The Data Governance service SCP contains the following key elements, which are stored in its Active Directory attributes.
Attribute/Attribute Syntax | Function | Default Value |
---|---|---|
CN Attribute syntax: String |
SCP Name | DataGovernance.Server |
keywords Attribute syntax: Multi-valued string |
Used to store the following information to facilitate locating the SCP:
|
|
serviceBindingInformation Attribute syntax: Multi-valued string |
Contains the default tcp.net port and HTTP port |
<XML> |
serviceClassName Attribute syntax: String |
Used to store service class for authentication | DataGovernance.Server |
serviceDNSName Attribute syntax: String |
FQDN of the computer running the Data Governance service | <Server FQDN> |
serviceDNSNameType Attribute syntax: String |
The DNS record type of the host listed in the serviceDNSName | A |
|
Note: For agent deployments, open the following file and printer sharing ports:
|
Port | Direction | Description | ||||
---|---|---|---|---|---|---|
8721 |
Incoming |
TCP (HTTP) port opened on the Data Governance server computer. This is the base port for the Data Governance REST API, used for communication with Data Governance server REST services, including the One Identity Manager clients and Windows PowerShell. | ||||
8722 |
Incoming |
TCP (net.tcp) port opened on the Data Governance server computer. Used for communication with Data Governance agents, One Identity Manager clients, One Identity Manager web server, and PowerShell.
| ||||
8723 |
Incoming |
HTTP port used for communication with the One Identity Manager web server (/landing and /home pages). | ||||
18530 - 18630 |
Incoming |
TCP port range opened on all agent computers. Used for communication with the Data Governance server. (The first agent on an agent host will use port 18530, and each subsequent agent on the same host will take the next available port, i.e., 18531, 18532, and so on.). In addition, this range is used to open a TCP listener for NetApp Cluster Mode hosts if resource activity collection is enabled. |
Information about all Data Governance Edition infrastructural elements such as service accounts, managed hosts and the security index information collected by the Data Governance agents is stored in the One Identity Manager database. Processing of security index updates, access and activity queries or any infrastructural changes to the system involve communication between the Data Governance server and the database.
The connection information used when communicating with the One Identity Manager database is stored in the Windows Registry on the Data Governance server. The connection information is written to the registry key "HKLM\SOFTWARE\One Identity\Broadway\Server" and is encrypted using the Microsoft Data Protection API.
Only the user account that encrypts the value can read it. If the account running the Data Governance server is changed, the database connection string has to be reset and re-encrypted.
Data Governance agents are semi-autonomous services running in a distributed environment. They are designed to remain fault tolerant in a fluctuating global network. In a typical organization, computers are rebooted, network outages occur, and systems are disrupted in any number of ways. Data Governance agents are set to automatically start when a server is restarted. Data Governance agents require an initial configuration from the server; however, they will continue to scan and collect activity per configuration even when unable to communicate with the Data Governance server. All the collected activity and security updates are synchronized with the Data Governance server when connectivity is restored.
The communication uses encrypted WCF (Windows Communication Foundation) channels and the net.tcp protocol. .NET v4.5 is required on all agent host computers, except for SharePoint 2010 agents, which requires .NET v3.5.1.
Data Governance client elements are embedded into the Manager client application. The user interface elements communicate with the Data Governance server and directly with the One Identity Manager database as needed.
Communication with the database is performed in the same way as any other One Identity Manager database communication, using the authentication information provided when the user launches the client tools.
When communicating with the Data Governance server, the client uses an encrypted WCF channel and the net.tcp protocol.
.NET 4.5.2 is required on the Data Governance server and client computers.
When communicating directly with the One Identity Manager database, the client is authenticated using standard One Identity Manager authorization checks. For more information on this type of authentication, see Granting Access Permissions to One Identity Manager Schema in the One Identity Manager Configuration Guide.
When user interface elements communicate with the Data Governance server, the authentication is performed using the One Identity Manager role-based authentication checks using the logged on Windows identity. This can lead to a discrepancy in authentication between the client and server. If possible, it is recommended that the client user authenticates to One Identity Manager using the “Active Directory user account (role based)” authentication mechanism, so no ambiguity exists. This mechanism maps the logged on Active Directory account to a One Identity Manager employee and uses that employee’s application roles to determine what permissions they have.
|
NOTE: Regardless of the identity used to log in to the client application, it is the Employee associated with the logged in Windows account that is used for permissions checks when communicating with the Data Governance server. |
This table describes each segment of communication that occurs in the Data Governance Edition system along with technical details for each type of communication.
