Ondrej Sevecek | GOPAS a.s. MCSM:Directory Services | MVP:Enteprise Security | CISA | CEH | CHFI | Enterprise certification.

Slides:



Advertisements
Similar presentations
Planning a Public Key Infrastructure
Advertisements

Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
KIERAN JACOBSEN HP Understanding PKI and Certificate Services Gold Sponsors Silver Sponsors.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Deploying and Managing Active Directory Certificate Services
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 9 Deploying IIS and Active Directory Certificate Services
Ing. Ondřej Ševeček | GOPAS a.s. | MCSM:Directory | MVP:Enterprise Security | CEH:Certified Ethical Hacker | CHFI:Computer Hacking Forensic Investigator.
PKI Administration Using EJBCA and OpenCA
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
WSU A Symphony in Four Movements. A Century of Controlled Flight.
Chapter 11: Active Directory Certificate Services
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Ing. Ondřej Ševeček MCSM:Directory | MVP:Enterprise Security | Certified Ethical Hacker | MCSE:SharePoint | Smart card.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Maintaining Network Health Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Understanding the Components of NAP Configure Network.
Configuring Active Directory Certificate Services Lesson 13.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
Microsoft ® Official Course Module 8 Deploying and Managing Certificates.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Bezpečnost Windows pro pokročilé: uživatelské účty GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. |
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
What would a real hacker do to your AD GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Passwords Everywhere GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP:
Configuring Directory Certificate Services Lesson 13.
Module 9: Fundamentals of Securing Network Communication.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Windows 2000 Certificate Authority By Saunders Roesser.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Designing Secure SharePoint External Access Ondrej Sevecek | MCM: Directory | MVP: Security |
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEH | | |
Bezpečnost Windows pro pokročilé: zajímavosti a UAC GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. |
70-412: Configuring Advanced Windows Server 2012 services
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Module 13: Enterprise PKI Active Directory Certificate Services (AD CS)
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Ing. Ondřej Ševeček MCSM:Directory | MVP:Enterprise Security | Certified Ethical Hacker | MCSE:SharePoint | Passwords.
Building and extending the internal PKI
Ondrej Sevecek | GOPAS a.s. MCSM:Directory Services | MVP:Enteprise Security | CISA | CEH | CHFI | facebook: ondrej.sevecek.official.
Maintaining Network Health Lesson 10. Active Directory Certificates Services 2 A component of Microsoft Identity Lifecycle Management (ILM) ILM allow.
Ondřej Ševeček | GOPAS a.s. MCSM:Directory Services | MVP:Enteprise Security | CISA | CEH | CHFI | facebook: ondrej.sevecek.official.
Ing. Ondrej Sevecek MCSM:Directory2012 | MVP:Security | CEH | MCSE:Windows2012 | What would a real hacker do to your AD.
Maintaining Network Health
Module 8: Securing Network Traffic by Using IPSec and Certificates
جايگاه گواهی ديجيتالی در ايران
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
National Trust Platform
Presentation transcript:

Ondrej Sevecek | GOPAS a.s. MCSM:Directory Services | MVP:Enteprise Security | CISA | CEH | CHFI | Enterprise certification policies and smart cards GOLD PARTNER:Hlavní odborný partner:

Everything can/must use private certificates  User authentication –smart card logon => Kerberos PKININT –TLS client certificate authentication => HTTPS, VPN, WiFi, 802.1x  Computer authentication –DirectAccess, IPSec, WiFi, 802.1x  Server authentication –HTTPS, RDP, Kerberos, LDAPS, Hyper-V replication, VPN, DirectAccess, RADIUS, (SMTPS)  Digital signatures –code signing  Others –EFS, EFS recovery, BitLocker recovery, Key Recovery, (S/MIME)

Choosing public vs. internal certificates  Public –payed –trusted by any device –manual management  Internal –for free in any amounts –automatic management

CA hierarchy or not Root CA Leaf End entity Endpoint Certificate name constraints EKU constraints path length constrains Policy Subordinate Intermediate CA Policy Subordinate Intermediate CA Policy Subordinate Intermediate Issuing CA Policy Subordinate Intermediate Issuing CA Qualified Subordination ???

