Security configuration: options
The tables below describe the configuration of everything about security.
| Setting | Description |
|---|---|
| X-Frame options (Requires restart) |
The content of the HTTP-header |
| Limit user sessions |
|
|
Office research guest access |
Note Currently, The Office research integration is only available when Collibra Data Intelligence Cloud is publicly available, which is why this override setting is necessary. |
| Prevent advanced html features in text dashboard |
Text widgets can contain full HTML. However, this means an attacker could potentially execute an XSS attack by injecting malicious HTML. For more information, see the Troubleshooting section.
Note
If you enable this setting, the following HTML elements are deleted when you save:
|
|
Guest access This setting requires the SUPER role. |
|
| Enable schema introspection |
|
| Enable customer validation functions |
|
LDAP
DGC can connect to an LDAP server to handle the authentication.
| Setting | Description | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Enable LDAP integration (Requires restart) | |||||||||||||||
| Sync after restore |
|
||||||||||||||
| User page size |
The page size that is used when retrieving users during synchronization. The default value is 500. You can set it to 0 to disable paging. Note This is a global setting. If you are working with multiple LDAP servers, only the value for the main server is taken into account. |
||||||||||||||
| Group page size |
The page size that is used when retrieving groups. You can set it to 0 to disable paging. Note This is a global setting. If you are working with multiple LDAP servers, only the value for the main server is taken into account. |
||||||||||||||
| Time limit |
Specifies the time limit in milliseconds for all LDAP searches. The default value is 120,000. You can set it to 0 to disable the time limit. |
||||||||||||||
| Sync job enabled |
|
||||||||||||||
| Sync job cron |
The schedule to perform an LDAP synchronization (CRON). The default value for this setting is daily at midnight. If you create an invalid Cron pattern, Collibra Data Intelligence Cloud stops responding. |
||||||||||||||
| User field mapping | The configuration mapping of all the user fields. This determines which LDAP field ismapped to which user field. Empty fields are ignored during the synchronization. | ||||||||||||||
|
The unique user ID in the LDAP, typically UID. This is a mandatory field. | ||||||||||||||
|
|
The corresponding email field in the LDAP directory. This is a mandatory field. | ||||||||||||||
|
The first name field in the LDAP directory. | ||||||||||||||
|
The last name field in the LDAP directory. | ||||||||||||||
|
The middle name field of the LDAP directory, this is usually givenName. |
||||||||||||||
|
Indication whether a user is active or inactive in LDAP. | ||||||||||||||
|
The language and locale of the user. It has to contain a language code and may contain a country code.
Examples: pl, en_US, nl_BE. |
||||||||||||||
|
The LDAP property that defines to which groups the user belongs. If there is a group entry in the LDAP directory, use the Group field mapping settings. |
||||||||||||||
|
An additional email list. |
||||||||||||||
|
The mapping for the user's IM locations. | ||||||||||||||
|
The mapping for the user's AOL IM account. | ||||||||||||||
|
The mapping for the user's Google Talk IM account. | ||||||||||||||
|
The mapping for the user's ICQ IM account. | ||||||||||||||
|
The mapping for the user's Jabber IM account. | ||||||||||||||
|
The mapping for the user's Live Messenger IM account. | ||||||||||||||
|
The mapping for the user's Skype IM account. | ||||||||||||||
|
The mapping for the user's Yahoo Messenger IM account. | ||||||||||||||
|
Enter the field value and field key to map a social media website. | ||||||||||||||
|
The mapping for the user's phone. | ||||||||||||||
|
The mapping for the user's fax number. | ||||||||||||||
|
The mapping for the user's mobile number. | ||||||||||||||
|
The mapping for the user's pager number. | ||||||||||||||
|
The mapping for the user's private number. | ||||||||||||||
|
The mapping for the user's work number. | ||||||||||||||
|
The mapping for any other phone number for this user. | ||||||||||||||
|
The mapping for the user's home address. | ||||||||||||||
|
The mapping for the user's street. | ||||||||||||||
|
The mapping for the user's number. | ||||||||||||||
|
The mapping for the user's city. | ||||||||||||||
|
The mapping for the user's postal code. | ||||||||||||||
|
The mapping for the user's state. | ||||||||||||||
|
The mapping for the user's country. | ||||||||||||||
|
The mapping for the user's work address. | ||||||||||||||
|
The mapping for the user's street. | ||||||||||||||
|
The mapping for the user's number. | ||||||||||||||
|
The mapping for the user's city. | ||||||||||||||
|
The mapping for the user's postal code. | ||||||||||||||
|
The mapping for the user's state. | ||||||||||||||
|
The mapping for the user's country. | ||||||||||||||
|
The mapping information for the user's gender. | ||||||||||||||
|
The attribute key for the gender value. If the content equals one of the male or female mappings, the user will be saved as male or female. Otherwise a default of UNKNOWN will be used. | ||||||||||||||
|
The value for male users. | ||||||||||||||
|
The value for female users. | ||||||||||||||
| Group field mapping | Groups can be defined as a separate structure or as a userField. The following section allows you to sync with a group structure that is unrelated to the user structure. | ||||||||||||||
|
The name of the group to use in the application. |
||||||||||||||
|
The user DNs that are member of the group. | ||||||||||||||
| Servers |
The Collibra parameters to map with your LDAP server parameters. |
||||||||||||||
|
The URL or IP address to the LDAP server, for example ldap://ldap.yourcompany.com:389 or ldaps://ldap.yourcompany.com:636. | ||||||||||||||
|
The DN of the administrator user that is used for authentication, for example admin. | ||||||||||||||
|
The password of the administrator user. | ||||||||||||||
|
The base DN for when you are working with relative DNs. This base DN is used for all LDAP look-ups. | ||||||||||||||
|
The base DN of where the LDAP users for Collibra are located. If a base has been specified, it is used as a prefix for this user base. Subtree search is used, so all DNs located below are searched for matching users. | ||||||||||||||
|
The filter that specifies which users can authenticate in the application. By default, all the objects found in the user base are selected, including the root. | ||||||||||||||
|
The filter that specifies which users are imported by the synchronization job. The users have to be the same as, or a subset of, the Authentication user LDAP filter. If you provide no value for this setting, the same filter as specified for the Authentication user LDAP filter setting is used. That allows you to synchronize only the users that have to have access to the application, even if they have not logged in yet. Users in the Authentication user LDAP filter are synchronized each time they authenticate and are only available after the first sign-in to the application. This is the default setting. |
||||||||||||||
|
The authentication mechanism for authenticating users on the LDAP servers.
|
||||||||||||||
|
|
||||||||||||||
|
Specifies what to do with referrals. Possible values:
Note If you are experiencing slow searches on Microsoft Active Directory with the follow value for the Referral setting, try using the Global Catalog as Active Directory domain controller. The Global Catalog enables searching for Active Directory objects in any domain in the forest without the need for subordinate referrals. This can dramatically speed up searching. However, the Global Catalog only contains a subset of the attributes of an object. This solution is only viable if the attributes requested for the search results are stored in the global catalog. Note that the Global Catalog is accessible on port 3268/3269, not the standard 389/636 LDAP ports. |
||||||||||||||
|
The base DN of where all the groups are located. If a base has been specified, that base is used as the prefix for this group base. | ||||||||||||||
|
The LDAP filter to which each group has to comply to be synchronized. | ||||||||||||||
| Batch synchronization | The synchronization of the users with the LDAP server happens in batches. | ||||||||||||||
|
The number of users in each batch. If a batch fails, none of the users in that batch is updated and the user names are listed in the DGC service log. Other batches are processed as normal. After processing all batches, Collibra disables users that are no longer in LDAP, unless one ore more batches failed. Set the value to 0 to disable batch processing. |
Password
Configure how strong a users password should be.
