Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
Module 5: Configuring Access for Remote Clients and Networks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
1 of 3 Open Outlook On the Tools menu, click Account Settings. 1 Enable Outlook Anywhere 2 Click your Microsoft Exchange account, and then click.
Introduction To Windows NT ® Server And Internet Information Server.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
11 CERTIFICATE SERVICES AND SECURE AUTHENTICATION Chapter 10.
Internet Information Server 6.0. Overview  What’s New in IIS 6.0?  Built-in Accounts and IIS 6.0  IIS Pass-Through Authentication  Securing Web Traffic.
TAM STE Series 2008 © 2008 IBM Corporation WebSEAL SSO, Session 108/2008 TAM STE Series WebSEAL SSO, Session 1 Presented by: Andrew Quap.
Smart Card Single Sign On with Access Gateway Enterprise Edition
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
Understanding Integrated Authentication in IIS Chris Adams IIS Supportability Lead Microsoft Corp.
Slide Master Layout Useful for revisions and projector test  First-level bullet  Second levels  Third level  Fourth level  Fifth level  Drop body.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Session 11: Security with ASP.NET
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
15.47 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Understanding Digest and Advanced Digest Authentication in IIS 6.0
Designing Active Directory for Security
Copyright 2000 eMation SECURITY - Controlling Data Access with
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
The In’s and Out’s of the IIS 6.0 Migration Tool The In’s and Out’s of the IIS 6.0 Migration Tool Chris Adams Web Platform Supportability Lead Microsoft.
1 Web services and security ---discuss different ways to enforce security Presenter: Han, Xue.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Project Server 2003: DC340: Security (Part 1 of 2): How to securely deploy Project Server in an enterprise environment Pradeep GanapathyRaj (PM), Karthik.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Dr. Mustafa Cem Kasapbaşı Security in ASP.NET. Determining Security Requirements Restricted File Types.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Module 11: Securing a Microsoft ASP.NET Web Application.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Web Access. Overview  Purpose  Prerequisites  Install Components  Enable Virtual Directories  IIS Configuration & Security  Troubleshooting.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Web Services Security Patterns Alex Mackman CM Group Ltd
Security E-Learning Chapter 08. Security Control access to your web site –3 Techinques for Identifying users Giving users access to your site Securing.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
KERBEROS SYSTEM Kumar Madugula.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Kerberos Miha Pihler MVP – Enterprise Security Microsoft Certified Master | Exchange 2010.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Authentication & .htaccess
Radius, LDAP, Radius used in Authenticating Users
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
Configuring Internet-related services
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation

Agenda Introduction to Authentication Diving into Authentication Types Anonymous Access Basic Authentication Windows Authentication Digest & Advanced Digest Authentication ASP.NET 2.0 Forms Authentication

Introduction to Authentication How authentication works in IIS Anonymous Basic Digest Kerberos NTLM Server Core Request enters server core Server core forwards to anonymous provider. IIS builds path (w3svc/1/root) and verifies if anonymous is enabled. Yes: Provide path and Anon.users token to authorization manager No: IIS passes the path to each provider to determine if path has that provider enabled. Each provider that is enabled returns to Server core the appropriate header.

Anonymous Authentication Anonymous Account: Role of IUSR Is automatically added during setup to the systems Guests group The IUSR account is intrinsically provided Read access to all folders as a member of the Guests group Also used by MS FTP server for anonymous authentication IIS Sub-authentication Avoids password synchronization problems

Anonymous Authentication (2) Define IIS's Sub-authenticator “Allow IIS to Control Password” = SubAuth is being Used What component is IIS SubAuth? Why does it exist? Avoids password synchronization problems Security Concerns: Must run in-process (Inetinfo) Must run as LocalSystem Default on IIS 4.0, 5.0, and 5.1 Not the default on IIS 6.0

Anonymous Authentication (3) Is IIS Sub-Authentication enabled? This checked enables IIS Sub-Authentication in IIS 4, 5, and 5.1. This does not exist in IIS 6.0 IIS Manager. Must be done manually.

Anonymous Authentication (4) Metabase Properties Two Secure Properties: Anonymoususername : (STRING) "IUSR_CA-MAIN“ anonymoususerpass : (STRING) "**********" Token obtained at startup of w3svc service for IUSR_MachineName Both properties must contain correct information on user account and password when sub-auth disabled If not correct, a results Use Event Viewer Security log to track failures Can be customize at the site or virtual directory level

Watching IIS Sub- Authentication in action Chris Adams Program Manager IIS Product Unit

Basic Authentication Limitations and Risks of Basic “Clear Text Passwords” – Base64 Encoded Advantages RFC backed (RFC 2617) Supports proxies Wide browser support Good authentication when combined with SSL Disadvantages Requires a Windows account Very insecure if not protected with Secure Socket Layer (SSL) Password sent directly on the wire (encoded) allows administrators to decrypt if desired (less secure)

Decoding Basic Authentication Chris Adams Program Manager IIS Product Unit

Introduction… “Negotiate” Kerberos NTLM “Negotiate” is a wrapper for these two protocols

Introduction to Integrated Authentication MetaBase Property: AuthNTLM Internet Explorer prefers Integrated over Basic when each is enabled on path NTAuthenticationProvider s has no UI support. Must use adsutil or Metabase Explorer.

Introduction to Integrated Authentication How the appropriate integrated authentication is determined? AuthNTLM NO Yes NTAuthenticationProviders NegotiateNTLM Access Denied

Dynamics of NTLM Connection Oriented Same Connection always used per request HTTP Keep-Alives Required Understanding Auth Dialog Boxes NTLM, by default, doesn’t prompt NTLM may prompt if original request fails with NTLM’s use of Domain\Username\Password Domain and Username are always shared over the wire between client and server Password is never – Always uses Hash of password Authentication Header includes: Domain\Username\HashedPassword

Dynamics of NTLM: Security Why is NTLM authentication secure? Hash Algorithm of password is unknown when hackers monitor the HTTP requests on the wire If connections are broke, manipulated (by proxies), then NTLM fails Versions: Lan Manager – Windows 95 NTLM v1 – NT 4.0 NTLM v2 – Windows 2000 / 2003

Work… Get /Default.HTM Get /Default.HTM w/ AuthNTLM Get /Default.HTM w/ AuthNTLM Hashed 401 – WWW Auth: NTLM OK 401 – Access Denied Client IIS Server

Dynamics of NTLM NTLM at work… (previous slide) 1.IE Client requests a IIS resource (Anon) 2.IIS returns 401 with WWWAuthenticate Header saying NTLM 3.IE submits new request for a IIS resource with NTLM Authentication header (username) 4.IIS uses NT Authentication Header to build secret key and sends 401 with key back to client 5.IE submits new request for a IIS resource with NTLM Authentication header (username\password\hash of password) 6.IIS checks username\password\hash and matches, return 200 OK –or Login failed (IE prompts)

Dynamics of Kerberos Why create another authentication protocol? NTLM limitations NTLM Tokens cannot be delegated NTLM is proprietary and only supported by Windows platform NTLM has limited support out of the box... (other browsers) Is Negotiate a new protocol? No, it is just a wrapper that allows either Kerberos or NTLM authentication based on client request

Dynamics of Kerberos Key Terms of Negotiate Client: Internet Explorer Server: IIS Server that is member of Active Directory Domain Active Directory: Key Distribution Center (KDC) for all clients Ticket Granting Service: Issues all tickets (aka tokens)

Dynamics of Negotiate The IIS server is started and when the server authenticates to domain (aka KDC) it receives it ticket. Ticket Granting Services Domain Controller (KDC) Client IIS Server

Work… I need a ticket for The following service (aka HTTP\HOST) If Service located in KDC, Secret Key shared with Client Initial Client request for IIS resource anonymously The Server esponse is 401 – WWWAuth Header for Negotiate Using key provided, Client creates hash (key) and sends IIS IIS uses secret key and verifies that password matches Shared Client Domain Controller (KDC) IIS Server

Modifying Integrated & Locking down NTLM Chris Adams Program Manager IIS

Digest Authentication What is digest authentication? Limitation and Risks of Digest Requirement of Digest IIS Sub-Auth (iissuba - LocalSystem) Active Directory Password stored in AD with Reversible Encryption Platforms available Windows 2000 Windows 2003

Advanced Digest What is advanced digest authentication? Requirements of Adv. Digest 2003 Active Directory Forest required Hash Pre-Compiled at User Creation Strictly RFC Compliant Platforms available Determining which digest is being used? More details on Digest and Adv. Digest Authentication: ort/webcasts.mspx ort/webcasts.mspx

ASP.NET Forms Authentication Developer Driven Authentication. Does not use windows authentication. Advantage: You can easily support your existing user base. i.e. Novell, AS400

ASP.NET uses IIS’s authentication token when the authentication is set to “Windows” ASP.NET Forms Authentication Setup: ASP.NET implements forms authentication when selected and uses the provider specified

Session Summary There are a lot of variables that go into authentication in IIS Understanding how IIS Sub-Authentication works is key to two authentication types: Anonymous and Digest Basic authentication is commonly supported by browsers, but is insecure without encryption technology Integrated authentication is complex and difficult to troubleshoot without knowing key metabase properties such as NTAuthenticationProviders

© 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.