Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Slides:



Advertisements
Similar presentations
Experience with NTLM v2 on Win2K in NT 4.0 Domain Myung Bang Jefferson Lab Hepix-HepNT 2000 October 31, 2000.
Advertisements

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 1: Introduction to Active Directory.
Chapter 7 HARDENING SERVERS.
Chapter 4 Chapter 4: Planning the Active Directory and Security.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Chapter 4 Introduction to Active Directory and Account Management
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Vikram Thakur Introduction to Active Directory Structure.
Overview of Active Directory Domain Services Lesson 1.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Directory services Unit objectives
11 REVIEWING MICROSOFT ACTIVE DIRECTORY CONCEPTS Chapter 1.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 7: Active Directory Replication.
Slide Master Layout Useful for revisions and projector test  First-level bullet  Second levels  Third level  Fourth level  Fifth level  Drop body.
Windows Server 2008 Chapter 4 Last Update
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Group 11 CSE 8343 Group 1 Windows 2000 Domain Security & Authentication.
Module 2: Implementing DNS to Support Active Directory
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Designing Active Directory for Security
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 5: Active Directory Logical Design.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Module 7 Active Directory and Account Management.
Session 7 Windows Platform Eng. Dina Alkhoudari. Learning Objectives Active Directory review Managing users and groups Single Master Operations Delegation.
Mastering Windows Network Forensics and Investigation Chapter 13: Logon and Account Logon Events.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Company Confidential 1 A Course on Global Catalog And Flexible Single Master Operations (Fsmo) Roles Prepared for: *Stars* New Horizons Certified Professional.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Global Catalog and Flexible Single Master Operations (FSMO) Roles
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Module 1: Implementing Active Directory ® Domain Services.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
Active Directory Infrastructure Microsoft Windows 2003 Active Directory Infrastructure MCSE Exam
OVERVIEW OF ACTIVE DIRECTORY
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Active Directory.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
11 UPGRADING AND MIGRATING TO WINDOWS SERVER 2003 Chapter 12.
Global Catalog and Flexible Single Master Operations (FSMO) Roles BAI516.
Module 8: Planning for Windows Server 2008 Active Directory Services.
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
11 GLOBAL CATALOG AND FLEXIBLE SINGLE MASTER OPERATIONS (FSMO) ROLES Chapter 4.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Kerberos Miha Pihler MVP – Enterprise Security Microsoft Certified Master | Exchange 2010.
Overview of Active Directory Domain Services Lesson 1.
Implementing Active Directory Domain Services
Global Catalog and Flexible Single Master Operations (FSMO) Roles
Overview of Active Directory Domain Services
(ITI310) SESSIONS 6-7-8: Active Directory.
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Unit 3 NT1330 Client-Server Networking II Date: 1/6/2016
Chapter 4: Planning the Active Directory and Security
Global Catalog and Flexible Single Master Operations (FSMO) Roles
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication NTLM Authentication Authenticating Down-Level Clients Planning Server Placement for Authentication Planning server placement Planning domain controller (DC) placement Planning global catalog server placement Planning PDC emulator placement

Designing Authentication in a Microsoft Windows 2000 Network Business requirements Reduce total cost of company's ownership Identify security risks in the network Technical requirements Network authentication must be available even if WAN links are not. Network authentication must occur in a timely manner. DCs must not be overloaded with authentication requests.

Business Requirements Reduce total cost of company’s ownership Identify security risks in the network

Technical Requirements Network authentication must be available even if WAN links are not. Network authentication must occur in a timely manner. DCs must not be overloaded with authentication requests.

Designing Kerberos Authentication Advantages of Kerberos authentication Understanding the Kerberos message exchanges Analyzing Kerberos authentication Making the decision: designing Kerberos authentication Applying the decision: designing Kerberos authentication

Advantages of Kerberos Authentication Mutual authentication Single sign-on Ticket caching Delegation Standards-based protocol Interoperability

Understanding the Kerberos Message Exchanges Authentication Service Exchange Ticket Granting Service Exchange Client/Server Authentication Exchange

Initial Authentication with the Network The Authentication Service Exchange is used when a user initially logs on. This provides the user with a logon session key and a ticket granting ticket (TGT ) that will be used to acquire service tickets (STs) during the session. Information contained within the KRB_AS_REP message is encrypted with the user's long-term key. Each user shares a long-term key with the key distribution center (KDC). The long-term key is derived from the account's password.

The Kerberos Authentication Exchange

Acquiring a Service Ticket for the Computer

Network Authentication

Smart Card Authentication

Multiple Domain Authentication

Criteria for Delegation The following computers must be running Microsoft Windows 2000 in a Windows 2000 domain: Computers hosting the client process Computers running the service process Computers running processes for any back-end services The client's user account must be enabled for delegation. The service's account must be enabled for delegation.

Delegation and Kerberos Authentication

Making the Decision: Designing Kerberos Authentication Microsoft Windows 2000 DCs must be available on the network. DNS services must be available to find Windows 2000 DCs. The authenticating DC must contact a global catalog server. Global catalog server SRV resource records are stored in the _msdcs.forestrootdomain zone. Only Windows 2000 and UNIX clients use Kerberos authentication. Smart card logon requires Kerberos authentication. Kerberos settings are part of the domain account policy.

Applying the Decision: Designing Kerberos Authentication at Market Florist Each domain has sufficient DCs at each of the four sites. The San Francisco site does not have a dedicated DNS server. The DNS servers in Winnipeg and Monterrey do not have a secondary zone for the _msdcs.marketflorit.tld domain. The Winnipeg and Monterrey sites do not have a local global catalog server.

NTLM Authentication Only Windows 2000 clients and UNIX clients can use Kerberos authentication. Windows 2000 continues to support NTLM. NTLM can also be used to authenticate logons to Windows 2000 computers that are not participating in a domain. Security weaknesses were found with the NTLM protocol. NTLM version 2 was developed for Microsoft Windows NT 4.0 Service Pack 4 (SP4).

Additional NTLMv2 Security Unique session keys per connection Session keys protected with a key exchange Unique keys generated for the encryption and integrity of session data

NTLMv2 Authentication

Making the Decision: Implementing NTLMv2 Authentication When Windows 2000 is authenticating with Local SAM database of a standalone Windows 2000–based computer Microsoft Windows NT 4.0 computer with SP4 or later installed When Windows NT 4.0 is authenticating with Windows 2000 and Windows NT 4.0 servers and the client has SP4 or later applied Windows 2000 and Windows NT 4.0 servers and the client has the Directory Services Client installed When Microsoft Windows 95 or Microsoft Windows 98 is authenticating with Windows 2000 and Windows NT 4.0 servers using the Directory Services Client

Applying the Decision: Implementing NTLMv2 Authentication at Market Florist Microsoft Windows 95 and Microsoft NT 4.0 Workstation cannot use Kerberos authentication. The Directory Services Client must be deployed to Windows 95 clients. Windows NT 4.0 Workstation will not require the Directory Services Client.

Authenticating Down-Level Clients Analyzing standard authentication Analyzing the Directory Services Client

Analyzing Standard Authentication: Windows NT 4.0 Clients Windows NT 4.0 clients without service packs use NTLM. Information exchanged between a DC and an authenticating client is not secure with only NTLM protection. NTLMv2, introduced with SP4, provides added security.

Analyzing Standard Authentication: Windows 95 and Windows 98 Clients These clients use LAN Manager (LM) authentication protocol. LM authentication is the weakest of the authentication protocols. LM authentication is not case sensitive. The LM password protection scheme is easily cracked. Sensitive account passwords can be decrypted if they are maintained in LM format within Active Directory.

Analyzing Standard Authentication: Microsoft DSClient Microsoft Directory Services Client (DSClient) was designed to counteract the weaknesses in LM authentication. Allows Windows NT 4.0, Windows 95, and Windows 98 clients to use NTLMv2 for authentication in the Windows 2000 network.

DSClient Functionality NTLMv2 authentication protocol Site awareness Search for objects in Active Directory Reduced dependency on the PDC ADSI Distributed File System (DFS) fault tolerance client Active Directory Windows Address Book (WAB) property pages

Features DSClient Does Not Provide Kerberos support Group Policy/Intellimirror support IPSec/L2TP support SPN/Mutual authentication Dynamic DNS support User principal name (UPN) authentication

Controlling Authentication Level with Group Policy The LMCompatibilityLevel setting can be deployed using Group Policy. Set LMCompatibilityLevel at the container where the Windows 2000 computer accounts reside. For DCs, set LMCompatibilityLevel at the Domain Controllers OU.

