Kelly Whitacre, Kunal Bele, and Mike Gerschefske.

Slides:



Advertisements
Similar presentations
AUTHENTICATION AND KEY DISTRIBUTION
Advertisements

Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Access Control Chapter 3 Part 3 Pages 209 to 227.
The Basic Authentication Scheme of HTTP. Access Restriction Sometimes, we want to restrict access to certain Web pages to certain users A user is identified.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Make Secure Information Sharing (SIS) Easy and an Reality C. Edward Chow, PI Osama Khaleel Bill Kretschmer C. Edward Chow, PI Osama Khaleel Bill Kretschmer.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
ACCESS CONTROL MANAGEMENT Project Progress (as of March 3) By: Poonam Gupta Sowmya Sugumaran.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
4/26/2007okhaleel/Enforce1 EN gine FOR C ontrolling E mergent H ierarchical R ole- B ased A ccess (ENforCE HRBAccess) Osama Khaleel Thesis Defense May.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
Introduction To Windows NT ® Server And Internet Information Server.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Microsoft Networking.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Session 11: Security with ASP.NET
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Remotely authenticating against the Service Framework.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
18-jan-962. ETH-W4 (ra)1 security on the Web l security l authentication l privacy.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
Module 2: Overview of IIS 7.0 Application Server.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
Web Services Security Patterns Alex Mackman CM Group Ltd
Understanding Security
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
University of Murcia Gabriel López.  Network authentication in eduroam and SSO token distribution ◦ RADIUS hierarchy ◦ Token based on SAML  Network.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
1 Example security systems n Kerberos n Secure shell.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
ArcGIS for Server Security: Advanced
Enabling Secure Internet Access with TMG
Jim Fawcett CSE686 – Internet Programming Summer 2005
Implementing TMG Server Publishing
Packet Sniffing.
Secure Electronic Transactions (SET)
Web Server Design Week 11 Old Dominion University
InfiNET Solutions 5/21/
Presentation transcript:

Kelly Whitacre, Kunal Bele, and Mike Gerschefske

Secure Role Based IM  Create an IM to cut down on excess chatting  Restrict users to chat only with people with similar roles within department  Provide Mechanism to allow users to request chat outside specific role  Leverage ENforCE 2

Policy Enforcement Point Global.asax ASP.NET Application FC4 machine (Firewall) Iptables Control Service B8) Network- resource Access IIS Authentication ISAPI Protected web resources A2) Http request A5) XML response Session policy source A3/ B3) Get User's AC RPS PPS Domain Controller Active Directory B2) Http request A1/B1) User Request Protected Network resources B7) XML response Policy Decision Point Policy Decision Point B6) Open or Close service commands A4/B4) Get Decision The ENforCE System 3

Role Based Hierarchy 4

What ENforCE Provides  Ability to determine if a user has access to a resource  i.e. user changed jobs, or was fired  Users’ management chains  Yet, Our Policy Enforcement is in our Server rather then Enforce 5

Server Algorithm  Check if user 1 can communicate with user 2 via XACML request to ENforCE  If not, ENforCE determines highest manager of user 1 required to get authorization to user 2  Send request to that manager and wait for acceptance  If authorized allow user 1 to send data to user 2 for some period of time  Obtain Public Key of Receiver by AD of ENforCE for Client of Sender  Note:  One way communication  Message sent to manager requiring token to be sent back to acknowledge acceptance 6

(Two) One Way Communication Request(s) 7

Conceptual Design ENforCE Server BobAlice Bob’s Boss Alice’s Boss AD XACML 8 IIS

Clients  Very Simple  Send messages containing  Message  To  Buddy List/Active Directory Browsing could be added  Clients encrypt via destinations public key  Could look into asymmetric crypto 9

Progress  Extracted IIS and DC of ENforCE  Recreated FW  Problems with Windows Activation  Problems with VMware Converter removing hardware  Problems with physical Unix machine 10

Questions?? 11