Windows 2000 Security Architecture: Microsoft Corporation
Windows 2000 Security Architecture: Microsoft Corporation
Microsoft Corporation
Topics
Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication Public key infrastructure Encrypting file system Network security Security policy Secure Windows
Single enterprise logon Strong authentication Authorization Secure communications Mandatory policy Auditing Interoperability Extensible architecture
Windows 2000
Single Sign On
Single account store in Active Directory Integrated Kerberos v5 logon Protected store for public key credentials Industry standard network security protocols
TGT
Kerberos V5 Integration
Client Server
KDC relies on the Active Directory as the store for security principals and policy
Kerberos Authentication
Mutual Authentication
Application Server (target)
4. Present service ticket at connection setup Target 1. Publish Service Connection Point and SPN
3. Request service ticket for <spn> 5. Mutual auth using unique session key
SMB protocol
Token
Access check
File
KDC
LDAP to Active Directory CIFS/SMB remote file access Secure dynamic DNS update System management tools Host-host IP security using IKE Secure Intranet web services in IIS Authenticate certificate request to Enterprise CA COM+/RPC security provider
Cross-platform Interoperability
RFC 1510 and RFC 1964 token format Testing with MIT Kerb V5 UNIX clients to Unix Servers UNIX clients to Windows Servers NT clients to UNIX Servers UNIX realm to Windows domain
Cross-realm authentication
LDAP
POP3, NNTP
SSPI
NTLM/ NTLMv2 Kerberos
SChannel SSL/TLS
MSV1_0/ SAM
KDC/DS
Organizational Unit (OU) hierarchy within a domain Users, groups, machines Domain configuration
OU OU Users
Active Directory
Authentication and Access Control
Authenticate using SASL and Kerberos protocol LDAP with SSL/TLS support Security
Descriptor
Bind Request
OU OU Users
Active Directory
Security administration
Delegation of administration
Grant permissions at organizational unit (OU) level Who creates OUs, users, groups, etc.
Grant or deny permissions on perproperty level, or a group of properties Read property Write property
Per-property auditing
Secure Applications
Connection Authentication
Secure Communication
IIS
3. WWW-Authenticate: ISAPI Negotiate <blob>
2. Ticket request to KDC
SQL Server
Server-A
Server-B 5. ASP uses ADO to 6. SQL Server query SQL, impersonates integrated security original client, requests ticket then data access
Interoperability
Cross Platform Secure 3-Tier App
Windows 2000 Professional Smart Card Logon
IE5 SSPI/Krb
IIS
HTTP
ISAPI Extension
TCP
SSPI/Krb
For clients User key and certificate mgmt Secure channel Secure storage CA enrollment Enterprise Certificate services Trust policy
Certificate Server
Server resources
Authentication service
Users
1. Verify user certificate based on trusted CA, CRL 2. Locate user object in directory by subject name 3. Build NT access token based on group membership 4. Impersonate client, object access verification
Key database
Windows NT File System - NTFS Crypto API key management LSA security policy
EFS Architecture
Applications Win32 layer
Crypto API User mode Kernel mode I/O manager
EFS service
NTFS
EFS
File Encryption
A quick brown fox jumped...
DDF
DRF
RNG
File Decryption
*#$fjda^j u539!3t t389E *& Users private key
DDF contains file encryption key encrypted under users public key
DDF is decrypted using the private key to get to the file encryption key
DDF
Secure Networking
Internet Protocol Security (IPSec) Extended Authentication Protocol/PPP Token and SmartCard support Remote Authentication Dial In User Service (RADIUS) Kerberos security package Public key (SSL/TLS) security package
Laptop or Home PC
A
Host
C
Internet Service Provider
Router or Tunnel Server Internet
Host
B
Host
Modems
Across Internet or private network with Windows 2000 <> Windows 2000 routers using IP tunnels IPSec Tunnel Mode L2TP/IPSec integrated tunneling
Corporate Net in LA
IP Tunnel
Corporate Net in DC
A
Host
Router C
Router D
B
Host
Internet
IP Security
IP Security Policy
Network layer
PA
PA
Policy Agent
Downloads
IPSEC
policy
IP Security Association
using Kerberos Authentication
Used for SMB data encryption KDC
Windows NT Directory Server
147.20.10.200
IKE
TCP IP
Enterprise Framework
Security settings in group policy Settings applied as part of policy enforcement on each computer
Secure Windows
Goals
Secure out-of-the-box Definition of secure system settings Backward compatible user experience
Upgrade can apply security configuration Administrators, Power Users, Users Group membership defines access
Administrators
Full control of the operating system Install system components, drivers Upgrade or repair the system Cannot compromise system integrity Read-only access to system resources Interactive and network logon rights Can shutdown desktop system Legacy application issues
Users
White papers