Download presentation
Presentation is loading. Please wait.
Published byNathaniel Burke Modified over 6 years ago
1
Novell BrainShare 2002 Installing, Configuring, and Administering Novell Modular Authentication Service (NMAS™) Reed Haslam Sr. Software Engineer Novell, Inc. Hal Henderson Sr. Software Engineer Novell, Inc. TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
2
Outline What is NMAS™? Multiple factor authentication
NMAS methods and login sequences NMAS architecture Installing NMAS and login methods Configuring and using login methods What Is graded authentication? Configuring and using graded authentication NMAS troubleshooting tips
3
Secure Enterprise Access Management
What Is NMAS? Secure Enterprise Access Management “NMAS reduces this risk of information compromise within the organization by enabling strong authentication and advanced authorization”
4
Are Passwords Secure Enough?
Are you confident that the user is who he or she claims to be? Employee: Jane.Smith Password: jsmith Hacker aka: Jane.Smith Password: jsmith
5
What Does NMAS Do for Your Business?
Novell BrainShare 2002 What Does NMAS Do for Your Business? Provides many options for logging in, including things you Know: User names, passwords… Have: Tokens, certificates, smart cards, proximity cards… Are: Fingerprint, voice, or face recognition… Reduces risk of unauthorized access to or modification of data Complete, comprehensive feature set Centralized, enterprise-strength TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
6
Business Benefits Security Choice Simplicity Consistency
Completely integrated with Novell eDirectory™, offering easy setup for strong authentication and advanced authorization Choice Support of many authentication (login) methods Simplicity Single point of administration for identity management Consistency Consistent, company-wide security policy through eDirectory
7
Key Business Benefits of NMAS
Novell BrainShare 2002 Key Business Benefits of NMAS Security Choice Simplicity Consistency Convenience “Lowers the cost of ownership of advanced authentication solutions” TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
8
Vision…one Net Mission
A world where networks of all types—corporate and public, intranets, extranets, and the Internet—work together as one Net and securely connect employees, customers, suppliers, and partners across organizational boundaries Mission To solve complex business and technical challenges with Net business solutions that enable people, processes, and systems to work together and our customers to profit from the opportunities of a networked world
10
NMAS Standard Edition and NMAS Enterprise Edition
NMAS Standard Edition (SE) ships with NetWare 6 and Novell eDirectory™ NMAS Enterprise Edition (EE) can be purchased separately or as part of the Novell Secure Access Suite NMAS SE allows ONLY ONE method per login sequence NMAS SE allows ONLY selected Novell methods to be used NMAS EE allows multiple methods per sequence thus enabling multi-factor authentication NMAS EE allows all Novell and third-party methods to be used NMAS EE also enables “Graded Authentication”
11
Authentication Factors
Novell BrainShare 2002 Authentication Factors Something you are—biometrics Fingerprint Voice Facial recognition Etc. Something you hold Smart cards X.509 certificates Challenge/response tokens Proximity cards Something you know Passwords TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
12
NMAS EE Supports Multiple Factors
Novell BrainShare 2002 NMAS EE Supports Multiple Factors Password or biometric Biometric and smart card Password and biometric and smart card TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
13
NMAS Methods NMAS provides authentication through the use of one or more NMAS methods An NMAS method Is provided by Novell and many Novell partners Is a module that is separate from the NMAS framework allowing NMAS to be very flexible and modular Are digitally signed by Novell for preventing anyone from tampering with or substituting a bogus method in place of a real method Represented in the directory by a Login Method Object (LMO)
14
Suitability Of NMAS Methods
Only signed methods whose signature can be verified are loaded by NMAS server Novell does not represent the quality of any third-party NMAS login method NMAS customers must determine the suitability of a login method for their environment and systems Obtain method details/features directly from the vendor
15
NMAS Partners Novell BrainShare 2002
TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
16
Novell BrainShare 2002 Login Sequences NMAS EE allows methods to be “chained” together into login sequences Each method in a sequence is executed in the order specified Methods can be entered into “and”/“or” sequences All methods in an “and” sequences must be passed for authentication to be successful, only one method is required to be completed for success in an “or” sequence TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
17
Post Login Methods Methods added to a sequence which are executed after the authentication methods in the sequence have been successfully completed Can be used to automatically take care of any task(s) that require the user to first authenticate his identity Workstation Access—locks or forces logout of the user after a defined period of inactivity Download X.509 certificates and private keys
18
NMAS Components NOVELL User NMAS Client NMAS Server PWD PIN Method
Novell BrainShare 2002 NMAS Components NMAS Server NOVELL User (Login—NWGINA) Method management GUI (ConsoleOne® and iManager) NMAS Client PWD PIN LCM Smartcards Biometrics LSM Enhanced Password Novell Cert. Server NICI eDirectory CA service Third party services TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
19
NMAS Directory Objects
Root Security Policy Categories, Labels, Clearances O+org cn=security LMC Login Policy ou=org unit Login Sequence PLMC LMO cn=user LMO PLMO Tagged config store attribute Tagged Secret Store Attribute LSM code Attribute Other Attribute Tagged config store attribute Tagged Secret Store Attribute Novell Certificate Store Other Attribute
20
NMAS Product Installation Demonstration
Novell BrainShare 2002 NMAS Product Installation Demonstration Server TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
21
NMAS Server Installation
22
License Agreement
23
NetWare or Windows
24
Select Server Components
25
Select Server NMAS methods need only be installed once per eDirectory tree NMAS server software must be installed on all servers that authenticate users
26
Server Installation Summary Screen
27
NMAS Product Installation Demonstration
Novell BrainShare 2002 NMAS Product Installation Demonstration Client TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
28
Product Installation Initial Screen
Novell BrainShare 2002 Product Installation Initial Screen The program detects components already installed and reports on the current status on the client Client components must be installed on every client TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
29
The “Umbrella” Controls installation of the components NICI, client, and server pieces
30
Select the Methods to Install on the Client
31
Select the Post-Login Methods to Install on the Client
32
NMAS Method Installation Demonstration
Novell BrainShare 2002 NMAS Method Installation Demonstration (ConsoleOne) TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
33
ConsoleOne Administration
34
Installing a Login Method
1. Select the Login Method Container
35
Adding the Login Method Object
2. Select SAS: NMAS Login Method
36
Specify the Method Configuration File
3. Enter the name of the Method Configuration File
37
Vendor License Agreement
4. Accept the Vendor’s License Agreement
38
View Method Information
5. Specify the Method name (optional)
39
View Modules Provided for the Method
6. View method modules
40
Complete Installation
7. Auto-create a login sequence with the same name
41
View an Existing Login Method
Right click the LMO and select Properties
42
Description Tab Presents General Information; Allows Updates
43
Some Methods have Method-Specific Tabs (Enhanced Password)
44
Login Sequence Management
Novell BrainShare 2002 Login Sequence Management TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
45
Login Sequences are Stored on a Multi-Valued Attribute of the Login Policy Object
46
Enhanced Password Login Sequence
47
Engineering Login Sequence Multiple Method Sequence
49
Graded Authentication (GA) Protecting Information
Novell BrainShare 2002 Graded Authentication (GA) Protecting Information TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
50
Types of Access Controls
Novell BrainShare 2002 Types of Access Controls Two types of Access Controls Discretionary (DAC) User identity Mandatory (MAC) How the user authenticates (login factors) The user’s assignment to “closed user groups” TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
51
Access Control Paradigm Shift
Novell BrainShare 2002 Access Control Paradigm Shift Discretionary controls Manages users Trusts all logins equally User can grant access to others Difficult to determine what rights have been granted Mandatory controls Manages data Different levels of trust for each login Users cannot override the policy Simplifies the implementation of a security policy within a large enterprise TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
52
Access Control Paradigm Shift (cont.)
Novell BrainShare 2002 Access Control Paradigm Shift (cont.) Discretionary Access Controls (DAC) are neither changed nor replaced by Mandatory Access Controls (MAC) Access requirements for both Discretionary Controls and GA Controls must be met to gain access to data TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
53
Graded Authentication
Novell BrainShare 2002 Graded Authentication Based on Mandatory Access Controls Can control access to information based on “how the user authenticated” using authentication factors Prohibits sensitive information from access (secrecy) or modification (integrity) Prohibits sensitive information from being copied to less secure storage TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
54
How Graded Authentication Works
Volumes and eDirectory attributes can be “labeled” to restrict access Users are granted clearances dependant on Factors used during authentication (password, token, biometric) Membership in “closed user groups” At runtime a “logical and operation” is performed using the label (bits) and the clearance (bits) to determine access rights
55
Graded Authentication Terminology
Novell BrainShare 2002 Graded Authentication Terminology Categories Two types Integrity—who can change information Secrecy—who can see information Each category is assigned a bit Labels (A name for a set of categories) A set of zero or more categories Clearances Represents user trust Read label limits reading of data Write label limit writing of data TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
56
Graded Authentication Terminology (cont.)
Novell BrainShare 2002 Graded Authentication Terminology (cont.) Grades Qualities of a login method (password, biometric, token) All authenticated users are at a minimum given the grade of “logged-in” Closed User Groups Represent classes of data and users Implemented with categories that do not map to grades GA can be implemented with just grades (password, token, biometric) or just closed user groups or both TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
57
Who Should Get Access to What?
58
Sales Access Restricted
59
Information Flow Control
60
Labeling Resources Research data Biometric & password Payroll data
Novell BrainShare 2002 Labeling Resources Research data Biometric & password Payroll data Token Sales data Password TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
61
Biometric Access Control Example
Novell BrainShare 2002 Biometric Access Control Example Department Label Access Read Write Research Biometric and Password Payroll Token Biometric clearance Read Sales Password TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
62
Access Control Example SmartCard and Password
Novell BrainShare 2002 Access Control Example SmartCard and Password Research Biometric Token clearance Payroll Token Read Write Sales Password TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
63
Only Multi-Level Administrators can Move Data between Volumes
Must be assigned a multi-level clearance User must use login sequence that contains GA grades to access all areas Multi-level administration
64
Graded Authentication Demonstration
Novell BrainShare 2002 Graded Authentication Demonstration TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
65
Family Security Policy
Parents’ files can be modified only by parents Parents’ files can be read by children and parents Children’s files can be modified only by children Children’s files can be read by children and parents Parents’ secret files can only be read and modified by parents Those who are not family members (parents or children) have no access to the kids or parents information
66
Implementing Family Security Policy
Define categories Define labels Define clearances Assign clearances to users (family members)
67
Category Definitions Kids integrity category
Parents integrity category Parents secrecy category Biometric secrecy category (built-in) Password secrecy category (built-in)
68
Categories, Labels, and Clearances Are Attributes of the Security Policy Object
69
Define Integrity Categories
70
Define Secrecy Categories
71
Label Definitions Kids Parents Parents Private Kids integrity category
Password secrecy category (built-in) Parents Parents integrity category Parents Private Parents secrecy category Biometric secrecy category (built-in)
72
Label Definitions (cont.)
Password Password secrecy category (built-in) Family High Parents secrecy category Biometric secrecy category (built-in) Family Low Kids integrity category Parents integrity category
73
Define Parents Label
74
Define Kids Label
75
Define Family High Label
76
Clearance Definitions
Kid Read Label: Password Write Label: Kids Parent Write Label: Parent
77
Clearance Definitions (cont.)
Secret Parent Read Label: Parents Private Write Label: Parents Private Family Administrator Read Label: Family High Write Label: Family Low
78
Kid Clearance Definition
79
Family Administrator Clearance Definition
80
Access for Family Administrator Clearance
81
Access for Parent Clearance
82
Access for Kid Clearance
83
Clearance Assignments
Father Parent Secret Parent Family Administrator (Default) Mother Parent (Default) Each child Kid (Default)
84
Set Authorized and Default Clearances for Papa
85
Set Authorized and Default Clearances for a Child
86
Volume Labeling Parents Parents Kids Kids Parents Secret
Novell BrainShare 2002 Volume Labeling Parents Parents Kids Kids Parents Secret Parents Secret Read/Write Volumes Password TUT242—Installing, Configuring, and Administering Novell Modular Authentication Service
87
Label Kids’ Volumes with the “Kids” Label
88
Label the Parents’ Volumes with the “Parents” Label
89
Label Volumes for All Family Members with the Password Label
90
GAMSView Displays Your Current Clearance
In the System Tray Launch GAMSView using this Icon
91
Troubleshooting NMAS must be running on a server with a Read/Write replica of user object Tree key must be synchronized on all NMAS™ servers eDirectory must be synchronized Install login method server modules once per tree Update Login Method objects rather than delete and recreating them NMASMON * sys:\public\nmas.txt trunc
92
Troubleshooting (cont.) NMAS and BorderManager®
Problem applies to BorderManager 3.5 and later releases If a Login Policy Object does not exist in tree, create it using NWAdmin with the BorderManager snap-ins At a NetWare server console, run ADMATTRS.NLM This NLM has been shipping with NMAS since v2.0, and also ships with NetWare 6 Using NWAdmin with the BorderManager snap-ins to create login rules for the users who will use BorderManager Make sure the replicas of the partition containing the security container are in sync and reboot the server
93
Summary Provides authentication based upon other factors other than passwords Supports several third-party login devices Enables multi-factor authentication Centralized enterprise-wide access control Provides access control (grades) based on how a user logs in
94
wiN big Access and Security table one Net solutions lab visit the
in the to obtain an entry form
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.