Strong Authentication with Identity Lifecycle Manager John Weigelt National Technology Officer Microsoft Canada Hugh Lindley VP, Identity Assurance Avaleris.

Slides:



Advertisements
Similar presentations
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Advertisements

Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Microsoft Forefront Identity Manager 2010
Microsoft Identity Solutions
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Identity and Access Management
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Making Identity and Access Management Real – The Early Days Brian Lauge Pedersen Senior Technology Specialist.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Configuring Active Directory Certificate Services Lesson 13.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
Microsoft Identity and Access Solutions Market Trends and Futures
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Microsoft ® Official Course Module 8 Deploying and Managing Certificates.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Overview of Access and Information Protection
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Configuring Directory Certificate Services Lesson 13.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Part II - Microsoft ® Project 2000 Enterprise Deployment Templates.
Sudha Iyer Principal Product Manager Oracle Corporation.
Tech Ed North America /24/2017 1:59 AM SESSION CODE: SIA327
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Federico Guerrini IDA TSP, EMEA Incubation Team From Identity Synchronization to Identity Management.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Microsoft ® Forefront ™ Identity Manager 2010 Infrastructure Planning and Design Published: June 2010.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
TechNet Architectural Design Series Part 5: Identity and Access Management Gary Williams & Colin Brown Microsoft Consulting Services.
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
Building and extending the internal PKI
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Identity and Access Management
Basharat Institute of Higher Education
Secure Connected Infrastructure
Data and Applications Security Developments and Directions
System Center Marketing
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Presentation transcript:

Strong Authentication with Identity Lifecycle Manager John Weigelt National Technology Officer Microsoft Canada Hugh Lindley VP, Identity Assurance Avaleris Inc.

Identity at the Center

Security BusinessEnablement Operational Efficiency Compliance Ensuring that only authorized users get network access Protecting confidential information from improper distribution Freeing up IT resources to focus on high business-value work Creating new ways to connect with customers & partners Provisioning in accordance with company policies Establishing auditable processes for granting access rights Automating, reducing and simplifying manual processes Reducing the complexity of managing many identity stores IDA Challenges

Extensibility 20+ Connectors WS-* Platform Components Workflow Foundation Windows Services Active Directory Domain & Directory Services Active Directory Federation Services Rights Management Services Certificate Services Microsoft Office Windows Web Sites.Net & Visual Studio User and Developer Experiences Identity Lifecycle Manager IDA Management Microsoft’s IDA Offerings

Directory Services Strong Authentication Federated Identity/SSO Information Protection Identity Lifecycle Mgmt Microsoft Solution Focus Areas Extensibility 20+ Connectors WS-* Platform Components Workflow Foundation Windows Services Active Directory Domain & Directory Services Active Directory Federation Services Rights Management Services Certificate Services Microsoft Office Windows Web Sites.Net & Visual Studio User and Developer Experiences Identity Lifecycle Manager IDA Management Focused on 5 Solution Areas

MIIS CLM Beta Previously Today Microsoft Identity Lifecycle Manager H 2008 Metadirectory Certificate Management User Provisioning Empowers People IT Control with Less Effort Increases Operational Efficiency ILM “2” UserManagement AccessManagement CredentialManagement Common Platform ConnectorsDelegationWorkflow Web Service API Logging PolicyManagement Identity Lifecycle Manager

Microsoft ILM 2007 Brings together metadirectory, certificate & smart card lifecycle management, and user provisioning across Windows and enterprise systems into a single packaged offering. User Provisioning Automates the process of on-boarding and off-boarding users Simplifies compliance through automated IDA enforcement Enforces consistent credentials across systems Certificate and Smart Card Management Reduces cost of managing certificate-based credentials Automates workflow-driven certificate issuance and revocation Vastly simplifies deployment of smart cards Identity Synchronization Provides single view of a user across enterprise systems Automatically keeps identity information across systems consistent

Partner Title Hugh Lindley, CISSP VP, Identity Assurance Avaleris Inc. (613) ext 235

Company Profile Microsoft Identity & Access (IDA) Systems Integration Partner Global provider of Identity Assurance professional services & solutions Incorporated by founders of Alacris -- the original developer of idNexus Predecessor to Microsoft Certificate Lifecycle Manager (CLM) Acquired by Microsoft in late now integrated with Microsoft ILM 2007 Successfully deployed in over 25 global clients in North America & Europe Value Avaleris Provides Heritage of client success & proven solution approach in Identity Assurance Understanding of the management & implementation challenges Depth of technical expertise in Microsoft IDA products About Avaleris

Agenda The business case for Multi-Factor Authentication Typical ILM 2007 deployment scenarios Smart card deployment scenario walkthrough ILM 2007 demonstration Share best practices & lessons learned Identify additional resources

Business Drivers Canada GSP and MITS Federal Accountability Act PIPEDA, FIPA, MFIPPA Bill ICOFR International HSPD-12 / FIPS 201 Sarbanes-OxleyHIPAAGramm-Leach-Bliley Basel II EU - Data Protection Directive EU - Qualified Certificates & Signatures FFIEC Security and Risk Management Privacy and Information Protection Auditability and Accountability Effective deployment and lifecycle management of MFA Simplifying user authentication Increased efficiency of helpdesk staff Regulatory Compliance Increased IT Security & Operational Efficiencies

