SlideShare a Scribd company logo
1 of 109
Download to read offline
Securing Novell GroupWise           ®   ®



through SSL and S/Mime

Dirk Giles
GroupWise Software Engineer
dpgiles@novell.com

Mukesh Jethwani
Novell WorldWide Support Engineer
mjethwani@novell.com
Agenda

    •   LDAP authentication and Novell GroupWise
                                           ®      ®



        Post Offices

    •   Novell GroupWise Agents and SSL

         –   Certificate Generation

         –   Installing and Enabling SSL

         –   Securing GWIA and WebAccess agents

    •   Secure Internet Email with S/MIME

2   © Novell, Inc. All rights reserved.
LDAP Authentication
Why Use LDAP Authentication?

    •   Uses user's directory password
         –   Minimizes password management requirements

         –   Supports password policies (Bind Mode)

         –   Less passwords for the user to remember

    •   Can authenticate to other LDAP directories
    •   Requires that users connect to the directory
         –   Note: Directory accounts without a password will
             not require a password, even with a High Security
             Post Office

4   © Novell, Inc. All rights reserved.
LDAP Authentication Planning

    •   LDAP Server information
         –   Use SSL or not?
              >   SSL key file

         –   IP Address or name of LDAP server

         –   LDAP port for LDAP server

         –   User authentication method
              >   Bind

              >   Compare




5   © Novell, Inc. All rights reserved.
LDAP Authentication Planning                          Part 2

    •   Use proxy user?
         –   Access the directory with limited rights

         –   Need distinguished name (DN)

         –   Need password

    •   Allow users to change password?
         –   Novell GroupWise Client Change Password dialog
                           ®              ®




6   © Novell, Inc. All rights reserved.
Export LDAP Certificate
    Which One?




7   © Novell, Inc. All rights reserved.
Export LDAP Certificate
    Certificate Properties




8   © Novell, Inc. All rights reserved.
Export LDAP Certificate
    Export Wizard – No Private Key




9   © Novell, Inc. All rights reserved.
Export LDAP Certificate
     Export Wizard – Output Format and Filename




10   © Novell, Inc. All rights reserved.
LDAP Server Configuration
     Novell GroupWise System Tools
                       ®                   ®




11   © Novell, Inc. All rights reserved.
LDAP Server Configuration
     LDAP Server List




12   © Novell, Inc. All rights reserved.
LDAP Server Configuration
     LDAP Server Options




13   © Novell, Inc. All rights reserved.
Post Office Configuration
     Security Settings




14   © Novell, Inc. All rights reserved.
Post Office Configuration
     LDAP Server Selection




15   © Novell, Inc. All rights reserved.
LDAP Authentication Demonstration
Securing Novell GroupWise with SSL
              ®          ®
Novell GroupWise Security and SSL
                             ®             ®




     •   Enhances native messaging encryption

     •   Ensures secure communication between the
         Post Office Agent and clients

     •   Ensures secure communication between the
         Novell GroupWise agents

     •   Secures Web Console and WebAccess




18   © Novell, Inc. All rights reserved.
Where Do I Start?

     1. Get a certificate!
          –   Generate a Certificate Signing Request (CSR)

               >   Each separate server should have its own

               >   Agents running on the same server can share




19   © Novell, Inc. All rights reserved.
Generate Certificate Signing Request
     Novell GroupWise Generate CSR Utility (GWCSRGEN)
                     ®                     ®




20   © Novell, Inc. All rights reserved.
Request the Certificate

     •   Submit the certificate signing request to a
         certificate authority
          –   Trusted Certificate Authorities

          –   Online submission mechanisms

          –   Create your own




21   © Novell, Inc. All rights reserved.
Create a Certificate

     •   Novell Certificate Server and Novell eDirectory
                                                 ™
                                                                    ®
                                                                           ™




          –   ConsoleOne                   ®




               >   Requires the Novell Certificate Server snap-in

          –   iManager
               >   Requires the Novell Certificate Server plug-in module

     •   YaST on Linux
          –   Novell Open Enterprise Server

          –   SUSE Linux Enterprise Server
                           ®




22   © Novell, Inc. All rights reserved.
Create a Certificate using
     Novell Certificate Server               ™



     •   Enter certificate signing request

     •   Select key type and usage

     •   Select validity period

     •   Select output format and filename




23   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Issue Certificate Wizard




24   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Enter certificate signing request




25   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Select key type and usage




26   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Select validity period




27   © Novell, Inc. All rights reserved.
Issuing a Certificate with ConsoleOne ®


     Select output format and filename




28   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Enter Certificate Authority




