Microsoft ® Official Course Module 8 Deploying and Managing Certificates.

Slides:



Advertisements
Similar presentations
Deploying and Managing Active Directory Certificate Services
Advertisements

Chapter 9 Deploying IIS and Active Directory Certificate Services
Module 5: Creating and Configuring Group Policy
Managing User Settings with Group Policy
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Chapter 11: Active Directory Certificate Services
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Module 6: Configuring AD RMS
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Configuring Active Directory Certificate Services Lesson 13.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Microsoft ® Official Course Module 9 Configuring Applications.
Microsoft ® Official Course Module 12 Monitoring, Managing, and Recovering AD DS.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Overview of Access and Information Protection
Implementing Secure Shared File Access
Module 4: Add Client Computers and Devices to the Network.
Implementing File and Print Services
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Managing Active Directory Domain Services Objects
Week #7 Objectives: Secure Windows 7 Desktop
Implementing Network Access Protection
Configuring Encryption and Advanced Auditing
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 15: Manage the Windows ® Small Business Server 2008 Environment Using Group Policy.
Module 14: Configuring Server Security Compliance
Securing AD DS Module A 3: Securing AD DS
Managing User Desktops with Group Policy
Module 9 Configuring Messaging Policy and Compliance.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 11: Remote Access Fundamentals
Configuring Directory Certificate Services Lesson 13.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Microsoft ® Official Course Module 3 Managing Active Directory Domain Services Objects.
Module 6: Configuring User Environments Using Group Policy.
Module 9: Fundamentals of Securing Network Communication.
Module 9 Configuring Messaging Policy and Compliance.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 3 Managing Recipient Objects. Module Overview Managing Mailboxes Managing Other Recipients Configuring Address Policies Configuring Address.
Module 3: Managing a Microsoft ® Windows ® Small Business Server Environment.
Module 7 Planning and Deploying Messaging Compliance.
Module 1: Implementing Active Directory ® Domain Services.
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
70-412: Configuring Advanced Windows Server 2012 services
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Implementing Group Policy
Module 7: Implementing Security Using Group Policy.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Module 10: Windows Firewall and Caching Fundamentals.
Implementing a Group Policy Infrastructure
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Building and extending the internal PKI
Presentation transcript:

Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Module Overview Deploying and Managing Certificate Templates Managing Certificates Deployment, Revocation, and Recovery Using Certificates in a Business Environment Implementing and Managing Smart Cards

Lesson 1: Deploying and Managing Certificate Templates What Are Certificates and Certificate Templates? Certificate Template Versions in Windows Server 2012 Configuring Certificate Template Permissions Configuring Certificate Template Settings Options for Updating a Certificate Template Demonstration: Modifying and Enabling a Certificate Template

What Are Certificates and Certificate Templates? A certificate contains information about users, devices, usage, validity, and a key pair A certificate template defines: The format and contents of a certificate The process for creating and submitting a valid certificate request The security principles that are allowed to read, enroll, or use autoenrollment for a certificate that will be based on the template The permissions required to modify a certificate template

Certificate Template Versions in Windows Server 2012 Introduced in Windows 2000 Server, provided for backward compatibility in newer versions Created by default when a CA is installed Cannot be modified (except for permissions) or removed, but can be duplicated to become version 2 or 3 templates, which can then be modified Version 1: Default template introduced with Windows Server 2003 Allows customization of most settings in the template Several preconfigured templates are provided when a CA is installed Version 2: Supports advanced Suite B cryptographic settings Includes advanced options for encryption, digital signatures, key exchange, and hashing Only supports Windows Server 2008 and Windows Server 2008 R2 servers Only supports Windows Vista and Windows 7 client computers Version 3: Available only for Windows Server 2012 and Windows 8 clients Supports both CSPs and key storage providers Supports renewal with the same key Version 4:

Configuring Certificate Template Permissions PermissionDescription Full Control Allows a designated user, group, or computer to modify all attributes—including ownership and permissions. Read Allows a designated user, group, or computer to read the certificate in AD DS when enrolling Write Allows a designated user, group, or computer to modify all attributes except permissions Enroll Allows a designated user, group, or computer to enroll for the certificate template Autoenroll Allows a designated user, group, or computer to receive a certificate through the autoenrollment process

