Temenos T24 Security Overview: User Guide
Temenos T24 Security Overview: User Guide
Temenos T24 Security Overview: User Guide
Security Overview
User Guide
No part of this document may be reproduced or transmitted in any form or by any means,
electronic or mechanical, for any purpose, without the express written permission of TEMENOS Holdings NV.
Table of Contents
Introduction.............................................................................................................................................. 5
Purpose................................................................................................................................................ 5
References ....................................................................................................................................... 5
Summary ................................................................................................................................................. 6
High-Level Design Overview ................................................................................................................... 7
Component Schematic......................................................................................................................... 7
Component Descriptions .................................................................................................................. 8
ARC-IB Tomcat Web Server ........................................................................................................ 8
Temenos Browser Web Server .................................................................................................... 8
T24 Server .................................................................................................................................... 8
Authentication Server ................................................................................................................... 8
Identity Stores............................................................................................................................... 8
Authentication Process ........................................................................................................................ 8
T24 Authentication Sub-process (Mandatory) ................................................................................. 8
Impersonate Sub-process (Optional) ............................................................................................... 9
T24 Server............................................................................................................................................. 10
T24 Identities ..................................................................................................................................... 10
Base Identity Provisioning ................................................................................................................. 10
Identity Authentication........................................................................................................................ 10
Cryptography ..................................................................................................................................... 10
Authorisation ...................................................................................................................................... 10
Access Channels and Audit............................................................................................................... 11
T24 Browser Servlet .............................................................................................................................. 11
Overview ............................................................................................................................................ 11
Connection to the T24 Server............................................................................................................ 11
Authentication .................................................................................................................................... 11
Standard T24 Authentication.......................................................................................................... 11
Login Session Ticket Management ............................................................................................ 12
PKI Certificate-Based Authentication (X.509) ................................................................................ 12
Basic Authentication (HTTP 1.0).................................................................................................... 12
Single Sign-On (SSO) .................................................................................................................... 12
Web Security...................................................................................................................................... 12
Cross site scripting ......................................................................................................................... 13
SQL injection .................................................................................................................................. 13
Denial of Service ............................................................................................................................ 13
Introduction
Temenos T24 is a banking system deployed on an internal corporate network. The main access to
the T24 system for end-users is via a web browser GUI, which provides access to the T24 banking
operations business services. In a system-to-system scenario, commands to execute T24 business
services can be submitted in the form of W3C compliant XML messages.
Both of these channels support a general access principle, provisioning access to T24. Hence, both
of these channels are subject to the various security policies required of a banking system.
T24 also has an internet banking interface called ARC Internet Banking which provides secure internet
facing web access to T24.
Purpose
This document describes the security aspects of the T24 system and the surrounding components.
The main security aspects of each component are described and other more comprehensive
documents are referenced in order to offer better context to them.
References
Title Description
Security Management System The Security Management System (SMS) controls who is
User guide allowed to use T24, when they are allowed to use it and to
what parts of the System they can have access. It will detect,
stop and record any attempt at unauthorized use of the
System. SMS can also, if required, record all activities
performed by selected Users.
Open Financial Service User The Open Financial Service module (OFS) provides an
Guide interface to allow the update and interrogation of T24
applications. The user guide for OFS describes the
architecture of the OFS module and how to construct
messages to send to T24 via OFS.
Temenos Browser Security Guide The Browser security guide describes the different security
configurations available in Temenos Browser and Temenos
ARC Internet Banking.
Temenos Connector Security A detailed description of the security aspects of the Temenos
Service Overview connector and how to set them up.
ARC Internet Banking A detailed description of the architecture of ARC-IB
Authentication White Paper authentication.
Temenos Application Gateway The user guide for the TAG .NET component.
(.NET) User Guide
TIB Product Overview An overview of the architecture and functionality of Temenos
Internet Banking.
