Presentation is loading. Please wait.

Presentation is loading. Please wait.

Making Identity and Access Management Real – The Early Days Brian Lauge Pedersen Senior Technology Specialist.

Similar presentations


Presentation on theme: "Making Identity and Access Management Real – The Early Days Brian Lauge Pedersen Senior Technology Specialist."— Presentation transcript:

1 Making Identity and Access Management Real – The Early Days Brian Lauge Pedersen Senior Technology Specialist

2 The Infrastructure Optimization Model Customer Challenges Implementing Solutions What Will We Cover?

3 Understanding Identity Management Challenges Implementing Active Directory Implementing Password Security Implementing Security Templates Agenda

4 Overview – The Core IO Model CROSS-MODEL ENABLERS IdentityIdentity Presence Presence Rights ManagementRights Management Network AccessNetwork Access Desktop, Device, and Server Management Security and Networking Identity and Access Management Data Protection and Recovery IT Management and Security Process

5 Identity and Access Management No common identity management model Identity management for user identification Centralized configuration and authentication, information protection infrastructure Centralized administration, federated identity management No server- based identity or access management Users operate in admin mode Limited or inconsistent use of passwords at the desktop Minimal enterprise access standards Active Directory for authentication and authorization Users have access to admin mode Security templates applied to standard images Desktops not managed by policy Policy and security templates used to manage desktops for security and settings Directory and certificate-based information protection infrastructure Certificate provisioning and authorization for mobile devices Centrally manage users provisioning across heterogeneous systems Federated identity management across organizational and platform boundaries

6 Contoso Identity Management Today User name Password

7 Key Challenges No single sign-on Non-standard computers and servers Passwords managed non-securely IT strained due to company growth

8 Provide single sign-on to network resources Enforce password security Implement scalable centralized management Our Goals: Optimize IDAM

9 Active Directory The Solution – Active Directory Provide single sign-on Enforce password security Implement scalable centralized management Robust replication Application- friendly Enforces security Simplified administration Scalable infrastructure

10 Understanding Identity Management Challenges Implementing Active Directory Implementing Password Security Implementing Security Templates Agenda

11 OU design DNS design Domain design Forest design Active Directory Planning

12 Active Directory Domains Boundary of Authentication Boundary of Policies Boundary of Replication CONTOSO.COM

13 Domain Design Options Single domain structure Regional domains structure

14 Additional Domain Considerations Management of multiple service administrator groups Group Policy consistency Access control and auditing settings consistency Increased likelihood of objects moving between domains Solution: Single domain structure

15 Organizational Units – An Overview CONTOSO.COM OU Admin Organized For: Administration Same Requirements Delegation Group Policy Configuration Security Organized For: Administration Same Requirements Delegation Group Policy Configuration Security OU Security OU Policy

16 Organizational Unit Design Delegation of administration Scope Group Policy application Delegation of administration Scope Group Policy application Contoso.com Administrative Workstations Users Desktops Laptops SQL Servers Exchange Servers Print Servers Standard Users Power Users Data Entry Users Servers

17 Active Directory Deployment Deployed first forest root domain controller Deployed second domain controller Configured and verified DNS Configured global catalog settings Reviewed operations master roles

18 Demo Reviewing the Organizational Unit Structure Review the OU Structure demonstration

19 Understanding Identity Management Challenges Implementing Active Directory Implementing Password Security Implementing Security Templates Agenda

20 Insufficient expiration policy Multiple passwords to remember Passwords written down Calls to helpdesk for password resets Username: aaronc Password: aaronc Username: aaronc Password: aaronc Password Challenges Weak passwords and desktop security Username: aaronc Password: abc123 Username: aaronc Password: abc123 Username: aaronc Password: P$7k#yZ Username: aaronc Password: P$7k#yZ Username: acon Password: password Username: acon Password: password

21 Password Security Solutions Solution: Group Policy Password policy Credential mapping Password synchronization Password reset Password change

22 Password Security Solutions - Notes Solution: Group Policy Password policy Credential mapping Password synchronization Password reset Password change

23 Password Security Solutions - Notes Solution: Group Policy Password policy Credential mapping Password synchronization Password reset Password change

24 Demo Setting Group Policy Password Options Configure Default Domain Policy Verify Group Policy Application demonstration

25 Understanding Identity Management Challenges Implementing Active Directory Implementing Password Security Implementing Security Templates Agenda

26 Group Policy Security Templates Compatws.inf Secure*.inf Hisec*.inf

27 Demo Implementing Security Templates Create Security Template Create Desktops GPO and Apply Security Template demonstration

28 What Have We Accomplished? Desktop, Device, and Server Management Security and Networking Identity and Access Management Data Protection and Recovery IT Management and Security Process CROSS-MODEL ENABLERS IdentityIdentity Presence Presence Rights ManagementRights Management Network AccessNetwork Access

29 Deployed Active Directory Implemented password security Configured security templates Session Summary

30 www.microsoft.com/technet/hot-11 Visit TechNet at: www.microsoft.com/technet Visit the following site for additional information: For More Information

31 For the latest titles, visit: www.microsoft.com/learning/books/itpro/ Microsoft Press Publications

32 Self-study learning tool free to anyone Determines skills gaps Provides learning plans Post your score—see how you stack up Visit: www.microsoft.com/assessment Readiness with Skills Assessment

33 Become a Microsoft Certified Professional What are MCP certifications? Validation in performing critical IT functions. Why Certify? WW recognition of skills gained via experience. More effective deployments with reduced costs What Certifications are there for IT Pros? MCP, MCSE, MCSA, MCDST, MCDBA. www.microsoft.com/learning/mcp

34 For more information please visit www.microsoft.com/technet/subscriptions Introducing: TechNet Plus Direct! All the benefits of TechNet Plus for 30% less, TechNet Plus Direct subscribers receive… Online Benefits Portal – New! Immediate download access: software and betas – New! 2 free Professional Support Incidents Managed Newsgroups and Online Concierge The TechNet Library containing the KB, security updates, service packs, resource kits, and more …TechNet Plus Direct is available exclusively online without media shipments Available Now!

35 Live Events and Online Webcast series Microsoft Professional Blogs Directory Chats, Newsgroups, Forums and Virtual Labs Local Locator for Professional User Groups Where Else Can I Get Help? www.microsoft.com/technet/community


Download ppt "Making Identity and Access Management Real – The Early Days Brian Lauge Pedersen Senior Technology Specialist."

Similar presentations


Ads by Google