Slide Master Layout Useful for revisions and projector test  First-level bullet  Second levels  Third level  Fourth level  Fifth level  Drop body.

Slides:



Advertisements
Similar presentations
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Experience with NTLM v2 on Win2K in NT 4.0 Domain Myung Bang Jefferson Lab Hepix-HepNT 2000 October 31, 2000.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Kerberos Part 1 CNS 4650 Fall 2004 Rev. 2. The Name Greek Mythology Cerberus Gatekeeper of Hates Only allowed in dead Prevented dead from leaving Spelling.
Chapter 7 HARDENING SERVERS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 10: Server Administration.
Windows NT ® Single Sign On BackOffice ® Applications (Part I) Peter Brundrett Program Manager Windows NT Security Microsoft Corporation.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
KerberSim CMPT 495 Fall 2004 Jerry Frederick. Project Goals Become familiar with Kerberos flow Create a simple Kerberos simulation.
Introduction to Kerberos Kerberos and Domain Authentication.
Understanding Active Directory
Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation.
TAM STE Series 2008 © 2008 IBM Corporation WebSEAL SSO, Session 108/2008 TAM STE Series WebSEAL SSO, Session 1 Presented by: Andrew Quap.
Overview of Active Directory Domain Services Lesson 1.
August 25, SSO with Microsoft Active Directory Presented by: Craig Larrabee.
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
Understanding Integrated Authentication in IIS Chris Adams IIS Supportability Lead Microsoft Corp.
Security features of Windows What is computer security ? Computer security refers to the protection of all components—hardware, software, and stored.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Group 11 CSE 8343 Group 1 Windows 2000 Domain Security & Authentication.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Chapter Six Windows XP Security and Access Controls.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
70-411: Administering Windows Server 2012
TNQ How To Implement Secure, Web-Based Business Solutions Based On Windows ® 2000 Server And Internet Information Server 5.0 Name Title Microsoft.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Windows NT ® Single Sign On Cross Platform Applications (Part II) John Brezak Program Manager Windows NT Security Microsoft Corporation.
Mastering Windows Network Forensics and Investigation Chapter 13: Logon and Account Logon Events.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
W2K and Kerberos at FNAL Jack Mark
Scaling NT To The Campus Integrating NT into the MIT Computing Environment Danilo Almeida, MIT.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Windows 2000 Certificate Authority By Saunders Roesser.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
W2K and Kerberos at FNAL Jack Schmidt Mark Kaletka.
Module 3: Configuring File Access and Printers on Windows 7 Clients
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
KERBEROS SYSTEM Kumar Madugula.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
LM/NTLMv1 Retirement Hosted by LSP Services.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Basharat Institute of Higher Education
Secure Connected Infrastructure
Overview of Active Directory Domain Services
Radius, LDAP, Radius used in Authenticating Users
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Slide Master Layout Useful for revisions and projector test  First-level bullet  Second levels  Third level  Fourth level  Fifth level  Drop body text block to if more than two lines of text in title  Next horizontal guide set at  Left vertical guide set at -4.58

Colors In This Template Useful for testing projectors during setup

TNQ200-13

Deploying Windows® 2000 Security in Corporate Networks Brent Lane OakRidge Consulting Group

Session Prerequisites  Familiarity with Windows 2000, beta 3 or later  General knowledge of Windows security and administration principles

Topics Covered  Windows ® 2000 default security  Single Sign On  Network authentication  Kerberos v5  NTLM v2  Security Interoperability  Network data protection

Windows 2000 Default Security Settings

Administrators Versus Users  Administrators  Full control of the operating system  Install system components, drivers  Upgrade or repair the system  Users  Cannot compromise system integrity  Read-only access to system resources  Interactive and network logon rights  Can shutdown desktop system  Legacy application issues

Power Users  Have sufficient access to run legacy applications  Can add files to system directory  Cannot modify existing system files  Create, manage non-admin resources:  Users and groups, file and print shares

Default Group Membership Local GroupDefault Workstation Members Default Server Members AdministratorsAdministrator Power UsersInteractive Users UsersAuthenticated Users

Secondary Logon  Run commands as another user without logoff - logon  RunAs  Command line  runas /user:MyDomain\Admin cmd  Shell support  Optional support for user profile  Terminal Server – separate console for admin

Windows Single Sign On  Single account store in Active Directory  Easier to administer user accounts  Single user id and password  Application integration

Kerberos Basic Concepts  Authentication  Key Distribution  Session Tickets  Requested for each network connection  Contains authorization data  Ticket Granting Ticket  Protected by user’s secret key  Contains session key for KDC

Active Directory Key Distribution Center (KDC) Windows Domain Controller 1.Locate KDC for domain by DNS lookup for Active Directory service 2.Use hash(pwd) to sign pre-auth data in AS request 3.Group membership expanded by KDC, added to TGT auth data TGT Ticket - NTW 4.Send TGS request for service ticket to workstation Kerberos Authentication Interactive domain logon

Application Server (target) 3.Verifies session ticket issued by KDC Active Directory Key Distribution Center (KDC) Windows domain controller 1.Send TGT and request session ticket from KDC for target server TGT 2.Present session ticket at connection setup Target Kerberos Authentication Network server connection

Cross-realm Authorization Referral

Kerberos Authentication Use  LDAP to Active Directory  CIFS/SMB remote file access  Secure dynamic DNS update  Distributed file system management  Host-host authentication for IP security  Secure Intranet web services in IIS  Authenticate certificate request to Enterprise CA  DCOM/RPC security provider

Active Directory KDC Microsoft DNS Server DNS DHCP host.domain.company.com Secure Dynamic DNS Update

Cross-platform Interoperability  Based on Kerberos V5 Protocol  Windows 2000 hosts the KDC  UNIX clients to Unix Servers  UNIX clients to Windows Servers  Windows NT clients to UNIX Servers  Simple cross-realm authentication  UNIX realm to Windows domain

Cross-platform Strategy Common Kerberos Domain Windows Desktop SSPI Kerberos SSP Application protocol Windows KDC TICKET GSS-API Application protocol GSS Kerberos mechanism Unix Server

Windows 2000 Professional Smart Card Logon Windows 2000 Server Web Server Solaris UNIX Server Oracle Application IIS ISAPIExtension SSPI/Krb AppService GSS/Krb IE5 SSPI/Krb HTTPTCP Interoperability Cross platform secure 3-tier app

1.NTLM challenge/response Application server Windows NT domain controller MSV1_0 Netlogon 5. Server impersonates client 2.Uses LSA to log on to domain 3.Netlogon service returns user and group SIDs from domain controller Windows NT Directory Service 4. SP4 Netlogon secure channel is protected NTLM Authentication Version 2

NTLMv2  Unique session key per connection  Key exchange key protects session key  Generate unique keys for integrity and encryption of session data  Client -> Server, Server -> Client

NTLMv2 Deployment  LMCompatibilityLevel = {0..5}  Upgrade DCs for user account domains  Upgrade clients and servers  Use Level 1 to negotiate NTLMv2  Use Level 3 to eliminate LM support  If users never need to connect to pre-SP4 servers  Use Level 4 at the DC to refuse LM clients

Network Data Protection  Options to enable data integrity and privacy  File Protection  Protect systems and applications from network attacks  Strong network encryption available  56-bit encryption world-wide  IPSec

File Server Encryption  Changed through Browser  Can easily let Administrator lock files or folders with encryption

IP Security  Host-to-host authentication and encryption  Network layer  IP security policy with domain policy  Negotiation policies, IP filters

Summary  Windows ® 2000 default security  Single Sign On  Network authentication  Security Interoperability  Network data protection

For More Information  Refer to the TechNet website at  Web Pages  security/default.asp 

For More Information  security/default.asp    asp

Session Credits  Author: Brent Lane  Producer/Editor: Alan Maier