Microsoft Windows 2000 Active Directory Service. Technology Overview



Similar documents
Forests, trees, and domains

Active Directory. By: Kishor Datar 10/25/2007

9. Which is the command used to remove active directory from a domain controller? Answer: Dcpromo /forceremoval

Understanding. Active Directory Replication

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure

Windows Server 2008 Active Directory Resource Kit

Windows Server 2008 Active Directory Resource Kit

Windows Server 2003 Active Directory: Perspective

WINDOWS 2000 Training Division, NIC

FreeIPA 3.3 Trust features

Active Directory Restructuring Recommendations

Windows.NET Beta 3 Active Directory New Features

Windows Server 2003 Active Directory MST 887. Course Outline

Module 7: Implementing Sites to Manage Active Directory Replication

IT ACADEMY LESSON PLAN. Microsoft Windows Server Active Directory

How the Active Directory Installation Wizard Works

Chapter 3: Building Your Active Directory Structure Objectives

Websense Support Webinar: Questions and Answers

ACTIVE DIRECTORY REPLICATION: HOW IT WORKS

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

LearnKey's Windows Server 2003 Active Directory Infrastructure with Dale Brice-Nash

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Managing an Active Directory Infrastructure

Managing an Active Directory Infrastructure O BJECTIVES

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2

Implementing Domain Name Service (DNS)

ms-help://ms.technet.2004jul.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/reskit/distsys/part1/dsgch06.htm

CGIAR Active Directory Design Assessment DRAFT. 18 September 2007

Faculty Details. : Assistant Professor ( OG. ),Assistant Professor (OG) Course Details. : B. Tech. Batch : : Information Technology

Planning Domain Controller Capacity

Designing the Active Directory

Network System Management. Creating an Active Directory Domain

Introduction to Auditing Active Directory

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Microsoft. Jump Start. M11: Implementing Active Directory Domain Services

Introduction to Active Directory Services

Configuring Sites and Understanding AD replication. Dante Villarroel Saavedra

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Active Directory basics. Explaining Active Directory to IT professionals

Active Directory. Learning Objective. Active Directory

Active Directory network protocols and traffic

Microsoft Virtual Labs. Active Directory New User Interface

Introduction. Versions Used Windows Server 2003

SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Module 2. Configuring and Troubleshooting DNS. Contents:

VMware Identity Manager Administration

Module 11. Configuring and Managing Distributed File System. Contents:

Lesson Plans LabSim for Microsoft s Configuring Windows Server 2008 Active Directory

Microsoft. Official Course. Introduction to Active Directory Domain Services. Module 2

Designing the Active Directory Structure

ChangeAuditor 5.5. For Active Directory Event Reference Guide

Configuring Sponsor Authentication

Managing Celerra for the Windows Environment

Dell Compellent Storage Center

Configuring Windows Server 2008 Active Directory

Outline. Definition. Name spaces Name resolution Example: The Domain Name System Example: X.500, LDAP. Names, Identifiers and Addresses

Conquering the Challenges of IP Network Management with DHCP and DNS

Active Directory & SQL Server

Recommended Practices for Deploying & Using Kerberos in Mixed Environments

Module 1: Introduction to Active Directory

Module 1: Introduction to Active Directory Infrastructure

User-ID Best Practices

Windows Server 2012 Directory Partition Containers- A Walk Through

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Installing and Setting up Microsoft DNS Server

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Module 2: Implementing an Active Directory Forest and Domain Structure

EXAM Designing and Implementing a Server Infrastructure. Buy Full Product.

MOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008

User Identification (User-ID) Tips and Best Practices

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Active Directory 2008 Implementation. Version 6.410

Lesson Plans Managing a Windows 2003 Network Infrastructure

Enabling single sign-on for Cognos 8/10 with Active Directory

MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services

Guide to Securing Microsoft Windows 2000 Active Directory

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

Windows Server 2012 / Windows 8 Audit Fundamentals

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

ADMT v3 Migration Guide

5 Configuring a DNS Infrastructure

Active Directory network protocols and traffic

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR EROOM

Windows Active Directory. DNS, Kerberos and LDAP T h u r s d a y, J a n u a r y 2 7, 2011 INLS 576 Spring 2011

Integration with Active Directory. Jeremy Allison Samba Team

70-413: Designing and Implementing a Server Infrastructure

Chapter 2 Active Directory Design... 30

Transcription:

