Microsoft’s Implementation of Smart Cards for Remote Access Published January 2002.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Ray Ozzie Chief Software Architect. Applications and Solutions Cloud Infrastructure Services Live Platform Services Global Foundation Services Services.
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Using SharePoint Server 2007 for Site and Enterprise Search at Monsanto Company Vincent L. Arter, Jr. Project Lead Portals and Collaboration Monsanto.
Connect with life Gopikrishna Kannan Program Manager | Microsoft Corporation
Understanding Active Directory
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
ESupport Shifting Customers to the Internet for Support Published: January 2002.
Executive Overview. PLEASE READ (hidden slide) To deliver this presentation effectively, you need to be familiar with Windows Server 2008 R2 management.
Managing LOB Applications by Using System Center Operations Manager Published: March 2007.
©2006 Microsoft Corporation. All rights reserved. WINDOWS MOBILE ® FOR SMALL BUSINESS Stay in sync with your office while on-the-go. [Presenter’s Information]
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Windows 7 Training Microsoft Confidential. Windows ® 7 Compatibility Version Checking.
Understanding Active Directory
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Ravi Sankar Technology Evangelist | Microsoft Corporation
Microsoft Online and Cloud Services. Software Services Benefits from your on premise investments Ease and convenience of online access to services Power.
Identity and Access Management Business Ready Security Solutions.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Integrating NAV 2013R2 and Office 365 Office 365 Single Sign-on NAV as an app NAV online document store.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Hosting an Enterprise Financial Forecasting Application with Terminal Server Published: June 2003.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Microsoft’s Worldwide Marketing Database with Windows 2000 Datacenter Server Scaling Up to the Needs of the Worldwide Marketing Database with Windows.
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Application Center 2000 at Microsoft A solution for managing high availability Web applications built on Windows 2000 Published April 2002.
Secure Windows App Development. Authentication.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Federico Guerrini IDA TSP, EMEA Incubation Team From Identity Synchronization to Identity Management.
Service Pack 2 System Center Configuration Manager 2007.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Initiating, reviewing, and approving requests to add a vendor to the vendor master Vendor onboarding.
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Setting up Remote Access Brent Reeser Technical Product Manager Windows Server Marketing.
Office 365 Upsell Paths.
The time to address enterprise mobility is now
Deployment Planning Services
Deployment Planning Services
SaaS Application Deep Dive
Configuration Management with Azure Automation DSC
Microsoft 365 Education – Partner Quick Reference Card
Windows Store for Business
Office 365 Identity Management
Microsoft Services Provider License Agreement Program reference card
Identity Infrastructure Fundamentals and Key Capabilities
Office 365 Identity Management
Licensing Windows for Virtrual Desktops
Enabling the hybrid cloud with remote access appliances
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Azure AD Simon May Technical Evangelist.
9/24/2019 5:31 PM ©2005 Microsoft Corporation. All rights reserved.
Microsoft Virtual Academy
Microsoft Virtual Academy
Presentation transcript:

Microsoft’s Implementation of Smart Cards for Remote Access Published January 2002

Agenda Solution Overview Solution Overview Products & Technology Products & Technology Smart Card Features Smart Card Features Business Benefits Business Benefits Architecture Architecture Deployment Deployment Challenges Challenges Future Plans Future Plans Lessons Learned Lessons Learned Summary Summary

Solution Overview Enterprises that allow for remote access to network assets are becoming increasingly vulnerable to hackers and malicious intruders. Enterprises that allow for remote access to network assets are becoming increasingly vulnerable to hackers and malicious intruders. ? Situation ! Benefits Using the existing Microsoft® Windows® 2000 Server infrastructure, enterprises can employ Smart Cards to substantially increase the strength of their network security. In addition, the extensible Smart Card platform allows IT organizations to leverage the investment in Smart Cards for many other applications to strengthen security and add convenience to their employees. Using the existing Microsoft® Windows® 2000 Server infrastructure, enterprises can employ Smart Cards to substantially increase the strength of their network security. In addition, the extensible Smart Card platform allows IT organizations to leverage the investment in Smart Cards for many other applications to strengthen security and add convenience to their employees. Strengthens security Strengthens security Flexible Flexible Simple Simple Leverages existing server infrastructure Leverages existing server infrastructure Solution

Products & Technologies Windows 2000 Server, Windows 2000, the Active Directory™ directory service, Certificate Services Windows 2000 Server, Windows 2000, the Active Directory™ directory service, Certificate Services Smart Cards Smart Cards “The use of Smart Cards will significantly increase the security of our corporate network by improving our ability to authenticate each employee and business partner as they remotely connect to Microsoft.” Greg Wood, General Manager, Corporate Security, Microsoft Corporation

Remote Access Services (RAS) at Microsoft Microsoft’s Information Technology Group Microsoft’s Information Technology Group Manages RAS security risks Manages RAS security risks 50,000 employees, contingent staff & vendors using RAS 50,000 employees, contingent staff & vendors using RAS 400 locations worldwide 400 locations worldwide Addressing authentication Addressing authentication Valid username and associated password Valid username and associated password Two-factor authentication Two-factor authentication Something you have (the Smart Card) as well as something you know (the card’s Personal Identification Number, or PIN) Something you have (the Smart Card) as well as something you know (the card’s Personal Identification Number, or PIN) Home computer vulnerabilities Home computer vulnerabilities Viruses, Trojan horse applications, computer worms Viruses, Trojan horse applications, computer worms Always-on, broadband Internet access heightens exposure Always-on, broadband Internet access heightens exposure Smart Cards were chosen over alternative technology solutions due to reliability, cost, features, and mobility Smart Cards were chosen over alternative technology solutions due to reliability, cost, features, and mobility

Smart Card Features Tamper resistant Tamper resistant Requires a Smart Card reader Requires a Smart Card reader PIN PIN Takes advantage of technologies in Microsoft’s Windows 2000 Server infrastructure Takes advantage of technologies in Microsoft’s Windows 2000 Server infrastructure Certificate Services feature Certificate Services feature Public Key Infrastructure (PKI) security Public Key Infrastructure (PKI) security Cryptographic Service Provider (CSP), Cryptographic Service Provider (CSP), Extensible Authentication Protocol/Transport Layer Security (EAP/TLS) Extensible Authentication Protocol/Transport Layer Security (EAP/TLS) Current user interface Current user interface View Smart Card contents, reset the PIN, and add personal data View Smart Card contents, reset the PIN, and add personal data Future user interface Future user interface Add new certificates for different applications for added functionality Add new certificates for different applications for added functionality

Smart Card Business Benefits Smart Cards offer two-factor authentication Smart Cards offer two-factor authentication Lost Smart Cards are easily rendered invalid by revoking the network logon certificate Lost Smart Cards are easily rendered invalid by revoking the network logon certificate Intruder would need the PIN to unlock access to a valid Smart Card Intruder would need the PIN to unlock access to a valid Smart Card Extensible, open platform and secured memory contents provide potential future development benefits Extensible, open platform and secured memory contents provide potential future development benefits Personal payment systems, data storage, and data ported between applications Personal payment systems, data storage, and data ported between applications “One thing we’ve seen as a potential benefit at Microsoft is password consolidation and storage. For the most part we’ve got a fairly robust single sign-on approach in our environment but a lot of enterprise customers don’t. They find it attractive to use the Smart Card and the Personal Identification Number (PIN) that unlocks the Smart Card as their one password.” Pete Boden, Group Program Manager, ITG Smart Card Project, Microsoft Corporation

Architecture Replacement photo ID building access badges for all employees Replacement photo ID building access badges for all employees Includes embedded 32 KB cryptographic processor Smart Card chip Includes embedded 32 KB cryptographic processor Smart Card chip Client computer requirements Client computer requirements Windows XP Professional Windows XP Professional Smart Card reader with appropriate port connector Smart Card reader with appropriate port connector Antivirus application Antivirus application Additional client-side software Additional client-side software Several OEM-based Smart Card client features in Windows XP Professional Several OEM-based Smart Card client features in Windows XP Professional Preconfigured version of Connection Manager standardizes all Smart Card security configuration settings upon installation Preconfigured version of Connection Manager standardizes all Smart Card security configuration settings upon installation Future development Future development Extending Connection Manager scripts to check overall security of RAS client PC Extending Connection Manager scripts to check overall security of RAS client PC Server-side changes Server-side changes Logon certificates on the Smart Card and in the Active Directory are issued by Windows 2000 Server Certificate Services feature using PKI technology Logon certificates on the Smart Card and in the Active Directory are issued by Windows 2000 Server Certificate Services feature using PKI technology

Deployment Acquired 32 KB Crypto processor Smart Card chip embedded in standard RFID cardkeys Acquired 32 KB Crypto processor Smart Card chip embedded in standard RFID cardkeys Centralized card management team formed Centralized card management team formed Issuance, card distribution management, second tier end-user support Issuance, card distribution management, second tier end-user support Smart Card security officers distributed new Smart Cards Smart Card security officers distributed new Smart Cards Verification of identity Verification of identity Exchanged old building access badges for new Smart Card badges Exchanged old building access badges for new Smart Card badges User required to change initial PIN prior to remotely logging onto the network User required to change initial PIN prior to remotely logging onto the network PIN required to be alphanumeric, characters in length PIN required to be alphanumeric, characters in length Used PKI infrastructure to create logon certificates, delivered through Windows 2000 Server’s Certificate Services Used PKI infrastructure to create logon certificates, delivered through Windows 2000 Server’s Certificate Services Delegated solution for regional distribution and administrative responsibilities to minimize cost Delegated solution for regional distribution and administrative responsibilities to minimize cost Authorized to distribute replacement cards after acquiring Redmond Security team approval Authorized to distribute replacement cards after acquiring Redmond Security team approval Supplied with pre-build Smart Cards whose unique serial numbers were carefully tracked Supplied with pre-build Smart Cards whose unique serial numbers were carefully tracked

Challenges Mobile users Mobile users PDA users cannot gain RAS access (no support for the EAP/TLS protocol) PDA users cannot gain RAS access (no support for the EAP/TLS protocol) Device issues Device issues Home users using Macintosh, UNIX, and Linux computers cannot gain RAS access (no support for the EAP/TLS protocol) Home users using Macintosh, UNIX, and Linux computers cannot gain RAS access (no support for the EAP/TLS protocol) Home computers Home computers Home systems not upgrading to the Smart Card solution can use the HTTPS secure alternative to access essential data via OWA Home systems not upgrading to the Smart Card solution can use the HTTPS secure alternative to access essential data via OWA Integrated Services Digital Network (ISDN) Integrated Services Digital Network (ISDN) ISDN channel bonding is not supported, forcing potentially significant reduction in user ISDN performance ISDN channel bonding is not supported, forcing potentially significant reduction in user ISDN performance Product selection Product selection Smart Card models are evolving quickly, so enterprise-wide standardization on one model may be challenging Smart Card models are evolving quickly, so enterprise-wide standardization on one model may be challenging

Future Plans Smart Card industry still maturing Smart Card industry still maturing Interoperability problems with various business systems Interoperability problems with various business systems Likely consolidation in the next months Likely consolidation in the next months Expect improved product standards, including plug-and-play compatibility and greater integration with Windows platform Expect improved product standards, including plug-and-play compatibility and greater integration with Windows platform Better management of accounts with elevated privileges Better management of accounts with elevated privileges Installed mapped certificate to minimize compromise and improve audit trail Installed mapped certificate to minimize compromise and improve audit trail Portable digital signatures Portable digital signatures Expanding applications support Expanding applications support Signing stock grants, securing financial/HR data, signing source code, etc. Signing stock grants, securing financial/HR data, signing source code, etc.

Lessons Learned Planning Planning Understand Smart Card capabilities Understand Smart Card capabilities Set deployment goals Set deployment goals Anticipate where Smart Card benefits can save money and time Anticipate where Smart Card benefits can save money and time Anticipate changes in technology over the next months Anticipate changes in technology over the next months Ensure staff is well trained in PKI Ensure staff is well trained in PKI Deployment considerations Deployment considerations Not a solution to cover 100% of user population Not a solution to cover 100% of user population Understand impact to non-standard clients and devices Understand impact to non-standard clients and devices Initial logon performance penalty adds ~30 seconds to logon process Initial logon performance penalty adds ~30 seconds to logon process Increased network security benefits far outweigh logon delay Increased network security benefits far outweigh logon delay

Summary New focus on Security for corporations and governments New focus on Security for corporations and governments Microsoft sought to implement a two-factor authentication security solution Microsoft sought to implement a two-factor authentication security solution Smart Card technology offered several advantages over competing two-factor security technologies Smart Card technology offered several advantages over competing two-factor security technologies Not burdensome for users to employ Not burdensome for users to employ Takes advantage of existing Windows 2000 Server PKI infrastructure Takes advantage of existing Windows 2000 Server PKI infrastructure Provides ITG with an extensible platform for future internal application development Provides ITG with an extensible platform for future internal application development

For More Information Additional IT Showcase white papers, case studies and presentations on ITG deployments and best practices can be found on Additional IT Showcase white papers, case studies and presentations on ITG deployments and best practices can be found on Microsoft’s TechNet Microsoft’s TechNet

The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is provided for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT.  2002 Microsoft Corporation. All rights reserved. Microsoft, Outlook, Where do you want to go today?, Windows, Windows NT, and Windows 2000 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners.