Security Directions - Release 6 and beyond SearchDomino.com Webcast Patricia Booth Security and Directory Product Management 9/25/02.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Digital Certificate Installation & User Guide For Class-2 Certificates.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Introduction To Windows NT ® Server And Internet Information Server.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
CCNA 2 v3.1 Module 2.
Copyright © 2002 ACNielsen a VNU company Key Features and Benefits of the 3CX PBX for Windows Server.
APACHE SERVER By Innovationframes.com »
Configuring Active Directory Certificate Services Lesson 13.
Public Key Infrastructure from the Most Trusted Name in e-Security.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
70-270: MCSE Guide to Microsoft Windows XP Professional Second Edition, Enhanced Chapter 6: Windows XP Security and Access Controls.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Masud Hasan Secue VS Hushmail Project 2.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Week #7 Objectives: Secure Windows 7 Desktop
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Troubleshooting Windows Vista Security Chapter 4.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 7: Fundamentals of Administering Windows Server 2008.
Security Planning and Administrative Delegation Lesson 6.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Configuring Directory Certificate Services Lesson 13.
The Capabilities of AdminP Carilyn E. Daniel KMAS Consulting.
DEP350 Windows ® Rights Management (Part 1): Introduction, Concepts, And Technology Marco DeMello Group Program Manager Windows Trusted Platforms & Infrastructure.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Computing Division Helpdesk Activity Report Rick Thies May 23, 2006.
Module 9: Fundamentals of Securing Network Communication.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 15 Managing Windows Server® 2008 Backup and Restore.
1 The System Menu. 2 The System menu Dashboard Page displayed upon every login. It encompasses several boxes organised in two columns that provide a complete.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 3: Configuring File Access and Printers on Windows 7 Clients
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Users and Documents.
The Diagnostic Pathfinder System Introduction Getting Started.
Introduction to Routers
KEK GRID CA updates Takashi Sasaki Computing Research Center KEK.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Folio3 IPhone Training Session 2 Testing App on device Presenter: Imam Raza.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Get the Most Out of GoAnywhere: Agents
To Join the Teleconference
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Unit 27: Network Operating Systems
Public Key Infrastructure from the Most Trusted Name in e-Security
Installation & User Guide
Chapter 9: Managing Groups, Folders, Files, and Object Security
Designing IIS Security (IIS – Internet Information Service)
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

Security Directions - Release 6 and beyond SearchDomino.com Webcast Patricia Booth Security and Directory Product Management 9/25/02

Agenda l Market Trends l New Security Features in 6.0 n Crypto update n User Security Dialog n On-line Certificate Authority n Password Management n Execution Control List enhancements n Smart Cards n Off-server access by agents n "Full Admin" access for clientless servers n Browser access to encrypted mail l...and beyond

IDC WW Market Security Opportunity WW security software market $5.1B (2000) to $14.2B (2005) Computer security in 2002 will shift away from perimeter defense in favor of internal access control and authentication management

Security Market Trends Source: CERT Reports of Security Software holes more than doubled from to 2400

l Estimates cost of security related downtime to U.S. business in past 12 months at $273B, WW $1.39T l 12% (down from 17% last year) indicate their companies suffered a total of >24 hours of system downtime in the past year l 11% said companies spent >$1M on security software, hardware, and other expenses; another 22% will spend $100,000 to $1M Information Week Research 4th Annual Global Information Security Survey, (PWC) Cost of Security breaches

Crypto Update l Large key support for Notes protocols n 128-bit RC4 for Notes port encryption n 128-bit RC2 for local database encryption n Underlying changes for 1024-bit RSA keys (will allow backward compatibility) l S/MIMEv3 capabilities l PKIX support in CA l Post-6.0 n Full support for 1024-bit RSA keys n 128-bit RC2 support for bulk encryption keys and named encryption keys

New in Release 6

User Security Dialog

Change Password Dialogs

Local Database Encryption by Default

Encryption / Signing

Domino 6 Certification Authority l Better security n Administrators don't need certifier ID files & passwords n Certifiers can be password- protected on server, either individually or as a group n Tamper-resistant auditing of all activity l CA Process server task l Signs certificates when requested via admin4 l Maintains list of administrators who can approve certificate requests (RAs) l Manage both Notes and Internet (X.509) certificates l Publishes CRLs for Internet certificates and supports CDP l Better support for x.509 extensions

Internet Password Management

Execution Control List Enhancements l Central Administration l Logging of overrides l Better descriptions of what applications are doing l Intersection of rights using nested scripts

What's an Execution Control List?

Information on source of ESAs

Central Administration of User ECLs

Smart Card Support l Smart Card enabled ID file l PIN Prompt replaces password prompt l Smart Card disables itself after 3 wrong guesses l Internet (S/MIME) RSA key pushed onto card l If Card lost or destroyed, ID file must be recovered from backup

Agent Security - R5 l Agents run with the rights of their signer n Allows unprivileged agents on servers n "Out of office" agent n Special privileged signers l Can only access databases local to server where agent is running n Server can only authenticate as itself to another server

Agent Security - New l Server can sign agent "On Behalf of" user n Enable out of office agent via the web l Agent can open off-server databases n...if its server is privileged on the remote server l Unrestricted agent can choose to bypass ACLs locally

Agent Security - Futures l Agent should run with intersection of rights of its modifiers n Joe wrote the agent n Alice enabled the agent n The agent runs on server BigIron/dotcom l If all three are on the database ACL, access is allowed

Full Administrator Access l Suppose no managers listed on ACL of database l Old solution n Run Notes client locally on server platform l Current solution n Copy database as a file to machine supporting Notes client n Fix the ACL n Copy database as a file back to server l 6.0 solution: Full Administrator Access to server can bypass all ACLs

Roaming User Support l Permits use of Notes Client by downloading ID file from server l Server never learns the user's password l Eavesdropper cannot test guesses of user's password l Separate expensive interaction with server for each password guessed

Looking Forward... l Configuration options for better CA security l Smart card integration with more environments l Common PKI for Notes and Internet l Ease of administration & auditing n Common configuration for users and servers l Intersection of rights n Agents n Active Content - Change History l Managing Active Content on the Web

Submit your questions now by clicking on the “Ask A Question” button in the bottom left corner of your presentation screen. Q & A