… the easy way! Image © Wikimedia CC. Please visit our Gold Sponsor stands, we couldn't do it without you…

Slides:



Advertisements
Similar presentations
Kevin Donovan Program Manager, Office BI Microsoft Corporation
Advertisements

SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
SharePoint 2010 Business Productivity: What's new for Developers in Microsoft SharePoint 2010 Matthew McDermott, MVP Aptillon, Able Blue
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
DB Audit Expert v1.1 for Oracle Copyright © SoftTree Technologies, Inc. This presentation is for DB Audit Expert for Oracle version 1.1 which.
SAGE Computing Services Consulting and customised training workshops Active Directory Integration AD, WLS & ADF in Harmony (a case study) Ray Tindall Senior.
Configuring Kerberos for Microsoft SharePoint 2010 BI in 7 Steps (SQL Server 2012) Chuck Heinzelman Senior Program Manager – BPD CX Microsoft Corporation.
EPM 2007 Implementation and Upgrade Tips Summary June 18th, 2008 Brendan Giles, PMP, MCP.
Internet Information Server 6.0. Overview  What’s New in IIS 6.0?  Built-in Accounts and IIS 6.0  IIS Pass-Through Authentication  Securing Web Traffic.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
TAM STE Series 2008 © 2008 IBM Corporation WebSEAL SSO, Session 108/2008 TAM STE Series WebSEAL SSO, Session 1 Presented by: Andrew Quap.
Chapter 12: Additional Active Directory Server Roles
Smart Card Single Sign On with Access Gateway Enterprise Edition
Chapter 8 Hardening Your SQL Server Instance. Hardening  Hardening The process of making your SQL Server Instance more secure  New features Policy based.
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
Understanding Integrated Authentication in IIS Chris Adams IIS Supportability Lead Microsoft Corp.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Timothy Heeney| Microsoft Corporation. Discuss the purpose of Identity Federation Explain how to implement Identity Federation Explain how Identity Federation.
Module 8: Managing Client Configuration and Connectivity.
© 2011 PLANET TECHNOLOGIES, INC. Extending User Profiles with Line of Business Data Patrick Curran, MCT FEBRUARY 24, 2013.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Verify Hardware Requirements Install Windows Server 2008 R2 Configure Active Directory Install SQL Server 2008 Install SharePoint Server 2010 Configure.
TechEd /22/2017 5:40 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
DBI328. Enabled as SharePoint Shared Service Built-in scale-out for RS Service Apps SharePoint Cross-farm reporting Integrated backup & recovery,
Remote Administration Remote Desktop Remote Assistance Remote Server Administration Tools.
What’s New? – BCS 2013 Brett Lonsdale.  Co-founder of Lightning Tools  One of the hosts on the SharePoint Pod Show  Co-organizer of SharePoint Saturday.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
Functional comparison between Windows SharePoint Services 3.0 and Microsoft Office SharePoint Server 2007 October 14 th, 2009, Lexington Microsoft Users.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
W2K and Kerberos at FNAL Jack Mark
1 Extending User Profiles with Line of Business Data Patrick Curran, MCT.
Designing Secure SharePoint External Access Ondrej Sevecek | MCM: Directory | MVP: Security |
Module 2: Overview of IIS 7.0 Application Server.
W2K and Kerberos at FNAL Jack Schmidt Mark Kaletka.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Impersonation in SharePoint Developers use impersonation when an application needs to.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Web Access. Overview  Purpose  Prerequisites  Install Components  Enable Virtual Directories  IIS Configuration & Security  Troubleshooting.
Lesson 12: Configuring Remote Management
Mirek Sztajno SQL Server Security PM
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Access Services Introduction & Setup Requirements Kipp Sorensen, Soren Innovations.
Security E-Learning Chapter 08. Security Control access to your web site –3 Techinques for Identifying users Giving users access to your site Securing.
1 Terminology. 2 Requirements for Network Printing Print server Sufficient RAM to process documents Sufficient disk space on the print server.
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
AuthenticationService Application DelegationKerberos.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
KERBEROS, SQL AND YOU Adam W. Saxton Microsoft - SQL
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
Kerberos Miha Pihler MVP – Enterprise Security Microsoft Certified Master | Exchange 2010.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Taming the Beast How a SQL DBA can keep Kerberos under control David Postlethwaite 29/08/2015David Postlethwaite.
Secure Connected Infrastructure
Stop Those Prying Eyes Getting to Your Data
Kerberos for SQL Server and SharePoint
Excel Services Deployment and Administration
What Is Sharepoint? Mohsen Ashkboos
Performance Point Services in SP2013
Hybrid Search Planning Implementation.
Kerberos for SSRS made Simple
SharePoint Online Hybrid – Configure Outbound Search
Kerberos for SSRS Made Simple
SQL Server Security 101 How did you get in here, and
Kerberos for SSRS made Simple
2010 Microsoft BI Conference
SQL Server Security 101 How did you get in here, and
GOPAS TechEd 2012 Kerberos Delegation
Presentation transcript:

