What is new in security in Windows 2012 or Dynamic Access Control Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEHv7 ondrej@sevecek.com | www.sevecek.com |
Revolution? Evolution
Evolution Access Control Lists (ACEs) and NTFS File Server Resource Manager (FSRM) and simple file classification Active Directory (AD) integrated classification and automatic file classification with FSRM Kerberos Claims and user attributes Kerberos CompoundId and computer attributes
Evolution Feature Server Client Schema 2012 / DFL / FFL And logic ACL Windows 2012 - FSRM automatic classification AD integrated classification terms schema 2012 FFL 2003 User claims one Windows 2012 DC Computer claims Windows 8 local Windows 2012 DC
Claims, Terms and Classifications They are just the same thing
What is New in Security in Windows 2012 Access Control Lists What is New in Security in Windows 2012
Until Windows 2012 Sorted in order Has OR logic DENY is not always stronger Has OR logic
Flow of Access Control Sharing Permissions Authentication Kerberos NTLM Allow Logon Locally Access this Computer from Network Sharing Permissions UAC Restricted Access Token Authentication TCP 445 Windows Firewall Kerberos NTLM NTFS Permissions Allowed to Authenticate? Access Token Folder Quotas Path Volume Quotas Owner Disk
New in Windows 2012 AND logic possible Extendable with claims FSRM file claims user claims device (computer) claims
Flow of Access Control Sharing Permissions Authentication Kerberos NTLM Allow Logon Locally Access this Computer from Network Sharing Permissions UAC Restricted Access Token Authentication TCP 445 Windows Firewall Kerberos NTLM NTFS Permissions Claim ACEs Allowed to Authenticate? Access Token Folder Quotas Path Volume Quotas Owner Disk
What is New in Security in Windows 2012 File Classification What is New in Security in Windows 2012
File Server Resource Manager (FSRM) Manual File Classification Automatic File Classification words file name wildcard regular expressions .PS1 code Locally vs. AD defined terms Adds file metadata alternative NTFS streams
File claims and ACL File claims can be used in the new ACL
AD defined file claims Requires Windows 2012 schema extension Requires Windows 2003 forest functional level do not require any Windows 2012 DC some editor like ADSI Edit or Windows 2012 ADAC Must be uploaded to FSRM servers manually
What is New in Security in Windows 2012 Kerberos Claims What is New in Security in Windows 2012
Kerberos ticket until Windows 2012 KDC User identity login SID Additional SIDs groups SID history
Good old Kerberos Client XP Server TGT DC 2003
Good old Kerberos Client XP Server TGS SIDs TGT TGS SIDs DC 2003
What is new in Kerberos tickets with Windows 2012 KDC User identity login SID Additional SIDs groups SID history User claims AD attributes in Kerberos TGT tickets
Requirements At least single Windows 2012 DC (KDC) Tickets are extendable If client does not understand the extension, it simple ignores its contents If server requires user claims and they are not present in the TGS ticket, it can just ask a Windows 2012 DC directly (secure channel)
Good old Kerberos supports claims as well Client XP Server 2012 TGS SIDs TGT Claims TGS SIDs DC 2012 DC 2003
Brand new Kerberos with Windows 2012 KDC Client XP Server 2012 TGT User Claims DC 2012
Brand new Kerberos with Windows 2012 KDC Client XP Server 2012 TGS SIDs User Claims TGT User Claims TGS SIDs User Claims DC 2012
What is new in Kerberos with DFL 2012 User identity login SID Additional SIDs groups SID history User claims AD attributes in Kerberos TGT tickets Device claims AD attributes of computers Compound ID in Kerberos TGT tickets
Kerberos Compound ID with device claims Client 8 Server 2012 TGT Request Computer TGT TGT User Claims Device Claims DC 2012
Brand new Kerberos with Windows 2012 KDC Client XP Server 2012 TGS SIDs User Claims TGT User Claims Device Claims TGS SIDs User Claims DC 2012 Device Claims
Requirements At least local Windows 2012 DC (KDC) better to have 2012 DFL for consistent behavior Clients Windows 8 or Windows 2012 must ask for TGTs with Compound ID extension Server cannot just obtain device claims because it does not know from what device the user came
What is New in Security in Windows 2012 Take away What is New in Security in Windows 2012
Evolution Feature Server Client Schema 2012 / DFL / FFL And logic ACL Windows 2012 - FSRM automatic classification AD integrated classification terms schema 2012 FFL 2003 User claims one Windows 2012 DC Computer claims Windows 8 local Windows 2012 DC
What is New in Security in Windows 2012 Thank you! What is New in Security in Windows 2012