From / To |
Originating port | Protocol | Destination port | ||
---|---|---|---|---|---|
Data Governance service to One Identity Manager database Actions involved:
|
Dynamic | TCP |
SQL Server port or Oracle port.
| ||
Data Governance service to Resource Activity database Actions involved:
|
Dynamic | TCP |
SQL Server port or Oracle port.
| ||
One Identity Manager service (job server) to Data Governance service Actions involved:
|
Dynamic | TCP |
Specified by customer during installation. Default value is 8722. | ||
Data Governance service to Windows Server on which to install agent Actions involved:
|
Dynamic | SMB | 445 | ||
Data Governance service to agent service Actions involved:
|
Dynamic | TCP (using Windows authentication of the "Log On As" account of the Data Governance Service Windows Service) |
Next unused port from the configured "BaseActivePort". Default value of "BasesActivePort" is 18530. | ||
Agent to Data Governance service Actions involved:
|
Dynamic | TCP (using Windows authentication of the "Log On As" account of the agent's Windows Service) |
Specified by customer during installation. Default value is 8722. | ||
Data Governance service to NetApp 7-Mode device with CIFS or NFS file system protocols enabled Actions involved:
|
Dynamic | RPC (using Windows authentication of the "Log On As" account of the Data Governance Windows Service) |
Named pipe on NetApp filer: <Host Name>\pipe\NETAPPSVC | ||
Data Governance service to NetApp 7-Mode or Cluster device with NFS file system protocol enabled Actions involved:
|
Dynamic | HTTPS (using the username and password specified in the managed host configuration) | 443 | ||
Agent to NetApp 7-Mode device with CIFS or NFS file system protocols enabled Actions involved:
|
Dynamic | RPC (using Windows authentication of the "Log On As" account of the agent's Windows Service. |
Named pipes on NetApp filer: <Host Name>\pipe\NETAPPSVC and <Host Name>\pipe\ntapfpcp | ||
NetApp 7-Mode to agent Actions involved:
|
Dynamic | RPC |
Named pipe: <\pipe\ntapfprg_<Agent Instance ID> | ||
Agent to NetApp Cluster Mode with CIFS or NFS file system protocols enabled Actions involved:
|
Dynamic | HTTPS | 443 | ||
NetApp Cluster Mode to Agent Actions involved:
|
Dynamic | TCP |
Next unused port from the configured "BaseActivePort". Default value of "BasesActivePort" is 18530. | ||
Agent to NetApp device with CIFS file system protocol enabled Actions involved:
|
Dynamic | CIFS/SMB (using Windows authentication of the "Log On As" account of the agent's Windows Service) | 445 | ||
Data Governance service to EMC Celerra device Actions involved:
|
Dynamic | SSH | 22 | ||
Data Governance service to EMC Isilon device with NFS file system protocol enabled Actions involved:
|
Dynamic | HTTPS (using the username and password specified in the managed host configuration) |
Specified by customer when configuring managed host. Default value is 443. | ||
Agent service to EMC device with CIFS file system protocol enabled Actions involved:
|
Dynamic | CIFS/SMB (using Windows authentication of the "Log On As" account of the agent's Windows Service) | 445 | ||
Agent service to EMC Isilon device with NFS file system protocol enabled Actions involved:
|
Dynamic | HTTPS (using the username and password specified in the managed host configuration) |
Specified by customer when configuring managed host. Default value is 443. | ||
Agent to SharePoint SQL Server database Actions involved:
|
Dynamic | TCP | Default SQL Server port, typically 1433. | ||
Data Governance service to Cloud API Actions involved:
|
Dynamic | REST over HTTP with OATH authentication | Dynamic | ||
Agent to Cloud API Actions involved:
|
Dynamic | REST over HTTP with OATH authentication | Dynamic | ||
Web client to Data Governance service Actions involved:
|
Dynamic | TCP |
Specified by customer during installation. Default value is 8722. | ||
Windows PowerShell to Data Governance service Actions involved:
|
Dynamic | TCP |
Specified by customer during installation. Default value is 8722. |
© 2023 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy