beautypg.com

Secure search example – Google Search Appliance Security User Manual

Page 23

background image


23

Public document

Secure document

Public crawled document

Feed document with no security

Content from a secure content source that has
been marked as public by using the GSA Admin
Console

Securely crawled document

Feed document declared as secure

Users can search and get to public documents without authentication. However, there is an exception.
GSA 6.14 introduced the perimeter security feature to the GSA, which ensures that the search appliance
doesn't serve any results without user authentication. When perimeter security is enabled, the search
appliance must authenticate a user with one of the configured authentication mechanisms before serving
any results. If authentication fails, the GSA will not serve any results, even if they are public. Take note
that only authentication is performed for documents marked as public, without the need to do any
authorization.

To configure perimeter security, set up an authentication mechanism, which can be any mechanism
described in

Chapter 2

. After that is done, navigate to Serving -> Universal Login and enable perimeter

security. Take note that once perimeter security is enabled, it applies to the GSA globally and cannot be
configured per collection or front end.

Secure Search Example

Here are requirements for four content sources to be included in search (all secure):

1. SharePoint 2010, with Kerberos authentication. Google supported connector for SharePoint is

used to index the content.

2. Salesforce content integrated with a SAML IdP which uses Forms authentication, but the user

directory is still Active Directory. A Salesforce connector is deployed to index the content with
ACLs. The connector is built based on Google’s connector framework and sends in documents
starting with “googleconnector://”.

3. A custom IIS web site with Kerberos Authentication. No API is available for checking permissions

or getting ACLs. GSA will crawl the content directly.

4. A legacy business application. Users and permissions are stored in the database. It’s not

integrated with Active Directory. There is no direct mapping of user names between Active
Directory and this application. Google’s database connector is used to index the content. A SQL
Query statement can be used to determine whether a user has access to the database records in
the search results.

It is also noted that there are various devices in the organization. Some don’t support Kerberos.

User Identities

SharePoint, Salesforce and the custom IIS web site are backed by the same Active Directory, while the
legacy application has its own. That means we need two Credential Groups: We can use the “Default”
Credential Group for Active Directory, and add a “Legacy” Credential Group for the business application.