Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Chapter 7 HARDENING SERVERS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Windows NT ® Single Sign On BackOffice ® Applications (Part I) Peter Brundrett Program Manager Windows NT Security Microsoft Corporation.
Introduction To Windows NT ® Server And Internet Information Server.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Understanding Active Directory
Authentication, Authorization and Accounting
Public Key Infrastructure from the Most Trusted Name in e-Security.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Internet Information Server 6.0. Overview  What’s New in IIS 6.0?  Built-in Accounts and IIS 6.0  IIS Pass-Through Authentication  Securing Web Traffic.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Windows 2000: Concepts & Deployment Larry Lieberman NT Support Engineer Premier Enterprise Support Microsoft Corporation.
Slide Master Layout Useful for revisions and projector test  First-level bullet  Second levels  Third level  Fourth level  Fifth level  Drop body.
Security features of Windows What is computer security ? Computer security refers to the protection of all components—hardware, software, and stored.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Group 11 CSE 8343 Group 1 Windows 2000 Domain Security & Authentication.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Windows NT ® Single Sign On Cross Platform Applications (Part II) John Brezak Program Manager Windows NT Security Microsoft Corporation.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 9: Fundamentals of Securing Network Communication.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 3: Configuring File Access and Printers on Windows 7 Clients
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Introduction to Active Directory
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Active Directory and NT Kerberos. Introduction to NT Kerberos v5 What is NT Kerberos? How is it different from NTLM NT Kerberos vs MIT Kerberos Delegation.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Secure Connected Infrastructure
Cryptography and Network Security
Radius, LDAP, Radius used in Authenticating Users
Module 8: Securing Network Traffic by Using IPSec and Certificates
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Public Key Infrastructure from the Most Trusted Name in e-Security
Module 8: Securing Network Traffic by Using IPSec and Certificates
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Topics Single Sign-on Single Sign-on Kerberos v5 integration Kerberos v5 integration Active Directory security Active Directory security Delegation of authentication Delegation of authentication Public key infrastructure Public key infrastructure Encrypting file system Encrypting file system Network security Network security Security policy Security policy Secure Windows Secure Windows

Platform Security Requirements Single enterprise logon Single enterprise logon Strong authentication Strong authentication Authorization Authorization Secure communications Secure communications Mandatory policy Mandatory policy Auditing Auditing Interoperability Interoperability Extensible architecture Extensible architecture Goal: Deliver Windows 2000 as the most secure high volume OS

Windows 2000 Single Sign On Single account store in Active Directory Single account store in Active Directory Integrated Kerberos v5 logon Integrated Kerberos v5 logon Key Distribution Center (KDC) Protected store for public key credentials Protected store for public key credentials Industry standard network security protocols Industry standard network security protocols Kerberos, SSL/TLS, others

Windows 2000 Active Directory Key Distribution Center (KDC) Windows 2000 Domain Controller 1. Insert smart card to reader, activate card with PIN 2. Private key and certificate on card authenticates user to KDC 3. KDC returns TGT response protected by User’s public key certificate TGT 4. Account control option requiring smart card logon per user Smart Card Logon

Kerberos V5 Integration KDC relies on the Active Directory as the store for security principals and policy Kerberos SSPI provider manages credentials and security contexts Server Service ticket authorization data supports NT access control model Client Windows 2000 Active Directory Key Distribution Center (KDC) Windows 2000 Domain Controller

Application Server (target) Windows 2000 Active Directory Key Distribution Center (KDC) Windows 2000 domain controller 4.Present service ticket at connection setup Target 2.Lookup Service, Compose SPN 1.Publish Service Connection Point and SPN TGT 3.Request service ticket for 3.Request service ticket for 5.Mutual auth using unique session key Kerberos Authentication Mutual Authentication

Secure Distributed Services Model Secure Distributed Service Client request Impersonate Client Get object’s security descriptor Get client’s access token Private Data Store Return response Authenticate Client Kernel access check

Remote File Access Check Rdr Server Kerberos SSP File application SMB protocol NTFS SSPI \\infosrv\share File Token KDC Ticket Access check SD Token Client

Windows 2000 Integration Kerberos Authentication Use LDAP to Active Directory LDAP to Active Directory CIFS/SMB remote file access CIFS/SMB remote file access Secure dynamic DNS update Secure dynamic DNS update System management tools System management tools Host-host IP security using IKE Host-host IP security using IKE Secure Intranet web services in IIS Secure Intranet web services in IIS Authenticate certificate request to Enterprise CA Authenticate certificate request to Enterprise CA COM+/RPC security provider COM+/RPC security provider