29   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Select Export to File




30   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Select output format and filename




31   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Save certificate




32   © Novell, Inc. All rights reserved.
Issuing a Certificate with YaST
     Save key




33   © Novell, Inc. All rights reserved.
Certificate Generation Demonstration
Install the Certificate

     2. Install the certificate!
          –   Use ConsoleOne to designate the certificate
                                           ®



              and key paths
          –   Enter the password of the key file




35   © Novell, Inc. All rights reserved.
Configure Access
     Network Access Tab

     3. Enable SSL and configure access
          –   Disabled, Enabled, and Required
          –   Internal versus External




36   © Novell, Inc. All rights reserved.
Equivalent Command Line Options




37   © Novell, Inc. All rights reserved.
GWPOA Certificate
Installation Demonstration
Securing Novell GroupWise Internet Agent
              ®          ®
Securing the Novell GroupWise         ®           ®



     Internet Agent with SSL
     •   Secure Connections to other SMTP hosts

     •   Secure Connections for POP/IMAP clients

     •   Secure Connections to WebConsole
          –   SSL Enabled or Required for the above?




40   © Novell, Inc. All rights reserved.
Securing the GWIA with SSL
     Install the Certificate




41   © Novell, Inc. All rights reserved.
Securing the GWIA with SSL
     Enabling SSL




42   © Novell, Inc. All rights reserved.
Securing Novell GroupWise
               ®           ®



Internet Agent Demonstration
Securing Novell GroupWise WebAccess
             ®         ®
Securing WebAccess with SSL

     •   Securing WebAccess Agent - WebConsole

     •   Securing WebAccess Application (Apache/IIS)




45   © Novell, Inc. All rights reserved.
Securing WebAccess Agent
     Install Certificate




46   © Novell, Inc. All rights reserved.
Securing WebAccess Agent
     Enabling SSL




47   © Novell, Inc. All rights reserved.
Securing WebAccess Agent Demonstration
Securing WebAccess Application
     Linux - Apache

     •   Modify /etc/sysconfig/apache
          –   APACHE_SERVER_FLAGS=” SSL”
     •   Modify /etc/apache2/vhosts.d/vhost-ssl.conf




49   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Linux - Apache

     •   Restart apache2 by typing “rcapache2 restart”

     •   If the Private Key has a password restarting apache will
         ask for the password during the restart. Follow the step
         listed below to remove the password from the Key file
          –   openssl rsa -in gw.key -out gwu.key

          –   Also protect gwu.key by making sure only root can read
              gwu.key by typing “chmod 700 gwu.key”

     •   Modify the /etc/apache2/vhosts.d/vhost-ssl.conf with
         the unencrypted key file

50   © Novell, Inc. All rights reserved.
Securing Apache on Linux Demonstration
Securing WebAccess Application
     NetWare - Apache        ®




     •   Apache on NetWare by default enables SSL but uses
         the internal Certificates

     •   Follow TID 3033173 to import Certificate from a Public
         CA to Novell eDirectory           ®
                                               ™




     •   Modify SYS:APACHE2CONFHTTPD.CONF file
          –   SecureListen 443 “SSL CertificateDNS”

     •   Restart apache by typing ap2webdn and ap2webup



52   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




53   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




54   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




55   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




56   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




57   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS

     Sign the CSR using ConsoleOne and issue the
                                           ®



     certificate in a der format

     OR

     Send the CSR to the Public CA and get the Certificate




58   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




59   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Windows 2008 - IIS




60   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Enabling SSL




61   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Enabling SSL




62   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Enabling SSL




63   © Novell, Inc. All rights reserved.
Securing WebAccess Application
     Enabling SSL




64   © Novell, Inc. All rights reserved.
Securing IIS on Windows Demonstration
Secure Internet Email with S/MIME
Secure Internet Email with S/MIME

     •   What is S/MIME
          –   Digital Signature
          –   Encryption (Symmetric vs Asymmetric)

     •   Advantages and Disadvantages

     •   Creating and Importing User Certificates (Public Key
         and Private Key)

     •   Exchanging Public Keys/Certificates

     •   Encrypting/Decrypting Mails
67   © Novell, Inc. All rights reserved.
What is S/MIME?

     •   S/MIME is an acronym for Secure/Multipurpose
         Internet Mail Extensions

     •   It is a standard for Public Key Encryption and signing
         of MIME Data. In simple terms, it is used for Digitally
         signing a message and/or Encrypting a message
          –   Digital Signature

          –   Encryption




68   © Novell, Inc. All rights reserved.
Digital Signature

     •   Signature – A signature in simple terms is a
         handwritten depiction of someone's name or a
         nickname that a person writes on documents as a
         proof of identity and intent

     •   Digital Signature is an electronic signature used to
         authenticate the identity of the sender of a message
         and possibly to ensure that the original content of
         the message or document that has been sent is
         unchanged. The ability to ensure that the original
         signed message arrived means that the sender
         cannot easily repudiate it later.

69   © Novell, Inc. All rights reserved.
Encryption

     •   Encryption – A process of transforming information
         using an information to make it unreadable to anyone
         except those possessing special knowledge

     •   Two types of Encryption
          –   Symmetric vs Asymmetric?




70   © Novell, Inc. All rights reserved.
Symmetric vs Asymmetric

     •   Symmetric
          –   Same key is used for Encryption and Decryption

     •   Asymmetric
          –   Separate keys are used for Encryption and Decryption




71   © Novell, Inc. All rights reserved.
Advantages/Disadvantages

     •   Advantages
          –   Authenticity and Protection of the Message

     •   Disadvantages
          –   Not all email software handles S/MIME signatures

          –   S/MIME Encryption is currently not available for the Novell   ®



              GroupWise Linux, Mac, or WebAccess clients
                                       ®




72   © Novell, Inc. All rights reserved.
Creating and Importing User Certificates
     (Public Key and Private Key)

     •   Administrator
          –   Creates the Public Key and Private Key

     •   Users
          –   Export the Private Key and the Public Key

     •   Users
          –   Import the Public Key and Private Key into the Client




73   © Novell, Inc. All rights reserved.
Creating User Certificates
     Login to iManager as admin




74   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




75   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




76   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




77   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




78   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




79   © Novell, Inc. All rights reserved.
Creating User Certificates
     Create Certificate for users




80   © Novell, Inc. All rights reserved.
Importing User Certificates
     Administrator sets the URL




81   © Novell, Inc. All rights reserved.
Importing User Certificates
     Administrator sets the URL




82   © Novell, Inc. All rights reserved.
Importing User Certificates
     Administrator sets the URL




83   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




84   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




85   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




86   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




87   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




88   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




89   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




90   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




91   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




92   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




93   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




94   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




95   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




96   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




97   © Novell, Inc. All rights reserved.
Importing User Certificates
     User Imports the Certificate




98   © Novell, Inc. All rights reserved.
Exchanging Public Keys/Certificates

     •   Sender
          –   Sends a digitally signed message

     •   Receiver
          –   Receiver receives the digitally signed message along with the
              Certificate




99   © Novell, Inc. All rights reserved.
Exchanging Public Key
      Sender sends Digitally Signed Message




100   © Novell, Inc. All rights reserved.
Exchanging Public Keys
      Receiver receives Digitally Signed Message along
      with the sender's Certificate




101   © Novell, Inc. All rights reserved.
Encrypting/Decrypting Mails

      •   Sender (Original Receiver)
           –   Encrypts an email using the Receivers Certificate

      •   Receiver (Original Sender)
           –   Decrypts it using his/her Private Key




102   © Novell, Inc. All rights reserved.
Exchanging Public Keys
      Send Encrypted Message




103   © Novell, Inc. All rights reserved.
Exchanging Public Keys
      Receive Encrypted Message




104   © Novell, Inc. All rights reserved.
Overview

      •   User1 sends a digitally signed message to User2

      •   User2 receives the digitally signed message along with
          the certificate

      •   Now User2 can send an encrypted message to User1

      •   User1 decrypts the message with the Private Key




105   © Novell, Inc. All rights reserved.
S/MIME Demonstration
Questions?
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

More Related Content

What's hot

Locking the Doors, Securing the Appliances
Locking the Doors, Securing the AppliancesLocking the Doors, Securing the Appliances
Locking the Doors, Securing the AppliancesDell World
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4Vepsun Technologies
 
What You Should Know About WebLogic Server 12c (12.2.1.2) #oow2015 #otntour2...
What You Should Know About WebLogic Server 12c (12.2.1.2)  #oow2015 #otntour2...What You Should Know About WebLogic Server 12c (12.2.1.2)  #oow2015 #otntour2...
What You Should Know About WebLogic Server 12c (12.2.1.2) #oow2015 #otntour2...Frank Munz
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2Vepsun Technologies
 
Storage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information ApplicationsStorage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information ApplicationsAmbareesh Kulkarni
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3Vepsun Technologies
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementSharkrit JOBBO
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGrant Swanson
 