… the easy way! Image © Wikimedia CC

Please visit our Gold Sponsor stands, we couldn't do it without you…

 MCTS in SQL Server and SharePoint  Over a decade of Microsoft solution development and architecture  Lately focused on SQL Server 2012 BI in SharePoint Integrated Mode  I like dogs, especially big ones

 Focus on SharePoint + SQL Server  Why Kerberos  Service Principal Names  Delegation options  Claims & Kerberos  Testing &Troubleshooting  Live Demo!

 More secure, Less DC load, interoperability...  Enables Delegation! ◦ Unified Security at data source level ◦ Data driven security ◦ Personalised reports NTLM or Kerberos SP Farm or DB server Kerberos Delegation Data Source

NTLM or Kerberos SP Farm Data Source 1st “hop” Any protocol 2 nd “hop” Kerberos only! Impersonate user

Identify your data sources  Service Principle Names Decide on your delegation  Constrained or not? Set delegation type Allow data sources to be delegated to Easy, right?

 Service Principal Name ◦ What (Service) and ◦ Where (Computer or “Principal”) to connect to  Identifies the target ◦ Not the delegating service ◦ Certainly not the client ◦ The Data Source Service! 1

 Service Principal Name  <service class>/ [:<port or instance>] or/and  <service class>/ [:<port or instance>] setspn.exe -S Service identity:  Service account as or  Host Account if running as Local System Host identity 1

NetBIOS: BI-SQL FQDN: Hades.Local Port: SQL-DB Domain Database service account identity SETSPN -S MSSQLSVC/BI-SQL:49753 HADES\SQL-DB BI-SQL.HADES.LOCAL Database service class Host server OR

SETSPN -S MSOLAPSVC.3/BI-SQL:UDM HADES\SQL-SSAS NetBIOS: BI-SQL FQDN: Hades. Local SQL-SSAS Domain SSAS service account identity Analysis Services Service class Host server OR Instance: UDM BI-SQL.HADES.LOCAL

IIS server SP-WFE FQDN: Hades. Local SP-PORTAL SharePoint Portal Application Pool identity SharePoint WFE Host server OR OLYMPUS.HADES.LOCAL SETSPN -S HTTP/OLYMPUS HADES\SP-PORTAL DNS “A” record: OLYMPUS Port: 80

 Now I can see Delegation tab! SETSPN -S DUMMYSPN HADES\SP-XLS-SVC ? FQDN: Hades. Local SP-XLS-SVC DomainDelegating account Arbitrary string Non-existing service

 Identifies the target  Stored against target’s identity  Instance name for Analysis Services  Arbitrary SPN to show delegation tab  Don’t forget discovery services for SQL2005 1

 Basic (unconstrained) ◦ To any Service  Constrained ◦ Only if allowed 2

2  SSRS SSRS   Basic ◦ Delegates to any service ◦ Cross-domain delegation ◦ No protocol transition ◦ Can precede constrained  Constrained ◦ Any service can use ◦ Most require ◦ More secure ◦ Only delegates if allowed! ◦ Only within a domain

Client SharePoint Farm Kerberos Data Source NTLM No Trust is OK! MSFT.com pintoso.MSFT.com contoso.MSFT.com Constrained delegation works!

