Download presentation
Presentation is loading. Please wait.
Published byBenedict Malone Modified over 6 years ago
1
What is new in security in Windows 2012 or Dynamic Access Control
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEHv7 | |
2
Revolution? Evolution
3
Evolution Access Control Lists (ACEs)
and NTFS File Server Resource Manager (FSRM) and simple file classification Active Directory (AD) integrated classification and automatic file classification with FSRM Kerberos Claims and user attributes Kerberos CompoundId and computer attributes
4
Evolution Feature Server Client Schema 2012 / DFL / FFL And logic ACL
Windows 2012 - FSRM automatic classification AD integrated classification terms schema 2012 FFL 2003 User claims one Windows 2012 DC Computer claims Windows 8 local Windows 2012 DC
5
Claims, Terms and Classifications
They are just the same thing
6
What is New in Security in Windows 2012
Access Control Lists What is New in Security in Windows 2012
7
Until Windows 2012 Sorted in order Has OR logic
DENY is not always stronger Has OR logic
8
Flow of Access Control Sharing Permissions Authentication
Kerberos NTLM Allow Logon Locally Access this Computer from Network Sharing Permissions UAC Restricted Access Token Authentication TCP 445 Windows Firewall Kerberos NTLM NTFS Permissions Allowed to Authenticate? Access Token Folder Quotas Path Volume Quotas Owner Disk
9
New in Windows 2012 AND logic possible Extendable with claims
FSRM file claims user claims device (computer) claims
10
Flow of Access Control Sharing Permissions Authentication
Kerberos NTLM Allow Logon Locally Access this Computer from Network Sharing Permissions UAC Restricted Access Token Authentication TCP 445 Windows Firewall Kerberos NTLM NTFS Permissions Claim ACEs Allowed to Authenticate? Access Token Folder Quotas Path Volume Quotas Owner Disk
11
What is New in Security in Windows 2012
File Classification What is New in Security in Windows 2012
12
File Server Resource Manager (FSRM)
Manual File Classification Automatic File Classification words file name wildcard regular expressions .PS1 code Locally vs. AD defined terms Adds file metadata alternative NTFS streams
13
File claims and ACL File claims can be used in the new ACL
14
AD defined file claims Requires Windows 2012 schema extension
Requires Windows 2003 forest functional level do not require any Windows 2012 DC some editor like ADSI Edit or Windows 2012 ADAC Must be uploaded to FSRM servers manually
15
What is New in Security in Windows 2012
Kerberos Claims What is New in Security in Windows 2012
16
Kerberos ticket until Windows 2012 KDC
User identity login SID Additional SIDs groups SID history
17
Good old Kerberos Client XP Server TGT DC 2003
18
Good old Kerberos Client XP Server TGS SIDs TGT TGS SIDs DC 2003
19
What is new in Kerberos tickets with Windows 2012 KDC
User identity login SID Additional SIDs groups SID history User claims AD attributes in Kerberos TGT tickets
20
Requirements At least single Windows 2012 DC (KDC)
Tickets are extendable If client does not understand the extension, it simple ignores its contents If server requires user claims and they are not present in the TGS ticket, it can just ask a Windows 2012 DC directly (secure channel)
21
Good old Kerberos supports claims as well
Client XP Server 2012 TGS SIDs TGT Claims TGS SIDs DC 2012 DC 2003
22
Brand new Kerberos with Windows 2012 KDC
Client XP Server 2012 TGT User Claims DC 2012
23
Brand new Kerberos with Windows 2012 KDC
Client XP Server 2012 TGS SIDs User Claims TGT User Claims TGS SIDs User Claims DC 2012
24
What is new in Kerberos with DFL 2012
User identity login SID Additional SIDs groups SID history User claims AD attributes in Kerberos TGT tickets Device claims AD attributes of computers Compound ID in Kerberos TGT tickets
25
Kerberos Compound ID with device claims
Client 8 Server 2012 TGT Request Computer TGT TGT User Claims Device Claims DC 2012
26
Brand new Kerberos with Windows 2012 KDC
Client XP Server 2012 TGS SIDs User Claims TGT User Claims Device Claims TGS SIDs User Claims DC 2012 Device Claims
27
Requirements At least local Windows 2012 DC (KDC)
better to have 2012 DFL for consistent behavior Clients Windows 8 or Windows 2012 must ask for TGTs with Compound ID extension Server cannot just obtain device claims because it does not know from what device the user came
28
What is New in Security in Windows 2012
Take away What is New in Security in Windows 2012
29
Evolution Feature Server Client Schema 2012 / DFL / FFL And logic ACL
Windows 2012 - FSRM automatic classification AD integrated classification terms schema 2012 FFL 2003 User claims one Windows 2012 DC Computer claims Windows 8 local Windows 2012 DC
30
What is New in Security in Windows 2012
Thank you! What is New in Security in Windows 2012
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.