise Linux, Mac, or WebAccess clients
                                       ®




72   © Novell, Inc. All rights reserved.
Creating and Importing User Certificates
     (Public Key and Private Key)

     •   Administrator
          –   Creates the Public Key and Private Key

     •   Users
          –   Export the Private Key and the Public Key

     •   Users
          –   Import the Public Key and Private Key into the Client




73   © Novell, Inc. All rights reserved.
Creating User Certificates
     Login to iManager as admin




74   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




75   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




76   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




77   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




78   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




79   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




80   © Novell, Inc. All rights reserved.
Importing User Certificates
     Administrator sets the URL




81   © Novell, Inc. All rights reserved.
Importing User Certificates
     Administrator sets the URL




82   © Novell, Inc. All rights reserved.
Importing User Certificates
     Administrator sets the URL




83   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




84   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




85   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




86   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




87   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




88   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




89   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




90   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




91   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




92   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




93   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




94   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




95   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




96   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




97   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




98   © Novell, Inc. All rights reserved.
Exchanging Public Keys/Certificates

     •   Sender
          –   Sends a digitally signed message

     •   Receiver
          –   Receiver receives the digitally signed message along with the
              Certificate




99   © Novell, Inc. All rights reserved.
Exchanging Public Key
      Sender sends Digitally Signed Message




100   © Novell, Inc. All rights reserved.
Exchanging Public Keys
      Receiver receives Digitally Signed Message along
      with the sender's Certificate




101   © Novell, Inc. All rights reserved.
Encrypting/Decrypting Mails

      •   Sender (Original Receiver)
           –   Encrypts an email using the Receivers Certificate

      •   Receiver (Original Sender)
           –   Decrypts it using his/her Private Key




102   © Novell, Inc. All rights reserved.
Exchanging Public Keys
      Send Encrypted Message




103   © Novell, Inc. All rights reserved.
Exchanging Public Keys
      Receive Encrypted Message




104   © Novell, Inc. All rights reserved.
Overview

      •   User1 sends a digitally signed message to User2

      •   User2 receives the digitally signed message along with
          the certificate

      •   Now User2 can send an encrypted message to User1

      •   User1 decrypts the message with the Private Key




105   © Novell, Inc. All rights reserved.
S/MIME Demonstration
Questions?
Securing Novell GroupWise through SSL and S/MIME
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

More Related Content

What's hot (20)

PDF
James G. Joyner
techguyjames
 
PDF
Locking the Doors, Securing the Appliances
Dell World
 
PPTX
VMware Advance Troubleshooting Workshop - Day 4
Vepsun Technologies
 
PDF
CSACSGuide-SAMPLE
Tariq Sheikh
 
PDF
What You Should Know About WebLogic Server 12c (12.2.1.2) #oow2015 #otntour2...
Frank Munz
 
PPTX
VMware Advance Troubleshooting Workshop - Day 2
Vepsun Technologies
 
PPT
Storage Provisioning for Enterprise Information Applications
Ambareesh Kulkarni
 
PPTX
VMware Advance Troubleshooting Workshop - Day 3
Vepsun Technologies
 
PPTX
MCSA 70-412 Chapter 09
Computer Networking
 
PPTX
Windows 2012 R2 Multi Server Management
Sharkrit JOBBO
 
PDF
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
Grant Swanson
 
PDF
Presentation cloupia product overview and demo
xKinAnx
 
PDF
Eyeball XMPP Server Administrator Guide
Eyeball Networks
 
PDF
Philly Tech Fest Upgrade To Windows Server 2008 R2
Springhouse Education and Consulting Services
 
PPTX
VMware vSphere 6.0 - Troubleshooting Training - Day 1
Sanjeev Kumar
 
PPTX
Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2
Jeroen Burgers
 
PDF
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Cisco Canada
 
PDF
Innovating with Cisco Contact Center Architectures
Cisco Canada
 
PPTX
Pvs slide
Mohit Gupta
 
PPTX
Morning Coffee - Windows Server 2016
Primend
 
James G. Joyner
techguyjames
 
Locking the Doors, Securing the Appliances
Dell World
 
VMware Advance Troubleshooting Workshop - Day 4
Vepsun Technologies
 
CSACSGuide-SAMPLE
Tariq Sheikh
 
What You Should Know About WebLogic Server 12c (12.2.1.2) #oow2015 #otntour2...
Frank Munz
 
VMware Advance Troubleshooting Workshop - Day 2
Vepsun Technologies
 
Storage Provisioning for Enterprise Information Applications
Ambareesh Kulkarni
 
VMware Advance Troubleshooting Workshop - Day 3
Vepsun Technologies
 
MCSA 70-412 Chapter 09
Computer Networking
 
Windows 2012 R2 Multi Server Management
Sharkrit JOBBO
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
Grant Swanson
 
Presentation cloupia product overview and demo
xKinAnx
 
Eyeball XMPP Server Administrator Guide
Eyeball Networks
 
Philly Tech Fest Upgrade To Windows Server 2008 R2
Springhouse Education and Consulting Services
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
Sanjeev Kumar
 
Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2
Jeroen Burgers
 
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Cisco Canada
 
Innovating with Cisco Contact Center Architectures
Cisco Canada
 
Pvs slide
Mohit Gupta
 
Morning Coffee - Windows Server 2016
Primend
 

Viewers also liked (7)

PPTX
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
PPTX
pgp s mime
Chirag Patel
 
PPT
Pgp smime
Tania Agni
 
PPT
E-mail Security in Network Security NS5
koolkampus
 
PPT
Celebrity Cricket League 2016 - http://ccl5.com/
Tania Agni
 
PPTX
Pgp pretty good privacy
Pawan Arya
 
PDF
Email Security Overview
- Mark - Fullbright
 
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
pgp s mime
Chirag Patel
 
Pgp smime
Tania Agni
 
E-mail Security in Network Security NS5
koolkampus
 
Celebrity Cricket League 2016 - http://ccl5.com/
Tania Agni
 
Pgp pretty good privacy
Pawan Arya
 
Email Security Overview
- Mark - Fullbright
 
Ad

Similar to Securing Novell GroupWise through SSL and S/MIME (20)

PDF
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Novell
 
PDF
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Novell
 
PPTX
Cloud Platform Symantec Meetup Nov 2014
Miguel Zuniga
 
PPTX
SSL deep dive vCenter Server 5.5
fbuechsel
 
PPT
Chapter08
Muhammad Ahad
 
PDF
Exploring Advanced Authentication Methods in Novell Access Manager
Novell
 
PDF
Life without the Novell Client
Novell
 
PDF
59264945-Websphere-Security.pdf
DeepakAC3
 
PPTX
Fiware cloud developers week brussels
Fernando Lopez Aguilar
 
PDF
Novell Open Enterprise Server Architecture
Novell
 
PDF
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell
 
PPTX
End-to-End CI/CD at scale with Infrastructure-as-Code on AWS
Bhuvaneswari Subramani
 
PPTX
OpenStack Enabling DevOps
Cisco DevNet
 
PPTX
A Bit of Everything Chef
Mandi Walls
 
ODP
Cl212
Juliette Ponnet
 
PPTX
2014 OpenSuse Conf: Protect your MySQL Server
Georgi Kodinov
 
PPTX
Siebel server cloning
Jeroen Burgers
 
PPTX
Što danas zamjenjuje Small Business Server?
Tomislav Lulic
 
PPTX
Best ofmms scsm - iaas
Kenny Buntinx
 
PPTX
Best ofmms scsm - iaas
Dieter Wijckmans
 
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Novell
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Novell
 