Cross-platform Interoperability Based on Kerberos V5 Protocol Based on Kerberos V5 Protocol RFC 1510 and RFC 1964 token format RFC 1510 and RFC 1964 token format Testing with MIT Kerb V5 Testing with MIT Kerb V5 Windows 2000 hosts the KDC Windows 2000 hosts the KDC UNIX clients to Unix Servers UNIX clients to Unix Servers UNIX clients to Windows Servers UNIX clients to Windows Servers NT clients to UNIX Servers NT clients to UNIX Servers Cross-realm authentication Cross-realm authentication UNIX realm to Windows domain UNIX realm to Windows domain

Secure RPC HTTP SSPI Internet Explorer, Internet Information Server NTLM/ NTLMv2 Kerberos SChannel SSL/TLS MSV1_0/ SAM KDC/DS COM+ application POP3, NNTP Mail, Chat, News CIFS/SMB Remote file Architecture For Multiple Authentication Services LDAP Directory enabled apps using ADSI

Windows 2000 Active Directory Domain hierarchy: domain tree Domain hierarchy: domain tree Organizational Unit (OU) hierarchy within a domain Organizational Unit (OU) hierarchy within a domain Users, groups, machines Users, groups, machines Domain configuration Domain configuration OU OU Users

Active Directory Authentication and Access Control LDAP v3 is core directory access protocol LDAP v3 is core directory access protocol Authenticate using SASL and Kerberos protocol Authenticate using SASL and Kerberos protocol LDAP with SSL/TLS support LDAP with SSL/TLS support OU OU Users Bind Request Every object has a unique ACL Every object has a unique ACL Like NTFS folders and files Like NTFS folders and files Security Descriptor

Active Directory Security administration Delegation of administration Delegation of administration Grant permissions at organizational unit (OU) level Grant permissions at organizational unit (OU) level Who creates OUs, users, groups, etc. Who creates OUs, users, groups, etc. Fine-grain access control Fine-grain access control Grant or deny permissions on per- property level, or a group of properties Grant or deny permissions on per- property level, or a group of properties Read property Read property Write property Write property Per-property auditing Per-property auditing

Secure Applications Connection Authentication Connection Authentication Establish Credentials Establish Credentials Mutual authentication of client and server Mutual authentication of client and server Secure Communication Secure Communication Message privacy and integrity Message privacy and integrity Impersonation and Delegation Impersonation and Delegation Assuming client’s identity Assuming client’s identity Authorization and Auditing Authorization and Auditing Using security descriptors Using security descriptors

Example: Delegation in Action SQL Server IIS Access Denied WWW-Authenticate: Negotiate 2. Ticket request to KDC 6. SQL Server impersonates original client, then data access 5. ASP uses ADO to query SQL, integrated security requests ticket 3. WWW-Authenticate: Negotiate 3. WWW-Authenticate: Negotiate ISAPI 4. IIS impersonates client, invokes ISAPI extension Server-A Server-B

Interoperability Cross Platform Secure 3-Tier App Windows 2000 Professional Smart Card Logon Windows 2000 Server Web Server Solaris UNIX Server Oracle DB Application IIS ISAPI Extension SSPI/Krb AppService GSS/Krb IE5 SSPI/Krb HTTPTCP

Public Key Components Windows 2000 Active Directory Certificate Server For clients  User key and certificate mgmt  Secure channel  Secure storage  CA enrollment For servers  Key and certificate management  Secure channel with Client authentication  Auto enrollment Enterprise  Certificate services  Trust policy

SSL Client Authentication SChannel SSP Client certificate  Server Server Certificate Store of Trusted CAs Authentication service  Domain Org (OU) Users 2. Locate user object in directory by subject name Access token  3. Build NT access token based on group membership 1. Verify user certificate based on trusted CA, CRL Server resources  ACL 4. Impersonate client, object access verification

Crypto API Architecture Crypto API 1.0 RSA base RSA baseCSPFortezzaCSP Application SmartCardCSP u Cryptographic Service Providers Certificate management services Secure channel Key database Certificate store

Encrypting File System Privacy of data that goes beyond access control Privacy of data that goes beyond access control Protect confidential data on laptops Protect confidential data on laptops Configurable approach to data recovery Configurable approach to data recovery Integrated with core operating system components Integrated with core operating system components Windows NT File System - NTFS Windows NT File System - NTFS Crypto API key management Crypto API key management LSA security policy LSA security policy Transparent and very high performance Transparent and very high performance

EFS Architecture I/O manager EFS NTFS User mode Kernel mode Win32 layer Applications Encrypted on-disk data storage LPC communication for all key management support Crypto API EFSservice

