Solving OWA Attachment Security with Citrix NetScaler

September 22, 2011

What’s the problem exactly?

With the rise of the availability of web based applications, web based versions of their client-server counterparts, and workforce mobility, comes the increased risk of potentially leaving behind sensitive information on remote devices not under the control of corporate IT.  While there are no 100% solutions to this problem, organizations can implement numerous preventative measures to deal with it which are available from the developer as well as 3rd party technologies.

Microsoft Outlook Web Access is no exception to this problem and is often at the forefront of the concerns of security teams because of it’s popularity and the fact it is very often exposed to the public internet so that mobile work forces can remain productive from anywhere.  This is of course exacerbated by the fact that OWA and other web based email interfaces like it provide access to email attachments.  These attachments, when opened, are cached in a browser’s Temporary Internet Files folder or worse perhaps saved to a folder location that is easily accessible by anyone.  End-users could potentially walk-away from these devices leaving corporate information behind to possibly be exploited for malicious purposes. 

As mentioned, there is no solution that is 100% safe to the aforementioned problem.  There are numerous solutions to these issues, ranging from VPN Cleanup Agents, to access via Virtualization technologies such as Citrix XenApp or Citrix XenDesktop, to proxy devices such as Citrix NetScaler.  Each method has their own set of pros and cons and have varying levels of cost and preventative .  This article focuses on utilizing the power of Citrix NetScaler ADC

How can one solve this problem?

Starting with Exchange Server 2007, Microsoft introduced the concept of Public and Private computers allowing end-users to select whether their end device was to be trusted or not. 

image image
OWA 2007 Login Form OWA 2010 Logon Form

On the Exchange Server end, these options pertain to settings that can be used to control the behaviour of how attachments are dealt with.  These include the ability to block all attachment access or allow attachment access but only via the built-in document conversion utilities which convert the attachment to HTML for view right in the browser.

image

image

Disallow all attachment access or only allow file preview

Allow attachments with restrictions or certain file types only or force use of file preview

These settings in turn control the end-user experience with regards to attachment access. 

image
Public computer with no access to attachment
image
Private computer with attachment access and preview

Giving end-users the control is not the answer

All of the above are great options if you actually trust your end users to select the correct option at login to classify the type of device or location they are accessing your network from. But a more realistic solution is to profile the device, user, or location and enforce the behaviours based on this discovery information.  Some examples of the information you could base a decision on include:

  • Client IP Source Address
  • SSL Certificate Auth/Details
  • Browser/Device Type
  • User Identity or Group Membership
  • Presence of Anti-Virus or Anti-Spam software

How can Citrix NetScaler ADC help? 

NetScaler has three core features which can be leveraged to secure Outlook Web Access attachment functionality based on the methods described above. The NetScaler AAATM feature (Authentication, Authorization, and Accounting for Traffic Management) enables the ability to use the NetScaler to perform authentication to user account directories based on LDAP, RADIUS, TACACS+, or Client SSL certificates.  Secondly, Access Gateway functionality provides bi-directional SSL VPN tunnelling and ICA Proxy capabilities and adds the ability to perform endpoint analysis to the aforementioned AAA features provided by AAATM.  And lastly, the NetScaler Rewriting feature allows us to alter or inject html in Requests and Responses based on conditions we define by the very extensible AppExpert policy engine. 

Instead of letting the End User control the attachment behavior, the NetScaler can be inserted in front of the solution to provide

  • DMZ Authentication and Authorization
  • Single Sign-On to Outlook Web Access
  • Attachment control based on end user, location, or device attributes

In the configuration example below, Source Address and Group Membership are chosen for example to determine the level of attachment security applied to the session.

image

In addition to providing attachment security, Citrix NetScaler can be leveraged to provide High Availability, High Scalability, and Consolidation through additional on-box features such as SSL Offload, Content Switching, Load Balancing, Content Compression, and Integrated Cache. 

owa_tmaaa_example

Sample NetScaler AAATM Configuration for OWA 2010

Sample Access Gateway Configuration (coming soon)


More Information

 


Symphony Theme for Citrix NetScaler

March 26, 2011

Overview:

This theme will update the look and feel of NetScaler AAATM/Access Gateway Enterprise to the Symphony theme which you have likely already seen in Web Interface 5.4 and various other Citrix products. 

Theme Options:

After some initial feedback, some additional options were added to enhance the theme which can be decided on at install time:

 Symphony1
Symphony1
Base Symphony Theme
Symphony2  Symphony2
Base Symphony Theme with a Domain Drop-down for login.  Please follow additional required steps in CTX118657
Symphony3 Base Symphony Theme with Google reCaptcha 2nd factor auth (Coming Soon!)
Symphony4 Base Symphony Theme with a Domain Drop-down for login and Google reCaptcha 2nd factor auth. Please follow additional required steps in CTX118657 and my blog post on use of captcha with NetScaler AAA TM. (Coming Soon!)

How to Implement the Symphony Theme:

Andre Perry has assisted with the creation of a very nice shell script that completely automates the installation of the theme.  This script will:

  1. Automatically download the latest Symphony theme from the Citrix CDN site to the NetScaler you are implementing the theme on.
  2. Extract all files to /var/vpn/customizations directory
  3. Modify hard-coded theme build references with specific installed 9.3 build
  4. Copy content to /netscaler/ns_gui and /netscaler/portal locations on flash
  5. Add entry into nsafter.sh to invoke routine at each system startup to check the installation state and copy custom content to flash

Simply download the installation script and name the file to the theme option that you want to implement.  i.e. – Symphony1.sh.

Note – If the NetScaler or Access gateway you are installing the theme on does not have internet access, you can simply download the appropriate Symphony Theme to the /tmp directory and run the script.

Download the Symphony Theme!

Download the Symphony Theme Symphony automated install script (rename this on save to reflect the theme you are installing – i.e. – Symphony1.sh
  Individual Symphony Theme Packages for Manual Installs:
Archive-icon Symphony1.gz
Archive-icon Symphony2.gz

Implementation and Testing Notes:

  1. When testing the new skin, be sure to clear your browser cache via Ctrl-F5 if you had previously loaded the default theme
  2. If you have the Integrated Cache enabled on the NetScaler, you may also need to flush or invalidate the Access Gateway specific portal content

Additional Information:

Acknowledgements

Special shout out to Jesse Boehm and team of Techstur.com for the creation of this skin.  Techstur.com is a pioneer in the field of Interface Customization Services, adding clients’ branding elements to the Web interfaces that employees, customers and vendors rely on for application delivery and remote access. Techstur.com customizes many of the most widely-used interfaces, including all versions of Citrix Web Interface, Citrix NetScaler, Citrix Access Gateway, Microsoft Outlook Web App, Microsoft Outlook Web Access, Microsoft RD Web Access, Microsoft Threat Management Gateway 2010 and a number of others. Visit their company website techstur.com

Thanks as well to Jonathan Devenish for the slick streamlined sed command method of find and replace in the shell

And many thanks to Andre Perry for his *nix shell scripting prowess