Microsoft Windows 2000 Active Directory Service Technology Overview

Agenda z Active Directory Structure Logical Physical Replication Operations z DNS Integration/Interaction z Kerberos V5 Functionality

Active Directory Logical Structure

The Active Directory Goals z z Address customer needs for a Directory Service Hierarchical namespace Partitioning for scalability Multimaster replication Dynamically extensible schema Online backup and restore Open and extensible directory synchronization interfaces LDAP as the core protocol for interoperability

Directory Service Enabling Technology - Distributed Services Replaces registry-based security account manager (SAM) 100% backwards compatible Adds many new features X.500 and DNS naming LDAP protocol support Domain hierarchy Extensible schema Multimaster replication

DS Structure z X500-Like Tree per Domain z Allows easy segmentation along organizational or geographic lines z Represents the unit of Replication (Naming Context) z Enables Granular Administration OU OU OU OU Domain OU OU OU OU OU

DS Schema z Contains a formal definition of the contents and structure of Active Directory Attributes Classes z Defines what attributes an instance of a class must have, what additional attributes it may have, and what object class can be a parent of the current object class.

Extensible Schema Object Class Computers Object Definition Object Name Object Identifier (OID) May-Contain Attributes Must-Contain Attributes Parent Classes Class Derived From Auxiliary Classes Extend with new objects Extend with new attributes Groups Users User Attributes First name Last name Logon name Attributes Attribute Definition Object Name OID Syntax Optional Range Limits

Naming Contexts z Portion of the LDAP namespace z Specific region inside a DCs database z Boundary for replication z Existing NCs: Configuration (Enterprise wide context) Schema (Enterprise wide context) Domains in Enterprise (Domain wide context for full replication, Enterprise wide context for partial replication to Global Catalogs)

Location of Naming Context in the Domain Namespace z Root of a Domain Namespace is the DNS name of the Domain z Objects and containers are children of the root z Configuration is child of the first domain in the enterprise (root domain), Schema is child of Configuration container

Knowledge References in AD z All knowledge about the namespace is held by Cross-Ref objects in the Partitions Container z Default Referral supported by: First determining if a value exists for the superiordnsroot attribute of the Forest Root, if so referral is generated using this value If not, then best effort to construct a referral using DC= components of DN presented

Domain Tree - Definition A collection of NT5 domains representative of a contiguous namespace and sharing a common schema and configuration container.

A Domain Tree Trust corp.com Trust Shared Active Directory sales.corp.com Trust accounting.corp.com

Domain Tree z Tree Renaming parent s domain will affect all its children s names. Moving domain in a tree, it will rename the from domain and its children. Joining two trees in a forest is possible Deep search on parent s domain will get referral on its children.

Trust Relationships One-way Explicit Trusts Two-way Transitive Trusts Windows NT 4.0 - Proprietary Windows NT 5.0 - Based on Kerberos V5 Protocol

Forest One or More Discontiguous Trees Intra Tree Relationship: Trust Share Common Schema & Global Catalog Single Domain Domain Tree Domain Forest

Global Catalog z Hosts all objects in the Enterprise It is hierarchical, not flat z Read-only Mode z Frequently queried properties enterprise wide are prime candidates for GC z Port Number is 3268 z Deep search at the root of name space will generate referral to GC

Global Catalog Forest Global Catalog Tree Tree Domain Domain Tree Domain Domain Domain Domain OU OU OU OU Domain Objects Global Catalog Server OU OU OU OU

Active Directory Physical Structure And Replication

Active Directory Implementation Physical Organization: Sites z Sites are areas of good connectivity, e.g. LANs, ATM nets, etc. z Not part of the logical namespace structure z DCs for a given domain can be distributed across many sites z A single Site can hold many different DCs z The physical organization provides faulttolerance and performance for the logical organization

Active Directory Implementation Physical Organization: Sites Site A Domain Controller Site B Domain Replica Global Catalog Site C

Intra-site Replication Site Replication Topology Links

Replication Terminology z Naming Context z Update sequence numbers z Watermark vector z State vector z Sites and Domains z Site links z Site link bridges

Database content LSASS.EXE Schema Configuration Starfleet.com NTDS.DIT z Domain Controller in Starfleet.com

Replication Fundamentals z Multi-master Replication z Replicated Operations Object Creation Object Manipulation Object Move Object Deletion z Originating Update Update was initiated by the DC or an application z Replicated Update Update was replicated from a replication partner z Object deletions create tombstones

Replication Fundamentals z Transitiveness of Replication Store/Forward mechanism Propagation dampening based on state vector z Domain Controller Server object (not machine account) Server GUID: Used to find DC using DNS Database GUID: Used to identify the DC s database in replication calls z Initially: Same as Server GUID z Changes if database is restored from backup

Replication Architecture z USN based z High-watermark vector used to detect updates on replication partner z Up-to-date Vector used to filter updates that have not yet reached the domain controller z Conflict reconciliation

Replication Architecture - USNs z 64 Bit DWORD z DC local meaning z Assigned to new object update transaction If transaction is aborted, then the USN is not assigned to any object z Each object carries two USNs usncreated, usnchanged z Each property carries two USNs z Indexed property in the database

Object Creation Add new user DS1 USN: 4710 USN: 4711 Object: usncreated : 4711 Object: usnchanged : 4711 Property Value USN P1: Value 4711 1 Version# Timest. TS Org. DB GUID DS1 DB GUID Org USN 4711 P2: Value 4711 1 TS DS1 DB GUID 4711 P3: Value 4711 1 TS DS1 DB GUID 4711 P4: Value 4711 1 TS DS1 DB GUID 4711

Object Replicated User replicated DS1 USN: 4711 USN: 1745 DS2 USN: 1746 Object: usncreated : 1746 Object: usnchanged : 1746 Property Value USN P1: Value 1746 1 Version# Timest. TS Org. DB GUID DS1 DB GUID Org USN 4711 P2: Value 1746 1 TS DS1 DB GUID 4711 P3: Value 1746 1 TS DS1 DB GUID 4711 P4: Value 1746 1 TS DS1 DB GUID 4711

Object Modification Change Password USN: 2001 DS2 USN: 2002 Object: usncreated : 1746 Object: usnchanged : 2002 Property Value USN P1: Value 1746 1 Version# Timest.. TS Org. DB GUID DS1 DB GUID Org USN 4711 P2: Value 2002 2 TS DS2 DB GUID 2002 P3: Value 1746 1 TS DS1 DB GUID 4711 P4: Value 1746 1 TS DS1 DB GUID 4711

Change Replicated Modified password replicated DS1 USN: 5039 DS2 USN: 5040 USN: 2002 Object: usncreated : 1746 Object: usnchanged : 5040 Property Value USN P1: Value 4711 1 Version# Timest. TS Org. DB GUID DS1 DB GUID Org USN 4711 P2: Value 5040 2 TS DS2 DB GUID 2002 P3: Value 4711 1 TS DS1 DB GUID 4711 P4: Value 4711 1 TS DS1 DB GUID 4711

High-watermark vector z Table on each DC Replication partners Highest known USN z Used to detect recent changes on replication partners

High-watermark vector DS4 DS1 USN 4711 DS2 USN 2052 DS3 USN 1217 DS4 USN 3388 DSA GUID Highest known USN DS1 GUID 4711 DS3 GUID 1217 z DS4 s high-watermark vector Assuming, that DS1 and DS3 are it s replication partners

Information sent in preparation of replication z Naming context for which changes are requested z Max. # of object update entries requested z Max. # of values requested z High-USN-changed value of naming context of replication partner z Complete up-to-dateness vector Used for propagation dampening

Up-to-dateness vector z Up-to-dateness related to a specific Naming Context z List of pairs: Originating-DC-GUID (Database GUID) Highest-Originating-USN z Only those DCs are added from which originating updates have been received (even through replication) z Stored as repluptodatevector, which is a property on the naming context object

Up-to-dateness vector DS1 USN 4711 DS2 USN 2052 DS3 USN 1217 DS4 USN 3388 DSA GUID Highest Org. USN DS1 GUID 4711 DS2 GUID 2050 z DS4 s up-to-dateness vector Assuming, that only DS1 and DS2 (and maybe DS4) performed originating write operations

Replication - DC4 DS1 USN 4711 z Step 1: User added to DS2 No changes for DS4 DS2 USN 2052 -> 2053 DS3 USN 1217 DS4 USN 3388 DC4 - Up-to-dateness vector DSA GUID Highest Org. USN DS1 GUID 4711 DS2 GUID 2050 DC4 - High watermark vector DSA GUID Highest known USN DS1 GUID 4711 DS3 GUID 1217

