{"id":19,"date":"2022-07-01T18:36:50","date_gmt":"2022-07-01T18:36:50","guid":{"rendered":"https:\/\/olyareri.nl\/?p=19"},"modified":"2022-07-01T18:36:51","modified_gmt":"2022-07-01T18:36:51","slug":"securing-oracle-saas-and-paas-solutions-using-ip-whitelisting-and-mfa","status":"publish","type":"post","link":"https:\/\/olyareri.nl\/?p=19","title":{"rendered":"Securing Oracle SaaS and PaaS solutions using IP whitelisting and MFA"},"content":{"rendered":"\n<p><strong>With more and more business applications in the cloud, the need for tighter security increases. Setting up Multi-Factor Authentication (MFA) is one way to achieve this. In this article, we will show how to set up MFA and IP whitelisting for the Oracle Cloud.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>User laptops can be hacked, and malware can accidentally be installed, thus passwords will be compromised. However, in the pre-cloud era, business applications were less exposed to the outside world. Now, anyone in the world could in theory access&nbsp;<strong>your<\/strong>&nbsp;business application. The only security measure in between: a username\/password combination.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IP whitelisting<\/h2>\n\n\n\n<p>Using IP whitelisting, we can make sure only IP addresses coming from a specific country (or continent) can access your cloud applications. More elaborate schemes one can implement are those in which you restrict specific roles (admin and such) to only login from a short list of IP addresses.<\/p>\n\n\n\n<p>For the Oracle cloud, you can configure this using the Oracle Identity Cloud Service (IDCS).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Defining sign-on policies<\/h2>\n\n\n\n<p>In Oracle IDCS, we can define multiple sign-on policies. Each policy defines a set of rules, and a list of applications for which these rules apply. The default sign-on policy allows any authenticated user access to the IDCS application (see fig 1).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/fc906739-2fc4-4037-831e-98da95e3d8f0\/Figuur+1.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/fc906739-2fc4-4037-831e-98da95e3d8f0\/Figuur+1.png\" alt=\"\"\/><\/a><figcaption>Figure 1: The default sign-on policy allows all access<\/figcaption><\/figure>\n\n\n\n<p>Each rule within a sign-on policy helps in determining whether a user may or may not sign on. Each rule can either grant or restrict access. By means of setting a rule priority, we can control the order in which rules are evaluated.<\/p>\n\n\n\n<p>Adding a second sign-on policy for a specific application allows us to configure access specifically for a single application (see figures 2 and 3). &nbsp;In our example, we are going to define specific sign-on policies for Oracle Integration Cloud (PaaS). If one defines a specific sign-on policy for a particular application, IDCS will use that instead of the \u2018Default\u2019 one.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/dd43fdad-6a79-43b2-ba07-eec06507e626\/Figuur+2.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/dd43fdad-6a79-43b2-ba07-eec06507e626\/Figuur+2.png\" alt=\"\"\/><\/a><figcaption>Figure 2: Adding a sign-on policy for a specific application<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/e40feae5-0a2a-4617-8c09-9b8f736ea7be\/Figuur+3.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/e40feae5-0a2a-4617-8c09-9b8f736ea7be\/Figuur+3.png\" alt=\"\"\/><\/a><figcaption>Figure 3: Adding a specific application to sign-on policy. If desired, multiple applications can be added<\/figcaption><\/figure>\n\n\n\n<p>Now, we need to allow access to this application, based on a particular (corporate) IP range.<br>In figures 4, 5 and 6 you can see how to:<\/p>\n\n\n\n<p>&#8211;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define a network perimeter.<br>&#8211;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Add a rule to the policy to allow access for all users within a particular IP address range.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/6c3999a2-6a06-46f9-a60b-f54f7337ceca\/Figuur+4.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/6c3999a2-6a06-46f9-a60b-f54f7337ceca\/Figuur+4.png\" alt=\"\"\/><\/a><figcaption><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/6c3999a2-6a06-46f9-a60b-f54f7337ceca\/Figuur+4.png\">Figure 4: Adding network perimeter<\/a><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/cc705aaf-a9ca-4ffb-8701-94ffb9023272\/Figuur+5.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/cc705aaf-a9ca-4ffb-8701-94ffb9023272\/Figuur+5.png\" alt=\"\"\/><\/a><figcaption>Figure 5: Adding network perimeter listing all corporate IP addresses. Please mind this is an internal IP range used for illustration purposes only<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/8e648c16-64ef-47e1-9af0-aacd7c5f22d3\/Figuur+6.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/8e648c16-64ef-47e1-9af0-aacd7c5f22d3\/Figuur+6.png\" alt=\"\"\/><\/a><figcaption>Figure 6: Sign-on rule whitelisting the corporate IP range<\/figcaption><\/figure>\n\n\n\n<p>We add a second rule to restrict all other access to Oracle Integration Cloud (fig 7 and 8).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/e4222bef-a222-46a7-a4ef-a7e74b0ea35a\/Figuur+7.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/e4222bef-a222-46a7-a4ef-a7e74b0ea35a\/Figuur+7.png\" alt=\"\"\/><\/a><figcaption>Figure 7: Rule to deny all access<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/c409b31e-dcf0-4576-94d1-dc93d8005fe3\/Figuur+8.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/c409b31e-dcf0-4576-94d1-dc93d8005fe3\/Figuur+8.png\" alt=\"\"\/><\/a><figcaption>Figure 8: Sign-on policy rules to allow only corporate, whitelisted addresses<\/figcaption><\/figure>\n\n\n\n<p>Say, we would like people outside the corporate address range to be able to login, but with additional authentication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Setting up MFA in Oracle Cloud<\/h2>\n\n\n\n<p>Enabling Multi-Factor Authentication (MFA) in the Oracle Cloud is rather simple. In your IDCS console, navigate to Security -&gt; MFA and simply check some boxes (see figures 9 and 10).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/802a918a-767c-40ea-93e2-bbcc3fe2f396\/Figuur+9.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/802a918a-767c-40ea-93e2-bbcc3fe2f396\/Figuur+9.png\" alt=\"\"\/><\/a><figcaption>Figure 9: MFA menu<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/107d2241-14d3-4054-b917-c19082e52807\/Figuur+10.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/107d2241-14d3-4054-b917-c19082e52807\/Figuur+10.png\" alt=\"\"\/><\/a><figcaption>Figure 10: Enable MFA by checking boxes<\/figcaption><\/figure>\n\n\n\n<p>Next, we add a new rule to our Integration sign-on policy. This rule will allow all other IP addresses to access the system, but it will require the user to present an additional factor (see figure 11 and 12).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/235ab28c-b524-482d-8acf-103693fc9a5c\/Figuur+11.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/235ab28c-b524-482d-8acf-103693fc9a5c\/Figuur+11.png\" alt=\"\"\/><\/a><figcaption>Figure 11: Adding second rule for all IP addresses outside of corporate range, to make use of MFA<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/7edaa3a4-1adb-4ce4-9688-44691c78f7f8\/Figuur+12.png\"><img decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/7edaa3a4-1adb-4ce4-9688-44691c78f7f8\/Figuur+12.png\" alt=\"\"\/><\/a><figcaption>Figure 12: Three sign-on rules. First rule allows access whenever someone logs in from the corporate IP range. Second rule defines users who have to use a second authentication factor. Last rule denies all access<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Log in using MFA<\/h2>\n\n\n\n<p>With the new sign-on policy in place, we\u2019re going to try to log in our Oracle Integration Cloud instance.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/d87ed43c-4aaf-4e50-9471-0bf6dc0f2cc8\/Figuur+13.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/d87ed43c-4aaf-4e50-9471-0bf6dc0f2cc8\/Figuur+13.png\" alt=\"\" width=\"634\" height=\"500\"\/><\/a><figcaption>Figure 13: First, we sign on using our username\/password credentials<\/figcaption><\/figure>\n\n\n\n<p>Oracle now requests a second authentication token (figure 14). To get access, we download a mobile app (Oracle Verificator). After downloading, the app needs to be matched with this particular cloud account. Luckily, this is very easy. On the first login attempt, IDCS detects that no mobile app was coupled to this account. A quick and easy QR code pops up to match this account to your mobile authenticator app.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><a href=\"https:\/\/www.qualogy.com\/static\/upload\/lightbox\/1ebe458e-ac72-4ef2-9e60-2270120391b9\/Figuur+14.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.qualogy.com\/static\/upload\/center-mw\/1ebe458e-ac72-4ef2-9e60-2270120391b9\/Figuur+14.png\" alt=\"\" width=\"784\" height=\"378\"\/><\/a><figcaption>Figure 14: MFA: 2-Step Verification<\/figcaption><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=http%3A%2F%2Fiqc.ms%2FgVX&amp;text=Securing+Oracle+SaaS+and+PaaS+solutions+using+IP+whitelisting+and+MFA\"><\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>With more and more business applications in the cloud, the need for tighter security increases. Setting up Multi-Factor Authentication (MFA) is one way to achieve this. In this article, we will show how to set up MFA and IP whitelisting for the Oracle Cloud. User laptops can be hacked, and malware can accidentally be installed, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-19","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/olyareri.nl\/index.php?rest_route=\/wp\/v2\/posts\/19","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/olyareri.nl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/olyareri.nl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/olyareri.nl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/olyareri.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=19"}],"version-history":[{"count":1,"href":"https:\/\/olyareri.nl\/index.php?rest_route=\/wp\/v2\/posts\/19\/revisions"}],"predecessor-version":[{"id":20,"href":"https:\/\/olyareri.nl\/index.php?rest_route=\/wp\/v2\/posts\/19\/revisions\/20"}],"wp:attachment":[{"href":"https:\/\/olyareri.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=19"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/olyareri.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=19"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/olyareri.nl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}