CA hierarchy or not single DC compromised whole forest compromised

Types of certificates (general)  Signature –signature –logon  Transport encryption –TLS, IPSec  Storage encryption –EFS, S/MIME, BitLocker

Types of certificates (public/private key)  Signature –I sign with my own private key  Transport encryption –we both exchange symmetric keys (AES) –either encrypted (RSA-KE) with public key of the server –or signed (EC/DH) by private key of the server  Storage encryption –I encrypt with the recipient party's public key

Types of certificates (backup)  Signature –no private key backup necessary  Transport encryption –no private key backup necessary  Storage encryption –backup private keys

Types of certificates (validity period)  Signature –cannot sign new data with expired certificates –signature is valid and can be verified indefinitely chained timestamping might be necessary  Transport encryption –not usable after expiration  Storage encryption –cannot encrypt new data with expired certificates –can decrypt indefinitely

Certificate requests  Client generates public/private key locally –private key never leaves client –CA cannot control private key generation  Request is signed –self-signed for new enrollment –previous-yet-valid-signed for renewal –RA-signed for enrollment agent issued certificates  CA accepts anything in request and ignores most –except for public key –possibly the requester subject –other extensions if allowed in registry

AD CS enterprise AD integrated interfaces  DCOM "online" AD authenticated  SCEP (NDES) HTTP OTP authenticated –Intune vs. mobile phones –requires Microsoft Intune Certificate Connector  Enrollment web services HTTP basic authenticated –non-domain machines

Certificate (policies) templates primary technical parameters  Type of key –signature, encryption  Crypto "driver"  Validity  EKU

Certificate (policies) templates primary policy parameters  Who can upload (enroll) the request  Subject –manual –from AD  Any "approval" requested  Renewal

Examples  LDAP and DC –computer, automatic, software  Web server –computer, manual subject, approval, software signature = ECDH IIS 2012 R2 automatic rebind  Code signing –user, manual subject, on request by trusted account, smart card  Smart card logon –user, on request, smart card, no renewal –user, by RA, smart card, no renewal  Web server –computer, manual subject, by RA, software  Smart card logon –user, on request, with attestation, attested renewal

Server admin for his OS CA admin approval Server$ local Admin issuing CA CA admin 1x Nx portal.gopas.cz

User for himself auto approval on CA Workstation user issuing CA Nx portal.gopas.cz

Enrollment agent (RA) for a user Workstation user issuing CA Nx enrollment agent 1 user Ax enrollment agent 2 user

Server admin for his OS approved locally by an enrollment agent Server$ local Admin issuing CA Nx portal.gopas.cz enrollment agent 3

Certificates on mobile devices (Win 8.1+, phones)  Intune, SCCM –makes internal CA trusted Trusted certificate profile –force device to request certificate from SCEP/NDES  NDES –Simple Certificate Enrollment Protocol (SCEP) –has RA (enrollment agent) certificate to issue for the devices SCEP certificate profile

Intune Trusted certificate policy profile

Intune Trusted certificate profile

NDES installation and certificate templates

Enable Intune Certificate connector + download ndesconnectorsetup.exe

NDES vs. Intune installation  NDES installation – certificate-infrastructure  Intune certificate profiles – certificate-profiles

NDES additional config  Policy module –Intune - Certificate Connector installed on NDES –SCCM - policy module communicates with Certificate Registration Point (CRP)  Client Authentication certificate to communicate with Intune/SCCM

Děkuji za pozornost! GOC173 - Enterprise PKI

Aktuální a navazující kurzy sledujte na DÁREK PRO VÁS! TechEd-DevCon 2016! …získejte tričko TechEd-DevCon 2016!Vyplňte dotazníkové hodnocení a… TechEd party! Xbowling Strašnice, Buďte The Best IT Pro nebo The Best Developer SOUTĚŽ! SOUTĚŽ! SOUTĚŽ!