Skip Headers

Oracle Advanced Security Administrator's Guide
Release 2 (9.2)

Part Number A96573-01
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents
Go To Index
Index

Master Index

Feedback

Go to previous page Go to next page

4
Configuring RADIUS Authentication

This chapter describes how to configure Oracle Advanced Security for the Oracle9i server, for use with RADIUS (Remote Authentication Dial-In User Service). This chapter contains the following topics:


Note:

SecurID, an authentication product of RSA Security, Inc., though not directly supported by Oracle Advanced Security, has been certified as RADIUS-compliant. You can therefore run SecurID under RADIUS.

See the RSA Security SecurID documentation for further information.


RADIUS Overview

RADIUS is a client/server security protocol widely used to enable remote authentication and access. Oracle Advanced Security uses this industry standard in a client/server network environment.

You can enable the network to use any authentication method that supports the RADIUS standard, including token cards and smart cards, by installing and configuring the RADIUS protocol. Moreover, when you use RADIUS, you can change the authentication method without modifying either the Oracle client or the Oracle database server.

From the user's perspective, the entire authentication process is transparent. When the user seeks access to an Oracle database server, the Oracle database server, acting as the RADIUS client, notifies the RADIUS server. The RADIUS server:

The Oracle/RADIUS environment is displayed in Figure 4-1:

Figure 4-1 RADIUS in an Oracle Environment

Text description of asoag003.gif follows.

Text description of the illustration asoag003.gif

The Oracle database server acts as the RADIUS client, passing information between the Oracle client and the RADIUS server. Similarly, the RADIUS server passes information between the Oracle database server and the appropriate authentication servers. The authentication components are listed in Table 4-1:

Table 4-1 RADIUS Authentication Components
Component Stored Information

Oracle client

Configuration setting for communicating through RADIUS.

Oracle database server/
RADIUS client

Configuration settings for passing information between the Oracle client and the RADIUS server.

The secret key file.

RADIUS server

Authentication and authorization information for all users.

Each client's name or IP address.

Each client's shared secret.

Unlimited number of menu files enabling users already authenticated to select different login options without reconnecting.

Authentication
server or servers

User authentication information such as passcodes and PINs, depending on the authentication method in use.

Note: The RADIUS server can also be the authentication server.

A RADIUS server vendor is often the authentication server vendor as well, in which case authentication can be processed on the RADIUS server. For example, the RSA ACE/Server is both a RADIUS server and an authentication server. It thus authenticates the user's passcode.

See Also:

Oracle9i Net Services Administrator's Guide, for information about the sqlnet.ora file

RADIUS Authentication Modes

User authentication can take place in either of two ways:

Synchronous Authentication Mode

In the synchronous mode, RADIUS lets you use various authentication methods, including passwords and SecurID token cards. Figure 4-2 shows the sequence in which synchronous authentication occurs:

Figure 4-2 Synchronous Authentication Sequence

Text description of ano81010.gif follows.

Text description of the illustration ano81010.gif

  1. A user logs in by entering a connect string, passcode, or other value. The client system passes this data to the Oracle database server.
  2. The Oracle database server, acting as the RADIUS client, passes the data from the Oracle client to the RADIUS server.
  3. The RADIUS server passes the data to the appropriate authentication server, such as Smart Card or SecurID ACE for validation.
  4. The authentication server sends either an Access Accept or an Access Reject message back to the RADIUS server.
  5. The RADIUS server passes this response to the Oracle database server / RADIUS client.
  6. The Oracle database server / RADIUS client passes the response back to the Oracle client.

Example: Synchronous Authentication with SecurID Token Cards

With SecurID authentication, each user has a token card that displays a dynamic number that changes every sixty seconds. To gain access to the Oracle database server/RADIUS client, the user enters a valid passcode that includes both a personal identification number (PIN) and the dynamic number currently displayed on the user's SecurID card. The Oracle database server passes this authentication information from the Oracle client to the RADIUS server, which in this case is the authentication server for validation. Once the authentication server (RSA ACE/Server) validates the user, it sends an "accept" packet to the Oracle database server, which, in turn, passes it to the Oracle client. The user is now authenticated and able to access the appropriate tables and applications.

See Also:

Challenge-Response (Asynchronous) Authentication Mode

When the system uses the asynchronous mode, the user does not need to enter a user name and password at the SQL*Plus CONNECT string. Instead, a graphical user interface asks the user for this information later in the process.

Figure 4-3 shows the sequence in which challenge-response (asynchronous) authentication occurs.


Note:

If the RADIUS server is the authentication server, Steps 3, 4, and 5, and Steps 9, 10, and 11 in Figure 4-3 are combined.


