Security & Reliability with Windows Vista Martin Parry Developer & Platform Group, Microsoft Ltd

Slides:



Advertisements
Similar presentations
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Advertisements

© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Windows 8 (1) (2) (3) Windows 8 (1) (2) (3)
Feature: Identity Management - Login © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Feature: Reprint Outstanding Transactions Report © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
Feature: Purchase Requisitions - Requester © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Windows CardSpace and the Identity Metasystem Glen Gordon Developer Evangelist, Microsoft
 Lynn Ayres Program Manager Identity Services  Tore Sundelin Program Manager Identity Services BB29.
Windows 7 Training. Windows ® 7 Compatibility Installer Detection.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Multitenant Model Request/Response General Model.
Feature: Purchase Order Prepayments II © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Feature: Web Client Keyboard Shortcuts © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Session 1.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
 Rico Mariani Architect Microsoft Corporation.
Feature: Assign an Item to Multiple Sites © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Windows 8 (1) (2) (3) Windows 8 (1) (2) (3)
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
A Windows Azure application runs multiple instances of each role A Windows Azure application behaves correctly when.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Suggested Item Enhancements – Sales Script and Additional Information © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Feature: Employee Self Service Timecard Entry © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
SQL Server SQL Azure Visual Studio“Quadrant” SQL Server Modeling Services Entity Framework ADO.NET“M”/EDM Data Services …
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Windows CardSpace Martin Parry Developer Evangelist Microsoft
demo Instance AInstance B Read “7” Write “8”

customer.
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Secure Windows App Development. Authentication.
demo Demo.
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
projekt202 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
The CLR CoreCLRCoreCLR © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Introduction to.NET FX 3.0 (+ sneak preview of.NET FX 3.5) Martin Parry Developer & Platform Group Microsoft Ltd
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

demo User Signs Up Temporary Account is Created with Verification Link Sent User Clicks Link Account is Activated Login.Register(userName,
Deployment Planning Services
Introduction to Windows Azure AppFabric
Deployment Planning Services
Возможности Excel 2010, о которых следует знать
Microsoft Virtual Academy
Citrix Virtual Desktops version 7
Setting up team development infrastructure for SharePoint 2013
Windows Summit /27/2018 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may.
Title of Presentation 12/2/2018 3:48 PM
Developing for Windows Azure
8/04/2019 9:13 PM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Caleb Baker Sr. Program Manager
Виктор Хаджийски Катедра “Металургия на желязото и металолеене”
Introducing the Windows Store
Шитманов Дархан Қаражанұлы Тарих пәнінің
Title of Presentation 5/24/2019 1:26 PM
Martin Parry Developer Evangelist Microsoft
Microsoft Virtual Academy
日本初公開!? Vista の新機能を実演 とっちゃん わんくま同盟 7/23/2019 9:09 AM
9/24/2019 5:31 PM ©2005 Microsoft Corporation. All rights reserved.
Microsoft Virtual Academy
Presentation transcript:

Security & Reliability with Windows Vista Martin Parry Developer & Platform Group, Microsoft Ltd

Agenda Reliability –Restart and Recovery –Transactional NTFS and Registry Security –User Account Control –Windows CardSpace

Restart and Recovery Applications sometimes fail Windows Vista can detect more failures –Crash, hang, memory leak Windows Vista can: - –Restart your app automatically –Give the dying process a “last chance” to save data

Restart and Recovery

Restart Manager Controlled restart during s/w installation Two sides… –Processes use Restart APIs as before –Setup scripts use new APIs Shutdown is more controlled: - –WM_QUERYENDSESSION Setup can use Windows Installer 4

Transactions System.Transactions Transactional File System & Registry –Isolation Level: Read Committed –Lock Granularity: File Handle, Registry Key New APIs –CreateFileTransacted –RegCreateKeyTransacted –etc...

Transactional File System

Where are we? Reliability –Restart and Recovery –Transactional NTFS and Registry Security –User Account Control –Windows CardSpace

User Account Control We are at risk from malware when running as administrator TCO benefits with “standard user” managed desktops Running without admin privilege can be difficult UAC makes everyone a “standard user” Explicit consent required for elevation

UAC Standard User Rights Administrative Rights Admin logon “Standard User” Token Admin Token User Process Change Time ZoneChange Time Zone Run IT Approved ApplicationsRun IT Approved Applications Install FontsInstall Fonts Install PrintersInstall Printers … Admin Process Install Application Admin Process Configure IIS Admin Process Change Time Standard User Mode Split Token Admin Privileges Admin Privilege Standard User Privilege User Computer

Shield UI

Consent Dialog - Windows

Consent Dialog – Signed App

Consent Dialog – Unsigned App

Elevation Starting a process with the “full” token Embed a manifest Installer detection Application-compatibility shim Right-click...

User Account Control

Virtualization Some existing apps write to admin locations –HKLM\Software; %SystemDrive%\Program Files … Virtualization removes need for elevation –Writes to system areas redirected to per-user areas –Copy-on-write Avoids security exceptions, but…! This is for apps that don’t know about UAC…!