Summary
T24 supports a wide range of authentication mechanisms to suit the needs of different customers. As
well as its own username / password based authentication T24 supports many industry standard
methods of authentication. The main ones are Basic Authentication, impersonation via an LDAP
directory, and with our ARC-IB offering, authentication using RSA Authentication Manager (SecurID)
or ActivIdentity 4TRESS.
T24 also supports access to its web interface via corporate single-sign-on mechanisms. It also allows
impersonation via Microsoft Active Directory (AD) or Active Directory Application Mode (ADAM) when
using the TAG.net to connect to T24.
All components of the T24 system can be configured to connect with each other using secure
connections (usually SSL or mutual SSL).
ARC-IB
TCC Internal
Tomcat Web
Server User
Authenticate
Authentication Server
Username/password,
(e.g. RSA, 4TRESS) X.509 Certificate or
SSO Principal
Component Descriptions
The tomcat web server for ARC-IB contains a login module and authentication filter, which deal with
authentication to an external authentication server, the ARC-IB servlet which deals with the
communication to the T24 server, and the TCC which deals with the transport of communications to
the T24 server.
This is the web server used for internal bank access to the T24 server. It contains filters and login
modules to enable basic authentication and single-sign-on. It also contains the Browser Servlet which
deals with communication to the T24 server, and the TCC which deals with the transport of
communications to the T24 server.
T24 Server
This contains The main T24 database and application. It also contains the OFS module to interpret
messages from clients and TCS to retrieve the messages from clients.
Authentication Server
This is only currently used in ARC-IB. It is a 3rd party authentication server that allow users to
authenticate themselves using many different kinds of hardware tokens.
Identity Stores
The corporate or T24 identity stored can currently be LDAP directories, or if using TAG.net, could be
Active Directory (AD) or ADAM directories. These can be used to map from a corporate identity to a
T24 identity in order to log into the T24 system without the user having to know their T24 credentials.
Authentication Process
A common high-level process is employed to authenticate end user and system-to-system messages.
This process is divided in to a mandatory sub-process and an optional sub-process. The optional part
utilises a controlled variable to permit the use of external authentication services.
In all cases, the order of execution of the authentication sub-processes is to first execute the optional
sub-process and thereafter the mandatory sub-process. This order constitutes a fixed “pipeline” which
helps to assure the validity of the authentication process itself.
• The provided T24 identity is checked for validity against the associated T24 identity’s “user”
profile.
• If the profile is valid, the associated T24 identity’s password is validated.
• At any step in the sub-process, access is granted or denied depending on the status of the
sign-on checks.
For end-user authentication, there is an alternative flow for messages received where the user has
previously signed-on. Once end-users are signed-on, their logon session information is retained in the
T24 database and hence may be recovered based only on a security ticket derived from the original
logon. The validation of the security ticket, which must be supplied on each end-user request,
replaces the T24 identity check and password validation. In the mandatory sub-process, the security
tickets are issued by T24 itself.
T24 Server
T24 Identities
T24 identities, known as T24 “users”, are provisioned by T24 and are used both in base authentication
and on the T24 audit trail. These identities are internal to T24 and are always present, in part due to
the strict enforcement of de facto banking security standards and in part due to the required link to the
audit trail of activity required by banking compliance.
Authentication of T24 identities is always present.
However, as presented in the previous section, the T24 authentication sub-process for “users” can be
effectively reduced to user credentials verification via substitution with an alternative authentication
provider. The critical measurement of identity for T24 is that an assure source of identity is employed
– with exactly which source depending on secured configuration and limited customisation.
Identity Authentication
There are three primary classes of user available in T24. These are normal T24 end-users (from the
USER table), general external users (from the EB.EXTERNAL.USER table, covering all external
users) and the legacy internet banking users (from the IB.USER table, planned for deprecation from
the release of T24 R08).
All three sets of users log in through the same routine – VALIDATE.SIGNON. This routine validates
the user against the relevant table, then hashes the password and compares the hash against the one
stored in the T24 database. If both of these match, then access is granted.
Cryptography
Passwords in the T24 server are hashed by an internal Temenos algorithm. Note that this is a one-
way hash, and there is no key available to decrypt it.
