Security scan reporting that Symantec VIP application is sending passwords using clear text
search cancel

Security scan reporting that Symantec VIP application is sending passwords using clear text

book

Article ID: 374869

calendar_today

Updated On:

Products

VIP Service

Issue/Introduction

System security scan is reporting that the VIP Enterprise Gateway (EGW) is authenticating using clear text authentication. There is concern that this can pose a significant security risk.

Environment

VIP Enterprise Gateway

Resolution

The three ways VIP Enterprise Gateway can be used for authentications are addressed here:

  1. Radius Authentications using PAP protocol - This is the method other applications use to make 2FA authentications while utilizing Symantec VIP. In this method the passwords are encrypted utilizing the Radius Shared Secret. This should only be done with local access or through a secure VPN.
  2. Local EGW service authentications (SSP/MyVIP, Manager IdP, or EGConsole) - These authentications can be encrypted with local SSL communications following this documentation:
  3. Local LDAP call between the VIP Enterprise Gateway and the Active Directory domain controller can also be setup using an SSL certificate encryption:
    • VIP User Store configuration - Refer to steps under heading "If the LDAP server is configured with SSL and if you have selected the Enable SSL option, you must ensure the following"