Presentation cloupia product overview and demo
Presentation   cloupia product overview and demoPresentation   cloupia product overview and demo
Presentation cloupia product overview and demoxKinAnx
 
Eyeball XMPP Server Administrator Guide
Eyeball XMPP Server Administrator GuideEyeball XMPP Server Administrator Guide
Eyeball XMPP Server Administrator GuideEyeball Networks
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 
Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2
Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2
Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2Jeroen Burgers
 
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph BassalyPlanning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph BassalyCisco Canada
 
Innovating with Cisco Contact Center Architectures
Innovating with Cisco Contact Center ArchitecturesInnovating with Cisco Contact Center Architectures
Innovating with Cisco Contact Center ArchitecturesCisco Canada
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Primend
 

What's hot (20)

James G. Joyner
James G. JoynerJames G. Joyner
James G. Joyner
 
Locking the Doors, Securing the Appliances
Locking the Doors, Securing the AppliancesLocking the Doors, Securing the Appliances
Locking the Doors, Securing the Appliances
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4
 
CSACSGuide-SAMPLE
CSACSGuide-SAMPLECSACSGuide-SAMPLE
CSACSGuide-SAMPLE
 
What You Should Know About WebLogic Server 12c (12.2.1.2) #oow2015 #otntour2...
What You Should Know About WebLogic Server 12c (12.2.1.2)  #oow2015 #otntour2...What You Should Know About WebLogic Server 12c (12.2.1.2)  #oow2015 #otntour2...
What You Should Know About WebLogic Server 12c (12.2.1.2) #oow2015 #otntour2...
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
 
Storage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information ApplicationsStorage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information Applications
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
 
MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server Management
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
 
Presentation cloupia product overview and demo
Presentation   cloupia product overview and demoPresentation   cloupia product overview and demo
Presentation cloupia product overview and demo
 
Eyeball XMPP Server Administrator Guide
Eyeball XMPP Server Administrator GuideEyeball XMPP Server Administrator Guide
Eyeball XMPP Server Administrator Guide
 
Philly Tech Fest Upgrade To Windows Server 2008 R2
Philly Tech Fest Upgrade To Windows Server 2008 R2Philly Tech Fest Upgrade To Windows Server 2008 R2
Philly Tech Fest Upgrade To Windows Server 2008 R2
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2
Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2
Siebel Server Cloning available in 8.1.1.9 / 8.2.2.2
 
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph BassalyPlanning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
 
Innovating with Cisco Contact Center Architectures
Innovating with Cisco Contact Center ArchitecturesInnovating with Cisco Contact Center Architectures
Innovating with Cisco Contact Center Architectures
 
Pvs slide
Pvs slidePvs slide
Pvs slide
 
Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016Morning Coffee - Windows Server 2016
Morning Coffee - Windows Server 2016
 

Viewers also liked

S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Tania Agni
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 

Viewers also liked (7)

S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
Pgp smime
Pgp smimePgp smime
Pgp smime
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 

Similar to Securing Novell GroupWise through SSL and S/MIME

Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Novell
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
 
Cloud Platform Symantec Meetup Nov 2014
Cloud Platform Symantec Meetup Nov 2014Cloud Platform Symantec Meetup Nov 2014
Cloud Platform Symantec Meetup Nov 2014Miguel Zuniga
 
SSL deep dive vCenter Server 5.5
SSL deep dive vCenter Server 5.5SSL deep dive vCenter Server 5.5
SSL deep dive vCenter Server 5.5fbuechsel
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
 
Life without the Novell Client
Life without the Novell ClientLife without the Novell Client
Life without the Novell ClientNovell
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdfDeepakAC3
 
Novell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell
 
Net Devops Overview
Net Devops OverviewNet Devops Overview
Net Devops OverviewJoel W. King
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell
 
End-to-End CI/CD at scale with Infrastructure-as-Code on AWS
End-to-End CI/CD at scale with Infrastructure-as-Code on AWSEnd-to-End CI/CD at scale with Infrastructure-as-Code on AWS
End-to-End CI/CD at scale with Infrastructure-as-Code on AWSBhuvaneswari Subramani
 
OpenStack Enabling DevOps
OpenStack Enabling DevOpsOpenStack Enabling DevOps
OpenStack Enabling DevOpsCisco DevNet
 
A Bit of Everything Chef
A Bit of Everything ChefA Bit of Everything Chef
A Bit of Everything ChefMandi Walls
 
2014 OpenSuse Conf: Protect your MySQL Server
2014 OpenSuse Conf: Protect your MySQL Server2014 OpenSuse Conf: Protect your MySQL Server
2014 OpenSuse Conf: Protect your MySQL ServerGeorgi Kodinov
 