Cloud Platform Symantec Meetup Nov 2014
Miguel Zuniga
 
SSL deep dive vCenter Server 5.5
fbuechsel
 
Chapter08
Muhammad Ahad
 
Exploring Advanced Authentication Methods in Novell Access Manager
Novell
 
Life without the Novell Client
Novell
 
59264945-Websphere-Security.pdf
DeepakAC3
 
Fiware cloud developers week brussels
Fernando Lopez Aguilar
 
Novell Open Enterprise Server Architecture
Novell
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell
 
End-to-End CI/CD at scale with Infrastructure-as-Code on AWS
Bhuvaneswari Subramani
 
OpenStack Enabling DevOps
Cisco DevNet
 
A Bit of Everything Chef
Mandi Walls
 
2014 OpenSuse Conf: Protect your MySQL Server
Georgi Kodinov
 
Siebel server cloning
Jeroen Burgers
 
Što danas zamjenjuje Small Business Server?
Tomislav Lulic
 
Best ofmms scsm - iaas
Kenny Buntinx
 
Best ofmms scsm - iaas
Dieter Wijckmans
 
Ad

More from Novell (20)

PDF
Filr white paper
Novell
 
PDF
Social media class 4 v2
Novell
 
PDF
Social media class 3
Novell
 
PDF
Social media class 2
Novell
 
PDF
Social media class 1
Novell
 
PDF
Social media class 2 v2
Novell
 
PDF
LinkedIn training presentation
Novell
 
PDF
Twitter training presentation
Novell
 
PDF
Getting started with social media
Novell
 
PDF
Strategies for sharing and commenting in social media
Novell
 
PPT
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Novell
 
PPT
Workload iq final
Novell
 
PDF
The Identity-infused Enterprise
Novell
 
PDF
Shining the Enterprise Light on Shades of Social
Novell
 
PDF
Accelerate to the Cloud
Novell
 
PDF
The New Business Value of Today’s Collaboration Trends
Novell
 
PDF
Preventing The Next Data Breach Through Log Management
Novell
 
PDF
Iaas for a demanding business
Novell
 
PDF
Workload IQ: A Differentiated Approach
Novell
 
PDF
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Novell
 
Filr white paper
Novell
 
Social media class 4 v2
Novell
 
Social media class 3
Novell
 
Social media class 2
Novell
 
Social media class 1
Novell
 
Social media class 2 v2
Novell
 
LinkedIn training presentation
Novell
 
Twitter training presentation
Novell
 
Getting started with social media
Novell
 
Strategies for sharing and commenting in social media
Novell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Novell
 
Workload iq final
Novell
 
The Identity-infused Enterprise
Novell
 
Shining the Enterprise Light on Shades of Social
Novell
 
Accelerate to the Cloud
Novell
 
The New Business Value of Today’s Collaboration Trends
Novell
 
Preventing The Next Data Breach Through Log Management
Novell
 
Iaas for a demanding business
Novell
 
Workload IQ: A Differentiated Approach
Novell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Novell
 

Recently uploaded (20)

PDF
visibel.ai Company Profile – Real-Time AI Solution for CCTV
visibelaiproject
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PDF
Integrating IIoT with SCADA in Oil & Gas A Technical Perspective.pdf
Rejig Digital
 
PDF
How Current Advanced Cyber Threats Transform Business Operation
Eryk Budi Pratama
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
Basics of Electronics for IOT(actuators ,microcontroller etc..)
arnavmanesh
 
PPTX
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
SalesForce Managed Services Benefits (1).pdf
TechForce Services
 
PDF
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
PDF
Alpha Altcoin Setup : TIA - 19th July 2025
CIFDAQ
 
PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
visibel.ai Company Profile – Real-Time AI Solution for CCTV
visibelaiproject
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
Integrating IIoT with SCADA in Oil & Gas A Technical Perspective.pdf
Rejig Digital
 
How Current Advanced Cyber Threats Transform Business Operation
Eryk Budi Pratama
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Basics of Electronics for IOT(actuators ,microcontroller etc..)
arnavmanesh
 
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
The Future of Artificial Intelligence (AI)
Mukul
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
SalesForce Managed Services Benefits (1).pdf
TechForce Services
 
