beautypg.com

Summary, Security best practices overview – Google Search Appliance Security User Manual

Page 39

background image


39

Summary

In this paper, we have reviewed the process of designing security for your enterprise search project with
the Google Search Appliance. This requires a solid understanding of security in your organization, as well
as the related content sources that will be part of the project. You need to invest quality time in analyzing
this scenario and modeling authentication and authorization in the search appliance.

Security Best Practices Overview

Spend time up front to analyze the following:

Which identity providers you’ll have to integrate with for Authentication

How you’ll authorize documents from each content source integrated with the GSA

When possible, use supported, out of the box components to integrate security on the GSA,
such as:

Kerberos

Google Search Appliance SAML Bridge for Windows

LDAP

Google Search Appliance Connector for Active Directory

Model each identity provider you have to integrate with a credential group

Classify credential groups per corporate security systems (identity providers) and associate them
with content sources.

Whenever possible, use only one credential group per identity provider.

Credential groups should be mapped to unique identity mechanisms, not necessarily
content sources.

One set of credentials can be used across many content sources that share the same
identity source.

Use ACLs to security trim documents as this makes authorization faster and creates a better
overall search experience.