FROM MIT KERBEROS TO MICROSOFT ACTIVE DIRECTORY The Pennsylvania State University’s move from a lower case MIT Kerberos realm to a Standard Microsoft Active.

Slides:



Advertisements
Similar presentations
ADManager Plus Simplify Your Active Directory Management.
Advertisements

Auditing Microsoft Active Directory
COMP091 OS1 Active Directory. Some History Early 1990s Windows for Workgroups introduced peer-to-peer networking based on SMB over netbios (tcp/ip still.
Agenda AD to Windows Azure AD Sync Options Federation Architecture
AD Child Domains By: Joan Carter 05/29/2003. Who can bring up a child domain in AD.ASU.EDU?  Campus/college/VP level units  Considerations: Is there.
The System Center Family Microsoft. Mobile Device Manager 2008.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Auditing Active Directory Presented to the National State Auditors Association 2014 Information Technology Conference.
WIN.MIT.EDU  Where are we today  Related services  Current enhancements  Some future enhancements  SharePoint  Panel Discussion.
Active Directory Production Pilot Project Department of Administration Enterprise Technology Services (ETS) ETS is a customer based team that provides.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
UW Windows Infrastructure: Delegated OUs Brian Arkills Software Engineer, LDAP geek, AD bum, and Associate Troublemaking Officer Identity and Access Management,
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 1: Introduction to Active Directory.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Chapter 1 Introduction to Windows Server Two main goals for Net Admin Make network resources available to users Files, folders, printers, etc.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Module 8: Implementing Administrative Templates and Audit Policy.
Active Directory at the University of Michigan Data Population and Kerberos Interoperability MaryBeth Stuenkel LAN/NOS/Groupware Services.
Active Directory Lecture 3 – Domain Services Primer.
Brian Arkills Software Engineer, LDAP geek, AD bum, Senior Heckler, and Associate Troublemaking Officer State of Windows Services at the UW.
Nassau Community College
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Introduction to Active Directory December 10th, pm Daniels 407.
Case for Multi-Domain/Forest Model
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Module 1: Introduction to Administering Accounts and Resources
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Managing Active Directory Domain Services Objects
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Module 6: Designing Active Directory Security in Windows Server 2008.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Designing Active Directory for Security
Module 2 Designing Microsoft® Exchange Server 2010 Integration with the Current Infrastructure.
Securing AD DS Module A 3: Securing AD DS
Module 7: Fundamentals of Administering Windows Server 2008.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 5: Active Directory Logical Design.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Windows 2000 University of Colorado. Background Limited enterprise services: MIT K5 in labs, modems and some desktops, starting directories now, no identifier.
Microsoft ® Official Course Module 3 Managing Active Directory Domain Services Objects.
11.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 11: Planning.
Active Directory Maryam Izadi. Topics Covered NT Vs 2000/2003 Active Directory LDAP MMC.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Introduction to Microsoft Windows 2000 Integrated support for client/server and peer-to-peer networks Increased reliability, availability, and scalability.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Introduction to Microsoft Windows 2000 Welcome to Chapter 1 Windows 2000 Server.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Active Directory Infrastructure Microsoft Windows 2003 Active Directory Infrastructure MCSE Exam
Module 1: Introduction to Administering Accounts and Resources.
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 8: Planning for Windows Server 2008 Active Directory Services.
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
CEG 2400 Fall 2012 Directory Services Active Directory Tree Domain.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
New Developments in Central Directory Service and Account Provisioning Dan Menicucci Enterprise Architect - University of Pittsburgh.
Module 1: Introduction to Administering Accounts and Resources
SharePoint Online Management and Control
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Presentation transcript:

FROM MIT KERBEROS TO MICROSOFT ACTIVE DIRECTORY The Pennsylvania State University’s move from a lower case MIT Kerberos realm to a Standard Microsoft Active Directory Deployment

OVERVIEW  Current state  MIT Kerberos “lower case realm name” passwords  Open LDAP  Central Domains:  ACCESS domain “Windows 2008 R2” external one-way trust  WIN domain “Windows 2008 R2” external one-way trust – Labs Only  60+ Other Windows domains  Current design does not support  Exchange  Majority of 3 rd party Apps and Hardware authentication and authorization  Local control of account live cycle

CAMPUS LOCATION MAP

BUSINESS REQUIREMENTS  Replace MIT Kerberos as authentication store  Central account and group provisioning  Foundation for other services (eg: Exchange, Skype, Office 365)  Improved PSU security posture  Restricted administrative accounts  Support of non MS clients and vended products  POSIXs Attributes  Custom Attributes

FUNDING FOR CHANGE  The current state could not support newer services  Security concerns of all Active Directory's - Security Need  No central ability to monitor all Account provisioning stores  Central Security office had no ability to monitor all Account stores  Bleed over from silos did not buy us security  Need ability to be more agile  Premier Microsoft Contract

CHALLENGES  Effort and resources  Up front costs  Team – 9 months to fully staff  Initial design started in March  Obstacles  No migration funding currently for units  No funding for auditing and logging  Other enhancements  Medical School <- Potential future challenge  Currently separate  Could potentially integrate at undetermined future date

TECHNICAL DESIGN  Support 180,000 accounts and 2 million groups “CPR, OpenLdap, Grouper”  Single Forest, Single Domain Design  2012 R2 Core  2012 R2 Forest Functional Level  External DNS  6 Prod Domain Controllers - 64 Gig of RAM, 4 CPUs  4 hosted in VMWare central service  2 on dedicated hardware  DNS  Bluecat Address Manager, formerly known as Proteus  Bluecat DNS/DHCP Server, formerly known as Adonis

NAMESPACE AND OU DESIGN  Lessons learned from other domains  Structure informed by location & Org Chart  Minimal depth  Facilitate delegated administration  Reduced logon time  Standard naming conventions  Newcomer friendly  Command-line friendly

OU DESIGN

SECURITY DESIGN  Administrative Accounts  Enterprise Admin, Domain Admin, Workstation Admin, Server Admin, OU Admin  Can only create OU Containers and Computer Objects  Self Service Portal  Create GPOs  Create Service Accounts  Create Keytabs  Central Authoritative source for accounts and groups  Central Identity Service for Account information  LDAP for additional attributes  Grouper and LDAP for group based administration

SECURITY PRACTICES  Protected privileged accounts  LAPS “Local Administrative Password Solution”  Secure Remote Desktop Service  GPOs to control runas service, logon as network, logon on locally, remote desktop logon  Protected Users group for Admin accounts  Red Forest?  Currently under investigation

RDS DESIGN PICTURE

WHAT DO YOU WANT TO KNOW?  Questions?

LINKS    Ignite Video on PtH  f_Pass-the-Hash.pdf f_Pass-the-Hash.pdf

BACKUPS     +Phases +Phases  +Phases+-+Deliverables

CURRENT AUTHENTICATION DESIGN