Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Privileged Account Management Jason Fehrenbach, Product Manager.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
WIN.MIT.EDU  Where are we today  Related services  Current enhancements  Some future enhancements  SharePoint  Panel Discussion.
Active Directory: Final Solution to Enterprise System Integration
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Chapter 5 Managing a Server. Overview  Server management  Examine networking models  Learn how users are authenticated  Manage users and groups 
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Objectives  Understand the purpose of the superuser account  Outline the key features of the Linux desktops  Navigate through the menus  Getting help.
Chapter 7 WORKING WITH GROUPS.
Active Directory Lecture 3 – Domain Services Primer.
Brian Arkills Software Engineer, LDAP geek, AD bum, Senior Heckler, and Associate Troublemaking Officer State of Windows Services at the UW.
Scenario covered in this presentation Separate credential from on- premises credential Authentication occurs via cloud directory service Does not.
Chapter 12: Additional Active Directory Server Roles
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Module 1: Introduction to Administering Accounts and Resources
Web Server Administration Chapter 5 Managing a Server.
Working with Workgroups and Domains
Overview of Access and Information Protection
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
The University of Akron Summit College Business Technology Dept.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Designing Active Directory for Security
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
Module 7: Fundamentals of Administering Windows Server 2008.
Security Planning and Administrative Delegation Lesson 6.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Craig A. Brown Practice Leader – Microsoft Global Knowledge MCT, Since 1996 MCSA/MCSE NT/2000/2003 MCDST MCITP: ES / CS.
1 Windows 2008 Configuring Server Roles and Services.
Scaling NT To The Campus Integrating NT into the MIT Computing Environment Danilo Almeida, MIT.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
FROM MIT KERBEROS TO MICROSOFT ACTIVE DIRECTORY The Pennsylvania State University’s move from a lower case MIT Kerberos realm to a Standard Microsoft Active.
Windows SharePoint Services. Overview Windows SharePoint Services (WSS) Information Worker Infrastructure component delivered in Windows Server 2003 Enables.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Module 1: Introduction to Windows 2000 and Networking.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Al Lilianstrom and Dr. Olga Terlyga NLIT 2016 May 4 th, 2016 Under the Hood of Fermilab’s Identity Management Service.
Secure Connected Infrastructure
WIN.MIT.EDU Update Where are we today Related services
ACTIVE DIRECTORY ADMINISTRATION
Active Directory Administration
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Introduction to System Administration
Introduction to System Administration
Unit 27: Network Operating Systems
Goals Introduce the Windows Server 2003 family of operating systems
Getting Started.
Getting Started.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations, and using them as designed in our diverse environment. Authentication at Fermilab

Centralized Authentication Environment Authentication at Fermilab 2

Three Authentication Services? The Kerberos realm was our initial centralized authentication service Active Directory was implemented to collapse several NT domains 2009 – LDAP was implemented to centralize authentication for the growing number of web apps that could use LDAP for authentication Together these services provide a secure, centralized solution that serves the needs of the varied communities and applications at Fermilab. Authentication at Fermilab 3

The Authentication Environment Designing, operating and maintaining authentication mechanisms to meet diverse needs of the user community at a national laboratory is challenging We have to balance the needs for scientific computing with the needs for traditional computing The solutions must be scalable and secure We have to keep in mind that our real business is science Authentication at Fermilab 4

Kerberos Authentication at Fermilab 5

Kerberos The Kerberos realm is used for scientific computing Workstations Servers Farm nodes GRID nodes A Kerberos realm allows for centralized management of users on *nix based platforms. Linux Solaris HP/UX OS X Authentication at Fermilab 6

Kerberos Principals Authentication at Fermilab 7 Total Compound host/18295/cd/678 ftp/18203enstore/cd/635 /cdf/14452/d0/464 /cdf/*caf12757/bd/285 /cron/3344/ft/farm84 /cms/farm1477 Active Users3658 Computers18274 Fermilab’s Kerberos infrastructure is based on the MIT distribution and issues 10 million tickets per week

Kerberos Security Considerations Minimal number of Kerberos Administrator accounts Administrator access is restricted to tightly controlled servers Delegated administration tasks are restricted to special accounts Authentication at Fermilab 8

Kerberos Auditing One reporting tool in use syslogNG Two instances Kerberos Administrators Computer Security Team Special notifications for user account creation, account enable, and deletion Authentication at Fermilab 9

Active Directory (AD) Authentication at Fermilab 10

Active Directory AD is used for traditional computing HR, ES&H, FESS Logon services for Windows workstations File and print services Windows integrated applications Growing number of OS X systems participating in the domain Authentication at Fermilab 11

Active Directory Risk Assessment Fermilab hosted Microsoft Professional Services for an Active Directory Risk Assessment in 2011 Overall results were very good Engineer noted the low number of DA accounts was well below the normal encountered Complimented the configuration for delegated AD object management. Authentication at Fermilab 12

Active Directory WorkstationsServers XP1047WS Vista14WS Windows 71852WS OS/X167 Authentication at Fermilab 13 TotalEnabledActive Users

Active Directory Security Considerations Minimal number of Domain Administrator (DA) accounts DA access is restricted to tightly controlled servers Delegated AD administration is restricted to special accounts Server administration is restricted to special accounts Minimizing local administrator access on workstations Authentication at Fermilab 14

Active Directory Security Considerations Centralized Anti-Virus Management Symantec Sophos Centralized Patch Management Windows Software Update Services (WSUS) System Center Configuration Manager (SCCM) Apple Software Update Server (ASUS) Centralized Configuration Management System Center Configuration Manager Casper Authentication at Fermilab 15

