In this scenario, you to learn how to use certificates as an authentication mechanism to protect and restrict which resources and applications that internal users can access on your internal servers.
You are the network administrator for a company (MyCo, Inc.) whose human resource department is concerned with such issues as legal matters and privacy of records. Company employees have requested that they be able to access their personal benefits and health care information online. The company has responded to this request by creating an internal Web site to provide this information to employees. You are responsible for administering this internal Web site, which runs on the IBM® HTTP Server for i5/OS™ (powered by Apache).
Because employees are located in two geographically separate offices and some employees travel frequently, you are concerned about keeping this information private as it travels across the Internet. Also, you traditionally authenticate users by means of a user name and password to limit access to company data. Because of the sensitive and private nature of this data, you realize that limiting access to it based on password authentication may not be sufficient. After all, people can share, forget, and even steal passwords.
After some research, you decide that using digital certificates can provide you with the security that you need. Using certificates allows you to use Secure Sockets Layer (SSL) to protect the transmission of the data. Additionally, you can use certificates instead of passwords to more securely authenticate users and limit the human resource information that they can access.
Therefore, you decide to set up a private Local Certificate Authority (CA) and issue certificates to all employees and have the employees associate their certificates with their iSeries™ user profiles. This type of private certificate implementation allows you to more tightly control access to sensitive data, as well as control the privacy of the data by using SSL. Ultimately, by issuing certificates yourself, you have increased the probability that your data remains secure and is accessible only to specific individuals.
This scenario has the following advantages:
In this scenario, MyCo, Inc. wants to use digital certificates to protect the sensitive personal information that their internal human resources Web site provides to company employees. The company also wants a more secure method of authenticating those users who are allowed to access this Web site.
The following figure illustrates the network configuration for this scenario:
The figure illustrates the following information about the situation for this scenario:
This scenario depends on the following prerequisites and assumptions: