Active Directory and Oxford Single Sign-On



Similar documents
Kerberos authentication made easy on OpenVMS

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Using Integrated Windows Authentication with Websense Content Gateway, v7.6

Leverage Active Directory with Kerberos to Eliminate HTTP Password

IceWarp Server - SSO (Single Sign-On)

Enabling single sign-on for Cognos 8/10 with Active Directory

Charles Firth Managing Macs in a Windows World

Kerberos on z/os. Active Directory On Windows Server William Mosley z/os NAS Development. December Interaction with.

ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

BlueCoat s Guide to Authentication V1.0

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Kerberos: Single Sign On for BS2000

Guide to SASL, GSSAPI & Kerberos v.6.0

Active Directory 2008 Implementation Guide Version 6.3

Implementing a Kerberos Single Sign-on Infrastructure

Optimization in a Secure Windows Environment

Kerberos and Active Directory symmetric cryptography in practice COSC412

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

Going in production Winbind in large AD domains today. Günther Deschner (Red Hat / Samba Team)

Active Directory 2008 Implementation. Version 6.410

Single Sign-on (SSO) technologies for the Domino Web Server

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Configuring Active Directory Single Sign-On (AD SSO)

Vintela Single Sign-on for Java from Quest Software. Deployment Guide WebSphere Edition 3.2

CS 356 Lecture 28 Internet Authentication. Spring 2013

Juniper Networks Secure Access Kerberos Constrained Delegation

Section 4 Application Description - LDAP

Troubleshooting Kerberos Errors

Authentication Applications

Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization

Mac OS X Directory Services

Windows XP Exchange Client Installation Instructions

Active Directory network protocols and traffic

Use of EASE Code of Practice. This code of practice is also qualified by The University of Edinburgh computing regulations, found at:

Configuring Sponsor Authentication

NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman

IBM i Version 7.2. Security Single sign-on

Websense Support Webinar: Questions and Answers

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

TopEase Single Sign On Windows AD

SAP SINGLE SIGN-ON AND SECURE CONNECTIONS VIA SNC ADAPTER. Author : Matthias Schlarb, REALTECH system consulting GmbH. matthias.schlarb@realtech.

Vintela Single Sign-on for Java. Deployment Guide Standard Edition 3.2

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices Edition Don Jones

Authentication Applications

BusinessObjects 4.0 Windows AD Single Sign on Configuration

AAM Kerberos Relay Integration with SharePoint

TIBCO Spotfire Platform IT Brief

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

Cross-Realm Trust Interoperability, MIT Kerberos and AD

Microsoft. Official Course. Introduction to Active Directory Domain Services. Module 2

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Kerberos and Single Sign-On with HTTP

Vintela Single Sign-on for Java. Deployment Guide JBoss Edition 3.2

Ensure that your environment meets the requirements. Provision the OpenAM server in Active Directory, then generate keytab files.

IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES

Single sign-on enabled OpenCms

PingFederate. IWA Integration Kit. User Guide. Version 3.0

Integrating OID with Active Directory and WNA

Configuring IBM Cognos Controller 8 to use Single Sign- On

User Identification (User-ID) Tips and Best Practices

Single Sign-On for Kerberized Linux and UNIX Applications

Step- by- Step guide to Configure Single sign- on for HTTP requests using SPNEGO web authentication

Pulse Policy Secure. UAC Solution Guide for SRX Series Services Gateways. Product Release 5.1. Document Revision 1.0 Published:

Use Enterprise SSO as the Credential Server for Protected Sites

SSO Methods Supported by Winshuttle Applications

Architecture of Enterprise Applications III Single Sign-On

HOBCOM and HOBLink J-Term

Kerberos and Windows SSO Guide Jahia EE v6.1

Red Hat Enterprise ipa

Troubleshooting Kerberos Encryption Types

Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)

Windows Security and Directory Services for UNIX using Centrify DirectControl

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Microsoft Active Directory and Windows Security Integration with Oracle Database

User-ID Best Practices

Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications

Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory

Kerberos and Single Sign On with HTTP

INUVIKA TECHNICAL GUIDE

TIBCO ActiveMatrix BPM Single Sign-On

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON. Chad Watson Sr. Business Intelligence Developer