Windows CardSpace.NET Fx V3.0 V2.0 Compilers V2.0 CLR VS 2005 Windows Vista, XP SP2, Server 2003 SP1

Identity on the Internet Identity on the Internet poses problems –Identity theft –I want multiple identities to choose from –Complexity of identity information We built an identity system a while ago –Microsoft Passport –Working very well for access to our sites –There were some trust issues

A New Approach –The seven laws of identity We have interoperable WS-* specs We have standard format for credentials –SAML tokens We have all the pieces for a cross-platform identity metasystem

Identity Metasystem Relying Parties Require identities Subjects Individuals and other entities about whom claims are made Identity Providers Issue identities

Windows CardSpace The Identity Selector for Windows Grounded in real-world metaphor of physical cards –Credit card, driving licence, etc. –Personal cards & managed cards Implemented as secure subsystem –Protected UI –Anti-spoofing techniques

Windows CardSpace

Requesting a Card Click here to sign in <param name="requiredClaims" value=" nalidentifier" />

Partner: Experian Joe Pygall IT Business Consultant

Use the Moment ® Consumer intelligence that delivers results at the speed of life Experian Identity Management Joe Pygall IT Business Consultant

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does Experian do? Experian is a Global leader in providing information solutions Headquartered in Nottingham and Costa Mesa, California 12,500 employees worldwide Global FTSE 100 company operating in over 60 countries One of our capabilities is validating that people are who they say they are: –Identity Authentication Millions of transactions per year At the start of the new business relationship and throughout Our UK Data Centres are secure; your identities are safe

Use the Moment ® Consumer intelligence that delivers results at the speed of life What did we decide to do? Objective – to reduce fraud through the introduction of trusted consumer identities How are we going to do this? –By being involved in every transaction between a consumer and their chosen organisation we will be able to verify that users are who they say they are –As a step towards this objective, we embarked on a Proof of Concept with Microsoft

Use the Moment ® Consumer intelligence that delivers results at the speed of life What did we do? Engaged with our customers to assess their identity issues Produced a working prototype with.Net 3.0, CardSpace and Vista Developed software in Visual Studio 2005, using C# Created applications based on web services, SOAP and XML Utilised the Microsoft Technology Centre (Reading)

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like? Identity Provider 1) Enrolment

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like? ` IdentityProvider 1) Enrolment

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like? Identity Provider 1) Enrolment

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment 2) Accepting a Card

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment 2) Accepting a Card

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment Relying Parties 3) Accessing a Website 2) Accepting a Card

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment 2) Accepting a Card Relying Parties 3) Accessing a Website

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment Relying Parties 3) Accessing a Website 2) Accepting a Card

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment 2) Accepting a Card Relying Parties 3) Accessing a Website

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment Relying Parties 3) Accessing a Website 2) Accepting a Card

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment Relying Parties 3) Accessing a Website 2) Accepting a Card

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment Relying Parties 3) Accessing a Website 4) Successful Authentication & Logon 2) Accepting a Card

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment 2) Accepting a Card Relying Parties 3) Accessing a Website 4) Successful Authentication & Logon

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does it look like?` Identity Provider 1) Enrolment Relying Parties 3) Accessing a Website 4) Successful Authentication & Logon 2) Accepting a Card

Use the Moment ® Consumer intelligence that delivers results at the speed of life What does this mean for you? Relying Parties (e.g. Banks, Retailers): No longer need to manage user credentials Do not need to provide a mechanism for authentication No longer need to have authentication infrastructure Can process identities from multiple ID providers in a standard way Can be more confident in the identity of a customer Consumers (i.e. all of us): Will have the option to have a single trusted identity that can be reused Resulting in a consistent experience with every relying party `

Use the Moment ® Consumer intelligence that delivers results at the speed of life What needs to happen? Relying parties will need to partner with a reputable identity provider e.g. Experian Identity providers will need to be able to verify individuals identity effectively Technically - what do CardSpace adopters have to do? Implement standards like WS-* and SAML Implement card selector object tags Concept can be applied through standards to non Microsoft implementations e.g. Safari, Firefox

Use the Moment ® Consumer intelligence that delivers results at the speed of life Summary Technology is proven – it works Experian is already a key player in the identity provider arena Experian can offer an Identity Management solution to businesses that need one The PoC forms part of a much bigger IDM solution within Experian We are looking at other methods to complement this e.g. biometrics and conventional authentication

Use the Moment ® Consumer intelligence that delivers results at the speed of life Summary Experian and Microsoft are leading the way in providing online digital identities to consumers, ensuring that the internet is a safer place to transact business for both consumers and retailers

Summary Confidence = Reliability + Security Reliability –Restart & Recovery –Transactional NTFS & Registry –Etc. Security –User Account Control –Windows CardSpace –Etc.

Useful Resources launch2007/dev/useful.mspxhttp:// launch2007/dev/useful.mspx

© 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.