Configuring Certificate Template Settings For each certificate template, you can customize several settings, such as validity time, purpose, CSP, private key exportability, and issuance requirements Category Single-purpose example Multi-purposes example Users Basic EFS Authenticated session Smart card logon Administrator User Smart card user Computers Web server IPsec Computer Domain controller

Options for Updating a Certificate Template Modify the original certificate template to incorporate the new settings Modifying Replace one or more certificate templates with an updated certificate template Superseding Updated Original Smart Card 1 Smart Card 2 Smart Cards (new)

Demonstration: Modifying and Enabling a Certificate Template In this demonstration, you will see how to modify and enable a certificate template

Lesson 2: Managing Certificates Deployment, Revocation, and Recovery Certificate Enrollment Methods Certificate Autoenrollment Overview Enrollment Agent Overview How Does Certificate Revocation Work? Overview of Key Archival and Recovery Configuring Automatic Key Archival Demonstration: Configuring a CA for Key Archival

Certificate Enrollment Methods MethodUse Autoenrollment To automate the request, retrieval, and storage of certificates for domain-based computers Manual enrollment To request certificates by using the Certificates Templates console or Certreq.exe when the requestor cannot communicate directly with the CA CA Web enrollment To request certificates from a website that is located on a CA To issue certificates when autoenrollment is not available Enroll on behalf To provide IT staff with the right to request certificates on behalf of another user (Enrollment Agent)

Certificate Autoenrollment Overview A certificate template is configured for Allow, Enroll, and Autoenroll permissions for users who receive the certificates The CA is configured to issue the template An AD DS GPO should be created to enable autoenrollment The GPO should be linked to the appropriate site, domain, or OU The client machine receives the certificates during the next Group Policy refresh interval

Enrollment Agent Overview An Enrollment Agent is a user who has the appropriate certificate assigned and and has the ability to request certificates on behalf of other users or computers The restricted Enrollment Agent has limited permissions: Limits permissions of the enrollment agent: For specific group of users For specific certificate templates Requires Windows Server 2008 Enterprise edition or Windows Server 2012 CA

How Does Certificate Revocation Work? The following are steps to revoke a certificate: 1. Certificate is revoked 2. Certificate revocation is published 3. Client computer verifies certificate validity and revocation

Overview of Key Archival and Recovery Private keys can get lost when: A user profile is deleted An operating system is reinstalled A disk is corrupted A computer is lost or stolen It is critical that you archive private keys for for certificates that are used for encryption The KRA is needed for key recovery Key archival must be configured on the CA and on the certificate template Key recovery is a two-phases process: 1. Key retrieval 2. Key recovery The KRA certificate must be protected

Configuring Automatic Key Archival Steps to configure automatic key archival: 1. Configure and issue the KRA certificate template 2. Designate a person as the KRA and enroll for the certificate 3. Enable key archival on the CA 4. Modify and enable certificate templates for key archival

Demonstration: Configuring a CA for Key Archival In this demonstration, you will see how to configure a CA for key archival

Lesson 3: Using Certificates in a Business Environment Using Certificates for SSL Using Certificates for Digital Signatures Demonstration: Signing a Document Digitally Using Certificates for Content Encryption Demonstration: Encrypting a File with EFS Using Certificates for Authentication

Using Certificates for SSL The purpose of securing a connection with SSL is to protect data during communication For SSL, a certificate must be installed on the server Be aware of trust issues The SSL works in the following steps: 1. The user types an HTTPS URL 2. The web server sends its SSL certificate. 3. The client performs a check of the server certificate 4. The client generates a symmetric encryption key 5. The client encrypts this key with the server’s public key 6. The server uses its private key to decrypt the encrypted symmetric key Make sure that you configure the SSL certificate properly

Using Certificates for Digital Signatures Digital signature ensure: Content is not modified during transport The identity of the author is verifiable Digital signatures works in the following steps: 1. When an author digitally signs a document or a message, the operating system on his or her machine creates a message cryptographic digest 2. The cryptographic digest is then encrypted by using author’s private key and added to the end of the document or message 3. The recipient uses the author’s public key to decrypt the cryptographic digest and compare it to the cryptographic digest created on the recipient’s machine Users need to have certificate based on a User template to use digital signatures

Demonstration: Signing a Document Digitally In this demonstration, you will see how to sign a document digitally

Using Certificates for Content Encryption Encryption protects data from unauthorized access EFS uses certificates for file encryption To send an encrypted message, you must be possess the recipient’s public key File encryption key: Encrypted with the file owner’s public key File encryption key: Encrypted with the public key of Recovery agent 1 File encryption key: Encrypted with the public key of Recovery agent 2 (optional) Encrypted Data Data Decryption Field Data Recovery Fields Header

Demonstration: Encrypting a File with EFS In this demonstration, you will see how to encrypt a file with EFS

Using Certificates for Authentication You can use certificates for user and device authentication, and in network and application access scenarios such as: L2TP/IPsec VPN EAP-TLS PEAP NAP with IPsec Outlook Web App Mobile device authentication

Lesson 4: Implementing and Managing Smart Cards What Is a Smart Card? How Does Smart Card Authentication Work? What Is a Virtual Smart Card? Enrolling Certificates for Smart Cards Smart Card Management

What Is a Smart Card? A smart card is a miniature computer, embedded in plastic with limited storage and processing capabilities Smart cards: Provide options for multifactor authentication Provide enhanced security over passwords A valid smart card and PIN must be used together

How Does Smart Card Authentication Work? Smart cards can be used for: Interactive logon to AD DS Client authentication, if you use a certificate that matches an account Remote logon Interactive logon steps: 1. Logon request goes to the LSA, which is forwarded to the Kerberos package 2. KDC verifies the certificate 3. KDC verifies the digital signature on the authentication service 4. KDC performs an AD DS query to locate user account 5. KDC generates a random encryption key to encrypt the TGT 6. KDC signs the reply with its private key and sends it to the user You can use smart cards for offline logon

What Is a Virtual Smart Card? A smart card infrastructure might be expensive Windows Server 2012 AD CS introduces Virtual Smart Cards Virtual Smart Cards use leverage the capabilities of the TPM chip No cost for buying smart cards and smart card readers Computer acts like a smart card Private keys are protected by the cryptographic capabilities of the TPM

Enrolling Certificates for Smart Cards Before issuing smart cards, you should define the method of enrollment for smart card certificates Smart card enrollment requires certificates require some manual intervention For smart card enrollment, you should: Define the certificate template for the smart cards Enroll one or more users for the Enrollment Agent certificate Configure the enrollment station Start the Enroll On Behalf Of wizard Ensure that users change their personal PIN

Smart Card Management Smart card management tasks: Issuance Revocation Renewal Block and Unblock Duplication Suspend FIM 2010 can: Issue smart cards to users Store information in a SQL database Manage revocation, renewal, unblocking, suspension and reinstatement procedures Provide users and administrators with a web-based, self-service smart card management interface Manage smart card printing with appropriate hardware Implement workflows for each management task

Lab: Deploying and Using Certificates Exercise 1: Configuring Certificate Templates Exercise 2: Enrolling and using certificates Exercise 3: Configuring and Implementing Key Recovery Logon Information Virtual machines:10969A-LON-DC1, 10969A-LON-SVR1, 10969A-LON-CL1 User name:Adatum\Administrator Password:Pa$$w0rd Estimated Time: 50 minutes

Lab Scenario You are working as an administrator at A. Datum Corporation. As A. Datum expands, its security requirements also are increasing. The Security department particularly is interested in enabling secure access to critical websites, and in providing additional security for features such as EFS, digital signatures, smart cards, and the Windows 7 and Windows 8 DirectAccess feature. The Security department especially wants to evaluate digital signatures in Microsoft Office documents. To address these and other security requirements, A. Datum has decided to use certificates that are issued by the AD CS role in Windows Server 2012.

Lab Scenario As one of the senior network administrators at A. Datum, you are responsible for implementing certificate enrollment. You also will be developing the procedures and process for managing certificate templates, and for deploying and revoking certificates.

Lab Review What must you do to recover private keys? What is the benefit of using a restricted Enrollment Agent?

Module Review and Takeaways Review Questions Real-world Issues and Scenarios Tools Best Practice Common Issues and Troubleshooting Tips