Active Directory Auditing Two reporting tools in place Quest Change Auditor Domain Administrators syslogNG Computer Security Team Special notifications for user account creation, user account enable, and user account deletion Authentication at Fermilab 16

LDAP Authentication at Fermilab 17

LDAP LDAP over SSL authentication Supports applications hosted at Fermilab SharePoint Exchange and Calendar VPN And those hosted in the cloud Service-Now Kronos Time and Leave Authentication at Fermilab 18

LDAP Based on Active Directory User Accounts 5400 Active Users Authentication at Fermilab 19

LDAP Security Considerations Authentication at Fermilab 20

LDAP Security Considerations The LDAP service is NOT part of the forest used for AD There is NO trust relationship with the forest used for AD Part of the design Separate passwords to contain issues resulting from compromise of user passwords Authentication at Fermilab 21

LDAP Security Considerations Active Directory supports LDAP so why create a unique LDAP service based on a different Active Directory forest? Unique security rules for interactive Kerberos environments AD uses Kerberos for authentication so we treat it as a Kerberos infrastructure passwords tend to be used on public (i.e. Starbucks, hotels, etc) WiFi networks and are susceptible to being compromised Authentication at Fermilab 22

LDAP Security Considerations By separating the LDAP service from the AD service ( from interactive) we feel we are lowering the risk of interactive passwords being compromised If a LDAP password is compromised and SharePoint access can be impacted. Access to Kerberos based scientific applications, data, PII and business applications located in Active Directory are not impacted. Authentication at Fermilab 23

Kerberos Certificate Authority (KCA) Authentication at Fermilab 24

Kerberos Certificate Authority Open source application running on Windows Server Issues 80,000 certificates per week Provides short lifetime x.509 certificates for accessing web services Maximum lifetime of 7 days Certificates are issued after authentication from Active Directory or Kerberos Authentication at Fermilab 25

KCA Certificate Usage Web page authorization Leave Usage Document Database Training Requirements GRID resources Access to GRID Virtual systems GRID job submission ** Not used for signing ** Authentication at Fermilab 26

KCA Tools - Windows Open source Net ID Manager client used on Windows systems to automatically acquire x.509 certificate at logon Authentication at Fermilab 27

KCA Tools - Windows Authentication at Fermilab 28 Certificate in Net ID Manager Certificate in Internet Explorer

KCA Tools – OS X and *nix Scripts and utilities are provided to OS X and *nix users to acquire x.509 certificates as needed Certificates are inserted in to the default browsers on each OS via the script Authentication at Fermilab 29

KCA Tools – OS X and *nix Authentication at Fermilab 30

KCA Tools – OS X and *nix Authentication at Fermilab 31

KCA Tools – OS X and *nix Authentication at Fermilab 32

User Accounts All regular user accounts are created in all three authentication realms by our ID Management System Active Directory Kerberos LDAP Special accounts (-admin, /admin, etc) created as necessary where needed Used for delegated access to systems and services Authentication at Fermilab 33

User Accounts Account Lifecycle Creation / Termination by IdM Computer Security has ability to disable user accounts What do we consider a user? Employees Contractors Visitors Authentication at Fermilab 34

The Authentication Environment Authentication at Fermilab 35

Windows Logon Windows users authenticate against AD Net ID Manager accesses KCA server on behalf of the user and gets a KCA certificate and installs it in the browser Net ID Manager can manage multiple identities for the end user Authentication at Fermilab 36 Access to domain resources occurs as expected File and print servers

Windows Logon Exchange Separate authentication against the LDAP service SharePoint Separate authentication against the LDAP service Access to Unix servers via SSH Client can use Windows credentials kinit against Kerberos realm and use those credentials Authentication at Fermilab 37

Windows Admin Access Delegated Admin Log into workstation or admin terminal server with – admin credentials Utilize the runas command runas /user:domain\user-admin command Domain Administrator Log into dedicated admin terminal server Elevate privilege to DA with runas Authentication at Fermilab 38

OS X and *nix Logon User Authentication Local Active Directory Get-Cert script prompts for credentials and accesses KCA server on behalf of user, gets a certificate and installs it into the browser Authentication at Fermilab 39 SSH Client uses credentials for Windows or Kerberos realm if present. Otherwise prompts for credentials.

OS X and *nix Logon Access to AD domain resources will prompt for credentials if necessary Exchange Separate authentication against the LDAP service SharePoint Separate authentication against the LDAP service Authentication at Fermilab 40

OS X and *nix Admin Access Elevated local access OS X – su and sudo *nix – kinit and ksu Authentication at Fermilab 41

OS X and *nix Admin Access Authentication at Fermilab 42

OS X and *nix Admin Access Authentication at Fermilab 43 Delegated Admin kinit and ksu

Future Plans Federation Internal Web Single Sign On (SSO) Provide tokens via web form or Windows logon for web apps that support claims authentication Shibboleth IdP Collaboration with other InCommon members IdM Existing IdM is home grown solution Support, feature enhancement, etc Looking at commercial solutions that allow a phased rollout Authentication at Fermilab 44

Future Plans Investigate moving *nix systems into Active Directory Replacement of the MIT Kerberos server infrastructure with Heimdal Two factor authentication Authentication at Fermilab 45

Conclusion Looking back at our goals: We have to balance the needs for scientific computing with the needs for traditional computing The solutions must be scalable and secure We have to keep in mind that our real business is science The authentication services presented provide a secure, centralized solution that serves the needs of the Fermilab community. Authentication at Fermilab 46

Questions? Authentication at Fermilab 47