Lawrence Livermore National Laboratory A system for strong local account management. SLAM David Frye Lawrence Livermore National Laboratory, P. O. Box.

Slides:



Advertisements
Similar presentations
Managing User, Computer and Group Accounts
Advertisements

© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
1 Preparing Windows 2000 installation (Week 3, Wednesday 2/25/2006) © Abdou Illia, Spring 2006.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Virtual Directories: Attack Models and Prevention June 2 nd, 2009 Bill Claycomb Systems Analyst Sandia National Laboratories Sandia is a multiprogram laboratory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Administration Chapter 7 Administering Web Resources in Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Chapter 7 Managing OUs and Active Directory Accounts
Microsoft ® Official Course Module 8 Deploying and Managing Certificates.
Introduction to Active Directory December 10th, pm Daniels 407.
Your storage on the ground; Your files in the cloud.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Hands-On Microsoft Windows Server 2008
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
70-411: Administering Windows Server 2012
Troubleshooting Windows Vista Security Chapter 4.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Security Planning and Administrative Delegation Lesson 6.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Maintaining Active Directory Domain Services
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Lawrence Livermore National Laboratory Centralized Desktop Management at LLNL A Major Paradigm Shift CDM David Frye This work performed under the auspices.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
By Rashid Khan Lesson 6-Building a Directory Service.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Basharat Institute of Higher Education
Secure Connected Infrastructure
MED-V - Managing virtual PCs for IT Pros
Nassau Community College
Assignment # 8.
Jim Fawcett CSE686 – Internet Programming Summer 2005
Administering Your Network
Security Planning and Administrative Delegation
Presentation transcript:

Lawrence Livermore National Laboratory A system for strong local account management. SLAM David Frye Lawrence Livermore National Laboratory, P. O. Box 808, Livermore, CA This work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.

The Subject: Local Accounts  All computers have a local account database  Allows people or code to authenticate locally  Enable access to resources locally  At least 1 administrator (full permissions)  Maintained independently No linkage to Active Directory No centralized management UCRL: LLNL-PRES

The Problem: Common Passwords  Admin Password typically set build time  Typically the same on all machines (imaging)  Password is seldom if ever changed  Often neglected when joined to Domain UCRL: LLNL-PRES

The Problem: Illustrated Typical AD Environment Machines built from images Local Administrator enabled Password is common UCRL: LLNL-PRES

The Problem: Illustrated Machine hack = site hack AD is immune AD can’t help Hacker UCRL: LLNL-PRES

Disable Local Accounts?  Offline without cached credentials  Temporary administration Scientists on travel w/ need to install sw.  Dropped from domain OS Virtualization  Re-enable via Recovery Console requires physical access. UCRL: LLNL-PRES

The Options:  Disable all local accounts Best option Not feasible in most environments  Deny “Access This Computer From The Network” Force physical login Kills remote management capability  Enabled accounts with common static passwords Most typical Most dangerous  Other options Commercial solutions (expensive) UCRL: LLNL-PRES

Strong Local Admin Manager (SLAM) Dynamic/Unique Passwords Centralized Recovery No Centralized Password Storage No Specialized Authorization No Dedicated Infrastructure* UCRL: LLNL-PRES

Dynamic/Unique Passwords Unique Computer AD Attribute Master Key Strong Unique Value How it works: Computer Last Password Change Date + GUID SHA-256 HMAC Crypto-Random 256 bits RSA 1024 bit encrypted Local Administrator Password UCRL: LLNL-PRES

Centralized Recovery How it works: OU Administrator uses AD Users & Computers (ADUC) Custom Context Menu Option for SLAM Recovery ADUC connects to Web Service & returns password UCRL: LLNL-PRES

No Centralized Password Storage How it works: Passwords are NOT random Passwords are calculated Only the master hashing key & computer password change dates are stored No Specialized Authorization How it works: SLAM Recovery leverages existing authorization in AD Permissions Required: Full Control of computer object UCRL: LLNL-PRES

SLAM Infrastructure SLAM ClientAD OU Administrator Small.NET app Daily process Requests new Local Admin Pwd Creates local account if needed Computer Password Change Date Master Key ADUC Checks for recently expired Computer pwd Checks for recently recovered Admin pwd Validates Authorization Calculates and returns password SSL Web Service SSL Copy to clipboard Historical passwords Print UCRL: LLNL-PRES

SLAM LLNL  Developed in April 2008 by David Frye and Joe Taitt  Started deployment in June 2008  Became mandated in 2009 for all unclassified Windows computers (except DCs)  ~9,000 Total SLAM Clients  ~200 Password Recoveries per Month UCRL: LLNL-PRES

SLAM Next Steps  SLAM Client for MAC (Daniel Hoit) Client is developed & currently in test  Remove/Disable non-SLAM local accounts Necessary next step to gain full benefit Need exception policies and procedures Need to be careful UCRL: LLNL-PRES

Questions on SLAM? UCRL: LLNL-PRES