| Setting | Description |
|---|---|
| Minimum length (Requires restart) |
The minimum length of passwords. The default minimum length is 12. |
| Maximum length (Requires restart) |
The maximum length of passwords. The default maximum length is 1,024. |
| Digits required (Requires restart) |
|
| Non alphanumeric required (Requires restart) |
|
| Uppercase required (Requires restart) |
|
| Lowercase required (Requires restart) |
|
| Username disallowed (Requires restart) |
|
|
Expiration interval (months) |
The number of months before users have to change their passwords. Set it to 0 if users never have to change their passwords. The default interval is 6 months. |
|
Allowed login failures |
The number of consecutive failed login attempts that are allowed before the user account is disabled. Set it to 0 for unlimited attempts. The default is 3 login failures. |
|
No reuse count |
The number of previous passwords users cannot reuse. The default is 1: the user cannot change his password to what it currently is. Set this to 0 to allow using the same password. |
| Password reset link validity period |
The number of minutes that a link to reset a password remains valid. Beyond this time, the user has to request a new password reset link. The default value is 60 minutes. The minimum value is 15 minutes, the maximum value is 1,440 minutes (24 hours). |
| Account lock-out duration |
The number of minutes that a user cannot sign in after too many failed sign-in attempts. If the number of minutes is set to 0, a Collibra administrator must reset the password to unlock the account. This setting is only applicable if the "Allowed sign-in failures" setting is defined. A locked-out account does not mean that your account is disabled. |
REST
The section about security for the REST interface.
| Setting | Description |
|---|---|
| CSRF token enabled |
|
| Referrer enabled |
|
| Referrer checking allow empty |
SSL
SSL Configuration.
SSO
The section about SSO (Single Sign On) authentication. See the SSO Documentation for more details.
| Setting | Description | ||
|---|---|---|---|
| Mode |
The SSO mode of Collibra. The possible values are:
|
||
| Header |
The name of the header to be checked. The contents of this header is used for the search query, which is SSO_HEADER = username. The value of the actual query depends on DN and possibly Attribute. |
||
| DN |
If the SSO mode is SSO_HEADER_LDAP or SAML_LDAP, this field determines whether the distinguished name (DN) or attribute is used:
If the SSO mode is DISABLED, SSO_HEADER or SAML_ATTRIBUTES, this field is ignored. |
||
| Attribute |
This field is only used if the SSO mode is SSO_HEADER_LDAP or SAML_LDAP, and if DN is False. If the above criteria are met, the LDAP has to contain this value. Example
If Attribute is FirstName, then the header should contain the FirstName of the user that was signed in. |
||
|
If users try to sign in via SSO, they still need a user account in Collibra. You can either create the user accounts automatically when they sign in, or create the user accounts manually or via LDAP synchronization
|
|||
|
When SSO is enabled, a user can still navigate to the /signin page and try to log in via that page. However, you can disable that page.
|
|||
| SAML | The configuration of SAML. | ||
|
The URL of the SAML metadata file to be used. The URL always has to be reachable by the Collibra environment. | ||
|
The entity ID inside the metadata to be referenced. Note A metadata file can describe multiple entity IDs, make sure to use in the entity ID from the correct metadata file. |
||
|
The mappings of attributes in the SAML response. The values are used as keys to look for in the SAML response. Examples of attribute fields are first name, last name, address information, phone numbers and so on. |
||
|
The mapping for the user's first name. This attribute is optional. The value can be empty. |
||
|
The mapping for the user's last name. This attribute is optional. The value can be empty. |
||
|
|
The mapping for the user's email address. This attribute is optional for existing users, but mandatory for new users. Warning If the email address is invalid when you synchronize, the user is deactivated and the user information is not updated. |
||
|
The mapping that indicates whether the account of the incoming user is enabled. | ||
|
The mapping (attribute) which indicates to which Collibra groups the user should be added. If the groups don't exist yet, they will be created. This attribute can have multiple values (groups) or the groups can be sent as a comma-separated list of groups. If passing groups in this attribute, you must set Groups DGC Managed to False. |
||
|
The mapping for the user's phone. | ||
|
The mapping for the user's fax number. | ||
|
The mapping for the user's mobile number. | ||
|
The mapping for the user's pager number. | ||
|
The mapping for the user's private number. | ||
|
The mapping for the user's work number. | ||
|
The mapping for any other phone number for this user. | ||
|
The mapping for the user's home address. | ||
|
The mapping for the user's street. | ||
|
The mapping for the user's number. | ||
|
The mapping for the user's city. | ||
|
The mapping for the user's postal code. | ||
|
The mapping for the user's state. | ||
|
The mapping for the user's country. | ||
|
The mapping for the user's work address. | ||
|
The mapping for the user's street. | ||
|
The mapping for the user's number. | ||
|
The mapping for the user's city. | ||
|
The mapping for the user's postal code. | ||
|
The mapping for the user's state. | ||
|
The mapping for the user's country. | ||
|
The mapping for the user's IM locations. | ||
|
The mapping for the user's AOL IM account. | ||
|
The mapping for the user's Google Talk IM account. | ||
|
The mapping for the user's ICQ IM account. | ||
|
The mapping for the user's Jabber IM account. | ||
|
The mapping for the user's Live Messenger IM account. | ||
|
The mapping for the user's Skype IM account. | ||
|
The mapping for the user's Yahoo Messenger IM account. | ||
|
The mapping information for the user's gender. | ||
|
The attribute key for the gender value. If the content equals one of the male or female mappings, the user will be saved as male or female. Otherwise a default of UNKNOWN will be used. | ||
|
The value for male users. | ||
|
The value for female users. | ||
|
Option to configure that groups should be managed by Collibra, or that groups should be set by the SAML assertion (SAML+Attributes mode). This option is only relevant if Mode is SAML_ATTRIBUTES.
