ASG
IBM
Zystems
Cressida
Icon
Netflexity
 
  MQSeries.net
Search  Search       Tech Exchange      Education      Certifications      Library      Info Center      SupportPacs      LinkedIn  Search  Search                                                                   FAQ  FAQ   Usergroups  Usergroups
 
Register  ::  Log in Log in to check your private messages
 
RSS Feed - WebSphere MQ Support RSS Feed - Message Broker Support

MQSeries.net Forum Index » Clustering » How can I control security within a single cluster?

Post new topic  Reply to topic Goto page Previous  1, 2, 3, 4  Next
 How can I control security within a single cluster? « View previous topic :: View next topic » 
Author Message
fjb_saper
PostPosted: Wed Sep 02, 2009 5:46 am    Post subject: Reply with quote

Grand High Poobah

Joined: 18 Nov 2003
Posts: 20763
Location: LI,NY

Monk wrote:
How will creating alias queues and pointing them to clusters queue help my requirements?.

QM2 can still see all the cluster queues locally defined on QM1 , irrespective of creating alias queues?

Am I missing something here?

Overlapping clusters perhaps?
_________________
MQ & Broker admin
Back to top
View user's profile Send private message Send e-mail
shashivarungupta
PostPosted: Wed Sep 02, 2009 5:53 am    Post subject: Re: How can I control security within a single cluster? Reply with quote

Grand Master

Joined: 24 Feb 2009
Posts: 1343
Location: Floating in space on a round rock.

Monk wrote:
Hi All,

How can I control security within a single cluster?....
.... but I need to control authorization for each parties queues.


HINT : Keep in mind Authorization(Y/N) of SYSTEM.CLUSTER.TRANSMIT.QUEUE.
_________________
*Life will beat you down, you need to decide to fight back or leave it.
Back to top
View user's profile Send private message Send e-mail
Sam Uppu
PostPosted: Wed Sep 02, 2009 6:12 am    Post subject: Reply with quote

Yatiri

Joined: 11 Nov 2008
Posts: 610

You will see the cluster queues in all of the cluster queue managers but you can restrict the access to that particular queue from applications.

If the application try to PUT a msg to a cluster queue by providing the QMgrName in the MQOD(sending msg to a particular cluster queue on a particular qmgr), then the PUTing application needs permissions to SCTQ otherwise defining Alias queue and providing the permissions to Alias queue will resolve the authorization.

In clustering the authorization is always on the destination QMgr/ queue side whereas in normal point to point communication the authorization is on sending side.

In clustering on the CLUSRCVR channel provide the low privileged user in MCAUSER and PUTAUT(DEF) will restrict access.

Thanks.
Back to top
View user's profile Send private message
bruce2359
PostPosted: Wed Sep 02, 2009 6:21 am    Post subject: Reply with quote

Poobah

Joined: 05 Jan 2008
Posts: 9475
Location: US: west coast, almost. Otherwise, enroute.

Quote:
In clustering the authorization is always on the destination QMgr/ queue side whereas in normal point to point communication the authorization is on sending side.

An odd statement.
Cluster channels are point-to-point channels. And, authorization takes place on both ends of point-to-point channels - at MQOPEN of the q definition on the sending end, and at theMQOPEN of the destination queue at the receiving end.
_________________
I like deadlines. I like to wave as they pass by.
ב''ה
Lex Orandi, Lex Credendi, Lex Vivendi. As we Worship, So we Believe, So we Live.
Back to top
View user's profile Send private message
exerk
PostPosted: Wed Sep 02, 2009 6:21 am    Post subject: Reply with quote

Jedi Council

Joined: 02 Nov 2006
Posts: 6339

Sam Uppu wrote:
You will see the cluster queues in all of the cluster queue managers but you can restrict the access to that particular queue from applications.


No, you won't! Only in the FR's will you be able to do so, the PR's will have absolutely NO knowledge of cluster queues until such time they first reference them - again, think before posting!
_________________
It's puzzling, I don't think I've ever seen anything quite like this before...and it's hard to soar like an eagle when you're surrounded by turkeys.
Back to top
View user's profile Send private message
Sam Uppu
PostPosted: Wed Sep 02, 2009 6:28 am    Post subject: Reply with quote

Yatiri

Joined: 11 Nov 2008
Posts: 610

Clustering request/ reply model – Security

1. Request:

On the request side, the app is not providing the QMgr name in the MQOD.

An Alias queue needs to be created on the source qmgr by specifying the targetq being the request queue(service provider) and provide the permissions to the source application id to the Alias queue.

On the service provider side, set the local user id of the service provider in the MCAUSER of cluster receiver channel and provide +setall permissions. The PUTAUT(DEF) and not the CTX.

2. Reply:
When the service provider replies to the ReplyToQueue by specifying the ReplyToQMgr, then the service provider app id needs permissions(+put) to SCTQ on the service provider qmgr.

