Microsoft vs. Red Hat. A Comparison of PKI Vendors



Similar documents
S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014

Certificate technology on Pulse Secure Access

Certificate technology on Junos Pulse Secure Access

Entrust Managed Services PKI

Using etoken for Securing s Using Outlook and Outlook Express

The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

Public Key Infrastructure for a Higher Education Environment

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points

HKUST CA. Certification Practice Statement

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

TELSTRA RSS CA Subscriber Agreement (SA)

PKI Services: The Best Kept Secret in z/os

Websense Content Gateway HTTPS Configuration

Developers Integration Lab (DIL) Certificate Installation Instructions. Version 1.4

Certification Practice Statement

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

Installation and Configuration Guide

Step-by-step installation guide for monitoring untrusted servers using Operations Manager (Part 1 of 3)

Setting Up SSL on IIS6 for MEGA Advisor

Computer and Network Security. Outline

ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder)

Axway Validation Authority Suite

CS 356 Lecture 28 Internet Authentication. Spring 2013

Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory

Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004

Agenda. How to configure

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Configuring Digital Certificates

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Installation Guide. SafeNet Authentication Service

NIST ITL July 2012 CA Compromise

Title: How to set up SSL between CA SiteMinder Web Access Manager - SiteMinder Policy Server and Active Directory (AD)

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3

prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to

DEPARTMENT OF DEFENSE ONLINE CERTIFICATE STATUS PROTOCOL RESPONDER INTEROPERABILITY MASTER TEST PLAN VERSION 1.0

Grid Computing - X.509

Certificate Request Generation and Certificate Installation Instructions for IIS 5 April 14, 2006

Comodo Certificate Manager Version 5.4

Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER

Public Key Infrastructure

Using Entrust certificates with VPN

PKI Architecture for VISIONng Proposal by A-TrustA

Procedure for How to Enroll for Digital Signature

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

Key Management and Distribution

WHITE PAPER Citrix Secure Gateway Startup Guide

DIGIPASS CertiID. Getting Started 3.1.0

Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Chapter 7 Managing Users, Authentication, and Certificates

TechNote. Contents. Overview. Using a Windows Enterprise Root CA with DPI-SSL. Network Security

Understanding digital certificates

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Administration Guide Certificate Server May 2013

Interwise Connect. Working with Reverse Proxy Version 7.x

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

Validating Digital Signatures in Adobe

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support

Certificate Management

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

Cisco TelePresence VCS Certificate Creation and Use

Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

Cisco Expressway Certificate Creation and Use

Security Digital Certificate Manager

TIBCO Spotfire Platform IT Brief

Cisco TelePresence VCS Certificate Creation and Use

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0

Key Management and Distribution

Windows Intune Walkthrough: Windows Phone 8 Management

Certificate Authority Product Overview Technology White Paper

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Symantec Managed PKI Service for Windows Service Description

Djigzo S/MIME setup guide

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Exchange Reporter Plus SSL Configuration Guide

SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date Version V1.0

Integrated SSL Scanning

SAFE Digital Signatures in PDF

CALIFORNIA SOFTWARE LABS

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

6421B: How to Install and Configure DirectAccess

SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates

70-647: Windows Server Enterprise Administration

Transcription:

Microsoft vs. A Comparison of PKI Vendors 1

Outline Definitions Issue #1: RedHat vs. Microsoft CA Issue #2: Cross Flows Issue #3: Core PKI Recommendation 2

Definitions User or Enrollment Officer - The entity that requests an X509 v3 certificate. Both vendors provide URL access to the CA for the purposes requesting a certificate. PKI Approving Agent - The entity that approves and issues the X509 v3 certificate. This entity is needed if auto enrollment is not used. OCSP - Online Certificate Status Protocol is an application protocol used query the status of the validity of a certificate. CRL - Certificate Revocation List is a product of the CA and is a signed list of serial numbers and revocation dates of all revoked certificates. Both CAs produce CRLs. MiniCRL - Mini Certificate Revocation List is a proprietary condensed version of a CRL. Usually 200-400 byte in size. Handy in low bandwidth situations. Air Gap - A method to transfer data from one domain to another not using network connectivity. 3

Issue #1: Microsoft vs. Microsoft provides a CA service with all of its family of servers: 2000, 2003 and 2008. This service is included free, has been in use since the introduction of Server 2000, and is widely used in industry and in government. TVE R2 is using a Microsoft CA in its ESS. This has prompted an analysis of whether LCSS SR 3 TacPKI should switch from a RedHat CA to a Microsoft CA for compatibility. The following slides detail the differences between token provisioning using both CAs. 4

Token Provisioning Token provisioning is the process of Assigning a token to an end user Generating the public/private key pair Generating a certificate request Retrieving the certificate from the Authority Importing the certificate to the token device. 5

Token Provisioning End User or enrollment officer Logs onto a client machine in the PKI domain Opens a web browser and enters the URL for the CAs End-user certificate services Fills-in required information and submits a request for a user certificate PKI Approving Agent Logs onto a client machine in the PKI domain Opens a web browser and enters the URL for the CA Agent services Locates and reviews/issues the certificate End User or enrollment officer Logs back into the client machine and uses the same browser and URL then imports the Certificate into the browser. From the browser the certificate is located and exported to the desktop in PKCS# 12 format. Launches etoken PKI application and imports the certificate chain onto the etoken device. Device ready for the end user. 6

Microsoft Token Provisioning User or enrollment officer Logs on to a client machine in the PKI domain From a browser connects to the MS CA via URL Submits a request for a certificate PKI Approving Agent Logs into the CA and opens the Certification Authority Snap-in and reviews/approves the request (issues the cert). User or enrollment officer Opens the browser and imports the certificate into the browser. The certificate is exported to the desktop in PKCS #12 format. Launches etoken PKI Client to import user certificate to etoken device. The etoken is ready to be used. 7