For security reasons the algorithm is not published.
Authorisation
Access authorisation to T24 business services (applications) and data is controlled by the T24
Security Management System (SMS) module in T24. This provisions extensive multi-level
authorisation based on groups. Based on configuration, one or more of these [SMS] groups are
attached to a T24 user profiles to enforce one or more access authorisation roles for that user.
Groups may be defined at the legal entity, organisation unit, channel or individual level.
Details of how to configure SMS can be found in the Security Management System User Guide.
Authentication
Standard T24 Authentication
The standard authentication mechanism with Browser is based on the T24 server authentication
mechanism.
The Temenos Browser Servlet constructs a login page that requests the username and password from
the user. The Browser Servlet constructs an XML login message, which submits the message via the
Temenos Connector and OFS to T24.
If the T24 login is successful, XML is returned to the browser client, which allows the web browser to
display the T24 home page.
The initial response from T24 after a login contains a token generated by T24. This token must be
returned to T24 in the subsequent request. If the token is missing from the request or if it is the wrong
value, then T24 will reject the command and the user will get a security violation error message.
In addition, if T24 gets a second request with the same token, it will reject the command giving an
error stating that it is possibly a duplicate transaction.
Web Security
There are several potential web security threats that are addressed within the Temenos Browser
Servlet. These are listed here for information.
SQL injection
This is unlikely as the internal representation of data access/update in T24 is based on JQL, not SQL.
The filter mentioned in section 0 can be amended to prevent JQL keywords from being entered into
form fields.
Denial of Service
The Temenos Browser Servlet is an internal web application, which should not be accessible from
outside a corporate network; therefore DOS attacks are highly unlikely. In any case, if the system does
come under attack, the web server hosting the Temenos Browser can be brought down to protect the
T24 server.
Directory Traversal
A filter can be enabled to prevent “..” expressions to be used in order to move up a directory structure.
In addition the BrowserFilter can be configured to block requests containing “..”.
Command Injection
The Temenos Browser Servlet is intended to be used with commands input through form fields.
These are application specific commands. It is not possible to execute operating system level
commands through T24 form fields.
Replay attack
The Browser ‘token’ described in section 0 protects against replay attacks.
Elevation of rights
The rights or permissions of a user are controlled by the SMS system (see section 0). It is not
possible for users to execute commands that are not enabled in their user profile.
Authentication
The authentication mechanism of ARC-IB is described in detail in the ARC-IB Authentication White
Paper.
Key:
rd
3 party
ARC-IB
Core T24
HSM
Via Internet
PKCS#11
Tomcat Authentication Listener TCS OFS T24
OFS Adapter
<transport>
Browser TCC SSL
Authentication
Filter Servlet Arc 4TRESS
Management
JAAS Arc Login Java EE App Component
adapter Modules Client
Container Java Crypto
(4TRESS Component
Java Crypto EJB stubs)
Component Session
PKCS#11 secure
HSM RMI/IIOP secure
(SSL) RMI/IIOP
(SSL)
HSM
Internal Browser to 4TRESS
4TRESS Admin PKCS#11
GUI
ActivIdentity 4TRESS
The 4TRESS authentication server is one of the leading authentication products on the market. It
supports several forms of authentication, from simple passwords (including seeded passwords), to
sequence and time-based one-time passwords from token devices to smartcard based tokens.
4TRESS also supports tokens from other vendors such as Vasco (with VASCO APIs) or any OATH-
compliant tokens. In the near future, 4TRESS will support mobile-phone based software tokens.
The ARC IB system uses the 4TRESS authentication server as the default authentication mechanism.
The 4TRESS database contains the user’s encrypted T24 user details as a method of indirection
which means that attackers cannot directly log in to T24 using the 4TRESS login details.
For more details of how 4TRESS can be integrated into ARC-IB, see the ARC-IB Authentication White
Paper.
