Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active...

28
Module 2: Introducing Windows 2000 Security

Transcript of Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active...

Page 1: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Module 2:Introducing

Windows 2000 Security

Page 2: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Overview

Introducing Security Features in Active Directory

Authenticating User Accounts

Securing Access to Resources

Introducing Encryption Technologies

Encrypting Stored and Transmitted Data

Introducing Public Key Infrastructure Technology

Page 3: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Introducing Security Features in Active Directory

Active Directory Hierarchical Structure

Trust Relationships

Administration Using Group Policy

Page 4: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Active Directory Hierarchical Structure

DomainDomain

DomainTree

Tree

ForestObjects

OUOU

OUOU OUOUDomainDomain

DomainDomain

DomainDomain

Defining Security Boundaries Using Domains

Supporting Security Settings Using OUs

Providing Delegation of Administration

Page 5: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Trust Relationships

Transitive (Two Way)

Shortcut (Two Way) External (One Way)

Forest 1 Forest 2

Page 6: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Administration Using Group Policy

Group Policy

DomainDomain

OUOU OUOU

OUOU OUOU OUOU

OUOU

Security Policies with Domain-wide

Scope

Security Policieswith OU-wide

Scope

Page 7: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Authenticating User Accounts

Using Kerberos V5 Authentication

Using Certificate-based Authentication

Using NTLM Protocol for Authentication

Page 8: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Using Kerberos V5 Authentication

Ticket-GrantingTicket

1111 Service Ticket

Windows 2000–based Computer

Windows 2000–based Computer

2222

4444

3333

TGT

Initial Logon

KDCKDC KDCKDC

11112222

TGT

Service Request

ST

ST

Session Established

3333TGT Cached Locally

Windows 2000–based Computer

Windows 2000–based Computer Target ServerTarget Server

Page 9: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Using Certificate-based Authentication

CertificationAuthority

Windows 2000–based Server

(configured for clientcertificate authentication)

SSL Protocol

Map Certificates to Active Directory Accounts

Implement Smart Card Authentication

User

Page 10: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Using NTLM Protocol for Authentication

Windows 2000Stand–alone Server

Windows 2000–based Computer

Windows NT–basedServer

Windows 2000–based Computer

Windows 2000 Domain Controller

Directory Services Client

Page 11: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Securing Access to Resources

Describing Security Identifiers

Controlling Access to Resources

Defining Security Groups for Resource Access

Discussion: Authentication and Access Control

Page 12: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Describing Security Identifiers

SID

S-1–5–21-212721301…S-1–5–21-212721301…

Automatically Created When an Object Is Added

Identify Users, Groups, or Computers

Used to Grant Access Rights and Permissions to Resources

Groups SID

Users SID

Computers

SID

Page 13: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Controlling Access to Resources

DACL Specifies Access

Permissions for a Resource

ACEs List Actions That Users or Groups Can Perform

SACL Specifies Users or

Groups to Be Audited

ACEs List Events to Be Audited Based on Successes or Failures

Page 14: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Domain Local Groups

Global Groups

Universal Groups

Defining Security Groups for Resource Access

Resources

TreeOUOU

OUOU OUOU

DomainDomain

DomainDomain

DomainDomain Domain Local

Groups

Global Groups

Universal Groups

Page 15: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Discussion: Authentication and Access Control

Houston

Windows 2000Domain Controllers

New York

Windows NT 4.0Domain

Windows NT

Windows 98

Page 16: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Introducing Encryption Technologies

Using Symmetric Key Encryption

Using Public Key Encryption

Using Digital Signatures

Page 17: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Using Symmetric Key Encryption

Encrypting Application Data

EFS S/MIME

Encrypting Communication Protocols

IPSec TLS

Shared Secret KeyShared Secret Key

Encryption by User1

Encryption Encryption AlgorithmAlgorithm

Shared Secret KeyShared Secret Key

Decryption by User2

Decryption Decryption AlgorithmAlgorithm

Page 18: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Using Public Key Encryption

Plaintext Ciphertext

User1

Plaintext

User2

Certification Authority

User2’s Public KeyUser2’s Public Key User2’s Private KeyUser2’s Private Key

Page 19: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Using Digital Signatures

Digest Digest FunctionFunction

User1 (Sender)

Plaintext

User1’s Private Key

Digest

EncryptedDigest

1111

2222

3333

User2 (Receiver)

User1’s Public Key

4444

6666Compare Compare

5555

Digest Digest FunctionFunction

Page 20: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Encrypting Stored and Transmitted Data

Encrypting Stored Data Using EFS

Encrypting Transmitted Data

Discussion: Encrypting Data

Page 21: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Encrypting Stored Data Using EFS

EFS Protects Stored Data

The File Encryption Key Encrypts the Data

The File Encryption Key Is Encrypted By:

The user’s public key

The EFS recovery agent’s public key

Page 22: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

IPSec Encrypts Data at the IP Layer

SSL Encrypts Data at the Application Layer

TLS Encrypts Data at the Application Layer

Encrypting Transmitted Data

Encrypted IP Packet

Page 23: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Discussion: Encrypting Data

Windows 2000Professional

Houston

Windows 2000Domain Controllers

New York

Windows NT 4.0Domain

Windows 2000Windows NT

Windows 95

Page 24: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Introducing Public Key Infrastructure Technology

Describing PKI Components

Using Digital Certificates for Authentication

Describing Certification Authorities

Page 25: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Describing PKI Components

Key and Certificate Management Tools

Certification Authority

Certificate Publication Point

Digital Certificate Public Key–Enabled

Applications and Services

Certificate Revocation List

Page 26: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Using Digital Certificates for Authentication

Issuer’s identity

Extensions

Subject’s identity

CA–issued ID number

Subject: Scott Culp

Issuer: CA1

Subject’s Public Key:

Serial Number: 29483756

Not Before: 6/18/99

Not After: 6/18/06Secure E-mail ClientAuthentication

Signed: Cg6&^78

Subject: Scott Culp

Issuer: CA1

Subject’s Public Key:

Serial Number: 29483756

Not Before: 6/18/99

Not After: 6/18/06Secure E-mail ClientAuthentication

Signed: Cg6&^78

Subject’s public key value

Validity period

CA’s digital signature

Page 27: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Describing Certification Authorities

Root CA

Intermediate CAs

Public Key–enabled Applications and Services

Page 28: Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.

Review

Introducing Security Features in Active Directory

Authenticating User Accounts

Securing Access to Resources

Introducing Encryption Technologies

Encrypting Stored and Transmitted Data

Introducing Public Key Infrastructure Technology