Microsoft Data Flows Microsoft CA publishes its CRLs and user certificates to Active Directory (AD) The TVA consumes the CRL and user certificates from the AD The TVA publishes OCSP response lists and minicrls The TVA can be configured as an OCSP responder The responders consume OCSP response lists and minicrls The Responders provide status responses to domain Desktop Validation Clients (DVC) All status requests and responses occur over Https connections 8

Pros & Cons of Microsoft CA with AD Pros: Microsoft CA functionality is included with the Server 2000, 2003, 2008 OS There are many MS servers in the current architecture that could be a CA. MS CA uses Active Directory to store certs, CRLs and user info. No duplicate identity information user information MS CA can be configured to use other LDAP Directories ESS is using MS CA and AD for TVE attestation purposes No products are necessary Currently supports PKI components Common MMC interface to MS CA is well know to system administrators AD exists in each domain currently. Cons: MS CA administration required in all affected domains The additional purchase of etoken Token Management System (TMS) is suggested, but not critical. Used to manage token assignment, enrollment, and certificate import. 9

Pros & Cons of RedHat CA Pros: Purchased, configured and installed in SOSPI for proof of concept demo Licenses exist to extend current architecture into the SBU domain No direct user contact with servers, functions are executed via URL network access Cons: Administration is cumbersome and configuration is complex User information duplicated between AD and the LDAP directory server Linux required for CA and Directory Is not compatible with etoken Token Management System 10

Issue #2: Cross Flows Currently in SOSPI there are no PKI directory servers in the Secret/SBU domains Target architecture has PKI directory servers in the Secret/SBU domains 11

Current Cross Activities Core PKI High Level Activities include: Certificate Authority (CA) publishes user certificates and Certificate Revocation Lists (CRLs) to the directory Validation Authority (VA) consumes the user certificates and CRL and publishes MiniCRLs and OCSP response lists Transferring PKI data to the secret domain is performed via air gap. There are two different methods that accomplish this. 1. Copy OCSP response lists and MiniCRLs from the VA to transfer media then copy OCSP responses and MiniCRL to the secret TVA 2. Copy CRLs and user certs from the LDAP directory to the transfer media then copy CRLs and user certs to secret TVA to produce MiniCRL and OCSP Responses PKI PKI MS Microsoft Secret Directory Server 2 User Certs CRLs Secret CA VA 1 MiniCRLs OCSP Response lists Tactical Validation Responder Authority 12

Current Cross Activities Cont. Secret Secret If multiple security domains use PKI services then all activities on previous slide occur in all domains. Microsoft Tactical Validation Responder Authority PKI PKI MS Directory Server CA VA SBU SBU Microsoft Tactical Validation Authority Responder 13

Directory Server in Secret Adding a directory in the secret domain provides for data transfer of one file for air gap transfer to the Secret domain. PKI An ldif export / import from the PKI to the secret directory server provides the TVA with a source of user certs and CRLs MS Directory Server CA VA TVA consumes CRLs and user certs from the directory and publishes its own MiniCRL and OCSP response lists LDIF Export/Import Secret Secret Microsoft Directory Server Tactical Validation Authority Responder 14

Directory Server in Secret Cont. Secret Secret For multiple domains using PKI services, the ldif export/import occurs in all domains. This makes the exported database the same in the target domain. Microsoft Directory Server Tactical Validation Authority Responder PKI Ldif Export/import PKI MS Directory Server CA VA SBU SBU Ldif Export/import Microsoft Directory Server Tactical Validation Authority Responder 15

Benefits Directories in the Secret/SBU domains provide the following benefits: Ease of use importing individual certificates into the TVA is very time consuming Less data that needs to go cross domains If we choose to go with a Microsoft CA, then a directory (AD) already exists in each domain 16

Issue #3: Core PKI Original purpose for PKI domain was to have certificates classified as vanilla so that they could then be exported into both Secret and SBU domains Because we are using certificates for signing emails, the certificates must be bound to an email address. Therefore, there is no way to make a domain agnostic certificate. The current architecture requires separate certificates for the Secret and SBU domains Question then arises whether we should remove the PKI domain and have a separate CA in both the Secret and SBU domains to manage domain specific certificates 17

Cross Activities with Multiple CAs TacPKI data flows between domains with respect to validating signatures is reduced with the introduction of a CA in each domain. If signed message traffic crosses domains and signature validation is required, then there will be a need for a CDS. Microsoft Secret Microsoft CA Secret Tactical Validation Authority Responder SBU SBU Microsoft /AD Microsoft CA Tactical Validation Authority Responder 18

Token Provisioning without PKI domain Token provisioning using PKCS #12 is the method used for SoSPI. The CA is not connected to a reachable network. The addition of a tactical CA in a security domain allows for a cleaner provisioning process than using PKCS#12 files. Token Management System is an application server/client package from etoken that is a management tool covering full token life cycle. 19

etoken TMS The Token Management System (TMS) manages the etoken throughout the entire lifecycle from Assignment thru EOL Benefits: Integrates with Microsoft CA Can be configured for end user self enrollment Need one license for each PKI domain Loads the certificate directly to the token User certificate renewal Public/Private key pair generated on the token 20

Issue Consolidation & Recommendation Due to these issues, the recommendation is to do the following: Switch to a Microsoft CA and use AD for directory services Get rid of the PKI domain and have a CA/AD in each domain requiring certificate services There is already a Microsoft Server (where Certificate Services could be turned on) and AD in each domain Use the etoken TMS to manage certificates 21