Figure 4-3 Asynchronous Authentication Sequence

Text description of ano81011.gif follows.

Text description of the illustration ano81011.gif

  1. A user seeks a connection to an Oracle database server. The client system passes the data to the Oracle database server.
  2. The Oracle database server, acting as the RADIUS client, passes the data from the Oracle client to the RADIUS server.
  3. The RADIUS server passes the data to the appropriate authentication server, such as a Smart Card, SecurID ACE, or token card server.
  4. The authentication server sends a challenge, such as a random number, to the RADIUS server.
  5. The RADIUS server passes the challenge to the Oracle database server / RADIUS client.
  6. The Oracle database server / RADIUS client, in turn, passes it to the Oracle client. A graphical user interface presents the challenge to the user.
  7. The user provides a response to the challenge. To formulate a response, the user can, for example, enter the received challenge into the token card. The token card provides a dynamic password to be entered into the graphical user interface. The Oracle client passes the user's response to the Oracle database server / RADIUS client.
  8. The Oracle database server / RADIUS client sends the user's response to the RADIUS server.
  9. The RADIUS server passes the user's response to the appropriate authentication server for validation.
  10. The authentication server sends either an Access Accept or an Access Reject message back to the RADIUS server.
  11. The RADIUS server passes the response to the Oracle database server / RADIUS client.
  12. The Oracle database server / RADIUS client passes the response to the Oracle client.

Example: Asynchronous Authentication with Smart Cards

With smart card authentication, the user logs in by inserting the smart card--a plastic card (like a credit card) with an embedded integrated circuit for storing information--into a hardware device which reads the card. The Oracle client sends the login information contained in the smart card to the authentication server by way of the Oracle database server/RADIUS client and the RADIUS server. The authentication server sends back a challenge to the Oracle client, by way of the RADIUS server and the Oracle database server, prompting the user for authentication information. The information could be, for example, a PIN as well as additional authentication information contained on the smart card.

The Oracle client sends the user's response to the authentication server by way of the Oracle database server and the RADIUS server. If the user has entered a valid number, the authentication server sends an "accept" packet back to the Oracle client by way of the RADIUS server and the Oracle database server. The user is now authenticated and authorized to access the appropriate tables and applications. If the user has entered incorrect information, the authentication server sends back a message rejecting the user's access.

Example: Asynchronous Authentication with ActivCard Tokens

One particular ActivCard token is a hand-held device with a keypad and which displays a dynamic password. When the user seeks access to an Oracle database server by entering a password, the information is passed to the appropriate authentication server by way of the Oracle database server/RADIUS client and the RADIUS server. The authentication server sends back a challenge to the client--by way of the RADIUS server and the Oracle database server. The user types that challenge into the token, and the token displays a number for the user to send in response.

The Oracle client then sends the user's response to the authentication server by way of the Oracle database server and the RADIUS server. If the user has typed a valid number, the authentication server sends an "accept" packet back to the Oracle client by way of the RADIUS server and the Oracle database server. The user is now authenticated and authorized to access the appropriate tables and applications. If the user has entered an incorrect response, the authentication server sends back a message rejecting the user's access.

Enabling RADIUS Authentication, Authorization, and Accounting

To enable RADIUS authentication and accounting, perform the following tasks:

Task 1: Install RADIUS on the Oracle Database Server and on the Oracle Client

RADIUS is installed with Oracle Advanced Security during a typical installation of Oracle9i.

See:

Oracle9i operating system-specific installation documentation, for information about installing Oracle Advanced Security and the RADIUS adapter

Task 2: Configure RADIUS Authentication

This task includes the following steps:

Unless otherwise indicated, perform these configuration tasks by using Oracle Net Manager or by using any text editor to modify the sqlnet.ora file.

Step 1: Configure RADIUS on the Oracle Client

  1. To start Oracle Net Manager:
    • On UNIX, run netmgr from $ORACLE_HOME/bin.
    • On Windows NT, choose Start > Programs > Oracle - HOME_NAME > Network Administration > Oracle Net Manager.
  2. In the Navigator window, expand Local > Profile.
  3. From the list in the right pane, select Oracle Advanced Security; the Oracle Advanced Security tabbed window appears (Figure 4-4):

Figure 4-4 Oracle Advanced Security Authentication Window

Text description of radu0001.gif follows.

Text description of the illustration radu0001.gif


Go to previous page Go to next page
Oracle
Copyright © 1996, 2002 Oracle Corporation.

All Rights Reserved.
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents
Go To Index
Index

Master Index

Feedback