Presentation is loading. Please wait.

Presentation is loading. Please wait.

What is new in security in Windows 2012 or Dynamic Access Control

Similar presentations


Presentation on theme: "What is new in security in Windows 2012 or Dynamic Access Control"— Presentation transcript:

1 What is new in security in Windows 2012 or Dynamic Access Control
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEHv7 | |

2 Revolution? Evolution

3 Evolution Access Control Lists (ACEs)
and NTFS File Server Resource Manager (FSRM) and simple file classification Active Directory (AD) integrated classification and automatic file classification with FSRM Kerberos Claims and user attributes Kerberos CompoundId and computer attributes

4 Evolution Feature Server Client Schema 2012 / DFL / FFL And logic ACL
Windows 2012 - FSRM automatic classification AD integrated classification terms schema 2012 FFL 2003 User claims one Windows 2012 DC Computer claims Windows 8 local Windows 2012 DC

5 Claims, Terms and Classifications
They are just the same thing

6 What is New in Security in Windows 2012
Access Control Lists What is New in Security in Windows 2012

7 Until Windows 2012 Sorted in order Has OR logic
DENY is not always stronger Has OR logic

8 Flow of Access Control Sharing Permissions Authentication
Kerberos NTLM Allow Logon Locally Access this Computer from Network Sharing Permissions UAC Restricted Access Token Authentication TCP 445 Windows Firewall Kerberos NTLM NTFS Permissions Allowed to Authenticate? Access Token Folder Quotas Path Volume Quotas Owner Disk

9 New in Windows 2012 AND logic possible Extendable with claims
FSRM file claims user claims device (computer) claims

10 Flow of Access Control Sharing Permissions Authentication
Kerberos NTLM Allow Logon Locally Access this Computer from Network Sharing Permissions UAC Restricted Access Token Authentication TCP 445 Windows Firewall Kerberos NTLM NTFS Permissions Claim ACEs Allowed to Authenticate? Access Token Folder Quotas Path Volume Quotas Owner Disk

11 What is New in Security in Windows 2012
File Classification What is New in Security in Windows 2012

12 File Server Resource Manager (FSRM)
Manual File Classification Automatic File Classification words file name wildcard regular expressions .PS1 code Locally vs. AD defined terms Adds file metadata alternative NTFS streams

13 File claims and ACL File claims can be used in the new ACL

14 AD defined file claims Requires Windows 2012 schema extension
Requires Windows 2003 forest functional level do not require any Windows 2012 DC some editor like ADSI Edit or Windows 2012 ADAC Must be uploaded to FSRM servers manually

15 What is New in Security in Windows 2012
Kerberos Claims What is New in Security in Windows 2012

16 Kerberos ticket until Windows 2012 KDC
User identity login SID Additional SIDs groups SID history

17 Good old Kerberos Client XP Server TGT DC 2003

18 Good old Kerberos Client XP Server TGS SIDs TGT TGS SIDs DC 2003

19 What is new in Kerberos tickets with Windows 2012 KDC
User identity login SID Additional SIDs groups SID history User claims AD attributes in Kerberos TGT tickets

20 Requirements At least single Windows 2012 DC (KDC)
Tickets are extendable If client does not understand the extension, it simple ignores its contents If server requires user claims and they are not present in the TGS ticket, it can just ask a Windows 2012 DC directly (secure channel)

21 Good old Kerberos supports claims as well
Client XP Server 2012 TGS SIDs TGT Claims TGS SIDs DC 2012 DC 2003

22 Brand new Kerberos with Windows 2012 KDC
Client XP Server 2012 TGT User Claims DC 2012

23 Brand new Kerberos with Windows 2012 KDC
Client XP Server 2012 TGS SIDs User Claims TGT User Claims TGS SIDs User Claims DC 2012

24 What is new in Kerberos with DFL 2012
User identity login SID Additional SIDs groups SID history User claims AD attributes in Kerberos TGT tickets Device claims AD attributes of computers Compound ID in Kerberos TGT tickets

25 Kerberos Compound ID with device claims
Client 8 Server 2012 TGT Request Computer TGT TGT User Claims Device Claims DC 2012

26 Brand new Kerberos with Windows 2012 KDC
Client XP Server 2012 TGS SIDs User Claims TGT User Claims Device Claims TGS SIDs User Claims DC 2012 Device Claims

27 Requirements At least local Windows 2012 DC (KDC)
better to have 2012 DFL for consistent behavior Clients Windows 8 or Windows 2012 must ask for TGTs with Compound ID extension Server cannot just obtain device claims because it does not know from what device the user came

28 What is New in Security in Windows 2012
Take away What is New in Security in Windows 2012

29 Evolution Feature Server Client Schema 2012 / DFL / FFL And logic ACL
Windows 2012 - FSRM automatic classification AD integrated classification terms schema 2012 FFL 2003 User claims one Windows 2012 DC Computer claims Windows 8 local Windows 2012 DC

30 What is New in Security in Windows 2012
Thank you! What is New in Security in Windows 2012


Download ppt "What is new in security in Windows 2012 or Dynamic Access Control"

Similar presentations


Ads by Google