Secure Lync mobile Authentication V5V5.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
The Natural way for Secure Mobile v.1.4
Secure Lync mobile Authentication
Secure SharePoint mobile connectivity
SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
SharePoint Server Exchange Server CORPORATE NETWORK Mobile devices PCs Browsers INTERNET DMZ Active Directory Policies Filter EAS Filter web access.
Introduction To Windows NT ® Server And Internet Information Server.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Active Directory Integration with Microsoft Office 365
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Active Directory Integration with Microsoft Office 365 Ross Adams & Jono Luk Program Managers Microsoft Corporation OSP321.
Page Copyright Giritech A/S an – Excitor company.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Course 201 – Administration, Content Inspection and SSL VPN
Securing Microsoft® Exchange Server 2010
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Chapter 13 – Network Security
70-411: Administering Windows Server 2012
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Integrating and Troubleshooting Citrix Access Gateway.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Implementing Microsoft Exchange Online with Microsoft Office 365
Secure Skype for Business
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Craig Pringle & Derek Moir
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Secure Skype for Business V6.2
ArcGIS for Server Security: Advanced
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Secure Single Sign-On Across Security Domains
Contents Software components All users in one location:
Module 3: Enabling Access to Internet Resources
Munix for Education Content Filter, Bandwidth Control, Location Mapping, Movement Analysis, User Self Management Portal, Time Analysis, and much more ….
Enabling Secure Internet Access with TMG
Module Overview Installing and Configuring a Network Policy Server
Configuring Windows Firewall with Advanced Security
Power BI Security Best Practices
Enhanced ADFS Protection for Securing Cloud Services
Secure Skype for Business
Azure AD Application Proxy
Office 365 Identity Management
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Ignite /20/2018 2:21 PM
Access and Information Protection Product Overview October 2013
Getting Started.
Getting Started.
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
System Center Marketing
Designing IIS Security (IIS – Internet Information Service)
Securing web applications Externally
Microsoft Virtual Academy
Presentation transcript:

Secure Lync mobile Authentication V5V5

Slide 2 Background & Overview Connecting external devices (mobile/computers) to the corporate network raises security risks related the Active Directory exposure. Typically there is no control over apps installed on employees’ smartphones and the networks that these devices are connected to. LyncShield is a server side solution with not additional client install supporting all devices.

Slide 3 Security requirement and solutions SolutionRequirement Two Factor Authentication based adding the device factor Secure external authentication Avoid AD credentials on device – Dedicated App credentials log Protect Active Directory password from leaking Soft lockout in DMZ Blocking false authentication attempts from reaching the Active Directory Protect agaist Account lockout & DDoS attack

Slide 4 Security issues and solutions (cont) SolutionRequirement Control device registration by certificate or manual admin Limit Lync to approved / corporate devices Bind Lync usage to MDM control Limit Lync to devices with MDM All the solutions are available for both mobile and external PC/ Laptops

Slide 5 [1] - Two Factor authentication Based on Device ID sent by client Several registration/ enrolment options to enforce access control policy based on matching the device and the user. Protects both Lync & Exchange (EWS) – blocking any request passing to network servers unless coming from an approved device

Slide 6 Access Control – Enrollment Support several access control policies: Automatic Registration – Device ID is registered upon first use of account. Two steps registration process: Self Service / Two Step Registration – User registers on internal site and then must sync within a defined time frame to complete registration. Admin Manual Enrollment – Admin management of user list using training mode and rejected auditing list.

Slide 7 Two Step Registration

Slide 8 Two Factor Authentication architecture

Slide 9 Access Portal main Settings View approved & blocked devices Restrict registration and ongoing connection by IP range Access Rule black / White list Allow / Block guest users Filter by device type & OS Allow / Block Web app login Define number of devices per user Registration policy (Two steps/ Manual/ Automatic) Failed login auditing & Soft Lockout management

Slide 10 Access Portal main Settings (cont) Require re-authentication by time -Session termination Save password policy management Multi LDAP support (for HA & distributed implantation) Support of Multi level admin management Web service for external event to lock/ approve device/user House keeping service Notification settings Reports & Search

Slide 11 Access Portal admin control

Slide 12 [2]- AD credential protection approach Lync Shield introduces a new approach for protecting the Active Directory credentials With Lync Shield the connection to Lync is done by using App dedicated Lync credentials that are created by the user rather than the regular network Active Directory credential Lync Shield completely eliminates the need to store Active Directory passwords on the device Supports work against Exchange & Lync with one App credentials

Slide 13 Active Directory App login The user creates dedicated Lync credentials on a self service internal web site for use on device, instead of Active Directory credentials.