|
||
|
Field that determines the value of the Enter a custom value if the base URL does not match the Warning The value of the Note SSO does not work if the |
||
|
|
||
|
|
||
|
This is only relevant if Force authn is True. |
||
|
Name ID that is used in the SP authentication. The default value is urn:oasis:names:tc:SAML:2.0:nameid-format:persistent. The Name ID value is mandatory. |
||
|
|
||
|
|
||
|
Settings for the SAML requested authentication context. The IDP uses the authentication context to authenticate the user. By default, the authentication context mandates user/password authentication over HTTPS. |
||
|
|
||
|
The comparison type that is transmitted in the requested authentication context. Possible values:
For more information about the comparison type values, refer to the SAML specifications. |
||
|
The list of class references in the requested authentication context. You can separate list items with the pipe character (|). For more information about this list, refer to the SAML specifications. |
||
|
The list of class declarations in the requested authentication context. You can separate list items with the pipe character (|). For more information about this list, refer to the SAML specifications. |
||
|
Enable the support for encrypted SAML responses.
Once OPTIONAL or FORCED is selected, the encryption key pair is generated and added to the Collibra SAML keystore. A self-signed certificate is generated and works in most situations. If your IdP rejects self-signed certificates, you will have to add a certificate that is signed by a trusted 3rd party. |
||
|
The SAML certificate expiry date in years. By default, the SAML certificate expires after 20 years. |
Signout
The section about signout redirect changes.
| Setting | Description |
|---|---|
| Override signout URL (Requires restart) | |
| Signout redirect URL (Requires restart) | The URL to be redirected to when signing out. |
JWT
This section helps you configure the JSON Web Token authentication.
| Setting | Description |
|---|---|
| JSON Web Key Set URL |
The URL to retrieve public key information needed to verify the authenticity of JSON Web Tokens (JWTs), issued by an authorization server. This setting is required to enable JWT authentication. |
| JWT Token Types |
A case-insensitive comma-separated list of accepted JWT media types coming in the typ header parameter. Leave blank if the authorization server does not provide a media type parameter. The default values is at+jwt,jwt. |
| JWT Algorithms |
A comma-separated list of accepted JWT algorithms coming in the alg header parameter. See https://tools.ietf.org/html/rfc7518#section-3.1 for details. Leave blank to accept all digital signature algorithms. |
| JWT Issuer |
The accepted issuer coming in the iss JWT claim. Leave blank if the authorization server does not provide an issuer claim. |
| JWT Audience |
A comma-separated list of accepted audience values for the aud claim. The value for this field is a configuration setting in your authorization server, which identifies your Collibra environment as the intended recipient of the JWT. Leave blank if the authorization server does not provide an audience claim. |
| JWT Principal ID Claim Name. |
The name of the JWT claim containing the principal's identity. See https://tools.ietf.org/html/rfc7519#section-4.1.2 for details. Defaults to the standard subject claim, sub. Change this setting only if your authorization server has other means of identifying the principal, for example, a client_id claim. This setting is required if JWT authentication is enabled. |
| JWT Maximum Clock Skew |
The maximum acceptable difference in seconds between the clocks of the machines running the authorization server and Collibra. Differences smaller than the given amount are ignored when performing time comparisons for token validation. The default value is 60 seconds if left blank. |