16
© 2014 Citrix. Confidential. 1 echEdge 2014

Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

Embed Size (px)

DESCRIPTION

This session will cover how Worx home user authentication and communication flow works and what tools can be used for troubleshooting common authentication issues. What you will learn - XenMobile Enterprise authentication flow - How Single Sign-on works between NetScaler Gateway and App Controller - How "Step up" authentication works for WorxMail and WorxWeb

Citation preview

Page 1: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.1

TechEdge 2014

Page 2: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.2

How to protect against Top Web Security Issues

with NetScaler

Page 3: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.3

OWASPwww.owasp.org

Page 4: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.4

TopWeb Application Security Vulnerabilities

Page 5: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.5

The world’s most advanced cloud networking platform

Page 6: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.6

Page 7: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.7

Page 8: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.8

#1 Injection

Page 9: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.9

Injection Preventions

Signatures

Page 10: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.10

#2 Authentication/Session Management

Page 11: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.11

AAA

Cookie Protections

SSL/TLS

Page 12: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.12

#3 Cross-Site Scripting

Page 13: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.13

XSSXSS Preventions

Signatures

Page 14: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.14

#4 Insecure Direct Object References#5 Security Misconfiguration#6 Sensitive Data Exposure#7 Missing Function Level Access Control#8 Cross-site Request Forgery (CSRF)#9 Using vulnerable components#10 Unvalidated Redirects and Forwards

Page 15: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.15

Feedback

Please tweet about this session

#SYN607 and #CitrixSynergy

Andrew @NStipster

Lucas @NS_Informer

NetScaler @netscaler

Page 16: Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

© 2014 Citrix. Confidential.16

WORK BETTER. LIVE BETTER.