Client SharePoint Farm Basic Kerberos Data Source NTLM or Basic Kerberos Must have Two Way Trust MSFT.com pintoso.MSFT.com contoso.MSFT.com

 Use Basic for ◦ SSRS (SQL Reporting Services) to connect to another domain ◦ When security is not critical  Use Constrained for ◦ Any other case! 2

NTLM or Kerberos SP Farm Data Source Delegating Account SPN Account

 Add a dummy SPN to the Delegating account to bring up delegation tab in ADUC:  Allows trust for constrained delegation  Enables protocol transition for SharePoint 3

 Select allowed SPNs:  Use ADUC delegation tab  Locate SPN’s account  Click to select SPNs to add SPN’s account 4

 ADSIEdit (easier): ◦ Same string as in SETSPN statement  PowerShell: ◦ Not for wimps ◦ Active Directory Module:  Set-ADObject  Get-ADObject  Set-KCD  CMD (document): ◦ ldifde

Set your SPNs (inc Dummy and Browser 2005)  Use “KerberosHelper.xslx” from Decide: Basic or Constrained? Set delegation type Add Allowed SPNs (for constrained) Test working, Sit back and relax! Let me know if it doesn't work

 Claims to Windows Token Service (C2WTS) ◦ SharePoint protocol transition: Kerberos Delegation! NTLM or Kerberos SharePoint Web Frontend SharePoint Application Server Data Source STS Claims C2WTS ? UPN Claim Windows Token

 Starts automatically  Depends on Cryptographic Service ◦ sc config c2wts depend= CryptSvc  Service Identity is trusted for delegation ◦ Local System by default (and should stay that way) ◦ If changed to Windows Identity, must be a local admin  Claims-aware services are allowedCaller s ◦ c2wtshost.exe.config  Use Rodney Viana's little tool c2WTSTest.exeRodney Viana's

 “NT Authority/Anonymous” is no more!  Profiler shows Your login  Test every service against every data source SSRS

 15 character limit on Windows NetBIOS  Open Port 88 on Firewall  SPN for SQL 2005 browser/discovery services  Sensitive Client Account

 Enable Kerberos logging (don’t forget about it!)  Registry hack  Check Kerberos errors in Event log on SP App server and client  ULS log (SP App server with Verbose)  Use Event log, Kerbtray and Kerberos helper tools to check for common errors  Use Klist –purge to re-test Kerberos  Use dcdiag to check SPNs

Sponsor Competition Draws in the Exhibition Hall 17:15 After …

Community Events SQL Saturday Edinburgh7/8 Junewww.sqlsaturday.com/202/ SQL Relay17/27 Junewww.sqlrelay.co.uk SQL Saturday Dublin21/22 Junewww.sqlsaturday.com/229/ SQL Saturday Cambridge27 Septemberwww.sqlsaturday.com/228/ UK User GroupsAll the timewww.sqlserverfaq.com

 Please complete feedback     (General feedback)

We hope you had a great conference day! Keep checking for slides, videos and news of the next conference # SQLBIT S

 Kerberos: authentication protocol  Principal – a computer in the Kerberos protocol, usually the target  UPN: user principal name  FQDN: Fully Qualified Domain Name  WCF: Windows Communication Foundation (.NET)  C2WTS: WCF service granting windows token for a UPN claim

 How the Kerberos Version 5 Authentication Protocol Works  Overview of Kerberos authentication for Microsoft SharePoint 2010 Products  Kerberos Guide for SharePoint  Kerberos Blog and Resources

 Kerberos using PowerShell  Troubleshooting C2WTS by Rodney Viana windows-nt-token-service-c2wts-in-sharepoint-2010-may-be-difficult-if-you-don-t-know-where- to-start.aspx  Kerberos Professional Services

 Command Prompt ◦ List all Kerberos Tickets on the principal (a ticket must be present for the URL, otherwise NTLM is used)  Klist ◦ Purge Kerberos Tickets (run on all principals to avoid reboot/wait)  Klist –purge ◦ List all msDS-AllowedToDelegateTo properties for a single account (only computers with )  ldifde -f c:\temp\filename.txt -d "CN=SA_SVC_C2WTS,OU=Service Accounts,DC=contoso,DC=msft,DC=com" -l msDS-AllowedToDelegateTo ◦ List all msDS-AllowedToDelegateTo properties all accounts in an OU:  ldifde -f c:\temp\filename.txt -d "OU=Service Accounts, DC=contoso,DC=msft,DC=com" -l msDS-AllowedToDelegateTo