|
COMMERCE BUSINESS DAILY ISSUE OF FEBRUARY 16,2000 PSA#2538U.S. Department of Agriculture, National Finance Center (NFC), 13800
Old Gentilly Rd., Bldg 350, MAF, New Orleans, LA 70129 70 -- SOURCES SOUGHT FOR SINGLE-SIGNON AND SECURITY ADMINISTRATION
PRODUCT SOL NFC-00-RFI-009 DUE 031000 POC Mrs. Freddie D. Moses,
Contracting Officer, 504-255-5911 E-MAIL: USDA, National Finance
Center, freddie.moses@usda.gov. This is a Sources Sought Synopsis.
USDA, OFCO, National Finance Center (NFC), is seeking information on a
trusted single-signon and security administration product. The
following is a list of the functional requirements of the product, as
set forth by the USDA National Finance Center. The requirements are
broken down in four major categories: The USDA National Finance Center
is seeking information on a trusted single-signon and security
administration product. The following is a list of the functional
requirements of the product, as set forth by the USDA National Finance
Center. The requirements are broken down in four major categories:
Security Administration Management, Identification and Authorization,
Access Control, and Data Integrity/Confidentiality/Encryption. Under
each category the requirements are listed in the most critical to least
critical order. Assumptions 1. All USERIDs are unique, no two USERIDs
can be the same. This prevents two or more users from having the same
USERID. 2. The vendor should provide the requisite software to provide
functionality on all supported platforms. 3. The term multiple
platforms refers to both hardware and software. Software: Windows
95/98/NT, UNIX, MVS OS390, Novell, GroupWise, etc. Hardware: Mainframe,
Novell/NT/Proxy/FTP Servers, RS6000, etc. Security Administration
Management Single Point of Administration All administration of the
product should be done from a single point. This enables an
administrator to provide support for multiple platforms from one single
platform device. This also enables the user to only have to change
his/her password on one platform and have it propagate across all other
platforms. Administration for Multiple Platforms The product should
provide for the administration of the product from any of the supported
platforms. This enables the administrator to support the product from
any platform of his/her choice. Ability to Enforce Enterprise/Global
Security Rules The product should provide the ability to enforce
security rules over the entire enterprise regardless of platform. This
will ensure consistent security over resources on all protected
platforms. Audit Trail All changes, modifications, additions, and
deletions should be logged. This ensures that all security changes are
recorded for review at a later time. Security Administration
Management (continued) Real-Time and Batch Update All changes should be
made on-line/real-time. The ability to batch changes together is also
important to enable easy loading or changing of large numbers of
security resources or users. Synchronization Across All Entities The
product should synchronize security data across all entities and all
platforms. This ensures that all security decisions are made with
up-to-date security information. Ability to Trace Access The product
should enable the administrator to be able to trace access to systems
regardless of system or platform. Scoping and Decentralization of
Control The product should be able to support the creation of spans of
control so thatadministrators can be excluded from or included in
certain security control areas within the overall security setup. This
enables an administrator to decentralize the administration of
security functions based on the groups/nodes/domains/enterprises that
the decentralized administrator has control over. Ability To Group
Users The product should enable the grouping of like users where
applicable. These groups should be handled the same way individual
users are handled. This will enable more efficient administration of
access authority. Ability to Recreate Information logged by the system
should be able to be used to "backout" changes to the security system.
This enables mass changes to be "backed out" of production. One Single
Product The product should be a single product, not a compendium of
several associated products. Modularity for the sake of
platform-to-platform compatibility is acceptable and favored. Usage
Indicators The product should include usage data on each user. Usage
data should include usage count for each application/domain, last date
used, last date modified, date created, etc. Physical
Terminal/Node/Address Control The product should have the ability to
restrict or control access on the basis of a terminal, node, or network
address. This ability will enable administrators to provide access
control by physical location. Security Administration Management
(continued) Release Independent/Backward Compatible All releases of the
product should be backward compatible or release independent. Features
of new releases should co-exist with current features and not require
a total reinstallation of the product. Implementation in Phases The
product should support a phased implementation to enable administrators
to implement the product on individual platforms without impacting
other platforms. This will enable installation on a
platform-by-platform basis if desired. Ability to Interface with
Application/Database/Network Security The product should be able to
interface with existing application, database, or network security by
way of standard security interfaces. This will ensure that the product
will mesh with existing security products installed. Ability to
Interface with Session Manager The product should be able to interface
with existing session manager software, in particular, CL-Super
Session. Software Release Distribution New releases of the product
should be distributed via the network from a single distribution server
of the administrator's choice. This enables an administrator to upgrade
the product on any platform without physically moving from platform to
platform. Flexible Cost The cost of the product should be reasonable.
Several cost scenarios should be considered such as per seat, CPU,
site licensing and MIPS pricing. Pricing should include disaster
recovery scenarios. Ability to Create Security Extract Files The
product should have a feature to produce an extract file of the
security structure and logged data. This enables the administrator to
write his/her own reporting systems via SAS or any other language. Test
Functionality The product should include a test facility to enable
administrators to test security changes before placing them into
production. Ability to Tag Enterprise/Domain/Node/Application. The
product should be able to add a notation or "tag" specifying
Enterprise/ Domain/ Node/ Application in order to provide the
administrator with a way to identify the entity. This enables the
administrator to denote the tagged entity and possibly perform extra or
non-standard operations on the entity based on that tag. Security
Administration Management (continued) User Defined Fields The product
should have a number of user customizable/user-defined fields. This
enables a user to provide for informational needs that are specific to
his/her organization. Target Platform Flexibility Administrator should
be able to have the option of directing security command to a
particular platform or to multiple platforms. Identification and
Authorization Support RACF Pass Ticket Technology The product should
support IBM's RACF Pass Ticket technology ensuring that the product can
reside in an environment using Pass Ticket technology to provide
security identification and authorization. Support Password Rules All
common password rules should be supported: Use or non-use of passwords
Password length rules Password aging rules Password change intervals
Password syntax rules Password expiration warning message Disallow
previous x passwords Password uniqueness rules Limited number of logons
after a password expires Customer defined rules Logging of All Activity
All activity should be logged, or able to be logged, for all
activities. The logging should include the origin of the logged item or
action, the destination, the application involved, and the platform
involved. This enables the administrator to provide a concise map of
all activity on the enterprise. The degree of logging should be
controlled by the administrator. Single Revoke/Resume for All Platforms
The product should support asingle revoke or resume of a USERID
regardless of the platform. This ensures that a user can be revoked or
resumed with only one command from one source or platform. Support a
Standard Primary USERID Format All common USERID syntax rules should be
defined by the administrator and supported across all platforms.
Identification and Authorization (continued) Auto Revoke After X
Attempts Users should be revoked from system access after a specified
number of invalid attempts. This threshold should set by the
administrator. This ensures that invalid users are prevented from
retrying signons indefinitely. Authorization Server On Mainframe
Platform The product should provide for the authentication server to
reside on a OS390 Mainframe platform. Single Point of Authorization All
authorizations should be made at a single point, i.e., an
authentication server. The product should not need to go to several
versions of the product on several platforms to gain the needed access
to a resource. This provides not only asingle point of administration
for the product, but also reduced network security traffic. Support
User Exits/Options The product should support the addition of user
exits/options that could be attached to the base product at
strategically identified points of operation. The points would include:
signon, signoff, resource access check, etc. This enables an
administrator or key technical support personnel to add exit/option
code to the package to provide for specific security needs above and
beyond the scope of the package. Insure USERID Uniqueness The product
should ensure that all USERIDs are unique, no two USERIDs can be the
same. This prevents two users from having the same USERID. Support
Signons from Multiple Devices The product should support signons from
a variety of sources. LAN/WAN, workstations, Laptops/Notebooks,
Dial-in, dumb terminals, etc. This ensures that all signon sources are
able to provide signon access. Customizable Messages The product
should support the use of customized security messages. This will
enable an administrator to customize messages to fit the needs of the
enterprise. Access Control Ability to Support Scripting -- Session
Manager Menus The product should support the use of session managers,
i.e. CL Super Session, and session manager scripting. This enables the
use of a session manager script in those sites and instances where
they are needed or required. Access Control (continued) Privileges at
Group/System Level The product should support administration privileges
at a group level (Based on span of control) or on the system level.
