Windows NT ® Single Sign On BackOffice ® Applications (Part I) Peter Brundrett Program Manager Windows NT Security Microsoft Corporation.

Slides:



Advertisements
Similar presentations
The following is intended to outline our general product direction
Advertisements

Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Enabling Secure Internet Access with ISA Server
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Password? CLASP Project Update C5 Meeting, 16 June 2000 Denise Heagerty, IT/IS.
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Active Directory: Final Solution to Enterprise System Integration
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Introduction To Windows NT ® Server And Internet Information Server.
Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Internet Information Server 6.0. Overview  What’s New in IIS 6.0?  Built-in Accounts and IIS 6.0  IIS Pass-Through Authentication  Securing Web Traffic.
TAM STE Series 2008 © 2008 IBM Corporation WebSEAL SSO, Session 108/2008 TAM STE Series WebSEAL SSO, Session 1 Presented by: Andrew Quap.
Smart Card Single Sign On with Access Gateway Enterprise Edition
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
Understanding Integrated Authentication in IIS Chris Adams IIS Supportability Lead Microsoft Corp.
Slide Master Layout Useful for revisions and projector test  First-level bullet  Second levels  Third level  Fourth level  Fifth level  Drop body.
Security features of Windows What is computer security ? Computer security refers to the protection of all components—hardware, software, and stored.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Session 11: Security with ASP.NET
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Group 11 CSE 8343 Group 1 Windows 2000 Domain Security & Authentication.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Windows NT ® Single Sign On Cross Platform Applications (Part II) John Brezak Program Manager Windows NT Security Microsoft Corporation.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 9: Fundamentals of Securing Network Communication.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Sudha Iyer Principal Product Manager Oracle Corporation.
Scaling NT To The Campus Integrating NT into the MIT Computing Environment Danilo Almeida, MIT.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
Single Sign-On
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Module 11: Securing a Microsoft ASP.NET Web Application.
Module 2: Overview of IIS 7.0 Application Server.
CS795.Net Impersonation… why & How? Presented by: Vijay Reddy Mara.
Windows Role-Based Access Control Longhorn Update
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Impersonation Bharat Kadia CS-795. What is Impersonation ? Dictionary-: To assume the character or appearance of someone ASP.NET-: Impersonation is the.
Web Services Security Patterns Alex Mackman CM Group Ltd
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Basharat Institute of Higher Education
Secure Connected Infrastructure
Configuring and Troubleshooting Routing and Remote Access
Radius, LDAP, Radius used in Authenticating Users
Module 8: Securing Network Traffic by Using IPSec and Certificates
Goals Introduce the Windows Server 2003 family of operating systems
Active Directory and Windows Security Integration with Oracle Database
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
Module 8: Securing Network Traffic by Using IPSec and Certificates
(Authentication / Authorization)
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Windows NT ® Single Sign On BackOffice ® Applications (Part I) Peter Brundrett Program Manager Windows NT Security Microsoft Corporation

Agenda  Windows NT single sign on  Kerberos v5 authentication and SSPI  Three-tier security delegation  Windows NT authorization

Single Sign On Issues  User issue: Too many passwords to remember Too many passwords to remember  Administrator issue: Too many places to define user accounts Too many places to define user accounts Hard to determine user access Hard to determine user access  Security issue: Clear text passwords Clear text passwords Hard to disable an account Hard to disable an account  IT Manager issue: Heterogeneous computer systems Heterogeneous computer systems

Single Sign On Goals  User Logon once to the Enterprise Logon once to the Enterprise Use few passwords, ideally one! Use few passwords, ideally one!  Administrator Create user account once Create user account once Assign access based on roles Assign access based on roles Manage accounts across systems Manage accounts across systems  Security administrator Define and verify security policies Define and verify security policies

 Integrated Kerberos v5 logon Key Distribution Center (KDC)  Protected store for public key credentials  Industry standard network security protocols Kerberos, SSL/TLS, others Windows NT Single Sign On  Single account store in Active Directory