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
Alpha Altcoin Setup : TIA - 19th July 2025
CIFDAQ
 
Market Insight : ETH Dominance Returns
CIFDAQ
 

Securing Novell GroupWise through SSL and S/MIME

  • 1. Securing Novell GroupWise ® ® through SSL and S/Mime Dirk Giles GroupWise Software Engineer [email protected] Mukesh Jethwani Novell WorldWide Support Engineer [email protected]
  • 2. Agenda • LDAP authentication and Novell GroupWise ® ® Post Offices • Novell GroupWise Agents and SSL – Certificate Generation – Installing and Enabling SSL – Securing GWIA and WebAccess agents • Secure Internet Email with S/MIME 2 © Novell, Inc. All rights reserved.
  • 4. Why Use LDAP Authentication? • Uses user's directory password – Minimizes password management requirements – Supports password policies (Bind Mode) – Less passwords for the user to remember • Can authenticate to other LDAP directories • Requires that users connect to the directory – Note: Directory accounts without a password will not require a password, even with a High Security Post Office 4 © Novell, Inc. All rights reserved.
  • 5. LDAP Authentication Planning • LDAP Server information – Use SSL or not? > SSL key file – IP Address or name of LDAP server – LDAP port for LDAP server – User authentication method > Bind > Compare 5 © Novell, Inc. All rights reserved.
  • 6. LDAP Authentication Planning Part 2 • Use proxy user? – Access the directory with limited rights – Need distinguished name (DN) – Need password • Allow users to change password? – Novell GroupWise Client Change Password dialog ® ® 6 © Novell, Inc. All rights reserved.
  • 7. Export LDAP Certificate Which One? 7 © Novell, Inc. All rights reserved.
  • 8. Export LDAP Certificate Certificate Properties 8 © Novell, Inc. All rights reserved.
  • 9. Export LDAP Certificate Export Wizard – No Private Key 9 © Novell, Inc. All rights reserved.
  • 10. Export LDAP Certificate Export Wizard – Output Format and Filename 10 © Novell, Inc. All rights reserved.
  • 11. LDAP Server Configuration Novell GroupWise System Tools ® ® 11 © Novell, Inc. All rights reserved.
  • 12. LDAP Server Configuration LDAP Server List 12 © Novell, Inc. All rights reserved.
  • 13. LDAP Server Configuration LDAP Server Options 13 © Novell, Inc. All rights reserved.
  • 14. Post Office Configuration Security Settings 14 © Novell, Inc. All rights reserved.
  • 15. Post Office Configuration LDAP Server Selection 15 © Novell, Inc. All rights reserved.
  • 17. Securing Novell GroupWise with SSL ® ®
  • 18. Novell GroupWise Security and SSL ® ® • Enhances native messaging encryption • Ensures secure communication between the Post Office Agent and clients • Ensures secure communication between the Novell GroupWise agents • Secures Web Console and WebAccess 18 © Novell, Inc. All rights reserved.
  • 19. Where Do I Start? 1. Get a certificate! – Generate a Certificate Signing Request (CSR) > Each separate server should have its own > Agents running on the same server can share 19 © Novell, Inc. All rights reserved.
  • 20. Generate Certificate Signing Request Novell GroupWise Generate CSR Utility (GWCSRGEN) ® ® 20 © Novell, Inc. All rights reserved.
  • 21. Request the Certificate • Submit the certificate signing request to a certificate authority – Trusted Certificate Authorities – Online submission mechanisms – Create your own 21 © Novell, Inc. All rights reserved.
  • 22. Create a Certificate • Novell Certificate Server and Novell eDirectory ™ ® ™ – ConsoleOne ® > Requires the Novell Certificate Server snap-in – iManager > Requires the Novell Certificate Server plug-in module • YaST on Linux – Novell Open Enterprise Server – SUSE Linux Enterprise Server ® 22 © Novell, Inc. All rights reserved.