This enables the product to be administered by several administrators
without the administrators authority overlapping. Default Protection
Option The product should provide for the option of protecting of all
resources and entities as the default. The product should also have the
option of having the default as being unprotected. Support
Masking/Generics The product should support security profiles
containing generic characters that enablethe product to make security
decisions based on groups of resources as opposed to individual
security profiles. This enables the administrator to provide security
profiles over many like-named resources with the minimum amount of
administration. Data Integrity/Confidentiality/Encryption No Clear Text
Passwords (Net or DB) At no time should any password be available on
the network or the security database in clear, human-readable form. The
only exception is the use of dumb terminals where the terminal does not
support encryption techniques. This will ensure the integrity of the
users' passwords in all cases with the exception of dumb terminals.
Option to Have One or Distributed Security Databases The product should
support the option of having a single security database or several
distributed security databases on different platforms. This enables an
administrator to use a distributed database on a platform that may be
sensitive to increased activity rather than a single security
database. The administrator will control who can and if they can update
distributed databases. Inactive User Time-out All users who are
inactive for a set period of time during a session should be timed out
and signed off of all sessions. This ensures that a user who becomes
inactive for whatever reason does not compromise the security of the
system by providing an open terminal to a system. This feature should
be controlled by the administrator and have two layers: 1. At the
session manager/screen level. 2. At the application/platform level.
Inactive User Revoke All users who have not signed on within a set
period of time should be revoked. This period should be configurable by
the administrator. This will ensure that USERIDs are not valid if not
used within a set period of time. Data
Integrity/Confidentiality/Encryption (continued) Ability to Backup
Security Database to Choice of Platforms/Media The product should be
able to backup its security database to a choice of supported platforms
or storage media. This enables the administrator to have a variety of
destinations available for the security database backup. Encryption
Should Be Commercial Standard (Presently DES) The encryption used in
the product should be standard. That standard is presently DES which is
128 bit encryption but could change as new encryption standards are
made. This will ensure that the product will be based on a tested,
generally accepted encryption base. Integrity of Security Database The
database used by the product to store security information and
parameters should be protected from changes via any source other than
the product itself. Generic file edit tools should not be able to view
or update the security database. Optional Application Data Encryption
The product should provide the optional ability to interface to
encrypted application data if the encryption techniques are provided.
This enables the product to interact with existing application
encrypted data. Failsoft Ability The product should have the ability to
perform at a degraded degree without access to the security database.
This ability should rely on administrator input on an as needed basis
to enable a user to signon, access resources and signoff. This enables
the product to at least work in a degraded mode in an emergency in
such a fashion that security is not compromised. This is not a request
for proposal, and in no way obligates the government in an award of
any contract. The government does not intend to compensate any sources
for any information provided. Interested sources are invited to
respond to this Sources Sought Announcement by providing in writing, at
a minimum, the following: a) Company Brochure indicating area of
expertise, company size and locations of facilities, b) any information
which might indicate that the offerer has the technical expertise and
applicable background to provide the required system, and c)
Demonstration of the offerer's ability to provide technical support for
the item described above. Proprietary information should be properly
identified. All respondents shall indicate whether they ar a small,
minority or handicapped owned business. Interested sources may submit
responses any time after the release of this Sources Sought synopsis,
but not later than March 10, 2000. Posted 02/14/00 (W-SN425182).
(0045) Loren Data Corp. http://www.ld.com (SYN# 0243 20000216\70-0002.SOL)
70 - General Purpose ADP Equipment Software, Supplies and Support Eq. Index Page
|
|