 1997 Entrust Technologies Orchestrating Enterprise Security Entrust Public Key Infrastructure Erik Schetina Chief Technology Officer IFsec, LLC

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Planning a Public Key Infrastructure
Electronic Filing Case Study NSW Land and Environment Court.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Lecture 23 Internet Authentication Applications
Public Key Infrastructure Ben Sangster February 23, 2006.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Introduction to Cryptography
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Understanding Active Directory
Chapter 11: Active Directory Certificate Services
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
UNCLASS DoD Public Key Infrastructure LCDR Tom Winnenberg DISA API1 Chief Engineer 25 April 2002.
Security Jonathan Calazan December 12, 2005.
Identity and Access Management
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Configuring Active Directory Certificate Services Lesson 13.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Public Key Infrastructure Ammar Hasayen ….
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
PKI interoperability and policy in the wireless world.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
HEPKI-TAG UPDATE Jim Jokl University of Virginia
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Configuring Directory Certificate Services Lesson 13.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Security in ebXML Messaging CPP/CPA Elements. Elements of Security P rivacy –Protect against information being disclosed or revealed to any entity not.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Some Technical Issues in PKI Deployment David Chadwick
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Building and extending the internal PKI
Product Manager, Keon PKI
Public Key Infrastructure (PKI)
Secure Enterprise Technology Initiatives e-Provisioning Group
Public Key Infrastructure from the Most Trusted Name in e-Security
Install AD Certificate Services
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
National Trust Platform
Presentation transcript:

 1997 Entrust Technologies Orchestrating Enterprise Security Entrust Public Key Infrastructure Erik Schetina Chief Technology Officer IFsec, LLC

 1997 Entrust Technologies Agenda F Introduction to Entrust F What is a PKI F Entrust Product Line F Piloting and Rolling out a PKI F Questions

Certification Authority Certificate Repository Certificate Revocation Key Backup & Recovery Support for non-repudiation Automatic Key Update Key Histories Cross-certification What is a PKI? Timestamping

 1997 Entrust Technologies p. 4 PKI Requirements F Certification Authority F Certificate repository F Revocation system F Key backup and recovery system F Support for non-repudiation F Automatic key update F Management of key histories F Cross-certification F Timestamping services F Client-side software

 1997 Entrust Technologies PKI with Entrust F Consistent security and trust F Single password and keys secure all applications F Automated key management Key backup/recovery Certificate issuance, storage and revocation Key distribution, rollover and expiry F Low administrative cost/burden

 1997 Entrust Technologies PKI without Entrust F Inconsistent security and trust Fragmented or non-existent policies and key management functions F Security “silos” Each application performs its own security Multiple key pairs and certificates Multiple passwords Costly, burdensome administration

 1997 Entrust Technologies p. 7 Entrust Components F Certificate Authority F Directory F Client Software (Certificate Store) Web VPN Any Entrust-Ready Application F Applications

 1997 Entrust Technologies p. 8 What is Key Management? F Issues: generating keys keeping backup keys dealing with compromised keys changing keys restoring keys F Key and certificate management is difficult

 1997 Entrust Technologies p. 9 Why is Key Management Important? F User Enrollment F Key Renewal F Restoration of Lost Keys F Automated functionality

 1997 Entrust Technologies p. 10 Certificate-Issuing Services (CA) F What they provide:  Issue certificates for a fee (per cert/per year) F What you don’t get:  Little control over certificate issuance policies  No key recovery (forgotten password = lost data)  No key history (what happens when certificates expire?)  Liability issues  No control over trust model and root keys  No automatic and transparent certificate revocation checking  No client capabilities

Entrust Architecture Security Officers Entrust Administrators Directory Administrators Entrust-Ready  applications and Entrust/Engine desktop crypto software Entrust Users Entrust/Manager Entrust/Admin …… …… Directory

 1997 Entrust Technologies The Directory F Stores certificates, CRLs, cross- certificates,... F Interoperates with numerous LDAP- compliant directories ICL, Control Data, Digital, Netscape, Unisys,... supports Directory distribution F Supports redundancy

 1997 Entrust Technologies p. 13 Entrust Products F Entrust/Entelligence Stores and Manages Certificates F Entrust/Express - plug-in F Entrust/Direct - Web, Extranet F Entrust/Unity - SSL & S/MIME F Entrust/Access - VPN F Entrust/Toolkit - Enable applications F Entrust/TimeStamp

 1997 Entrust Technologies Entelligence on the Desktop F Tight integration into Entrust-Ready applications F Secure key storage options smart cards, PC cards, biometric devices, and secure software profiles F Secure single log on F Consistent, trustworthy key lifecycle management across applications minimizes administrative costs

‘Entrust-Ready’ Desktop Architecture to Entrust/Manager and Directory Entrust User... “Entrust-Ready” applications Entrust/Engine Communications Services Tokens... Security Kernel User profile Personal address book PKCS #11

 1997 Entrust Technologies p. 16

Secure made easy

What is Entrust/Express? F Secure plug-in for users of Microsoft Exchange and Microsoft Outlook F Encrypt and/or digitally sign message text and attachments F Provides message confidentiality and integrity F For Windows 95 and Windows-NT 4.0

 1997 Entrust Technologies Orchestrating Enterprise Security Secure VPNs/Remote Access Entrust/Access

 1997 Entrust Technologies Virtual Private Networks F What is a VPN? A private and secure network carved out of a public or insecure network F Relevant Standards IPSec - interoperable packet-layer encryption ISAKMP Oakley - users are authenticated with digital signatures and X.509 certificates

 1997 Entrust Technologies VPN Partners F Remote Access, Firewall, VPN Gateways u Milkyway -SecurIT u Raptor - EagleMobile Pro u Timestep- PERMIT Product Suite u Stac - ReachOut u Sagus - Defensor u KyberPASS u Check Point - FireWall-1

 1997 Entrust Technologies Secure Remote Access F provides significant cost savings over dial-up (phone lines, maintenance, ID cards) F scalable - able to grow as the demand for remote access increases. Internet VPN Gateway Entrust Manager Human Resources Server Finance Server Mobile User

 1997 Entrust Technologies Orchestrating Enterprise Security Secure Extranet Applications TM

 1997 Entrust Technologies Intra/Extra Net Solution Target Solution Provides Entrust Enterprise Solution PKI capabilities to off- the-shelf Web browsers and servers Thin client software on user desktop Extranet applications Internet, Intranet, or Extranet Web Browser

Security you set and forget

F Desktop/laptop encryption software F Easy-to-use F Works with any desktop application F Automatic encryption F Security on-line or off-line F Windows 95 and Windows-NT 4.0 Entrust/ICE Orchestrating Enterprise Security  1997 Entrust Technologies p. 26

Entrust-Ready Applications F Web Browser F F Workgroup F Smart Cards and Biometrics F VPN F Forms F Human Resources

 1997 Entrust Technologies p. 28 Deploying a PKI F Begin with a pilot Pick a single application Evaluate the technology Prove the utility F Currently piloting Entrust CA, X.500, Secure Lotus Notes Short time to deploy (weeks)

 1997 Entrust Technologies p. 29 Deploying a PKI (cont.) F Rolling out an Operational PKI Planning and Goals Acceptable Usage (CPS) Disaster Recovery Applications  Access to records  E-commerce with State contractors  Remote access to internal resources

 1997 Entrust Technologies p. 30 Summary F Automates user administration F Integration across many applications (single sign-on) F Enables trustworthy business over the web F Growing collection of Entrust-enabled applications