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

Other documents in this series are available at: servernotes.wazmac.com

SINGLE SIGN-ON FOR MTWEB

Centrify Single Sign-On

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

OV Operations for Windows 7.x

Configuring Kerberos Constrained Delegation

Integrating Linux systems with Active Directory

Configuring Authentication for Microsoft Windows

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

External Authentication with WebCT. What We ll Discuss

Centrify Identity and Access Management for Cloudera

NETASQ SSO Agent Installation and deployment

Configuring Squid Proxy, Active Directory Authentication and SurfProtect ICAP Access

Domain Services for Windows Administration Guide

Transcription:

Active Directory and Oxford Single Sign-On Bridget Lewis ICTST Adrian Parks OUCS 21 st June 2007 1

Aim How to link Active Directory to the Oxford Kerberos Single sign-on (SSO) infrastructure

What is Kerberos? Authentication protocol Not authorisation Client and server mutually authenticate 3

Authentication vs Authorisation Fred A. Stair Undergrad Cornflake College Guest List Donald Duck Fred Smith Lucy Jones The Doctor Fred A. Stair Authenticated Authorized 4

Why Kerberos? Single sign-on Centralised authentication Strong encryption No passwords over the wire 5

Kerberos in Oxford Herald WebLearn Apache/IIS webservers (via Webauth) edirectory Active Directory Open Directory 6

So how does it work? Simple, really 7

Like this 8

Basic Kerberos Functionality Trusted Third Party A 1: A, B S S B Client A B A Service B 9

Essential Terminology Principal user or service with credentials Ticket issued for access to a service Key Distribution Centre (KDC) issues tickets for principals in a realm Realm set of principals in a Kerberos database, e.g. OX.AC.UK, OUCS.OX.AC.UK TGT (ticket-granting ticket) confirms identity; used to obtain further tickets (Single Sign-on) 10

Kerberos and Active Directory Kerberos 5 implemented in AD (with added ) Every domain is a Kerberos Realm Every domain controller is a KDC Many services can use Kerberos CIFS, LDAP, HTTP Kerberos is preferred over NTLM Trusts between Kerberos Realms 11

Integrating Active Directory with Oxford Kerberos Realm Configure Active Directory Kerberos realm to trust Oxford Kerberos realm for authentication 1 OX.AC.UK KDCs 2 Trust Client A 4 3 Active Directory OUCS.OX.AC.UK KDCs 12

Integrating Active Directory with Oxford Kerberos Realm Authorization: AD uses SID, not username to determine what a user can do Usernames must exist in AD (Identity Management) Oxford usernames must be mapped to Active Directory users fred@ox.ac.uk fred@oucs.ox.ac.uk 13

So what does this mean in practice? The Good... Use Oxford account to authenticate to AD No need to issue passwords to new students each year Devolve password problems to OUCS 14

Case Study St Hugh s College ~ 20 Public Access PCs ~ 600 Students, intake of ~120 per year Passwords were issued manually each year Integrated with Oxford KDCs Account creation simplified via VB script Students use Herald password Administrative overhead reduced for ITSS 15

Case Study Language Centre User base is whole university! Potentially 40000 users Historically, all used one shared account Webauth plus Oxford SSO solution Users register for AD account via Webauth protected site AD account generated on the fly Log in to AD via the Oxford SSO solution Herald password 16

But there are some caveats The Bad... Access from PCs not in domain Including via web, e.g. Outlook WebAccess Some students don t know their Oxford password (approx 13%) Loss of external connectivity to central KDCs 17

...and some problems The Ugly... Fallback authentication is NTLM KDCs don t speak NTLM Some apps only speak NTLM Problems integrating other operating systems (OS X, other?) 18

Summary Works very well in certain scenarios E.g. shared filestore for students Reduced administrative overhead Not appropriate for all environments E.g. many services built on Active Directory (Exchange, Sharepoint, Web access to files etc.) 19

How do we set this up? Full details are on the ITSS wiki: https://wiki.oucs.ox.ac.uk/itss/kerberosadtrust 20

How do we set this up? 1. Check time is in sync (throughout domain and to ntp source) See appendix for details! 21

How do we set this up? 2. Request a Kerberos principal from the OUCS Systems Development team (sysdev@oucs.ox.ac.uk) krbtgt/full.ad.domain.name krbtgt/sthughs.ox.ac.uk krbtgt/zoo.ox.ac.uk 22