RNG Data recovery field generation (RSA) DRF Recovery agent’s public key in recovery policy Randomly-generated file encryption key File Encryption File encryption (DESX) Data decryption field generation (RSA) DDF User’s public key A quick brown fox jumped... *#$fjda^ju539!3t t389E *&

*#$fjda^ju539!3t DDF File Decryption DDF contains file encryption key encrypted under user’s public key A quick brown fox jumped... A quick brown fox jumped... File decryption (DESX) DDF extraction (e.g., RSA) File encryption key DDF is decrypted using the private key to get to the file encryption key User’s private key

Secure Networking Internet Protocol Security (IPSec) Internet Protocol Security (IPSec) Extended Authentication Protocol/PPP Extended Authentication Protocol/PPP Token and SmartCard support Token and SmartCard support Remote Authentication Dial In User Service (RADIUS) Remote Authentication Dial In User Service (RADIUS) Kerberos security package Kerberos security package Public key (SSL/TLS) security package Public key (SSL/TLS) security package

Internet Corporate Network InternetServiceProvider Router or Tunnel Server Laptop or Home PC IP Tunnel Host A Modems B C Windows 2000 IPSec Target Scenarios Remote Access User to Corporate Network Remote Access User to Corporate Network Dial Up from Laptop or Home Dial Up from Laptop or Home Using existing network connectivity to Internet Using existing network connectivity to Internet

Internet Corporate Net in DC Router C Router D Corporate Net in LA Host A B IP Tunnel Windows 2000 IPSec Target Scenarios LAN Edge Gateway to Edge Gateway of Another LAN LAN Edge Gateway to Edge Gateway of Another LAN Across Internet or private network with Windows 2000 Windows 2000 routers using IP tunnels Across Internet or private network with Windows 2000 Windows 2000 routers using IP tunnels IPSec Tunnel Mode IPSec Tunnel Mode L2TP/IPSec integrated tunneling L2TP/IPSec integrated tunneling

IP Security Host-to-host authentication and encryption Host-to-host authentication and encryption Network layer Network layer IP security policy with domain policy IP security policy with domain policy Negotiation policies, IP filters Negotiation policies, IP filters IP Security Policy Source: Dest: Any protocol Policy Agent Policy Agent Downloads IPSEC policy Downloads IPSEC policy PAPA

IP Security Association using Kerberos Authentication Windows NT Directory Server KDC IKE IKE TCP IP SASA Used for SMB data encryption

Managing Security Policy Security settings in local or group policy Security settings in local or group policy Local computer policy Local computer policy Audit policy, rights, security options Audit policy, rights, security options Group Policy in the directory Group Policy in the directory Common computer policies Common computer policies Domain level policies Domain level policies Account policies Account policies Public key trust policies Public key trust policies

3 OU level policy Hierarchical Policy Settings Applied policy for a computer combines multiple policy objects Applied policy for a computer combines multiple policy objects Domain level policy 1 2 OU level policy

Enterprise Framework Integrated with Group Policy management Integrated with Group Policy management Security settings in group policy Security settings in group policy Settings applied as part of policy enforcement on each computer Settings applied as part of policy enforcement on each computer

Secure Windows Goals Goals Secure out-of-the-box Secure out-of-the-box Definition of secure system settings Definition of secure system settings Backward compatible user experience Backward compatible user experience Clean install of Windows 2000 Clean install of Windows 2000 Upgrade can apply security configuration Upgrade can apply security configuration Who can do what? Who can do what? Administrators, Power Users, Users Administrators, Power Users, Users Group membership defines access Group membership defines access

Administrators vs. Users Administrators Administrators Full control of the operating system Full control of the operating system Install system components, drivers Install system components, drivers Upgrade or repair the system Upgrade or repair the system Users Users Cannot compromise system integrity Cannot compromise system integrity Read-only access to system resources Read-only access to system resources Interactive and network logon rights Interactive and network logon rights Can shutdown desktop system Can shutdown desktop system Legacy application issues Legacy application issues

Security Features Summary Single sign on with standard protocols Single sign on with standard protocols Kerberos V5 and X.509 V3 certificates Kerberos V5 and X.509 V3 certificates Public key certificate management Public key certificate management Enterprise services for PKI rollout Enterprise services for PKI rollout Distributed security for applications Distributed security for applications Authentication, authorization, auditing Authentication, authorization, auditing Active Directory integration Active Directory integration Scalable, extensible user account directory Scalable, extensible user account directory

For More Information White papers White papers Active Directory Active Directory Security Services Security Services Windows 2000 Resource Kit Windows 2000 Resource Kit Deployment Guide Deployment Guide Detail technical material Detail technical material Microsoft Security Advisor Microsoft Security Advisor