Sending SaaS Omnissa Access Audit Logs to On-Premises SYSLOG

About:

This article discusses SaaS Omnissa Access SIEM Integration with an On-Premises SYSLOG service in order to record and retain the SaaS Access Audit Log data for security records and troubleshooting.

Introduction:

While the Omnissa documentation and actual integration are relatively straightforward and simple, there are some additional steps to take and topics to review in setting up SYSLOG integrations with a SaaS Access tenant. These items will be discussed individually in sections here; however, they should all be reviewed and worked through for any organization attempting this integration to ensure suggested changes meet your organization’s policies and requirements for secure communications between the SaaS Access tenant and an on-premises SYSLOG tenant.

It should be noted, this article will specifically discuss SYSLOG integrations with a SaaS Access tenant. It will NOT discuss the other SIEM integrations which Omnissa Access supports, including Splunk or CrowdStrike.

In this article, I show the setup with Graylog, pfSense for firewalls, and an internal ADCS-created certificate.

Requirements:

The following items will be required for integration. They are in no particular order.

SYSLOG Server Needs:

SYSLOG Secure Listener:

The SYSLOG Secure Listener will need to be up and running. See your SYSLOG provider for instructions on how to enable a secure listener on your SYSLOG server.

In my case, I used Graylog as my SYSLOG server.

When setting up the SYSLOG Secure TCP Listener, it is generally recommended to have this ONLY accept secure settings and NOT also accept insecure settings. For other, insecure (or in the clear) listeners, use separate listeners on separate TCP (or UDP) ports as it is not recommended to expose insecure listeners to the Internet.

Additionally, even though it is optional within most SYSLOG providers, it is highly recommended for secure listeners to require client authentication to ensure only the necessary traffic is consumed and bad actors cannot access the SYSLOG system.

Pasted Graphic 1.png

Understanding the Certificate Needs:

Client Certificates:

The client certificate is what is used by Omnissa Access to authenticate into the SYSLOG Secure Listener. This can be a generic client certificate or a specific client certificate (some SYSLOG servers only support the use of a single client certificate on a secure listener, and others can support multiple client certificates on a single listener - check with your SYSLOG provider to understand what your SYSLOG can support).

When creating the Client Certificate, the Client Certificate can be created by either an internal or external CA. What you choose will depend on how your SYSLOG solution is deployed and what it supports.

In my case, I used Graylog as my SYSLOG server and chose to use an internal ADCS CA to generate the client certificate for my Omnissa Access tenant. For Graylog to both require client authentication and accept any client certificate signed by my internal ADCS CA, I provided the necessary certs in the path on the SYSLOG host(s) and defined this in the SYSLOG Secure Listener settings.

Pasted Graphic.png

Creating the Client Certificate on ADCS:

To create the Client Certificate, I first needed to create an ADCS Certificate Template I could use for generating SYSLOG Client Certificates - which would also allow me to define any additional needed properties and would NOT require the certificate to be tied to an AD-joined computer object. To do this, within ADCS, under the Certificate Templates Console, I cloned the Domain Computer template and created a new SYSLOG CLIENT TEMPLATE with the following settings.

Key Adjustments for Non-AD Clients

Below are the main changes needed for ADCS to supply a client certificate for syslog client authentication to a SYSLOG server.

With these settings, you’ll be able to generate CSRs on most any system, including iLinux/macOS (via OpenSSL), submit them against this template in ADCS, and export the resulting certificate + private key in PFX/PEM for use with your SYSLOG’s Secure Listener for Client Certificate authentication.

Detailed ADCS Computer Client Certificate Template Changes Per Tab:

Compatibility Tab

General Tab

Request Handling Tab

Cryptography Tab

Subject Name Tab

Extensions Tab

Security Tab

Server & Issuance Requirements Tabs

Publishing the Client Certificate Template:

Once the above SYSLOG Client Certificate template is created in ADCS, you then need to publish the client certificate template in order for it to be used. This is done via the ADCS Certificate Authority MMC.EXE snap-in UI via the NEW>CERTIFICATE TEMPLATES TO ISSUE context menu option. See Microsoft documentation for any needed additional guidance on this.

Creating the Client Certificates:

Once the above SYSLOG Client Certificate template is published in ADCS, you then need to request and create the client certificate. This can be done using ADCS UI via the MMC.EXE Certificates plugin or via OPENSSL (if on a system where OPENSSL is installed).
  1. When requesting the certificate via the Certificate Request UI in Windows, it is required to utilize the Computer account.

Pasted Graphic 7.png

  1. Within the Certificates MMC snap-in, using the context menus, request a new certificate.

Pasted Graphic 9.png

  1. Click through the next few screens to get to the Certificate Templates selection and check the box to select your SYSLOG CLIENT template and then click the blue text “More information is required to enroll for this certificate. Click here to configure settings. DO NOT CLICK ENROLL!!

Pasted Graphic 10.png

  1. By clicking the blue text in the above screen, you will get the option to type in the common name and DNS (Subject Alternate Name or SAN) values you may wish to define.

Pasted Graphic 11.png

  1. After defining the common name and alternate settings needed for your environment, click OK and finish off the wizard by selecting ENROLL.

  2. Once done, you will need to export the certificate and the private key and store all of it as a single, password-protected PFX/P12. Ensure you select “Yes, export the private key” in the MS Certificate Export Wizard.

Pasted Graphic 12.png

  1. When exporting as a PFX/P12, you will want to include all certificates in the certificate path if possible, and enable certificate privacy. This will enable you to set a password on the exported certificate PFX bundle.

Pasted Graphic 13.png

Pasted Graphic 14.png

  1. Select your file name, path, and save the file.

Converting the Client Certificate(s) to PEM Format:

Omnissa Access requires the certificate bundle to be in a PEM format. This is similar to the below example.

Example: PEM Certificate Example

Certificate Chain Example
-----BEGIN CERTIFICATE-----
(Your Primary SSL certificate:your client_cert.crt)
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
(Your Intermediate/Issuing CA certificate: .crt)
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
Your Root CA certificate: TrustedRoot.crt)
-----END CERTIFICATE-----
Private Key Example
-----BEGIN RSA PRIVATE KEY-----
(Your PrivateKey: your_client_cert_key)
-----END RSA PRIVATE KEY-----

Using OPENSSL is generally the industry baseline for converting a certificate (public or private, server or client) and certificate private key from one format to another. Once the certificates and key are converted to PEM format, they are ready for use within Access to provide your SaaS Access tenant the ability to perform client authentication into your on-premises SYSLOG via its SYSLOG Secure Listener.

Server Certificates:

There are no needs for creating server certificates in this deployment. Additionally, the SYSLOG web admin UI does not need to be publicly exposed just for Omnissa Access to route traffic to the SYSLOG Secure Listener. Should you choose to do this, I highly recommend securing this traffic with multiple layers of security - including TLS security for Admin UI communications as well as authentication and authorization security in the form of Identity Providers and Multi-Factor Authentications/Authorizations.

Firewall Needs:

External SYSLOG Secure Listener:

The SYSLOG Secure Listener will need to be publicly exposed at this time as SaaS instances of Omnissa Access do not (at this time) support proxying SYSLOG traffic via the Access Connectors (something Omnissa Workspace ONE UEM ACCs do support). This means - assuming use of TCP 6514 (the default SYSLOG Secure Listener port) - TCP 6514 will need to be available on a publicly routable IP address and routed inbound to the SYSLOG Secure Listener port on the internal SYSLOG server.

NAT Rules:

Pasted Graphic 6.png

Pasted Graphic 5.png

Pasted Graphic 4.png

Optional Inbound Traffic Filters:

If inbound filters are desired with Omnissa Access, please see Omnissa KB68035 to obtain the latest SOURCE IPs list and use those to build the correct filters for applying to your firewall rules.

NOTE: In the above screenshots, I am showing filters in use on my firewall rules.

Applying Changes to Access:

Enabling the SYSLOG SIEM Adapter in Omnissa Access:

When enabling the SYSLOG adapter for use to send Access Audit Logs to SYSLOG, the Omnissa Access documentation provides step-by-step instructions to apply the settings once all of the other requirements have been met above. Essentially, the steps are: enable the SYSLOG Adapter and fill in the necessary information and save the data.

Pasted Graphic 15.png

Troubleshooting:

If successful, you will see Access report “Adapter connected” in green.

Pasted Graphic 16.png

If unsuccessful, you will see a “Connection failure” in red and the reason why.

Pasted Graphic 17.png

Aside from removing firewall filters and checking the SYSLOG Secure Listener is up and running, you may wish to review Omnissa’s documentation on “Troubleshooting TLS Encrypted Message Transfer as this assists in any potential TLS issues.

#Access #SYSLOG