Cryptography
Any sensitive data stored on the system are encrypted using 256bit AES keys. All keys can be stored
in Hardware Security Modules (HSM). There is a requirement for there to be one available to the web
server and one to the T24 server. These could be the same HSM if a network HSM is used. 4TRESS
also uses an HSM to encrypt its data.
Web Security
This section describes any further enhancements to security on top of those implemented for
Temenos Browser.
ToolBox
Overview
T24 ToolBox provides an interface to components that perform specialised business functions. These
components are referred to as ToolBox ‘Plug-Ins’. T24 ToolBox provides a framework where Plug-Ins
are made accessible to the users.
Authentication
Toolbox uses either an http or https connection to the Temenos Browser servlet in order to access
T24. Toolbox users must provide their T24 username and password in order to make the connection
to T24. The connection is made via the Temenos Browser servlet which identifies a login request as
being from ToolBox. As the username and password have already been provided, the Browser servlet
then forwards the request to T24 via the Temenos Connector without returning the T24 login page.
The only configuration that is required for ToolBox to connect to T24 is the URL of the Browser servlet
and the T24 username and password.
Temenos Connector
A detailed description of the security components and how to set them up can be found in the
Temenos Connector Security Service Overview.
LDAP
It is possible to configure the Temenos Connector to use LDAP as part of the authentication
mechanism. It is most widely used as part of a corporate single sign on mechanism.
A username and password or are passed to the TCC with a T24 command message. If valid, the TCC
looks up the Distinguished Name (DN) of the user in the corporate LDAP directory. The distinguished
name is passed with the message to the TCS. The TCS then looks up the DN in a T24 LDAP
directory. This directory contains the T24 username and password which are then used to log into
T24. The advantage of this system is that the T24 username and password are never known outside
the T24 server.
X.509 Certificates
As mentioned in section 0, in order to log in using an LDAP directory, the client system can specify an
X.509 certificate. The TCS then extracts the user information from the certificate and validates the
certificate chain.
SSL
It is possible to configure the connection between the TCC and the TCS using mutual SSL. This
means that X.509 certificates are supplied by the client and the server in order to authenticate to each
other.
Cryptography
It is possible to configure the Temenos Connector to encrypt the data in the message passed between
TCC and TCS. It is recommended that encryption alone is not used, but the connection should also
be an SSL connection.
A key feature is the provision of the configuration service and associated GUI, to enable the easy
setup of the Web Services as well as connections to the T24 Server.
The Impersonate Service enables impersonation from an external identity such as a corporate user id
and password or X.509 certificate, to a T24 user id and password. This can be performed using an
LDAP directory, and in the case of TAG.net with Microsoft Active Directory (AD) or Active Directory
Application Mode. Note that use of AD or ADAM is currently not available in TAG.JEE.
TAG Agents
TAG agents are required on a server either to communicate with a T24 instance on another machine,
or for other TAG agents to communicate to a T24 instance on its own machine.
There can be many agents, one of which is designated as the master. In addition to the standard
services, the master agent provides services that are used by the other agents to retrieve
configuration.
Glossary of Terms
Web Server The component that supports the deployment of the Browser web interface to T24.
SSL Secure Sockets Layer. A standard method of secure transport over HTTP and
other channels where the client must validate the server’s X.509 certificate.
Mutual SSL As SSL, but both client and server must validate each others certificates (mutual
authentication).
TCC Temenos Connector Client.
TCS Temenos Connector Server.
TAG Temenos Application Gateway.
T24 Server The server-side host, where the T24 business logic executes.
AD Active Directory.
ADAM Active Directory Application Mode.
LDAP Lightweight Directory Access Protocol.
W3C The World Wide Web Consortium (http://www.w3.org)
JAAS Java Authentication and Authorisation Service
HTTP Basic A simple mechanism of authentication over HTTP 1.0 protocol
Authentication
SMS Security Management Service module of T24.
RSA One of the leading authentication servers on the market today. Formerly know as
Authentication RSA ACE Server. http://www.rsa.com
Manager