  • 23. Create a Certificate using Novell Certificate Server ™ • Enter certificate signing request • Select key type and usage • Select validity period • Select output format and filename 23 © Novell, Inc. All rights reserved.
  • 24. Issuing a Certificate with ConsoleOne ® Issue Certificate Wizard 24 © Novell, Inc. All rights reserved.
  • 25. Issuing a Certificate with ConsoleOne ® Enter certificate signing request 25 © Novell, Inc. All rights reserved.
  • 26. Issuing a Certificate with ConsoleOne ® Select key type and usage 26 © Novell, Inc. All rights reserved.
  • 27. Issuing a Certificate with ConsoleOne ® Select validity period 27 © Novell, Inc. All rights reserved.
  • 28. Issuing a Certificate with ConsoleOne ® Select output format and filename 28 © Novell, Inc. All rights reserved.
  • 29. Issuing a Certificate with YaST Enter Certificate Authority 29 © Novell, Inc. All rights reserved.
  • 30. Issuing a Certificate with YaST Select Export to File 30 © Novell, Inc. All rights reserved.
  • 31. Issuing a Certificate with YaST Select output format and filename 31 © Novell, Inc. All rights reserved.
  • 32. Issuing a Certificate with YaST Save certificate 32 © Novell, Inc. All rights reserved.
  • 33. Issuing a Certificate with YaST Save key 33 © Novell, Inc. All rights reserved.
  • 35. Install the Certificate 2. Install the certificate! – Use ConsoleOne to designate the certificate ® and key paths – Enter the password of the key file 35 © Novell, Inc. All rights reserved.
  • 36. Configure Access Network Access Tab 3. Enable SSL and configure access – Disabled, Enabled, and Required – Internal versus External 36 © Novell, Inc. All rights reserved.
  • 37. Equivalent Command Line Options 37 © Novell, Inc. All rights reserved.
  • 39. Securing Novell GroupWise Internet Agent ® ®
  • 40. Securing the Novell GroupWise ® ® Internet Agent with SSL • Secure Connections to other SMTP hosts • Secure Connections for POP/IMAP clients • Secure Connections to WebConsole – SSL Enabled or Required for the above? 40 © Novell, Inc. All rights reserved.
  • 41. Securing the GWIA with SSL Install the Certificate 41 © Novell, Inc. All rights reserved.
  • 42. Securing the GWIA with SSL Enabling SSL 42 © Novell, Inc. All rights reserved.
  • 43. Securing Novell GroupWise ® ® Internet Agent Demonstration
  • 44. Securing Novell GroupWise WebAccess ® ®
  • 45. Securing WebAccess with SSL • Securing WebAccess Agent - WebConsole • Securing WebAccess Application (Apache/IIS) 45 © Novell, Inc. All rights reserved.
  • 46. Securing WebAccess Agent Install Certificate 46 © Novell, Inc. All rights reserved.
  • 47. Securing WebAccess Agent Enabling SSL 47 © Novell, Inc. All rights reserved.
  • 48. Securing WebAccess Agent Demonstration
  • 49. Securing WebAccess Application Linux - Apache • Modify /etc/sysconfig/apache – APACHE_SERVER_FLAGS=” SSL” • Modify /etc/apache2/vhosts.d/vhost-ssl.conf 49 © Novell, Inc. All rights reserved.
  • 50. Securing WebAccess Application Linux - Apache • Restart apache2 by typing “rcapache2 restart” • If the Private Key has a password restarting apache will ask for the password during the restart. Follow the step listed below to remove the password from the Key file – openssl rsa -in gw.key -out gwu.key – Also protect gwu.key by making sure only root can read gwu.key by typing “chmod 700 gwu.key” • Modify the /etc/apache2/vhosts.d/vhost-ssl.conf with the unencrypted key file 50 © Novell, Inc. All rights reserved.
  • 51. Securing Apache on Linux Demonstration
  • 52. Securing WebAccess Application NetWare - Apache ® • Apache on NetWare by default enables SSL but uses the internal Certificates • Follow TID 3033173 to import Certificate from a Public CA to Novell eDirectory ® ™ • Modify SYS:APACHE2CONFHTTPD.CONF file – SecureListen 443 “SSL CertificateDNS” • Restart apache by typing ap2webdn and ap2webup 52 © Novell, Inc. All rights reserved.