Što danas zamjenjuje Small Business Server?
Što danas zamjenjuje Small Business Server?Što danas zamjenjuje Small Business Server?
Što danas zamjenjuje Small Business Server?Tomislav Lulic
 

Similar to Securing Novell GroupWise through SSL and S/MIME (20)

Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
 
Cloud Platform Symantec Meetup Nov 2014
Cloud Platform Symantec Meetup Nov 2014Cloud Platform Symantec Meetup Nov 2014
Cloud Platform Symantec Meetup Nov 2014
 
SSL deep dive vCenter Server 5.5
SSL deep dive vCenter Server 5.5SSL deep dive vCenter Server 5.5
SSL deep dive vCenter Server 5.5
 
Chapter08
Chapter08Chapter08
Chapter08
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Life without the Novell Client
Life without the Novell ClientLife without the Novell Client
Life without the Novell Client
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
 
Fiware cloud developers week brussels
Fiware cloud developers week brusselsFiware cloud developers week brussels
Fiware cloud developers week brussels
 
Novell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell Open Enterprise Server Architecture
Novell Open Enterprise Server Architecture
 
Net Devops Overview
Net Devops OverviewNet Devops Overview
Net Devops Overview
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
 
End-to-End CI/CD at scale with Infrastructure-as-Code on AWS
End-to-End CI/CD at scale with Infrastructure-as-Code on AWSEnd-to-End CI/CD at scale with Infrastructure-as-Code on AWS
End-to-End CI/CD at scale with Infrastructure-as-Code on AWS
 
OpenStack Enabling DevOps
OpenStack Enabling DevOpsOpenStack Enabling DevOps
OpenStack Enabling DevOps
 
A Bit of Everything Chef
A Bit of Everything ChefA Bit of Everything Chef
A Bit of Everything Chef
 
Cl212
Cl212Cl212
Cl212
 
2014 OpenSuse Conf: Protect your MySQL Server
2014 OpenSuse Conf: Protect your MySQL Server2014 OpenSuse Conf: Protect your MySQL Server
2014 OpenSuse Conf: Protect your MySQL Server
 
Siebel server cloning
Siebel server cloningSiebel server cloning
Siebel server cloning
 
Što danas zamjenjuje Small Business Server?
Što danas zamjenjuje Small Business Server?Što danas zamjenjuje Small Business Server?
Što danas zamjenjuje Small Business Server?
 
Best ofmms scsm - iaas
Best ofmms scsm - iaasBest ofmms scsm - iaas
Best ofmms scsm - iaas
 

More from Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

More from Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Securing Novell GroupWise through SSL and S/MIME

