docmain.css" /> Create, Deploy, and Test a TLS 1.2 Session - Evaluating Host Access Management and Security Server

3.2 Create, Deploy, and Test a TLS 1.2 Session

In this section, you will create a TLS 1.2 session and then test the “before” security settings — before the workstation is locked down.

Steps in this section:

________________________________________________________________________________

3.2.1 Step 6. Create a Windows-based 3270 session that uses TLS 1.2.

The administrator’s company requires secure access to the mainframe. To meet this requirement, create a session to an IBM 3270 host, using both Management and Security Server and Reflection Desktop.

  1. Log off Windows as the domain user, and log on as the administrator.

  2. Open Management and Security Server, and log on as the Management and Security Server administrator.

  3. The Administrative Console opens to the Manage Sessions panel.

  4. Click +Add.

  5. Select Reflection/InfoConnect Workspace as the Product, and Workspace as the Session type.

  6. Enter a Session name, such as 3270-TLS.

  7. Add a comment for internal reference, if desired.

  8. Accept the default settings and click Launch. Reflection Workspace launches in a separate window.

  9. In Reflection Workspace, create a new document using the 3270 terminal template. Click Create.

  10. In the Create New 3270 Terminal Document dialog, enter the Host name of a TLS-enabled host name and the appropriate port.

    If you cannot connect with TLS, enter the name of another mainframe host. You will not be able to evaluate the exact behavior on your system, but you can follow along.

  11. Check Configure additional settings (at the bottom), and click OK.

  12. In the Settings for 3270 dialog under Host Connection, click Configure Advanced Connection Settings. Scroll to and click Security Settings. (If prompted, disconnect the session.)

  13. On the SSL/TLS tab:

    1. Check Use SSL/TLS security, and keep the Default Encryption strength.

    2. In the SSL/TLS version drop-down menu, select TLS Version 1.2.

    3. Click OK twice. The session is now configured.

    As mentioned earlier, if you cannot connect with TLS, you will not be able to evaluate the exact behavior on your system, but you can follow along.

  14. In Reflection Workspace, click File > Save. Click OK to send the settings to the Administrative Server.

    For this evaluation, you do not need to send it as a compound session.

    (When the session is sent as a compound file, all of the custom keyboard maps and other settings that apply to that session are saved in the session file. Compound files simplify the deployment process because you do not have to deploy these settings in separate files.)

  15. Close Reflection Workspace. You are returned to the Administrative Console in Management and Security Server.

Review your progress

The security settings are configured (Steps 4, 5), and the session to the mainframe is created (Step 6). Now you can “push” the settings to the domain user.

3.2.2 Step 7. Deploy the session to the domain user’s workstation.

In Management and Security Server, use Assign Access to authorize the domain user to access the mainframe session.

  1. In the Administrative Console, open Assign Access. Or, if the Session Saved page is still open, click Assign Access.

  2. For this evaluation, deploy the 3270-TLS session to the domain user. Because you are using LDAP for authorization, you can Search for users and groups.

    To find the user, enter a user name, a group or folder name, along with an asterisk (*) wildcard, or a combination of * and letters. Click Search.

    Note: If you are not using LDAP, the only option is to deploy the session to all (or no) users.

  3. On the same Search & Assign panel, verify that the correct user name is displayed

  4. Then, in the Session list, check your session, 3270-TLS, to grant access to that domain user.

  5. Click Apply.

    Now, when that domain user opens Reflection Workspace, they will see the 3270-TLS session.

  6. Log off as administrator.

Review your progress

The companion package is installed on the user workstation, with settings to enable Centralized Management in the Reflection Workstation and to display the Open dialog box when the Workstation first opens.

The completion of Steps 1–7 meet the company requirements to ensure that:

  • Only authorized users are allowed access to the mainframe applications.

  • All sessions are connected over a secure protocol.

3.2.3 Step 8. Test the deployment.

Test the initial deployment and make note of what the user can and cannot change.

  1. Log on as the Windows domain user.

  2. Click Start > All Programs > Micro Focus Reflection > Reflection Workspace.

    When the domain user launches Reflection Workspace, any sessions made available to that user using Management and Security Server are downloaded to the users documents folder.

    Notice that Reflection Workspace opens and presents the Open dialog (that you configured earlier).

  3. Find and double-click the 3270-TLS session you created (in Step 6).

  4. Note the default security settings for Primary Account Number (PAN) Redaction Rules:

    1. Open Reflection Workspace Settings (File > Settings > Reflection Workspace Settings).

    2. Under Trust Center, click Set Up Information Privacy, and scroll to Primary Account Number (PAN) Redaction Rules.

      NOTE:The first three check boxes under Primary Account Number (PAN) Redaction Rules are not checked for this user. (These settings will be modified in a future step.)

      Click OK.

  5. View the TLS Connection settings (from Step 6):

    1. Click File > Settings > Document Settings, and under Host Connection, click Configure Advanced Connection Settings.

    2. Scroll to and click Security Settings.

    NOTE:Although the Use SSL/TLS security setting is checked, the user could change the setting.

Review your progress

When you tested the initial deployment (Step 8), you observed the “before” settings – before access to the company’s mainframe applications is locked down.

Now the administrator needs to restrict the end user’s ability to change the security settings and thereby lock down the workstation.

________________________________________________________________________________

Next step: Lock Down the Workstation and Test the User Experience