On the service requester side, mention the local user id in MCAUSER of cluster receiver channel and PUTAUT(DEF) which is a default. Don’t use PUTAUT(CTX).
Provide the permissions(+setall) to the local user id to the queues/ qmgr.


Note: When the application wants to PUT a msg to a particular cluster queue to a selected qmgr within the cluster by providing the qmgr name in its MQOD, that application id needs permissions(+put) to SCTQ.

We need to set the local user id(low privileged user id) on the cluster receiver’s MCAUSER and provide the permissions to that user on the qmgr and queues. Don’t forget to provide the permissions(+setall) for the user on the qmgr and queue objects.

References:
http://www.mqseries.net/phpBB2/viewtopic.php?t=48209&postdays=0&postorder=asc&start=0

http://t-rob.net/2008/07/08/websphere-mq-security-heats-up/

Qmgr name resolution table(IBM website)
Back to top
View user's profile Send private message
Sam Uppu
PostPosted: Wed Sep 02, 2009 6:33 am    Post subject: Reply with quote

Yatiri

Joined: 11 Nov 2008
Posts: 610

exerk wrote:
Sam Uppu wrote:
You will see the cluster queues in all of the cluster queue managers but you can restrict the access to that particular queue from applications.


No, you won't! Only in the FR's will you be able to do so, the PR's will have absolutely NO knowledge of cluster queues until such time they first reference them - again, think before posting!


I agree with your statements. In the QM!, QM2, QM# qmgrs we dont know which is FR and which PR. It could be FR where he doesn't want to have the cluster queue not to show up.
Back to top
View user's profile Send private message
Sam Uppu
PostPosted: Wed Sep 02, 2009 6:36 am    Post subject: Reply with quote

Yatiri

Joined: 11 Nov 2008
Posts: 610

bruce2359 wrote:
Quote:
In clustering the authorization is always on the destination QMgr/ queue side whereas in normal point to point communication the authorization is on sending side.

An odd statement.
Cluster channels are point-to-point channels. And, authorization takes place on both ends of point-to-point channels - at MQOPEN of the q definition on the sending end, and at theMQOPEN of the destination queue at the receiving end.


Sorry for not being clear in my description, On the source side we DO need permissions to SCTQ if the app is providing the QMgr name in MQOD. At the same time we have to provide the low privileged user in MCAUSER of the CLUSRCVR channel with PUTAUT(DEF).

If the app is not providing the QMgr name in MQOD then an Alias or remote queue locally for a cluster queue and providing the permissions to Alias/ remote queue would work.
Back to top
View user's profile Send private message
exerk
PostPosted: Wed Sep 02, 2009 6:39 am    Post subject: Reply with quote

Jedi Council

Joined: 02 Nov 2006
Posts: 6339

Sam Uppu wrote:
I agree with your statements...


Good start, then:

Sam Uppu wrote:
...In the QM!, QM2, QM# qmgrs we dont know which is FR and which PR. It could be FR where he doesn't want to have the cluster queue not to show up.


Do you even read documentation? To help you understand the concepts of clustering, remember the following:

"Full Repository queue managers know all about the cluster all of the time, but Partial Repository queue managers only know what they need to know, when they need to know it, and then remember"

Now, just how on this earth could a Full Repository queue manager function as such if it didn't know about all the objects?
_________________
It's puzzling, I don't think I've ever seen anything quite like this before...and it's hard to soar like an eagle when you're surrounded by turkeys.
Back to top
View user's profile Send private message
Sam Uppu
PostPosted: Wed Sep 02, 2009 6:53 am    Post subject: Reply with quote

Yatiri

Joined: 11 Nov 2008
Posts: 610

Exerk,
I know what an FR and a PR is and I agree with your statements.

Monk was asking not to show up the cluster queue on some of the queue managers. All I was saying if it is a FR, we can't restrict the cluster queue not to show up in FR and PR the cluster queue wont show up until there is some activity happens with that queue.
Back to top
View user's profile Send private message
shashivarungupta
PostPosted: Wed Sep 02, 2009 7:43 am    Post subject: Reply with quote

Grand Master

Joined: 24 Feb 2009
Posts: 1343
Location: Floating in space on a round rock.

bruce2359 wrote:
Quote:
In clustering the authorization is always on the destination QMgr/ queue side whereas in normal point to point communication the authorization is on sending side.


Cluster channels are point-to-point channels. And, authorization takes place on both ends of point-to-point channels - at MQOPEN of the q definition on the sending end, and at theMQOPEN of the destination queue at the receiving end.



As far as mq cluster security is concerned.....
There is a Message Channel Agent (MCA) at each end of the channel. The MCA is a component that handles the sending and receiving of messages between queue managers. Before the MCA can send and receive messages, the UserId and Password must be authenticated as detailed below:
*The MCA that is running the Cluster-Sender channel will call client-side security exit to send a security message that contains the UserId and Password across the channel to the Cluster-Receiver channel.
*The MCA that is running the Cluster-Receiver channel will call server-side security exit to authenticate the incoming UserId and Password.

Suggestion: You can have a look at Capitalware Manuals for the Cluster Security Exit for the Better and Clear Understanding.
_________________
*Life will beat you down, you need to decide to fight back or leave it.
Back to top
View user's profile Send private message Send e-mail
Sam Uppu
PostPosted: Wed Sep 02, 2009 7:50 am    Post subject: Reply with quote

Yatiri

Joined: 11 Nov 2008
Posts: 610

shashivarungupta wrote:
bruce2359 wrote:
Quote:
In clustering the authorization is always on the destination QMgr/ queue side whereas in normal point to point communication the authorization is on sending side.


Cluster channels are point-to-point channels. And, authorization takes place on both ends of point-to-point channels - at MQOPEN of the q definition on the sending end, and at theMQOPEN of the destination queue at the receiving end.



As far as mq cluster security is concerned.....
There is a Message Channel Agent (MCA) at each end of the channel. The MCA is a component that handles the sending and receiving of messages between queue managers. Before the MCA can send and receive messages, the UserId and Password must be authenticated as detailed below:
*The MCA that is running the Cluster-Sender channel will call client-side security exit to send a security message that contains the UserId and Password across the channel to the Cluster-Receiver channel.
*The MCA that is running the Cluster-Receiver channel will call server-side security exit to authenticate the incoming UserId and Password.

Suggestion: You can have a look at Capitalware Manuals for the Cluster Security Exit for the Better and Clear Understanding.


What if we dont use the Capitalware's security exit?.
Back to top
View user's profile Send private message
exerk
PostPosted: Wed Sep 02, 2009 7:53 am    Post subject: Reply with quote

Jedi Council

Joined: 02 Nov 2006
Posts: 6339

Sam Uppu wrote:
...What if we dont use the Capitalware's security exit?.


Write an maintain your own...
_________________
It's puzzling, I don't think I've ever seen anything quite like this before...and it's hard to soar like an eagle when you're surrounded by turkeys.
Back to top
View user's profile Send private message
bruce2359
PostPosted: Wed Sep 02, 2009 7:54 am    Post subject: Reply with quote

Poobah

Joined: 05 Jan 2008
Posts: 9475
Location: US: west coast, almost. Otherwise, enroute.

This presumes that there are security exits in place; and that userid/passwords are flowed across the network.
_________________
I like deadlines. I like to wave as they pass by.
ב''ה
Lex Orandi, Lex Credendi, Lex Vivendi. As we Worship, So we Believe, So we Live.
Back to top
View user's profile Send private message
shashivarungupta
PostPosted: Wed Sep 02, 2009 7:55 am    Post subject: Reply with quote

Grand Master

Joined: 24 Feb 2009
Posts: 1343
Location: Floating in space on a round rock.

Sam Uppu wrote:
shashivarungupta wrote:
bruce2359 wrote:
Quote:
In clustering the authorization is always on the destination QMgr/ queue side whereas in normal point to point communication the authorization is on sending side.


Cluster channels are point-to-point channels. And, authorization takes place on both ends of point-to-point channels - at MQOPEN of the q definition on the sending end, and at theMQOPEN of the destination queue at the receiving end.



As far as mq cluster security is concerned.....
There is a Message Channel Agent (MCA) at each end of the channel. The MCA is a component that handles the sending and receiving of messages between queue managers. Before the MCA can send and receive messages, the UserId and Password must be authenticated as detailed below:
*The MCA that is running the Cluster-Sender channel will call client-side security exit to send a security message that contains the UserId and Password across the channel to the Cluster-Receiver channel.
*The MCA that is running the Cluster-Receiver channel will call server-side security exit to authenticate the incoming UserId and Password.

Suggestion: You can have a look at Capitalware Manuals for the Cluster Security Exit for the Better and Clear Understanding.


What if we dont use the Capitalware's security exit?.


I just said/suggested to have a look at their manual to check the way of implementation of security exit in the cluster...not to implement it forcefully.
_________________
*Life will beat you down, you need to decide to fight back or leave it.
Back to top
View user's profile Send private message Send e-mail
Display posts from previous:   
Post new topic  Reply to topic Goto page Previous  1, 2, 3, 4  Next Page 2 of 4

MQSeries.net Forum Index » Clustering » How can I control security within a single cluster?
Jump to:  



You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
Protected by Anti-Spam ACP
 
 


Theme by Dustin Baccetti
Powered by phpBB © 2001, 2002 phpBB Group

Copyright © MQSeries.net. All rights reserved.