We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Web Application Firewall

How to Integrate CA SiteMinder with the Barracuda Web Application Firewall

  • Last updated on

Overview

CA/Netegrity SiteMinder provides an infrastructure for centralized and secure policy management of websites. It uniquely identifies users before they are authenticated as named users, and manages user privileges to ensure that they access only authorized applications or operations.

Support for SiteMinder has been deprecated. Also, SiteMinder feature will NOT be available from Version 9.1.

Components in SiteMinder Setup

The two significant components of SiteMinder are:

  • Web Agents – Integrated with a standard web server or application server to enable SiteMinder to manage web applications using predefined security policies.
  • Policy Server – Provides Policy management and AAA functions within the SiteMinder framework.

To integrate the Barracuda Web Application Firewall with CA/Netegrity SiteMinder, perform the following steps:

  1. Configure the Netegrity SiteMinder Policy Server
  2. Configure the Barracuda Web Application Firewall
  3. Verify the Setup

Configure the Netegrity SiteMinder Policy Server

The images captured in the following steps are taken from the Netegrity SiteMinder Policy Server Version 6.0 SP4. The screens may vary depending on the version you are using.

Follow these steps on the Netegrity SiteMinder Policy Server:

  1. Create an Agent in the SiteMinder Policy Server
  2. Create an Agent Configuration Object
  3. Create a Host Conf Object
  4. Create a User Directory with All User Names to be Authenticated by SiteMinder
  5. Create a Domain for the User Directory
  6. Create a Realm and Associate the Agent with the Realm
  7. Create Rules for the Realm
  8. Create a Policy for the Realm
Create an Agent in the SiteMinder Policy Server
  1. From the System tab of the Netegrity Policy Server window, right click the Agents option from the System Configuration tree and select Create Agent. The Agent Properties window appears. To create the Agent, fill in the following fields:
    1. Name – Enter the agent name.
    2. Description – Enter the description for the agent.
    3. Agent Type – Select SiteMinder as agent type, and then select Web Agent from the drop-down list.
  2. Click Apply, and then OK. The created agent appears in the Netegrity Policy Server window.
Figure 1. Creating SiteMinder Agent.

agent_conf_1.png

Create an Agent Configuration Object
  1. From the System tab of the Netegrity Policy Server window, right click the Agent Conf Objects option from the System Configuration tree. In the right hand pane, right click ApacheDefaultSettings and select Duplicate Configuration Object (Figure 2). The Agent Configuration Object Properties window appears. Fill in the following fields:
    1. Name – Enter a name for the agent configuration object.
    2. Description – Enter a description for the agent configuration object.
  2. Click Add. The Edit Parameter Dialog appears. Provide the Parameter Name: AcceptTPCookie and Value: Yes and click OK (Figure 3).
  3. Locate and select DefaultAgentName in the Configuration Values, and click Edit.
  4. When the Edit Parameter Dialog appears, remove the hash (#) associated with the DefaultAgentName and enter the Name from step a. above in the Value field (Figure 4).
  5. Verify the RequireCookies parameter in the Configuration Values is set to Yes for the agent.

  6. Leave the remaining parameters set to their default values. Click Apply and then OK.

Figure 2. Agent Conf Object List.

agent_conf_object_1.png

Figure 3. Agent Configuration Object Properties.

agent_conf_object_2.png

Figure 4. Configuring Default Agent Name.

agent_conf_object_3.png

Create a Host Conf Object
  1. From the System tab of the Netegrity Policy Server window (Figure 1), right click the Host Conf Objects option from the System Configuration tree and click the Create Host Conf Object. The Host Configuration Object Properties window appears (Figure 5). Do the following to create the host configuration object:
    1. Name: Enter a name for the host configuration object.
    2. Description: Enter a description for the host.
    3. Click Add. The Edit Parameter Dialog window appears. Add the following parameters and set appropriate values. For example, see Figure 5.
      1. EnableFailOver
      2. MaxSocketsPerPort
      3. MinSocketsPerPort
      4. NewSocketStep
      5. PolicyServer
      6. RequestTimeout
  2. Click Apply and then OK. The created Host Config Object appears in the Netegrity Policy Server window.
Figure 5. Host Configuration Object Properties.