Implementation Challenges Lifecycle Management of Smart Cards and Certificates Smart card personalization and customization Dealing with lost, stolen or forgotten smart cards Deployment of smart card middleware Multi-channel authentication Alignment of management and security practices High number of distributed sites and locations Leveraging existing IT infrastructure Integration with other IDA solution components Minimizing help-desk workload

ILM 2007 Functionality Smart Card / Certificate Lifecycle Management Single administration point for digital certificates and smart cards Configurable policy-based workflows for common tasks Enroll / renew / update Recover / card replacement Revoke Retire / disable smart card Issue temporary / duplicate smart card Personalize smart card Detailed auditing and reporting Support for centralized, decentralized and self-service scenarios Tightly integrated with Active Directory

Smart Cards in the Public Sector U.S. Federal Government HSPD-12 / FIPS issued fall of 2004 Goal: Establish a common identification standard for all federal government employees and contractors Personal Identity Verification (PIV) – I (Oct 2005): Identity validation & credential issuance process Personal Identity Verification (PIV) - I I (Oct 2006): Ability to issue FIPS 201 compliant smart card Most departments / agencies have met initial FIPS 201 milestones and are working towards production implementations Growing interest in broader public & private sectors

Deployment Scenarios Smart Card Authentication Secure (S/MIME) Secure Remote Access (VPN) Wireless LAN Authentication File and Hard Drive Encryption Secure Web Applications Distributed Certificate Enrollment Document Signing

Deployment Scenarios Smart Card Authentication Secure (S/MIME) Secure Remote Access (VPN) Wireless LAN Authentication File and Hard Drive Encryption Secure Web Applications Distributed Certificate Enrollment Document Signing

Smart Card Deployment Requirement: Two-factor authentication Smart card based network login Verification of Employee ID before card issuance Address smart card management issues 100’s – 10,000’s of users

Smart Card Deployment Deployment Considerations: 1.Registration and Issuance Process 2.Choice of Smart Card Platform 3.Lifecycle Management of the Smart Cards 4.Middleware Deployment (if not Base CSP)

Microsoft Certificate Lifecycle Manager Microsoft CAs End User Physical Architecture SQL AD CLM Policy Module CLM Exit Module Internet Explorer CLM Browser Control CLM AD Integration CLM Web App Internet Information Server Component Architecture Microsoft Certificate Authority Smart Card Middleware ILM 2007 Architecture

Include policies for each task that might be performed Additional profile data included for smart card management Can include templates issued from more than one CA Profile Templates include one or more certificate managed as a single entity Policy updates managed on a per user basis by Active Directory (AD) groups Contains necessary information to enforce policy across multiple certificates, users, and groups Stored in AD and available across the forest Certificate Template(s) Management Policies Profile Templates Enrollment Work flow Self-Service Data Collection Recovery Work flow Self-Service Data Collection Etc., Work flow Self-Service Data Collection Smart Card Information (if needed)

Smart Card Deployment DuplicateEnroll Online Update Replace Policy Recover on Behalf Renew Policy Reinstate Policy Disable Policy Retire Policy Temporary Cards Unblock

Enroll Policy Some questions to answer: What level of assurance are you trying to achieve? Are you giving the end-user the ability to self-service? Are you using enrollment agents? Are you collecting comments? How many approvals do you require? Who can initiate the request? Who can approve the request? What types of data will you be collecting? Are you using one-time secrets for registration? Are you printing smart cards or documentation during enrollment?

Enroll Policy

Smart Card Deployment DuplicateEnroll Online Update Replace Policy Recover on Behalf Renew Policy Reinstate Policy Disable Policy Retire Policy Temporary Cards Unblock

Demo Title Smart Card Enrollment Policy and Smart Card Issuance

Benefits of ILM 2007 Approach Two Factor Authentication Reduced cost and complexity Flexible policy driven workflow model Integrated Identity Lifecycle Management (certs, SC, etc) Supports a range of smart card platforms Less custom development effort required Leverages existing infrastructure

Lessons Learned Business Proceed in phased approach to realize success early Align issuance process with management and security policy Use risk assessments to identify high-sensitivity systems Determine your required level of assurance Map access control workflow and optimize where possible Technical Understand the Smart Card Lifecycle Management Challenge Map out optimal deployment scenario CentralizedDecentralizedSelf-Service Select a smart card & middleware strategy Deal with temporary card issuance Leverage existing infrastructure where practical

ILM 2007 Resources Microsoft ILM 2007 Website - DatasheetsWhitepapers Flash Demo Avaleris Website - Identity Assurance Solutions ILM 2007 Service Offerings Whitepapers & technical information Avaleris ILM 2007 Lunch & Learn Series Closer look at ILM 2007 within context of your specific requirements Map out next steps towards ILM 2007 Proof of Concept Pilot Contact Avaleris representative for schedule of upcoming sessions

Avaleris Contacts Hugh Lindley, CISSP  VP, Identity Assurance   (613) ext 235 Anita Burwash  VP, Sales   (613) ext 221