S 3.30 Training on the use of Novell eDirectory client software

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Supervisor, Head of IT

For use on an intranet, the eDirectory is installed on one server or (normally) on several servers. The users and user groups configured in the eDirectory can then access the directory service using appropriate eDirectory client software, in accordance with the rights assigned to them in the eDirectory.

Depending on the type of client software used, accessing eDirectory is transparent for the users, and it is therefore unnecessary for users to be trained in aspects of the software specific to the eDirectory. If, however, the client used requires user authentication for the eDirectory, as for example in Novell Client for Windows, then users must be trained in the subjects listed below as a minimum:

If an LDAP client which allows the user to browse through the hierarchical directory tree or to specify his/her own search queries at the level of LDAP attributes is used, additional training must be provided in the following subjects:

In addition to the general client directory service (Novell Client for Windows and libraries for UNIX operating systems) there is another class of client applications for eDirectory, which are used specifically for user administration in IT environments (including heterogeneous ones): the Novell Account Management module. These applications are integrated into the login procedure for the corresponding operating systems and thus assume user authentication tasks. In addition, NDS AS (NDS Authentication Service) is available for a number of platforms (Linux, FreeBSD, HP-UX, MVS, OS/390, Solaris). NDS AS requires the use of Netware (version 5.0, SP 4A or above).

Authentication is a major aspect of the secure operation of eDirectory. From the point of view of the directory service, steps should be taken to ensure that not only is the client authenticated to the system but the user to the client as well. Following successful authentication, eDirectory offers automatic access to all objects and services to which access is permitted (so-called background authentication). In this manner single sign-on is implemented.

Authentication thus entails the following sequence: the user enters his/her user name on the Novell client and this is passed directly to eDirectory. eDirectory searches through its directory for the relevant private key and encrypts the key. Both the user password and a client secret are involved in this encryption. This encrypted private key is passed to the requesting client. The user is then asked to enter his/her password which he/she communicates to the client. Using this password and the client proof of authority, the client then decrypts the private key and keeps it in its working memory. On the basis of this private key and the certificate counterpart, the real authentication with eDirectory now takes place using a challenge-response procedure. If this is successful, the user is logged on and the private key of the user is deleted from the working memory of the client.

Outwardly, the system thus appears to be using a password-protected authentication scheme, but inwardly, asymmetric cryptography mechanisms are being employed.

The security of the data stored on eDirectory servers is also largely dependent on users correctly handling the security mechanisms. Users of eDirectory client software should therefore be given appropriate training in their effective use.

Security mechanisms from the user's perspective

In terms of using eDirectory client software, users can be relieved of many of the security-related set-up work through appropriate preliminary work and definition of default settings by the administrator. Such an approach is imperative if clients are to be configured in a manner that is uniform and can be checked. Nevertheless, some security-related settings have to be made by users themselves. These normally include rights of access to a user's own files and directories at operating system level. Rights of access to files with eDirectory resources can only be directly administrated for file servers based on the Netware operating system. Access rights to files on other platforms can be administrated indirectly via the organisational roles.

Training course content

The key points set out below summarise the subjects that need to be covered in training courses. The application scenario should be considered when selecting the course contents.

Review questions: