Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.

Slides:



Advertisements
Similar presentations
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Advertisements

Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Deploying and Managing Active Directory Certificate Services
SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Chapter 9 Deploying IIS and Active Directory Certificate Services
Module 5: Configuring Access to Internal Resources.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
1 Week #1 Objectives Review clients, servers, and Windows network models Differentiate among the editions of Server 2008 Discuss the new Windows Server.
Understanding Active Directory
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Understanding Active Directory
Module 6: Configuring AD RMS
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Senior Technical Writer
Configuring Active Directory Certificate Services Lesson 13.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Chapter 12: Additional Active Directory Server Roles
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Module 13: Configuring Availability of Network Resources and Content.
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
Securing Microsoft® Exchange Server 2010
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Module 9 Configuring Messaging Policy and Compliance.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
Module 5: Designing a Terminal Services Infrastructure.
Configuring Active Directory Objects and Trusts
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Module 5: Configuring Internet Explorer and Supporting Applications.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Module 7 Planning and Deploying Messaging Compliance.
Module 5: Designing Security for Internal Networks.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
70-412: Configuring Advanced Windows Server 2012 services
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Module 11: Designing an Active Directory Federation Services Implementation in Windows Server 2008.
Module 12: Implementing ISA Server 2004 Enterprise Edition: Back-to-Back Firewall Scenario.
Module 3 Planning for Active Directory®
Introduction to Active Directory
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Module 10: Identity and Access Services in Windows Server 2008 Active Directory.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Labs. Session 1 Lab 1: Designing an Active Directory Forest Infrastructure in Windows Server 2008 Exercise 1: Designing an Active Directory Forest Exercise.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Module 3: Enabling Access to Internet Resources
Utilize Group Policy Terminal Server Settings
SharePoint Online Hybrid – Configure Outbound Search
8.1 Active Directory Rights Management Services (AD RMS)
AD RMS Templates Active Directory Rights Management Services (AD RMS)
Implement Web Application Proxy (WAP)
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Module 10: Designing an AD RMS Infrastructure in Windows Server 2008

Module Overview Gathering Information for an Active Directory Rights Management Services (AD RMS) Design Designing AD RMS Clusters and Access Designing AD RMS Backup and Recovery

Key Components of AD RMS Author AD RMS- enabled applications AD RMS Server Database server Consumer AD DS

Considerations for External Client AD RMS Access Consider the following methods for providing external clients better access to AD RMS: The root certification cluster URL must be accessible from the Internet and Intranet Deploy a dedicated license server for external clients in complex environments Require SSL for external clients when accessing AD RMS Define the method for granting external users access to AD RMS (external trusted domains, Windows Live IDs, AD FS)

What are AD RMS Rights Policy Templates? AD RMS rights policy templates specify the rights and conditions that apply to protected content Rights policy templates allow you to: Establish different rules for protecting different types of information – in a manageable way In Windows Vista SP1 and Windows Server 2008, a distribution mechanism is available that enables the client to automatically retrieve templates from the AD RMS server Create customized templates

Lesson 2: Designing AD RMS Clusters and Access Options for Configuring AD RMS Clusters Guidelines for Designing AD RMS Clusters Options for Granting External Users Access to AD RMS Guidelines for Designing AD RMS Access

Options for Configuring AD RMS Clusters The two types of clusters in Windows Server 2008: Licensing clusterRoot cluster Simple cluster: The simplest form of a cluster is one AD RMS server Root cluster: The first server installed is always the root cluster Handles all certification and licensing requests for the domain Complex cluster: Multiple servers can be configured as a cluster behind a single, shared URL Licensing-only clusters can be created in addition to the root cluster

Guidelines for Designing AD RMS Clusters When designing AD RMS clusters, follow these guidelines: In small environments with limited resources, use single- server clusters For high availability, add multiple servers in a cluster behind a single URL Use only a root cluster and join more AD RMS servers to this cluster For complex environments, create licensing-only clusters For redundancy and load balancing, add multiple servers to the installation and create a licensing cluster

Options for Granting External Users Access to AD RMS There are several ways to support multiple forests and provide external users with authentication and access: External trusted user domains Trusted publishing domains Windows Live ID credentials A federated trust

Guidelines for Designing AD RMS Access When designing AD RMS access, follow these guidelines: Set the root certification cluster URL to an address that: Can be accessed over the Internet Resolved in the intranet to AD RMS servers for the same cluster Enable SSL and require an SSL connection between the AD RMS clients and the AD RMS server Set up a license server dedicated to extranet users and configure the extranet cluster URL appropriately Use ISA Server 2006 publishing to connect securely to AD RMS from external clients

Guidelines for Implementing an AD RMS Backup and Recovery Strategy When designing a backup and restore strategy for AD RMS, consider the following guidelines: The AD RMS private key must be backed up and managed Always maintain a current backup of AD RMS database Provide a redundant Internet link for AD RMS if you are servicing external clients Backup all certificates on AD RMS Backup custom templates on AD RMS Test your backup