  • 1. Securing Novell GroupWise ® ® through SSL and S/Mime Dirk Giles GroupWise Software Engineer dpgiles@novell.com Mukesh Jethwani Novell WorldWide Support Engineer mjethwani@novell.com
  • 2. Agenda • LDAP authentication and Novell GroupWise ® ® Post Offices • Novell GroupWise Agents and SSL – Certificate Generation – Installing and Enabling SSL – Securing GWIA and WebAccess agents • Secure Internet Email with S/MIME 2 © Novell, Inc. All rights reserved.
  • 4. Why Use LDAP Authentication? • Uses user's directory password – Minimizes password management requirements – Supports password policies (Bind Mode) – Less passwords for the user to remember • Can authenticate to other LDAP directories • Requires that users connect to the directory – Note: Directory accounts without a password will not require a password, even with a High Security Post Office 4 © Novell, Inc. All rights reserved.
  • 5. LDAP Authentication Planning • LDAP Server information – Use SSL or not? > SSL key file – IP Address or name of LDAP server – LDAP port for LDAP server – User authentication method > Bind > Compare 5 © Novell, Inc. All rights reserved.
  • 6. LDAP Authentication Planning Part 2 • Use proxy user? – Access the directory with limited rights – Need distinguished name (DN) – Need password • Allow users to change password? – Novell GroupWise Client Change Password dialog ® ® 6 © Novell, Inc. All rights reserved.
  • 7. Export LDAP Certificate Which One? 7 © Novell, Inc. All rights reserved.
  • 8. Export LDAP Certificate Certificate Properties 8 © Novell, Inc. All rights reserved.
  • 9. Export LDAP Certificate Export Wizard – No Private Key 9 © Novell, Inc. All rights reserved.
  • 10. Export LDAP Certificate Export Wizard – Output Format and Filename 10 © Novell, Inc. All rights reserved.
  • 11. LDAP Server Configuration Novell GroupWise System Tools ® ® 11 © Novell, Inc. All rights reserved.
  • 12. LDAP Server Configuration LDAP Server List 12 © Novell, Inc. All rights reserved.
  • 13. LDAP Server Configuration LDAP Server Options 13 © Novell, Inc. All rights reserved.
  • 14. Post Office Configuration Security Settings 14 © Novell, Inc. All rights reserved.
  • 15. Post Office Configuration LDAP Server Selection 15 © Novell, Inc. All rights reserved.
  • 17. Securing Novell GroupWise with SSL ® ®
  • 18. Novell GroupWise Security and SSL ® ® • Enhances native messaging encryption • Ensures secure communication between the Post Office Agent and clients • Ensures secure communication between the Novell GroupWise agents • Secures Web Console and WebAccess 18 © Novell, Inc. All rights reserved.
  • 19. Where Do I Start? 1. Get a certificate! – Generate a Certificate Signing Request (CSR) > Each separate server should have its own > Agents running on the same server can share 19 © Novell, Inc. All rights reserved.
  • 20. Generate Certificate Signing Request Novell GroupWise Generate CSR Utility (GWCSRGEN) ® ® 20 © Novell, Inc. All rights reserved.
  • 21. Request the Certificate • Submit the certificate signing request to a certificate authority – Trusted Certificate Authorities – Online submission mechanisms – Create your own 21 © Novell, Inc. All rights reserved.
  • 22. Create a Certificate • Novell Certificate Server and Novell eDirectory ™ ® ™ – ConsoleOne ® > Requires the Novell Certificate Server snap-in – iManager > Requires the Novell Certificate Server plug-in module • YaST on Linux – Novell Open Enterprise Server – SUSE Linux Enterprise Server ® 22 © Novell, Inc. All rights reserved.
  • 23. Create a Certificate using Novell Certificate Server ™ • Enter certificate signing request • Select key type and usage • Select validity period • Select output format and filename 23 © Novell, Inc. All rights reserved.
  • 24. Issuing a Certificate with ConsoleOne ® Issue Certificate Wizard 24 © Novell, Inc. All rights reserved.
  • 25. Issuing a Certificate with ConsoleOne ® Enter certificate signing request 25 © Novell, Inc. All rights reserved.
  • 26. Issuing a Certificate with ConsoleOne ® Select key type and usage 26 © Novell, Inc. All rights reserved.
  • 27. Issuing a Certificate with ConsoleOne ® Select validity period 27 © Novell, Inc. All rights reserved.
  • 28. Issuing a Certificate with ConsoleOne ® Select output format and filename 28 © Novell, Inc. All rights reserved.
  • 29. Issuing a Certificate with YaST Enter Certificate Authority 29 © Novell, Inc. All rights reserved.
  • 30. Issuing a Certificate with YaST Select Export to File 30 © Novell, Inc. All rights reserved.
  • 31. Issuing a Certificate with YaST Select output format and filename 31 © Novell, Inc. All rights reserved.
  • 32. Issuing a Certificate with YaST Save certificate 32 © Novell, Inc. All rights reserved.
  • 33. Issuing a Certificate with YaST Save key 33 © Novell, Inc. All rights reserved.
  • 35. Install the Certificate 2. Install the certificate! – Use ConsoleOne to designate the certificate ® and key paths – Enter the password of the key file 35 © Novell, Inc. All rights reserved.