How do we set this up? 3. Change the password of the new principal (use linux.ox.ac.uk): 23

How do we set this up? 4. Check time is in sync 24

How do we set this up? 5. On all domain controllers, member servers and workstations, install the Windows Support Tools and run: ksetup /addkdc OX.AC.UK kdc0.ox.ac.uk ksetup /addkdc OX.AC.UK kdc1.ox.ac.uk ksetup /addkdc OX.AC.UK kdc2.ox.ac.uk Or use a registry file/group Policy (see wiki) 25

How do we set this up? 26

How do we set this up? 6. Create a one-way, outgoing, transitive trust between the Kerberos realm OX.AC.UK and the Active Directory forest Use the password set in step 3. 27

How do we set this up? 28

How do we set this up? 7. Check time is in sync 29

How do we set this up? 8. Add a name mapping for AD account to the Kerberos realm Format is oucs1234@ox.ac.uk Note uppercase OX.AC.UK 30

How do we set this up? 31

How do we set this up? 9. Reboot workstation and log in 32

Demo 33

Contact details bridget.lewis@ict.ox.ac.uk adrian.parks@oucs.ox.ac.uk 34

Some links ITSS Wiki: https://wiki.oucs.ox.ac.uk/itss/kerberosadtrust MIT: Designing an Authentication System: A Dialogue in Four Scenes http://web.mit.edu/kerberos/www/dialogue.html Microsoft: http://www.microsoft.com/technet/prodtechnol/windows2000serv/howto/kerbstep.mspx Kerberos: The Definitive Guide (Jason Garman/O'Reilly) http://www.amazon.co.uk/kerberos-definitive-guide-jason- Garman/dp/0596004036/ref=sr_1_1/202-9173258- 1666237?ie=UTF8&s=books&qid=1182273864&sr=8-1 35

Appendix A Utilities 2003 Resource Kit Utilities Kerbtray (GUI) Klist (command line) Support Tools Utilities (from 2003 CD) Ksetup (command line) Ktpass (command line)

Kerbtray Kerbtray displays tickets Picture shows TGTs for ITSSCONFADDE MO.OX.AC.UK and OX.AC.UK

Picture shows tickets for services in Active Directory Realm Kerbtray

Klist Klist as Kerbtray but command line

Support Tools Ksetup Set up realm information E.g. set KDCs for a given realm Ktpass Manipulating principals

MIT Kerberos for Windows http://web.mit.edu/kerberos/dist/ Another way of viewing tickets Maintains its own ticket cache Can import tickets from Microsoft cache Some applications can use these tickets

Network Identity Manager

Appendix B Additional Notes Time must be within 5 minutes of KDC time Logon may fail intermittently if logon allowed before network fully initialized (XP/2003) Group Policy setting Computer Configuration/ Administrative Templates/System/Logon Enable setting "Always wait for network on computer startup or user logon" Terminal Services Patch http://support.microsoft.com/default.aspx?scid=kb;en -US;902336

Short History of Time All DCs sync to PDC emulator (automatic) Member servers and workstations sync to Domain Controllers (automatic) PDC emulator must be sync d to ntp source Must update if you move PDC emulator role w32tm /config /manualpeerlist: "ntpserver1 ntpserver2 ntpserver3" /syncfromflags:manual /reliable:yes /update http://technet2.microsoft.com/windowsserver/en/library/ce8890cfef46-4931-8e4a-2fc5b4ddb0471033.mspx?mfr=true 44

Automated Account Creation OUCS can provide nightly update of Oxford usernames and other information to each unit http://www.oucs.ox.ac.uk/registration/card_dat a_2006.xml.id=body.1_div.9 Use scripts to feed into Active Directory 45

Full Kerberos Functionality KDC 2 parts AS: Authentication Server TGS: Ticket Granting Server AS A C B S S TGS C 2: A, B S S KDC Client A B A Service B 46

Other notes of interest Workstation authenticates too: problems for x-realm auth. DC devolution KDC patches available Macs edir preauth, timestamps, lifespan of tickets etc 47

Appendix C Use Wireshark to observe the Kerberos exchange 48

49

50

51

52

53