host_conf_object.png

Create a User Directory with All User Names to be Authenticated by SiteMinder
  1. From the System tab of the Netegrity Policy Server window (Figure 1), right click the User Directories option from the System Configuration tree and click Create User Directory. The User Directory Properties window (Figure 6) appears. Click the Directory Setup tab and do the following to configure the User Directory:
    1. Name: Enter a name for the user directory.
    2. Description: Enter a description.
    3. NameSpace: Select the directory where users can be authenticated.
    4. Server: Enter the IP Address of the NameSpace directory. SiteMinder communicates with this server to authenticate users.
  2. Click the Credentials and Connection tab and configure the Administrator Credentials section:
    1. Select the Require Credentials check box.
    2. Username: Enter the Distinguished Name (DN) that can be used to query the LDAP server.
    3. Password: Enter the password for querying the LDAP server.
    4. Confirm Password:  Reconfirm the password.
  3. Click Apply and then OK. The created user directory appears in the Netegrity Policy Server window (Figure 7).
Figure 6. User Directory Properties.

user_directory.png

Figure 7. User Directory List.

user_directory_list.png

Create a Domain for the User Directory
  1. From the System tab of the Netegrity Policy Server window (Figure 1), right click the Domains option from the System Configuration tree and click Create Domain. When the Domain Properties Dialog (Figure 9) appears, do the following:
    1. Name: Enter a domain name.
    2. Description: Enter a description for the domain.
    3. In the User Directories tab, select the relevant directory and click Add (Figure 8).
  2. Click Apply and then OK. The created agent appears in the Netegrity Policy Server window.
Figure 8. Domain Properties.

domain_properties.png

Create a Realm and Associate the Agent with the Realm

 

Realm on the SiteMinder Policy Server is different from Realm on the Barracuda Web Application Firewall.

  1. From the Domains tab of the Netegrity Policy Server window (Figure 9), right click the Realm option from the Domains tree and click Create Realm. When the Realm Properties Dialog (Figure 11) appears, do the following to create the realm:
    1. Name: Enter a realm name.
    2. Description: Enter a description for the realm.
  2. Enter the name of the created agent in the Agent field, or click Lookup to select it from a list.
  3. Select Basic or HTML Form authentication type from the Authentication Scheme list.
    1. If Basic authentication is selected, the Barracuda Web Application Firewall presents the default login page for authentication.
    2. If HTML Form authentication is selected, specify the target URL for authentication in the Authentication Scheme Properties window (Figure 10).
  4. Click OK in the Realm Properties window to associate the agent with the created realm.
Figure 9. Domains.

domains.png

Figure 10. Authentication Scheme.

auth_scheme.png

Create Rules for the Realm

Two rules needs to be configured for a realm:

  • Rule for Authentication Event
  • Rule for Web Agent actions
Rule for Authentication Event:
  1. From the Domains tab of the Netegrity Policy Server window (Figure 9), click the Realms option from the Domains tree. Right click on the realm to which you want to add a rule and click Create Rule under Realm (Figure 11). When the Rule Propertieswindow appears, do the following to configure the rule:
    1. Name: Enter a rule name.
    2. Description: Enter a description for the rule.
    3. Select Authentication events in the Action section (Figure 12).
  2. Click Apply and then OK. The created rule appears in the list of rules and realms for the bwaf-doc-realm.
Figure 11. Creating a Rule.

create_rule.png

Figure 12. Rule Properties.

rule_properties.png

Rule for Web Agent Actions:
  1. Follow Step 1: a and b under Rule for Authentication Event. In Step 1: c, select Web Agent actions in the Action section.
  2. Select the methods for web agent (Figure 13). Click Apply and then OK.
Figure 13. Rule for Web Agent Actions.

rule_web_agent_actions.jpg

Create a Policy for the Realm
  1. From the Domain tab of the Netegrity Policy Server window, click the Policies option from the Domains tree. Right click and select Create Policy. When the Policies Properties window appears , do the following to configure the policy:
  2. In the Users tab, click the Add/Remove button. When the Users/Groups window appears, add the desired users and click OK. The added users appear in the Policy Properties window ( Figure 14 - Users).
  3. In the Rules tab, click the Add/Remove Rules button. When the Rule Items window appears, add the rules and click OK. The added rules appear in the Policy Properties window ( Figure 15 - Rules).
  4. Click Apply and then OK. The created policy appears in the Policy List.
Figure 14. Users.

policy_properties.png

Figure 15. Rules.

policy_properties_rules.png

The Barracuda Web Application Firewall can be integrated with an external CA web agent, which can act as a cookie provider application (master application) to the slave applications configured on the Barracuda Web Application Firewall.

