| 12/13/99 Network Computing 36 1999 WL 8446001
 Network Computing
 Copyright 1999 CMP Publications Inc.
 
 Monday, December 13, 1999
 
 1025
 
 Sneak Previews
 
 Entrust Technologies Unleashes Stronger and Better PKI
 Asad Irshad
 
 Feeling insecure? Ask a corporate IT manager-the one responsible for
 secure end-to-end transactions-about true insecurity. He or she will be
 thankful for the PKI (public key infrastructure), which works to solve
 most online security troubles by creating a trust relationship between
 the sender and the receiver of information over an insecure network.
 
 I tested a beta release of Entrust Technologies' Entrust 5.0, which
 offers a complete PKI solution and much more. Entrust 5.0 is made up of
 two components: Entrust Authority/ Entrust RA on the server side and
 Entrust/Etelligence for the end user. The program offers a robust
 security solution for desktop applications, Internet transactions,
 e-commerce, developer applications and access-control devices. It also
 features highly customizable options that make deployment much easier
 and cost-effective. In all, Entrust 5.0 adds significant improvements to
 its version 4.0 predecessor (see "Nortel's Entrust," at www.
 networkcomputing.com/717/
 
 717f1.html). Overall, I liked the flexibility and value of the new
 features. However, the new support for hierarchical trust architecture
 needs some work before it's ready for deployment.
 
 Entrust's PKI is bundled with PeerLogic i500, a directory service for
 public directories. You can use Entrust PKI with PeerLogic i500 or a
 directory of your choice. Entrust uses a newer version of Informix as
 its internal database.
 
 Entrust's added flexibility lets security administrators customize PKI administration-including roles and policies for users and
 groups-according to their business needs. For example, Entrust customers
 can create users that have independent audit roles with limited access
 definable at several levels. Entrust has added a wide range of
 out-of-the-box functional roles that can be used as-is or easily
 modified.
 
 Most PKI implementations use five typical roles, each with predefined
 policies: security officer, administrator, directory administrator, end
 user and auditor. Before I added any users, I created some customized
 roles and policies. I also created a few groups to help me classify
 users, then added the users to the different groups accordingly. The
 authentication process was straightforward and intuitive. Entrust gave
 me an authorization and reference number and, unlike version 4.0, also
 provided an expiration date.
 
 Entrust supports cross-certification of certificate authorities (CAs)
 not only in a peer-to-peer architecture but also by hierarchical
 architecture. This lets Entrust customers exhaustively control trust
 relationships between CAs and their users within the enterprise.
 
 For example, you might want to restrict access to your research and
 development department, giving only trusted people and nodes access to
 certain information. CAs can be distributed according to domain,
 department, security levels and so forth. And these levels can be
 created and optimized according to your individual needs.
 
 I wanted to use this feature to deploy two CAs in a hierarchical
 fashion. From a root CA, I intended to create a subordinate CA. But
 before I could make any change in Entrust/RA, the registration
 authority, I was required to create an entry in the PeerLogic i500
 directory and provide all the attributes that went with it.
 
 Communication Breakdown
 
 I ran into a series of problems when the directories communicated
 with each other to allow cross-certification of CA. I wanted my root CA
 DN o=nwc, c=us to be the superior CA with a subordinate CA DN ou=lab,
 o=nwc, c=us. Entrust suggested using the same level of CA DN for the
 certification process. Later, I experienced problems with
 cross-referencing both the directories, and I was disappointed to see
 the terse error messages generated by the PeerLogic i500 directory service. A typical message read "XDS unwilling to perform," which didn't
 tell me anything about the location of the error. Log files generated by
 the i500 didn't offer much help either. In the end, I was forced to
 abandon the whole idea of a subordinate CA.
 
 Entrust/RA has its own certificate and lets administrators remotely
 add new users. Entrust/RA then connects to the CA for authorization or
 it's queued up for authorization from the security officer. Entrust/RA
 adds real value to Entrust/PKI.
 
 Entrust/Etelligence
 
 On the client side, Entrust login can be used as a single-site logon,
 which is centrally managed. I was able to log on to Entrust and my
 Microsoft Windows NT domain at the same time. For increased security,
 Entrust workstation automatically locked itself after a few minutes of
 inactivity. This feature is integrated with Windows screensaver and
 suspend features.
 
 Another client-side component is Entrust/ICE, which provides
 encryption and authentication services to the desktop user. Once again,
 the process is simple and straightforward. All you have to do is
 right-click on any file and select encrypt, or sign, or both. Entrust
 also provides TrueDelete, which makes sure a file that an end user
 deletes is totally scrubbed off the media, in compliance with the U.S.
 Department of Defense standards. It also securely deletes users'
 temporary files and protects the Windows swap file.
 
 For Internet security, Entrust has added two components,
 Entrust/Unity and Entrust/Direct. Entrust/Unity can be used for Web
 browsing (SSL), e-mail (S/MIME) or object signing. Entrust/Direct can be
 used for a higher level of commercial security, letting users
 automatically manage both keys and certificates through Entrust. Support
 of both Internet Explorer and Netscape Navigator is provided.
 
 Asad Irshad is a Syracuse, N.Y.-based freelance writer. Send your
 comments on this article to him at airshad@syr.edu.
 
 Vendor Information
 
 Entrust/PKI 5.0, $25,000. Available: Now. Entrust Technologies, (972) 671-9542; fax (972) 943-7305.
 
 www.entrust.com
 
 December 13, 1999
 
 ---- INDEX REFERENCES ----
 
 COMPANY (TICKER):  Northern Telecom Ltd.; Northern Telecom Ltd.; Bce Inc.; Entrust Technologies Inc.; National Trustco Inc.; Informix Corp. (T.NTL NT BCE ENTU T.NT IFMX)
 
 NEWS SUBJECT:      World Equity Index; Internet: World Wide Web; Internet (WEI IWWW NET)
 
 INDUSTRY:          Communications Technology; Telecommunications, All; Software (CMT TEL SOF)
 
 Word Count: 878
 12/13/99 NTWK-COM 36
 END OF DOCUMENT
 |