PK Kerberos ProfileCerts Keys Internet Explorer  User profile for other keys and certificates Domain credentials  Obtain Kerberos TGT and NTLM credentials TGT Smart Card Logon  Private key and certificate on card  Public key domain authentication

Windows NT Single Sign On  Standards-based Distributed System Infrastructure  Well documented APIs for developers  Platform services used in applications  Integrated logon to strategic platforms  Integrated Windows NT authorization

File and Print Services Exchange SQL Server Internet Information Proxy Internet Remote Access Public network Your app HERE SNA Server Integrated Single Sign On Today

BackOffice Logo Program  Security requirements for client/ server applications  Core baseline requirements  Windows NT authentication NTLM for Windows NT 4.0 NTLM for Windows NT 4.0 Kerberos v5 for Windows NT 5.0 Kerberos v5 for Windows NT 5.0  Benefits Easier administration, stronger security Easier administration, stronger security Intranet ready! Intranet ready!

Secure Applications  Connection authentication Establish credentials Establish credentials Mutual authentication of client and server Mutual authentication of client and server  Secure communication Message privacy and integrity Message privacy and integrity  Impersonation and delegation Assuming client’s identity Assuming client’s identity  Authorization and auditing Using security descriptors Using security descriptors

Client Kerberos Security Package Server SSPISSPI Security Support Provider Interface  Application protocol carries all data  Kerberos SSP manages security context

Connection Authentication  Client side Acquire credentials Acquire credentials Default or alternate Default or alternate Initialize security context Initialize security context Initiate connection Initiate connection  Server side Acquire credentials Acquire credentials Default or alternate Default or alternate Accept client’s security context Accept client’s security context

Example: SSPI  Security package name “Kerberos” or “Negotiate” “Kerberos” or “Negotiate” Negotiate package will choose Kerberos Negotiate package will choose Kerberos  Authentication InitializeSecurityContext InitializeSecurityContext AcceptSecurityContext AcceptSecurityContext  Impersonation

Impersonation  Security contexts Access Token associated with processes and threads Access Token associated with processes and threads Primary Token Primary Token Client Token Client Token  Impersonation Accessing system resources on client’s behalf Accessing system resources on client’s behalf Access check and auditing on private resources Access check and auditing on private resources

Impersonation API  Using SSPI ImpersonateSecurity Context ImpersonateSecurity Context RevertSecurity Context RevertSecurity Context  Using RPC RpcImpersonateClient RpcImpersonateClient RpcRevertToSelf RpcRevertToSelf RpcRevertToSelfEx RpcRevertToSelfExSECURITY_STATUSImpersonateSecurityContext( PCtxtHandle phContext );SECURITY_STATUSRevertSecurityContext( );RPC_STATUSRpcImpersonateClient( RPC_BINDING_HANDLE pBinding );RPC_STATUSRpcRevertToSelf();

Impersonation API  Using DCOM IServerSecurity IServerSecurity CoImpersonate Client CoImpersonate Client CoRevertToSelf CoRevertToSelf  For HTTP, Internet Information Server impersonates the client ISAPI runs in the client’s context ISAPI runs in the client’s context HRESULTCoImpersonateClient()HRESULTCoRevertToSelf()HRESULT IServerSecurity :: ImpersonateClient() HRESULT IServerSecurity :: RevertToSelf()

Application DCOM security Authenticated RPC SSPI Kerberos SChannel Crypto API WinInet Public Key Application Where Does SSPI Fit In

Kerberos Authentication  Kerberos service uses Active Directory  Implemented by SSPI security provider  Mutual authentication  Supports 3-tier delegation  Windows NT access control  Standards-based interoperability

Windows NT Workstation Unix Server Windows NT KDC GSS-Kerb5 Token formats (RFC 1964) SSPI Kerberos SSP Application protocol GSS Kerberos mechanism GSS-API TICKET Cross-platform Strategy  Common Kerberos domain

Three-Tier Security Delegation  End-to-end user authentication  Application requires data from several sources  Flexibility to separate Web server from back-end data servers  Single user account Simplify user management Simplify user management  Access control through groups