  • 53. Securing WebAccess Application Windows 2008 - IIS 53 © Novell, Inc. All rights reserved.
  • 54. Securing WebAccess Application Windows 2008 - IIS 54 © Novell, Inc. All rights reserved.
  • 55. Securing WebAccess Application Windows 2008 - IIS 55 © Novell, Inc. All rights reserved.
  • 56. Securing WebAccess Application Windows 2008 - IIS 56 © Novell, Inc. All rights reserved.
  • 57. Securing WebAccess Application Windows 2008 - IIS 57 © Novell, Inc. All rights reserved.
  • 58. Securing WebAccess Application Windows 2008 - IIS Sign the CSR using ConsoleOne and issue the ® certificate in a der format OR Send the CSR to the Public CA and get the Certificate 58 © Novell, Inc. All rights reserved.
  • 59. Securing WebAccess Application Windows 2008 - IIS 59 © Novell, Inc. All rights reserved.
  • 60. Securing WebAccess Application Windows 2008 - IIS 60 © Novell, Inc. All rights reserved.
  • 61. Securing WebAccess Application Enabling SSL 61 © Novell, Inc. All rights reserved.
  • 62. Securing WebAccess Application Enabling SSL 62 © Novell, Inc. All rights reserved.
  • 63. Securing WebAccess Application Enabling SSL 63 © Novell, Inc. All rights reserved.
  • 64. Securing WebAccess Application Enabling SSL 64 © Novell, Inc. All rights reserved.
  • 65. Securing IIS on Windows Demonstration
  • 66. Secure Internet Email with S/MIME
  • 67. Secure Internet Email with S/MIME • What is S/MIME – Digital Signature – Encryption (Symmetric vs Asymmetric) • Advantages and Disadvantages • Creating and Importing User Certificates (Public Key and Private Key) • Exchanging Public Keys/Certificates • Encrypting/Decrypting Mails 67 © Novell, Inc. All rights reserved.
  • 68. What is S/MIME? • S/MIME is an acronym for Secure/Multipurpose Internet Mail Extensions • It is a standard for Public Key Encryption and signing of MIME Data. In simple terms, it is used for Digitally signing a message and/or Encrypting a message – Digital Signature – Encryption 68 © Novell, Inc. All rights reserved.
  • 69. Digital Signature • Signature – A signature in simple terms is a handwritten depiction of someone's name or a nickname that a person writes on documents as a proof of identity and intent • Digital Signature is an electronic signature used to authenticate the identity of the sender of a message and possibly to ensure that the original content of the message or document that has been sent is unchanged. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later. 69 © Novell, Inc. All rights reserved.
  • 70. Encryption • Encryption – A process of transforming information using an information to make it unreadable to anyone except those possessing special knowledge • Two types of Encryption – Symmetric vs Asymmetric? 70 © Novell, Inc. All rights reserved.
  • 71. Symmetric vs Asymmetric • Symmetric – Same key is used for Encryption and Decryption • Asymmetric – Separate keys are used for Encryption and Decryption 71 © Novell, Inc. All rights reserved.
  • 72. Advantages/Disadvantages • Advantages – Authenticity and Protection of the Message • Disadvantages – Not all email software handles S/MIME signatures – S/MIME Encryption is currently not available for the Novell ® GroupWise Linux, Mac, or WebAccess clients ® 72 © Novell, Inc. All rights reserved.
  • 73. Creating and Importing User Certificates (Public Key and Private Key) • Administrator – Creates the Public Key and Private Key • Users – Export the Private Key and the Public Key • Users – Import the Public Key and Private Key into the Client 73 © Novell, Inc. All rights reserved.
  • 74. Creating User Certificates Login to iManager as admin 74 © Novell, Inc. All rights reserved.