  • 36. Configure Access Network Access Tab 3. Enable SSL and configure access – Disabled, Enabled, and Required – Internal versus External 36 © Novell, Inc. All rights reserved.
  • 37. Equivalent Command Line Options 37 © Novell, Inc. All rights reserved.
  • 39. Securing Novell GroupWise Internet Agent ® ®
  • 40. Securing the Novell GroupWise ® ® Internet Agent with SSL • Secure Connections to other SMTP hosts • Secure Connections for POP/IMAP clients • Secure Connections to WebConsole – SSL Enabled or Required for the above? 40 © Novell, Inc. All rights reserved.
  • 41. Securing the GWIA with SSL Install the Certificate 41 © Novell, Inc. All rights reserved.
  • 42. Securing the GWIA with SSL Enabling SSL 42 © Novell, Inc. All rights reserved.
  • 43. Securing Novell GroupWise ® ® Internet Agent Demonstration
  • 44. Securing Novell GroupWise WebAccess ® ®
  • 45. Securing WebAccess with SSL • Securing WebAccess Agent - WebConsole • Securing WebAccess Application (Apache/IIS) 45 © Novell, Inc. All rights reserved.
  • 46. Securing WebAccess Agent Install Certificate 46 © Novell, Inc. All rights reserved.
  • 47. Securing WebAccess Agent Enabling SSL 47 © Novell, Inc. All rights reserved.
  • 48. Securing WebAccess Agent Demonstration
  • 49. Securing WebAccess Application Linux - Apache • Modify /etc/sysconfig/apache – APACHE_SERVER_FLAGS=” SSL” • Modify /etc/apache2/vhosts.d/vhost-ssl.conf 49 © Novell, Inc. All rights reserved.
  • 50. Securing WebAccess Application Linux - Apache • Restart apache2 by typing “rcapache2 restart” • If the Private Key has a password restarting apache will ask for the password during the restart. Follow the step listed below to remove the password from the Key file – openssl rsa -in gw.key -out gwu.key – Also protect gwu.key by making sure only root can read gwu.key by typing “chmod 700 gwu.key” • Modify the /etc/apache2/vhosts.d/vhost-ssl.conf with the unencrypted key file 50 © Novell, Inc. All rights reserved.
  • 51. Securing Apache on Linux Demonstration
  • 52. Securing WebAccess Application NetWare - Apache ® • Apache on NetWare by default enables SSL but uses the internal Certificates • Follow TID 3033173 to import Certificate from a Public CA to Novell eDirectory ® ™ • Modify SYS:APACHE2CONFHTTPD.CONF file – SecureListen 443 “SSL CertificateDNS” • Restart apache by typing ap2webdn and ap2webup 52 © Novell, Inc. All rights reserved.
  • 53. Securing WebAccess Application Windows 2008 - IIS 53 © Novell, Inc. All rights reserved.
  • 54. Securing WebAccess Application Windows 2008 - IIS 54 © Novell, Inc. All rights reserved.
  • 55. Securing WebAccess Application Windows 2008 - IIS 55 © Novell, Inc. All rights reserved.
  • 56. Securing WebAccess Application Windows 2008 - IIS 56 © Novell, Inc. All rights reserved.
  • 57. Securing WebAccess Application Windows 2008 - IIS 57 © Novell, Inc. All rights reserved.
  • 58. Securing WebAccess Application Windows 2008 - IIS Sign the CSR using ConsoleOne and issue the ® certificate in a der format OR Send the CSR to the Public CA and get the Certificate 58 © Novell, Inc. All rights reserved.
  • 59. Securing WebAccess Application Windows 2008 - IIS 59 © Novell, Inc. All rights reserved.
  • 60. Securing WebAccess Application Windows 2008 - IIS 60 © Novell, Inc. All rights reserved.
  • 61. Securing WebAccess Application Enabling SSL 61 © Novell, Inc. All rights reserved.
  • 62. Securing WebAccess Application Enabling SSL 62 © Novell, Inc. All rights reserved.
  • 63. Securing WebAccess Application Enabling SSL 63 © Novell, Inc. All rights reserved.
  • 64. Securing WebAccess Application Enabling SSL 64 © Novell, Inc. All rights reserved.
  • 65. Securing IIS on Windows Demonstration
  • 66. Secure Internet Email with S/MIME
  • 67. Secure Internet Email with S/MIME • What is S/MIME – Digital Signature – Encryption (Symmetric vs Asymmetric) • Advantages and Disadvantages • Creating and Importing User Certificates (Public Key and Private Key) • Exchanging Public Keys/Certificates • Encrypting/Decrypting Mails 67 © Novell, Inc. All rights reserved.
  • 68. What is S/MIME? • S/MIME is an acronym for Secure/Multipurpose Internet Mail Extensions • It is a standard for Public Key Encryption and signing of MIME Data. In simple terms, it is used for Digitally signing a message and/or Encrypting a message – Digital Signature – Encryption 68 © Novell, Inc. All rights reserved.
  • 69. Digital Signature • Signature – A signature in simple terms is a handwritten depiction of someone's name or a nickname that a person writes on documents as a proof of identity and intent • Digital Signature is an electronic signature used to authenticate the identity of the sender of a message and possibly to ensure that the original content of the message or document that has been sent is unchanged. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later. 69 © Novell, Inc. All rights reserved.