SQL Server IIS Access Denied WWW-Authenticate: Negotiate 2. Ticket request to KDC 6. SQL Server impersonates original client, then data access 5. ASP uses ADO to query SQL, integrated security requests ticket 3. WWW-Authenticate: Negotiate 3. WWW-Authenticate: Negotiate ISAPI 4. IIS impersonates client, invokes ISAPI extension Server-A Server-B Example: Delegation in Action

Configuration Setup  Windows NT 5.0 with Kerberos protocol Internet Information Server Internet Information Server SQL Server ™ SQL Server ™  Client is Windows NT 5.0 or Windows ® 95/98 With Distributed Systems client update With Distributed Systems client update  Internet Information Server Virtual Directory uses “Windows NT Authentication”  SQL Server is using Integrated Security

Trusted For Delegation  Delegation means… Server can do anything on behalf of client Server can do anything on behalf of client Trusted not to run unauthorized services Trusted not to run unauthorized services Enabled on per-server basis Enabled on per-server basis  Enable on the computer object in Active Directory  Do not assume delegation is always enabled!

Windows NT Authorization  What is the client allowed to do?  Single sign on is not sufficient Centralize authorization through roles Centralize authorization through roles Windows NT group membership Windows NT group membership  Integrate authentication with server security model Windows NT object security model Windows NT object security model

SecureServer Client access request Impersonate Client Get object’s security descriptor Get client’s access token Perform access check Private Store Return response Encrypted Files Object Access Control

… // COM server impersonates client CoImpersonateClient(…); // Obtain private object security descriptor MyStatus = GetObjectSD(Object,…,&SD); // your own routine // Obtain client’s token Status = OpenThreadToken(…,&Token); // Perform Access Check Status = AccessCheck( SD, Token, DesiredAccess, GenericMapping, &PrivsUsed, &PrivLength, &GrantedAccess, &PrivsUsed, &PrivLength, &GrantedAccess, &Allowed); &Allowed); // Act as per the result if(Allowed) { …} AccessCheck

… // Impersonate client CoImpersonateClient(…); // Obtain private object security descriptor MyStatus = GetObjectSD(Object,…,&SD); // your own routine // Perform Access Check & Audit Status = AccessCheckAndAuditAlarm( L”YourServerName”, Object, L”ObjectTypeName”, L”ObjectName”, SD, DesiredAccess, GenericMapping, FALSE, &GrantedAccess, &Allowed, &OnClose); // Act as per the result if(Allowed) { …} AccessCheckAndAuditAlarm

User Account Management  One unified enterprise account image All account properties, extensible schema All account properties, extensible schema LDAP access, remote management LDAP access, remote management  Synchronize with other account stores Directory synchronization - LDAP, LDIF Directory synchronization - LDAP, LDIF Password change notification Password change notification  Authorization based on group membership for central access control Roles defined by group membership Roles defined by group membership

Single Sign On Summary  Comprehensive solution today Windows NT and BackOffice services Windows NT and BackOffice services Platform security services for applications Platform security services for applications  Cross-platform with industry standards Kerberos v5 and GSS token formats Kerberos v5 and GSS token formats X.509 v3 certificates with SSL/TLS X.509 v3 certificates with SSL/TLS  Familiar Windows NT security model extended to n-tier applications

Call To Action  Stop prompting for passwords! Use Windows NT distributed security Use Windows NT distributed security Use SSPI or DCOM/RPC security Use SSPI or DCOM/RPC security Use Windows NT access control Use Windows NT access control  Leverage industry standard protocols for cross-platform security  Depend on Active Directory for single user account store  Check out the Security Showcase!

More Information  SSPI SSPI Whitepaper on MSDN SSPI Whitepaper on MSDN Platform SDK: doc and samples Platform SDK: doc and samples \mssdk\samples\win32\winnt\security\sockauth \mssdk\samples\win32\winnt\security\sockauth  Kerberos v5 Distributed Security Services whitepaper Distributed Security Services whitepaper  BackOffice logo program  MSPress ® “Running Microsoft Internet Information Server” “Running Microsoft Internet Information Server”