Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.

Slides:



Advertisements
Similar presentations
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Advertisements

Kevin Donovan Program Manager, Office BI Microsoft Corporation
Dan Usher Joel Ward. Who we are… What we’ve seen… Security Concerns in today’s world Why SmartCards? Authentication & Authorization of SharePoint IIS.
SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Implementing and Administering AD FS
SharePoint 2010 Business Productivity: What's new for Developers in Microsoft SharePoint 2010 Matthew McDermott, MVP Aptillon, Able Blue
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Managing Identity and Permissions
Microsoft ® Official Course Developing Remote-hosted Apps for SharePoint Microsoft SharePoint 2013 SharePoint Practice.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Understanding Active Directory
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Internet Information Server 6.0. Overview  What’s New in IIS 6.0?  Built-in Accounts and IIS 6.0  IIS Pass-Through Authentication  Securing Web Traffic.
Delivering Excellence in Software Engineering ® EPAM Systems. All rights reserved. ASP.NET Authentication.
1 ASP.NET SECURITY Presenter: Van Nguyen. 2 Introduction Security is an integral part of any Web-based application. Understanding ASP.NET security will.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
SharePoint External Login Access – Forms Authentication vs Azure ACS.
First Look Clinic: What’s New for IT Professionals in Microsoft® SharePoint® Server 2013 Sayed Ali (MCTS, MCITP, MCT, MCSA, MCSE )
Session 11: Security with ASP.NET
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
1 Web services and security ---discuss different ways to enforce security Presenter: Han, Xue.
Module 11: Remote Access Fundamentals
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Module 9 Authenticating and Authorizing Users. Module Overview Authenticating Connections to SQL Server Authorizing Logins to Access Databases Authorization.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
Mastering Windows Network Forensics and Investigation Chapter 13: Logon and Account Logon Events.
Module 9: Fundamentals of Securing Network Communication.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
Designing Secure SharePoint External Access Ondrej Sevecek | MCM: Directory | MVP: Security |
Module 11: Securing a Microsoft ASP.NET Web Application.
Slide 1 ASP Authentication There are basically three authentication modes Windows Passport Forms There are others through WCF You choose an authentication.
Module 2: Overview of IIS 7.0 Application Server.
Module 3: Managing a Microsoft ® Windows ® Small Business Server Environment.
Module 7 Planning and Deploying Messaging Compliance.
IIS and.Net security -Vasudha Bhat. What is IIS? Why do we need IIS? Internet Information Services (IIS) is a Web server, its primary job is to accept.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Adxstudio Portals Training
Security E-Learning Chapter 08. Security Control access to your web site –3 Techinques for Identifying users Giving users access to your site Securing.
Module 3 Planning for Active Directory®
Configuring and Deploying Web Applications Lesson 7.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Designing a Secure Extranet with Sharepoint Russ Basiura Principal Consultant RJB Technical Consulting
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Kerberos Miha Pihler MVP – Enterprise Security Microsoft Certified Master | Exchange 2010.
PremierPoint Solutions Announces Significant New Features in Extranet Collaboration Manager for SharePoint 2013 R2 1888PressRelease - PremierPoint Solutions.
SharePoint Authentication and Authorization
Secure Connected Infrastructure
Stop Those Prying Eyes Getting to Your Data
Migrating SharePoint Add-ins from Azure ACS to Azure AD
Jim Fawcett CSE686 – Internet Programming Summer 2005
SharePoint Online Hybrid – Configure Outbound Search
Agenda OAuth Concepts Programming OAuth.
SharePoint Online Authentication Patterns
Presentation transcript:

Module 5 Configuring Authentication

Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated Authentication

Lesson 1: Understanding Classic SharePoint Authentication Providers Identity and Authentication in SharePoint Configure Classic-Mode Authentication Integrated Windows Authentication Configure Kerberos Authentication Additional Windows Authentication Methods Secure Store Service

Identity and Authentication in SharePoint SharePoint is a three-tier, distributed application  Front-end Web server  Application server  Back-end database server Authentication can be (and by default, is) required at each tier Authentication types, providers, and methods TypesProviderMethods ClassicWindowsAnonymous, Basic, Digest, Certificates, NTLM, Negotiate (Kerberos or NTLM) Claims-basedWindowsAnonymous, Basic, Digest, Certificates, NTLM, Negotiate (Kerberos or NTLM) FBALDAP, SQL database, Other DB, Custom SAMLADFS 2.0, Windows Live ID, Third Party

Configure Classic-Mode Authentication Create a New Web Application Edit Authentication  From the Web Applications Management page  From the Authentication Providers page

Create a New Web Application

Edit Authentication

Integrated Windows Authentication NTLM  Out of box default.  Cannot authenticate user to other tiers and services. Kerberos  More secure.  More scalable.  Supports delegation.  Improves authentication performance.  Can authenticate user to other tiers and services.  Extra steps to configure. Negotiate (Kerberos or NTLM)  Client selects authentication method.  Kerberos is used unless it is not supported. Fallback to NTFS.

Authentication Processes NTLM  Server request requires authentication Server challenges client Client responds Server passes through the response to a DC DC validates response Session established Kerberos  Authentication (one time) Client authenticates with domain controller DC issues TGT  Server request Server requests Kerberos ticket Client presents TGT to DC and gets session ticket Client gives session ticket to server Session established

Configure Kerberos Authentication Configure service principal names (SPNs)  Represent the service class, name, and port of a service or web application  A property of the computer or user account in Active Directory  Must exist so that client can obtain a Kerberos session ticketKerberos session ticket Needed for every service and Web application using Kerberos Configure by using ADSI Edit or SetSPN.exe Service or App PoolAccountSPN HTTP/intranet HTTP/sp2010-wfe1:9999 SQL ServerSVC_SQLMSSQLSvc/sqlserver01.contoso.com:1433 MSSQLSvc/sqlserver01:1433

Kerberos Session Tickets Client request to server  I need Service (in security context of app pool for intranet)  You need a session ticket for HTTP/intranet.contoso.com Client to domain controller  Here’s my TGT. I need a session ticket for HTTP/intranet.contoso.com. Domain controller  Knows client is authenticated already based on TGT  HTTP/intranet.contoso.com is a SPN of app pool user account  Create session key encrypted with app pool account password  Give session key to client Client returns to service with session key Service (app pool) decrypts the session key with its password Session established

Additional Windows Authentication Methods Anonymous access  Enables anonymous authentication but not permissions  Grant anonymous access permissions at site, list, library Basic  Plaintext password  Use SSL Digest  Configure in IIS Client certificates  Configure in IIS

Secure Store Service Replacement to Microsoft Single Sign On Simply stores username and passwords  NOT a Windows\Web Single Sign On Solution Several Service Applications support it  Business Connectivity Services  Excel Services  Performance Point Maps users to credentials for named applications Seamless integration with Security Token Service  Application ID Value in the authentication request forces lookup in Secure Store Service

Lesson 2: Understanding Federated Authentication Overview of Federated Identity Active Directory Federated Services (ADFS) Claims Authentication Process and Normalization Forms-Based Authentication Changes Claims to Windows Token Service

Overview of Federated Identity Federated Identity is the hosting of credentials somewhere else (claims providers)  LiveID  OpenID  Facebook Integration with one or many accomplished easily with Federation Gateways  ADFS  Azure ACS

Active Directory Federated Services (ADFS) ADFS is a service that allows for the creation of federated relationships between organizations for Web application authentication  Use their username and password AD; don’t create a new one!  Password resets and maintenance are responsibility of foreign system Allows you to trust other authentication mechanisms and retrieve “claims” about the users in those systems Implemented using WS-* standards You can define authorization rules based on the claims provided by external authentication systems

Claims Authentication Process and Normalization Identity validation process Federated sign-in process SharePoint identity normalization

Forms-Based Authentication Changes Forms-based authentication used to:  Create an ASP.NET Generic Identity It now creates:  Claims Identity Done through an STS provider  SecurityToken.svc Implements  SPSecurityTokenServiceHostFactory Multi-mode authentication  No longer requires you to “Extend” your Web applications. You can have multiple authentication types for a single Web application

Claims to Windows Token Service Since SharePoint is using Claims Identities, you need something to translate to Windows Identities  Claims to Windows Token Service (C2WTS)  When making a request for Windows authenticated resource, your claim is turned into a Windows Token Example  User through Web Part wants to access BCS data which connects to Windows authenticated Web service  The Claim Identity won’t work here!

Lab A: Configuring Custom Authentication Exercise 1: Creating and Configuring an ASP.NET Membership Database Exercise 2: Creating a Web Application that Uses Claims- Based Authentication Logon information Estimated time: 30 minutes

Scenario Your organizational IT policy states that only employees shall have an Active Directory account. Because of this policy, custom authentication databases must be used to authenticate outside vendors. IT has set up an ASP.NET membership database to authenticate all outside vendors. You have been tasked with setting up SharePoint to use this database for authentication.

Lab Review Why must you remove the elements from the Web.config file? If you are familiar with the configuration of forms-based authentication on Microsoft Office SharePoint Server 2007, what is different about the number and type of Web applications required to support forms-based authentication in SharePoint Server 2010 in the client extranet scenario presented in this lab?

Lab B: Configuring Secure Store Exercise 1: Creating User Accounts for Access to External Data Exercise 2: Configuring Secure Store Services Exercise 3: Configuring Secure Store Unattended Accounts Logon information Estimated time: 20 minutes

Scenario Organizational IT policy states that under no circumstances should credentials be stored in an unencrypted manner in applications. However, information workers have started using the new intranet portal site and would also like to start using SharePoint Designer 2010 to add Business Connectivity Services applications to pages. Because of the policy, they will not be allowed to embed the credentials in the ASP.NET pages. You have been tasked with configuring Secure Store to facilitate the authentication for these information workers.

Module Review and Takeaways Review Questions