  • 70. Encryption • Encryption – A process of transforming information using an information to make it unreadable to anyone except those possessing special knowledge • Two types of Encryption – Symmetric vs Asymmetric? 70 © Novell, Inc. All rights reserved.
  • 71. Symmetric vs Asymmetric • Symmetric – Same key is used for Encryption and Decryption • Asymmetric – Separate keys are used for Encryption and Decryption 71 © Novell, Inc. All rights reserved.
  • 72. Advantages/Disadvantages • Advantages – Authenticity and Protection of the Message • Disadvantages – Not all email software handles S/MIME signatures – S/MIME Encryption is currently not available for the Novell ® GroupWise Linux, Mac, or WebAccess clients ® 72 © Novell, Inc. All rights reserved.
  • 73. Creating and Importing User Certificates (Public Key and Private Key) • Administrator – Creates the Public Key and Private Key • Users – Export the Private Key and the Public Key • Users – Import the Public Key and Private Key into the Client 73 © Novell, Inc. All rights reserved.
  • 74. Creating User Certificates Login to iManager as admin 74 © Novell, Inc. All rights reserved.
  • 75. Creating User Certificates Create Certificate for users 75 © Novell, Inc. All rights reserved.
  • 76. Creating User Certificates Create Certificate for users 76 © Novell, Inc. All rights reserved.
  • 77. Creating User Certificates Create Certificate for users 77 © Novell, Inc. All rights reserved.
  • 78. Creating User Certificates Create Certificate for users 78 © Novell, Inc. All rights reserved.
  • 79. Creating User Certificates Create Certificate for users 79 © Novell, Inc. All rights reserved.
  • 80. Creating User Certificates Create Certificate for users 80 © Novell, Inc. All rights reserved.
  • 81. Importing User Certificates Administrator sets the URL 81 © Novell, Inc. All rights reserved.
  • 82. Importing User Certificates Administrator sets the URL 82 © Novell, Inc. All rights reserved.
  • 83. Importing User Certificates Administrator sets the URL 83 © Novell, Inc. All rights reserved.
  • 84. Importing User Certificates User Imports the Certificate 84 © Novell, Inc. All rights reserved.
  • 85. Importing User Certificates User Imports the Certificate 85 © Novell, Inc. All rights reserved.
  • 86. Importing User Certificates User Imports the Certificate 86 © Novell, Inc. All rights reserved.
  • 87. Importing User Certificates User Imports the Certificate 87 © Novell, Inc. All rights reserved.
  • 88. Importing User Certificates User Imports the Certificate 88 © Novell, Inc. All rights reserved.
  • 89. Importing User Certificates User Imports the Certificate 89 © Novell, Inc. All rights reserved.
  • 90. Importing User Certificates User Imports the Certificate 90 © Novell, Inc. All rights reserved.
  • 91. Importing User Certificates User Imports the Certificate 91 © Novell, Inc. All rights reserved.
  • 92. Importing User Certificates User Imports the Certificate 92 © Novell, Inc. All rights reserved.
  • 93. Importing User Certificates User Imports the Certificate 93 © Novell, Inc. All rights reserved.
  • 94. Importing User Certificates User Imports the Certificate 94 © Novell, Inc. All rights reserved.
  • 95. Importing User Certificates User Imports the Certificate 95 © Novell, Inc. All rights reserved.
  • 96. Importing User Certificates User Imports the Certificate 96 © Novell, Inc. All rights reserved.
  • 97. Importing User Certificates User Imports the Certificate 97 © Novell, Inc. All rights reserved.
  • 98. Importing User Certificates User Imports the Certificate 98 © Novell, Inc. All rights reserved.
  • 99. Exchanging Public Keys/Certificates • Sender – Sends a digitally signed message • Receiver – Receiver receives the digitally signed message along with the Certificate 99 © Novell, Inc. All rights reserved.
  • 100. Exchanging Public Key Sender sends Digitally Signed Message 100 © Novell, Inc. All rights reserved.
  • 101. Exchanging Public Keys Receiver receives Digitally Signed Message along with the sender's Certificate 101 © Novell, Inc. All rights reserved.
  • 102. Encrypting/Decrypting Mails • Sender (Original Receiver) – Encrypts an email using the Receivers Certificate • Receiver (Original Sender) – Decrypts it using his/her Private Key 102 © Novell, Inc. All rights reserved.
  • 103. Exchanging Public Keys Send Encrypted Message 103 © Novell, Inc. All rights reserved.
  • 104. Exchanging Public Keys Receive Encrypted Message 104 © Novell, Inc. All rights reserved.
  • 105. Overview • User1 sends a digitally signed message to User2 • User2 receives the digitally signed message along with the certificate • Now User2 can send an encrypted message to User1 • User1 decrypts the message with the Private Key 105 © Novell, Inc. All rights reserved.
  • 108.
  • 109. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.