Configure the Barracuda Web Application Firewall

Do the following steps to configure the Barracuda Web Application Firewall with CA SiteMinder:

  1. Add the SiteMinder Policy Server as an Authentication Service on the Barracuda Web Application Firewall
  2. Bind the appropriate Service(s) with the SiteMinder Authentication Service
  3. Configure the Authorization Policy for the Service
Add the SiteMinder Policy Server as an Authentication Service on the Barracuda Web Application Firewall
  1. In the Barracuda Web Application Firewall web interface, go to the ACCESS CONTROL > Authentication Services page and select the SITEMINDER tab.
  2. Specify values for the following fields:
    1. Realm Name – Enter the name of the realm where the Barracuda Web Application Firewall admins are stored.
    2. Server IP – Enter the IP address of the SiteMinder Policy Server used to authenticate users.
    3. Port – Enter the authentication port of the SiteMinder Policy Server. Port 44443 is the standard port used for SiteMinder.
    4. Admin – Enter the privileged username for the SiteMinder Policy Server.
    5. Password – Enter the privileged user password for the SiteMinder Policy Server.
    6. Agent Name – Enter the agent name configured in the SiteMinder Policy Server to act as the Barracuda Web Application Firewall's SiteMinder agent. Note: The specified agent name must have the following parameters set to Yes under Agent Conf Objects on the SiteMinder Policy Server:
      • AcceptTPCookie
      • RequireCookies
    7. Host Conf Object – Enter the corresponding Host Configuration Object defined on the SiteMinder Policy Server.
  3. Click Add to add the SiteMinder server configuration.

When SiteMinder is initially accessed, a trusted host is generated on the SiteMinder Policy Server. It includes the Barracuda Web Application Firewall Serial Number and agent name.

Figure 16. SiteMinder Authentication Service Configuration.

siteminder_authentication_service.png

Bind the appropriate Service(s) with the SiteMinder Authentication Service
  1. Go to the ACCESS CONTROL > Authentication page.
  2. Identify the Service you want to bind to the SiteMinder Authentication Service.
  3. Click Edit next to the Service. When the Edit Authentication Policy window appears (Figure 17), do the following:
  4. Set the Status to On.
  5. Select the SiteMinder Authentication Service created above (Figure 16) from the list. Specify values for other parameter(s) and click Save Changes.
Figure 17. Authentication Policy.

auth_policy.png

Configuring Authorization Policy for the Service
  1. Go to the ACCESS CONTROL > Authorization > Add Authorization Policy section.
  2. Service: Select the desired service from the list.
  3. Policy Name: Specify a name for the Authorization Policy.
  4. Set the Status to On and specify the values for other parameter(s) as required.
  5. Click Add to add the authorization policy configuration.
  6. If you wish to enforce fine grained access control, click Edit next to the created policy. The Edit Authorization Policy window appears. For more detailed instructions, see Configuring Authorization Policy.  
Figure 18. Authorization Policy.

add_auth_policy.png

If the user realm is set to HTML Form authentication type on the SiteMinder Policy Server, the Login Method on the Barracuda Web Application Firewall must be set to HTML Form.

Verify the Setup

  1. Enter the restricted URL in the browser. For example, for the above configuration you would enter http://192.168.132.121/forms/  in the address bar of a web browser (Figure 19).
  2. If the user realm on the SiteMinder Policy Server is set to Basic Authentication type and the Auth Not Done URL field is blank on the ACCESS CONTROL > Authorization page, the Barracuda Web Application Firewall presents the default authentication page (Figure 20 -Default Authentication Page ).
  3. If the user realm on the SiteMinder Policy Server is set to HTML Form authentication type, the Barracuda Web Application Firewall redirects the user to the login URL specified in the Authentication Scheme Properties window (Figure 10).
  4. Go to the BASIC > Access Logs page (Figure 21), enable the login column and verify the results.
Figure 19. Address bar.

browser.png

Figure 20. Default Authentication Page.

default_auth_page.png

Figure 21. Access Logs.

access_logs.png

 

Last updated on