  • 75. Creating User Certificates Create Certificate for users 75 © Novell, Inc. All rights reserved.
  • 76. Creating User Certificates Create Certificate for users 76 © Novell, Inc. All rights reserved.
  • 77. Creating User Certificates Create Certificate for users 77 © Novell, Inc. All rights reserved.
  • 78. Creating User Certificates Create Certificate for users 78 © Novell, Inc. All rights reserved.
  • 79. Creating User Certificates Create Certificate for users 79 © Novell, Inc. All rights reserved.
  • 80. Creating User Certificates Create Certificate for users 80 © Novell, Inc. All rights reserved.
  • 81. Importing User Certificates Administrator sets the URL 81 © Novell, Inc. All rights reserved.
  • 82. Importing User Certificates Administrator sets the URL 82 © Novell, Inc. All rights reserved.
  • 83. Importing User Certificates Administrator sets the URL 83 © Novell, Inc. All rights reserved.
  • 84. Importing User Certificates User Imports the Certificate 84 © Novell, Inc. All rights reserved.
  • 85. Importing User Certificates User Imports the Certificate 85 © Novell, Inc. All rights reserved.
  • 86. Importing User Certificates User Imports the Certificate 86 © Novell, Inc. All rights reserved.
  • 87. Importing User Certificates User Imports the Certificate 87 © Novell, Inc. All rights reserved.
  • 88. Importing User Certificates User Imports the Certificate 88 © Novell, Inc. All rights reserved.
  • 89. Importing User Certificates User Imports the Certificate 89 © Novell, Inc. All rights reserved.
  • 90. Importing User Certificates User Imports the Certificate 90 © Novell, Inc. All rights reserved.
  • 91. Importing User Certificates User Imports the Certificate 91 © Novell, Inc. All rights reserved.
  • 92. Importing User Certificates User Imports the Certificate 92 © Novell, Inc. All rights reserved.
  • 93. Importing User Certificates User Imports the Certificate 93 © Novell, Inc. All rights reserved.
  • 94. Importing User Certificates User Imports the Certificate 94 © Novell, Inc. All rights reserved.
  • 95. Importing User Certificates User Imports the Certificate 95 © Novell, Inc. All rights reserved.
  • 96. Importing User Certificates User Imports the Certificate 96 © Novell, Inc. All rights reserved.
  • 97. Importing User Certificates User Imports the Certificate 97 © Novell, Inc. All rights reserved.
  • 98. Importing User Certificates User Imports the Certificate 98 © Novell, Inc. All rights reserved.
  • 99. Exchanging Public Keys/Certificates • Sender – Sends a digitally signed message • Receiver – Receiver receives the digitally signed message along with the Certificate 99 © Novell, Inc. All rights reserved.
  • 100. Exchanging Public Key Sender sends Digitally Signed Message 100 © Novell, Inc. All rights reserved.
  • 101. Exchanging Public Keys Receiver receives Digitally Signed Message along with the sender's Certificate 101 © Novell, Inc. All rights reserved.
  • 102. Encrypting/Decrypting Mails • Sender (Original Receiver) – Encrypts an email using the Receivers Certificate • Receiver (Original Sender) – Decrypts it using his/her Private Key 102 © Novell, Inc. All rights reserved.
  • 103. Exchanging Public Keys Send Encrypted Message 103 © Novell, Inc. All rights reserved.
  • 104. Exchanging Public Keys Receive Encrypted Message 104 © Novell, Inc. All rights reserved.
  • 105. Overview • User1 sends a digitally signed message to User2 • User2 receives the digitally signed message along with the certificate • Now User2 can send an encrypted message to User1 • User1 decrypts the message with the Private Key 105 © Novell, Inc. All rights reserved.
  • 109. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.