DLP – Password Protected File & Encrypted File

I need a solution

Hello,

I would like to know how your organization deal with 2 DLP use cases (technically / process wise):

  • (1) password protected file (e.g. word, excel zip file with user password)
  • (2) encrypted file (e.g. user password encrypted documents)

I am struggling as DLP seems not able to apply “content inspection” to these 2 use cases.

Thanks.

0

Related:

7018114: SSPR Users locked after Grace Logins Expire

This document (7018114) is provided subject to the disclaimer at the end of this document.

Environment

Self Service Password Reset
SSPR 3.x
SSPR 4.x
eDirectory grace logins configured

Situation

SSPR consumes eDir grace logins
Users can’t log in to SSPR
eDirectory account is locked; no grace logins remain

Resolution

At least two options are available to avoid this situation:
1) If possible, disable grace logins on the eDirectory password policy. When configured this way, eDirectory itself won’t force users to change an expired password during authentication, but applications such as SSPR can still do so.
2) Increment the allowed grace login value to account for a typical user authentication operation happening multiple times. This won’t resolve the problem exactly but it can decrease the amount of users that will hit the limit.
In either case, consider the following settings in SSPR config manager, under Modules, Change Password:
Password Pre-Expire Time
Password Expire Warn Time
Check Expire During Authentication
With these settings in place users will:
1. If they are within the “Password Expire Warn Time,” see a warning when logging in to SSPR telling them their password will expire in x number of days.
2. Be forced to change their password if they are within the “Password Pre-Expire Time.” This helps prevent users from experiencing password expiration during the middle of a session.
3. Be forced to change their password if it has expired.
NOTE: The above settings are enforced when the user attaches to SSPR, not when a user logs in to eDirectory or other applications and systems that use eDirectory. However, it is possible to direct users to pass through SSPR during their login process, thus allowing SSPR to enforce the above password expiration settings. This can be accomplished as follows:
1. Use the Client Login Extension (CLE) to force users to change expired passwords when logging into windows desktop. CLE can also be used to force Challenge/Response enrollment and other SSPR operations.
2. Integrate SSPR with Access Manager or other web SSO technologies to force users to pass through SSPR during authentication. This approach can force web users to reset expired password during authentication

Cause

SSPR makes LDAP binds, and each LDAP bind operation decrements the grace login count.

Additional Information

Attempting to integrate SSPR with an SSO provider like Access Manager or other login provider can lead to confusing results in regards to eDirectory grace logins. While you may expect that grace logins will decrement in a predictable way when a user logs into your system, you will find that grace logins are consumed unexpectedly and sometimes unpredictably. This is because when multiple components of your authentication system are configured to use LDAP, grace logins can be consumed by each component.
The core issue is that when using LDAP, each LDAP bind operation which happens at the beginning of a connection will decrement the grace login count. Applications can use connection management techniques that disable idle connections and reconnect when needed, or use connection pools to limit the total connection count. Both of these techniques can lead to additional unexpected LDAP binds. Further, load balancing and high-availability architectures can result in additional connections. The end result is that a single user’s login process can execute multiple LDAP binds that cause multiple grace login decrements.
When these systems exhaust the grace logins remaining, failure can happen in odd ways such as the authentication gateway allowing login but an application failure happening during the session, or an application may return an error trying to read data from the directory.
SSPR itself will perform at least one, and sometimes more LDAP binds when a user attaches. SSPR tries to limit bind operations when a grace limit state is detected, but it is not always possible to limit the connections.

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented “AS IS” WITHOUT WARRANTY OF ANY KIND.

Related:

Client Login Extension 4.3

Abstract:

This is a patch for the Client Login Extension. When this patch is installed, the CLE version will be at 4.3.   It is a full build of the product. 

 

Document ID: 5376511
Security Alert: No
Distribution Type: Public
Entitlement Required: Yes
Files:

  • CLE_4.3_19.zip (52.2 MB)

Products:

  • Identity Manager 4.5.5
  • Identity Manager 4.5.6
  • Identity Manager 4.6
  • SecureLogin 8.5
  • SecureLogin 8.5.1
  • SecureLogin 8.5.2
  • SecureLogin 8.5.3
  • SecureLogin 8.6
  • Self Service Password Reset 4
  • Self Service Password Reset 4.1
  • Self Service Password Reset 4.2
  • Self Service Password Reset 4.3

Superceded Patches:

Related:

Top 5 Most Common Security Vulnerabilities on Web Applications

… Passwords, etc. can also be read from the database. The database data can be modified and the administration operations can be executed on the database. Here is how to Secure your website from SQL Injection Vulnerabilities. Vulnerable Objects: Input Fields and URLs interacting with the database …

Related: