CONTROLLING USER ACCESS: AUTHENTICATION AND AUTHORIZATION DEFIANA ARNALDY, M.SI 0818 0296 4763 1.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Online Security Tuesday April 8, 2003 Maxence Crossley.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
CSCI 6962: Server-side Design and Programming
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Session 11: Security with ASP.NET
Secure Electronic Transaction (SET)
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Unit 1: Protection and Security for Grid Computing Part 2
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Module 11: Securing a Microsoft ASP.NET Web Application.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Fall 2006CS 395: Computer Security1 Key Management.
Public Key Infrastructure (PKI)
SSL Certificates for Secure Websites
Cryptography and Network Security
CompTIA Security+ Study Guide (SY0-501)
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Presentation transcript:

CONTROLLING USER ACCESS: AUTHENTICATION AND AUTHORIZATION DEFIANA ARNALDY, M.SI

OVERVIEW Introduction Authentication techniques IIS authentication Microsoft.NET Passport authentication Hashing information Hashing algorithms SSL Financial network security Conclusion 2

INTRODUCTION Until now, we have assumed that hackers use network- sniffing software to intercept confidential data; however, there is as much danger in forged or spoofed data Authentication systems must be able to validate supplied credentials securely against trusted sources and also to ensure that the message has not been tampered with in transit 3

AUTHENTICATION TECHNIQUES To guarantee the identity of a client, you need to trust one piece of information that is unique to that client and that cannot easily be determined or faked (e.g., IP address, Windows username/password, or some other credential) 4

Several different types of authentications are applicable to different scenarios ISP  can use IP addresses as credentials Windows-only intranet application  Windows logins 5

IIS AUTHENTICATION The most basic is anonymous  the clients do not have to supply any credentials and are automatically granted IUSR (guest) privileges. One step above is basic authentication  Forces the client to supply credentials in base64 (basically, clear text) combined with SSL, this is a secure solution. 6

MICROSOFT.NET PASSPORT AUTHENTICATION Passport authentication is where users can be identified by their Hotmail addresses The advantage of passport over in-house-developed systems is that many people already have a Hotmail address, and thus do not have to reregister their details. 7

Passport authentication is used primarily for Web sites, but can also be applied to applications, MSN Messenger being a good example Passports are available in two flavors: Preproduction  free Production  not free 8

HASHING INFORMATION Hashing is a one-way algorithm in which data can be converted to a hash value, but a hash value cannot be converted back to meaningful data Modern hashing systems include Message Digest (MD5) and Secure Hash Algorithm (SHA-1). 9

HASHING ALGORITHMS.NET provides support for two hashing algorithms: Secure Hash Algorithm (SHA), and Message Digest (MD5) There are four different variations of the SHA available for use in.NET: SHA1Managed (20-byte hash), SHA256Managed (32-byte hash), SHA384Managed (48-byte hash), SHA512Managed (64-byte hash). 10

SSL SSL is a secure stream protocol, which uses both symmetric and asymmetric encryption, combined with digital certificates to provide authentication. Digital certificates can be bought from a certificate authority (CA) such as Thawte or Verisign 11

SSL is defined in RFC SSL is used for securing Web pages, , FTP, or news. HTTP over SSL (HTTPS) operates on port 443; SMTP over SSL (SSMTP) operates on port 465; NNTP over SSL (SNNTP) operates on port

CERTIfiCATES A certificate has to be issued by a CA in order to be globally accepted. It is possible to create self-signed certificates, but these would generally be deemed trustworthy only within your organization The most common form of digital certificate is known as X.509. This is an international standard maintained by the IETF Public Key Infrastructure (PKIX) working group 13

The certificate comprises various fields that identify the holder, the issuer, and the certificate itself: Serial number: The unique serial number on every certificate created by an issuer Signature: Identifies the makeup of the certificate, represented by an object identifier (OID). Validity period: The date at which the certificate becomes and ceases to be valid Subject: The owner of the private key Public key : The key that will decrypt the certificate hash Signed hash: The hash of the certificate encrypted with the private key of the CA 14

15

SERVER CERTIfiCATES Server certificates for real-world Web sites need to be obtained from a CA. A useful utility for creating self-signed certificates is IBM KeyMan ( The steps to enable HTTPS using a self-signed certificate and IBM KeyMan on IIS  see your self on the e-book. 16

CLIENT CERTIFICATES Client certificates are only used for maximum-security Web sites, such as online business banking. Client certificates are available free of charge from Thawte. They are used to send and receive encrypted s and to authenticate your address to recipients 17

18

MICROSOFT CERTIFICATE SERVICES MSCS runs on Windows 2000 and can generate X.509 certificates in PKCS #7 format from PKCS #10 certificate requests. MSCS can run as either a root CA or subordinate CA and can optionally hold certificates in the active directory. When used in conjunction with the active directory, MSCS will use this as its certificate revocation list (CRL) 19

READING CERTIFICATES Certificates can be read using the X509Certificate class (Table 9.2) in.NET. 20

21

FINANCIAL NETWORK SECURITY If a hacker were to break into an e-commerce site successfully and capture someone’s credit card number, some unfortunate person would get stung financially; however, if the same thing happened on an interbank network, a country’s economy could be ruined overnight 22

Most banks use private leased lines between their branches so that the confidential information does not come into contact with the public phone network When a bank needs to communicate with a second financial institution overseas to perform, it must use the public phone network 23

CONCLUSION This chapter has looked at the mechanisms for guaranteeing the identity of network clients over the Web and on Microsoft networks Extending the topic to real-world scenarios, we looked at how banks use authentication to transfer billions of dollars safely across phone lines. 24