Making the Decision: Authenticating Down-Level Clients Plan for distribution of the DSClient software. Ensure that all Windows NT 4.0 clients have the latest service pack installed. Identify any registry updates to be performed for client computers after DSClient installation. After DSClient installation, set the LMCompatibilityLevel at the servers to require NTLMv2 authentication. Replace or upgrade all older client computers from the network if they cannot support NTLMv2 authentication.

Applying the Decision: Authenticating Down-Level Clients at Market Florist Distribute the DSClient software to all down-level client computers. Ensure that all necessary registry settings are deployed to Windows NT 4.0 and Windows 95 clients. After the DSClient software is fully deployed, configure Group Policy to allow only NTLMv2 authentication. Configure DNS services locally at each site.

Planning Server Placement for Authentication Planning DNS server placement Planning DC placement Planning global catalog server placement Planning PDC emulator placement

Information Stored Within the _msdcs.forestrootdomain Zone All global catalog servers in the forest The GUID representation of each domain The GUID representation of each DC

Making the Decision: DNS Server Placement A DNS server should be located at each remote site to ensure DNS lookup capabilities to all clients if the WAN link is down to a central site. Each domain must have at least two DNS servers to provide fault tolerance in the event of server or WAN link failure. The DNS service at each site must contain zone information for all domains that must be accessed at that site. All global catalog resource records are stored in the forest root domain.

Applying the Decision: DNS Server Placement at Market Florist

Planning DC Placement DCs host KDC service for Windows Client will attempt to authenticate with a local DC. If a local DC is unavailable, the site link costs will be checked to determine what the closest site to the current site is, based on the lowest cost.

Making the Decision: DC Placement Place at least two DCs at each remote site to ensure that clients authenticate locally. If there are no client computers or users at a remote site for a specific domain, there is no reason to deploy a DC for that domain at the remote site. If the WAN link goes down, clients are restricted to logging on to the network with cache credentials.

Applying the Decision: DC Placement at Market Florist Each of the four sites for Market Florist has at least two DCs to ensure that authentication for the local domain will not occur over the WAN. Install the DSClient software to all Windows 95 and Windows NT 4.0 clients.

Planning Global Catalog Server Placement Global catalog servers are contacted during authentication when The domain is in native mode A user logs on at a Windows 2000–based computer using a UPN

Making the Decision: Global Catalog Server Placement Place at least one global catalog server at each site. Ensure that the _msdcs.forestrootdomain DNS domain is available at all remote sites on a local DNS server. Designate global catalog servers, even in a single domain environment.

Applying the Decision: Global Catalog Server Placement at Market Florist The current design does not include a local global catalog server at the Winnipeg and Monterrey sites. One DC at each site should be configured as a global catalog server to ensure that global catalog access is not taking place over the WAN. If the WAN link becomes unavailable, all Windows 2000 clients are authenticated using cached credentials. The local DNS servers at each site should have a replica of the _msdcs.marketflorist.tld domain to ensure that a local global catalog server can be found by authenticating clients.

Planning PDC Emulator Placement Down-level clients Connect to the PDC emulator for password changes Connect to the PDC emulator for system policy application by default Continue to depend on the PDC emulator for domain browse master functions, password changes, and system policy application until the DSClient software is installed

Making the Decision: PDC Emulator Considerations If possible, reduce dependency on the PDC emulator by installing DSClient software. Configure system policy to load balance to ensure the system policy is applied from the authenticating DC, not the PDC emulator. Upgrade all Windows NT 4.0 BDCs to Windows 2000 DCs as soon as possible to use multimaster replication. If the DSClient is not deployed, ensure the PDC emulator is on a central portion of the network that is easily accessible from all remote sites.

Applying the Decision: PDC Emulator Placement at Market Florist The network must ensure the rapid deployment of the DSClient software to the client computers. The San Francisco site will benefit the most from the quick deployment of the DSClient software. The PDC emulator will be located on the local network in Monterrey and Winnipeg location, so this will not be much of an issue.

Chapter Summary Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication NTLM Authentication Authenticating Down-Level Clients Planning Server Placement for Authentication Planning server placement Planning domain controller placement Planning global catalog server placement Planning PDC emulator placement