The product architecture handles and provides security at various levels, as described in the following sections:
The product can securely transfer data:
Data flow | When encrypted |
---|---|
Browser to BMC TrueSight IT Data Analytics server | When HTTPS is configured in the BMC TrueSight IT Data Analytics server |
Console Server to Collection Station | |
CLI to BMC TrueSight IT Data Analytics server | When HTTPS is configured in the BMC TrueSight IT Data Analytics server and in the CLI client |
BMC TrueSight IT Data Analytics server to Search component | When HTTPS is configured in the Search component and the BMC TrueSight IT Data Analytics server client |
Collection Agent to Collection Station | When HTTPS is configured in Collection Station and encryption in Payload Service |
Collection Station to target hosts | When SSH remote collection is used |
SMTP send for email | When SMTP is configured with credentials, TLS is used |
BMC ProactiveNet to get and send data | When HTTPS connection type is used to configure BMC ProactiveNet configuration |
For more information about the default communication ports and protocols, see Communication ports and protocols.
The following types of credentials are stored in encrypted form:
Credentials used for data collection are stored in encrypted form and are decrypted by the Collection Station or the Collection Agent just before passing the credentials to the external system for authentication. The product does not store or transfer the password in plain text. But the password is not encrypted when passed from the browser to the Console Server; to ensure complete security you need to enable security for the Console Server. For more information, see Enabling security for third-party certificates.
Note
The encryption and decryption keys are pre-configured in the product components. These keys are not visible to administrators and cannot be customized.
BMC TrueSight IT Data Analytics prevents CSRF attacks by checking the HTTP header, called as Referer, of the incoming HTTP request. This header is present in the requests that come from browsers. All invalid requests return a HTTP 403 response. The CSRF check is controlled by the check.csrf
property in the olaengiveService.properties file.
Note
The product cannot be accessed by using an iPv6 address. To enable the access, you must configure the system. For more information, see Configuring access URLs.
By default, the CSRF checks do not filter out the following requests from accessing the product:
Requests that are generated by CLI commands.
Requests that are generated by typing the URL in the address bar of the browser.
Requests in which the Referer matches the IT Data Analytics server host name.
Browser requests in which Referer matches any of the following regular expressions:
Regular expression | Description |
---|---|
^http(s)?://127.0.0.1:(9797|9443)/.* | Any HTTP or HTTPS referrer with IPV4 loopback address as 127.0.0.1 and Port is either 9797 or 9443 |
^http(s)?://\[::1\]:(9797|9443)/.* | Any HTTP or HTTPS referrer with IPv6 loopback address as ::1 and Port is either 9797 or 9443 |
^http(s)?://localhost:(9797|9443)/.* | Any HTTP or HTTPS referrer with localhost and Port is either 9797 or 9443 |