RSA Adaptive Authentication
Total Page:16
File Type:pdf, Size:1020Kb
RSA Adaptive Authentication (Hosted) Data Gathering Techniques Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of RSA trademarks, go to www.rsa.com/legal/trademarks_list.pdf. License agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Note on encryption technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright © 2012-2015 EMC Corporation. All Rights Reserved. October 2012 Revised: July 2014, May 2015, December 2015 RSA Adaptive Authentication (Hosted) Data Gathering Techniques Guide Contents Preface................................................................................................................................... 5 About This Guide................................................................................................................5 RSA Adaptive Authentication (Hosted) Documentation.................................................... 5 Support and Service ............................................................................................................ 7 Before You Call Customer Support............................................................................. 7 Chapter 1: Data Gathering Overview.................................................................. 9 Collection Methods............................................................................................................. 9 JavaScript Collection ................................................................................................... 9 Mobile Data Collection................................................................................................ 9 Browser Cookie ........................................................................................................... 9 Flash Shared Objects (FSO) ...................................................................................... 10 Supported Browser and Operating System Combinations................................................ 10 Operating Systems with Java Collection Support...................................................... 10 Mobile Devices and Browsers with Java Collection Support.....................................11 Supported Browser and Flash Component Combinations......................................... 12 Best Practices for Data Gathering..................................................................................... 12 Files to Implement Data Gathering................................................................................... 13 Chapter 2: JavaScript Collection........................................................................ 15 Device Fingerprint ............................................................................................................ 15 Prerequisites............................................................................................................... 17 Implementing the Device Fingerprint Method .......................................................... 17 Mobile Location Awareness ............................................................................................. 19 Collecting Mobile Browser Geolocation Data using JavaScript ............................... 19 Sending Collected Mobile Browser Geolocation Data to RSA Adaptive Authentication......................................................................................................... 23 Chapter 3: Mobile Data Collection ..................................................................... 25 Collecting Mobile Data..................................................................................................... 27 Collecting and Sending Information with the JavaScript ................................................. 28 Collecting Information with the RSA Mobile SDK - Adaptive Authentication Module . 28 Sending Collected Data with the RSA Mobile SDK to RSA Adaptive Authentication ... 28 Chapter 4: Browser Cookie .................................................................................... 29 Implementing the Browser Cookie ................................................................................... 29 Writing or Updating a Browser Cookie ............................................................................ 30 Sending Collected Data to the RSA Adaptive Authentication System............................. 30 Chapter 5: Adobe Flash Shared Object .......................................................... 31 Prerequisites...................................................................................................................... 31 Flash File Location and Flash Shared Object Creation..................................................... 31 Understanding Flash Variables ......................................................................................... 32 Detecting the Flash Version and Running the Movie....................................................... 32 Implementing the Flash Shared Object............................................................................. 33 Contents 3 RSA Adaptive Authentication (Hosted) Data Gathering Techniques Guide Running the Flash Shared Object Example ...................................................................... 34 Implementing the Flash Shared Object with the Anti-Theft Feature................................ 35 Reading the Flash Shared Object............................................................................... 35 Writing or Updating a Flash Shared Object............................................................... 35 Running the Anti-Theft Flash Shared Object Example .................................................... 36 Sending Collected Data to the RSA Adaptive Authentication System............................. 37 Chapter 6: IP Address Gathering Techniques............................................ 39 End User is not Behind Proxy........................................................................................... 39 End User is Behind Proxy................................................................................................. 39 Appendix A: SOAP Analyze Request Example.......................................... 41 4 Contents RSA Adaptive Authentication (Hosted) Data Gathering Techniques Guide Preface About This Guide RSA Adaptive Authentication makes extensive use of data collection for risk-based authentication. This guide focuses on the data gathering techniques for Device Fingerprint, Mobile device identifiers, Flash Shared Object, and Browser Cookie collection, that are used in conjunction with the SOAP API. It also describes the implementation mechanisms that allow the application or web site to collect data from the user’s device and pass it to the Adaptive Authentication system. This guide is intended for web site designers, system administrators, and other trusted personnel responsible for implementing data gathering techniques. Do not make this guide available to the general user population. Note: This document describes the JavaScript Collection code implementation in conjunction with Adaptive Authentication API 6.5. It is not compatible with earlier API versions. RSA Adaptive Authentication (Hosted) Documentation For more information about RSA Adaptive Authentication, see the following documentation: RSA Adaptive Authentication (Hosted) Release Notes. Provides information about what is new and changed in this release, as well as workarounds for known issues. The latest version of the Release Notes is available on RSA SecurCare Online at https://knowledge.rsasecurity.com. RSA Adaptive Authentication (Hosted) Product Overview Guide. Provides a high-level introduction to the product and its documentation. Setup Form. Specifies and describes the basic system configuration parameters that are required for getting started and describes optional system