Slide 14 Lync App credentials architecture

Slide 15 Mobile Smart Card solution Many organizations that smart card for network login do not have a username and password for Active Directory. LyncShield allows the usage of Lync without the need to manage Active Directory credentials. With the dedicated login solution, the user logs into the Access Portal authenticating with his smart card from his network computer and creates dedicated SharePoint credentials for use on the mobile device.

Slide 16 RSA integration Mobile users enter their RSA Token authentication code instead of Active Directory password LyncShield verifies password against RSA Authentication Manager and impersonate user against Lync Desktop users Authenticate in web site from Browser and than can login from Lync desktop client

Slide 17 [3]- Account Lockout protection Account lockout can be the result of the following: The user changed the Active Directory password, but did not change the settings on the device. The username (without the password) being obtained by a hacker who tried to log in several times DDoS, Dos, brute force attacks- Such attacks can result in the network becoming unavailable

Slide 18 Account lockout protection (cont) LyncShield blocks the failed attempts on the gateway server side, before reaching the Active Directory LyncShield offers a multi-site defense approach covering all authentication channels Unified solution that protects all distributed resources. Failed attempts are counted and stored in a central database table which is shared by all LyncShield components.

Slide 19 [5] MDM binding LyncShield can limit the usage of Lync to managed devices only – devices with MDM Compatible with any MDM solution supporting one of the following capabilities: Certificate enrollment Application management (MAM) VPN triggering / control These are available from most of the vendors around the market including Microsoft Intune, AirWatch, MobileIron, MASS360, Good, XenMobile and more.

Slide 20 LyncShield MDM app

Slide 21 VPN support for Lync MSFTs recommendation is to keep all voice and video traffic going through the Edge and not over the VPN LyncShield offers an Hybrid solution requiring the authentication to be done over VPN and routing the Video/Audio to go through the Edge over the internet. Does not require VPN splitting

Slide 22 Lync traffic splitting over VPN

Slide 23 Product architecture - Bastion Proxy LyncShield solution offers as part of the solution the dedicated reverse proxy Bastion developed by AGAT. The Lyncshield filters are plugged into Bastion to extend access control and content filtering capabilities Cross-platform- Windows / Linux Scalable Event-Driven Architecture. Can publish multiple servers in parallel/ mulita channels. Highly efficient asynchronous architecture. Supports high availability deployment

Slide 24 Bastion (cont) Main characteristics : Geared towards full-featured HTTP filtering. HTTPS - Decrypt SSL Supports many HTTP scenarios: Chunked, gzip and deflate Transfer-Encodings Pipelining. Supports filtering content, blocking content or generating proxy responses anytime during the filtering chain (unlike TMG and UAG).

Slide 25 Federation Firewall Access rules based on Active Directory group membership General access control Specific operations such as file sharing Privacy Lync SIEM - Security Information Event Management Security alerts based on geolocation information and usage patterns LyncShield Road map

Slide 26 LyncShield Road map (cont) Lync Application Firewall- Sanitize all non authenticated requests in DMZ: Verify request type, content type headers, content length, URL validation, validate request structure, characters etc. Break any direct request to enter domain- session termination Google Authenticator Two Factor Authentication for Lync on premise Lync online (Office 365)

Slide 27 LyncShield Road map (cont) DLP engine Apply content rules policy on IM data Examples of content handled in messages: Social security numbers Credit card numbers ID numbers Support Skype for Business On going as MS release new clients

Slide 28 AGAT products- Overview AGAT Software is a company focusing on security solutions for authentication and content filtering while externally connecting devices to company network. The companies Mobility-Shield core product suite secures applications such as Skype / Lync/ SharePoint and other apps based on Active Directory authentication. LyncShield is part of MobilityShield AGAT’s Security suite. AGAT also offers secure browser and digital signature mobile applications for mobile PKI requirements.

Slide 29 To learn more about our solutions please visit our website at