Replication - DC4 DS1 USN 4711 -> 4712 z Step 2: User replicated to DS1 No changes for DS4 Note: Write was originated on DS2! DS2 USN 2053 DS3 DS4 USN 3388 DC4 - Up-to-dateness vector DSA GUID Highest Org. USN DS1 GUID 4711 DS2 GUID 2050 USN 1217 DC4 - High watermark vector DSA GUID Highest known USN DS1 GUID 4711 DS3 GUID 1217

Replication - DC4 DS1 USN 4712 z Step 3: DS4 initiates replication with DS1 Sends NC, highest known USN DS1 for this NC, # objects, # valu up-to-dateness vector DS2 USN 2053 USN 3388 NC, 4711, 100, 100, vector DS3 USN 1217 DS4 DC4 - Up-to-dateness vector DSA GUID Highest Org. USN DS1 GUID 4711 DS2 GUID 2050 DC4 - High watermark vector DSA GUID Highest known USN DS1 GUID 4711 DS3 GUID 1217

DS2 USN 2053 Replication - DC4 DS1 USN 4712 Data, 4712, vector DS3 USN 1217 DS4 USN 3388 -> 3389 z Step 4: DS1 replicates new user to DS4 Sends data, last-object-changed USN, it s up-to-dateness vector DS4 uses DS1 s up-to-dateness vector to determine it s up-todateness DC4 - Up-to-dateness vector DSA GUID Highest Org. USN DS1 GUID 4711 DS2 GUID 2053 DC4 - High watermark vector DSA GUID Highest known USN DS1 GUID 4712 DS3 GUID 1217

Replication - DC4 DS1 USN 4712 z Step 5: DS2 replicates new user to DS3 No changes for DS4 DS2 USN 2053 DS3 DS4 USN 3389 DC4 - Up-to-dateness vector DSA GUID Highest Org. USN DS1 GUID 4711 DS2 GUID 2053 USN 1217 -> 1218 DC4 - High watermark vector DSA GUID Highest known USN DS1 GUID 4712 DS3 GUID 1217

Replication - DC4 DS1 USN 4712 z Step 6: DS4 initiates replication with DS1 Sends NC, highest known USN DS3 for this NC, # objects, # values, upto-dateness vector DS2 USN 2053 DS3 DS4 USN 3389 DC4 - Up-to-dateness vector DSA GUID Highest Org. USN DS1 GUID 4711 DS2 GUID 2053 USN 1218 DC4 - High watermark vector DSA GUID Highest known USN DS1 GUID 4712 DS3 GUID 1217

Replication - DC4 DS1 USN 4712 z Step 7: DS3 replication reply Determines, that DS4 already is up-to-date Sends last-object-changed USN, up-todateness vector, but no data! DS2 USN 2053 DS3 DS4 USN 3389 1218, vector DC4 - Up-to-dateness vector DSA GUID Highest Org. USN DS1 GUID 4711 DS2 GUID 2053 USN 1218 DC4 - High watermark vector DSA GUID Highest known USN DS1 GUID 4712 DS3 GUID 1218

Conflict Reconciliation - 1 z Attribute Value Conflict I.e., user changes his password on DC1, admin changes user s password on DC2 Reconciliation: higher version number -> higher timestamp -> higher GUID of originating write DSA z Move under deleted parent I.e., Admin creates user in OU1 on DC1, second Admin deletes OU1 on DC2 Reconciliation: OU1 is deleted, user moved to Lost and Found container

Conflict Reconciliation - 2 z Object creation name conflict I.e., two administrators create two user objects with identical RDNs on two DCs at the same time Reconciliation: One object (identified by it s GUID) receives a system wide unique value on the conflicting attribute (here the RDN) z In Beta 2: Both RDNs get new value Reconciliation: higher version number -> higher timestamp -> higher GUID of originating write DSA

Urgent Replication z Initiated by SAM or LSA (not by LDAP writes) for: Newly locked-out account RID pool changes DC Machine Accounts ( Post Beta 2?) z These trigger an immediate replication cycle within the site z Uses notification

Replication Transports z Intra-Site DS-RPC z Inter-Site DS-RPC ISM-SMTP

Replication Topology z z z Topology Generator on each DC (KCC) Local Operation Computes topology and creates/deletes connection objects Connection Object defines incoming replication from partner Single connection object per replication partner One topology per NC Configuration NC and Schema NC share same topology Each Domain NC has it s own topology GCs embrace Domain NCs Topology is built on top of sites For each NC, a bi-directional ring is automatically built within sites For each NC, a spanning tree topology is automatically built between sites Can be over-written

Replication Model z Intra Site RPC Replication in a Site - Uncompressed KCC Generates a bi-directional Ring with extra edges z Inter Site z Algorithm ensures no more than three hops between any two DCs Minimum cost Spanning Tree DS-RPC - Can be compressed SMTP

Intra-Site Replication z DC GUID is used to construct the ring z New installed DCs add themselves to the ring, and replicate the new configuration information z Existing DCs add/remove connection objects z For simplicity: This is a GUID: z 1509e139-1dcd-11d2-9e98-98493b0b9910 This is what we use: 1

DNS

Role of DNS z z z Active Directory Domains named with DNS names europe.microsoft microsoft.com Machines named with DNS names printserver1.hq hq.microsoft.com REPLACES NETBIOS NAMING! (Negates need for Netbios Dependent Services e.g., WINS, Browser, etc.)

Microsoft DNS New Features in NT5 z z z z z Dynamic DNS Active Directory replication integration Unicode character support Enhanced DNS Manager Caching resolver service

SRV RR ms.com IN SRV 2 10 389 dc01.ms.com ms.com IN SRV 1 30 389 dc02.ms.com ms.com IN SRV 1 50 389 dc03.ms.com ms.com IN SRV 1 20 389 dc04.ms.com z dc02, dc03, dc04 will be tried first before dc01 z dc02, dc03, dc04 will be picked 30%, 50% and 20% respectively z If all failed, dc01 will be picked 100%

The Domain Locator z Components of <domain> Active Directory domain name: hq.microsoft microsoft.com Optional site identifier: redmond.sites..sites.hq.microsoft.com Optional role: pdc.ms-.ms-dcs, gc.ms-.ms-dcs, for example: gc.ms-.ms-dcs.hq.microsoft.com

Microsoft DNS Dynamic DNS Protocol z IETF proposed standard (RFC 2136) z z Capabilities Add and delete records Updates are atomic Updates sent to authoritative server Client must locate authority Server with secondary zone forwards to server with primary zone

Microsoft DNS Dynamic DNS Client z z z Hostname <Computer Name>.<DNS Domain Name> DNS Domain Name is per-adapter Configured via DHCP, or by hand Name collision detection: Assert hostname is unique using prerequisites

Microsoft DNS Dynamic DNS Client z z DHCP client Track names and addresses Send A RR updates to DNS Ask DHCP server to update PTR RRs DHCP server Register PTR RRs for clients Remove PTR RRs when leases expire z z Optional - also remove A RR Garbage collection

Microsoft DNS Dynamic DNS Client z z z Downlevel hosts DHCP server can be configured to register A, PTR RRs for downlevel clients DHCP-DNS interaction is Internet-Draft draft-ietf ietf-dhc-dhcp-dns-04. -04.txt Moving toward standards track

DNS and Active Directory Save Site in the registry ldap.tcp.ms.com? Andyhar01 in Redmond ( new machine) 1. Client s Site (redmond) 2. DC s Site (detroit) 3. Closest Site Bit (false) dc01 and dc02 redmond.site.ms-dc.ms.com? dc02 ldap.tcp.ms.com SRV dc01 detroit.site.ms-dc... dc01 ldap.tcp.ms.com SRV dc02 redmond.site.ms-dc... dc02 DNS dc01 Detroit dc02 Redmond site+subnet objects

DNS Locator Retrieve Site in the registry Save Site Andyhar01 laptop (travel to Detroit) dc01 detroit.site.ms-dc.ms.com? redmond.site.ms-dc.ms.com? dc02 1. Client s Site (det) 2. DC s Site (redmond) 3. Closest Site Bit (false) ldap.tcp.ms.com SRV dc01 detroit.site.ms-dc... dc01 ldap.tcp.ms.com SRV dc02 redmond.site.ms-dc... dc02 DNS dc01 Detroit dc02 Redmond site+subnet objects

The Machine Locator z Machines named with DNS names z Machines register A RRs in DNS z Some capability already available in NT 4.0 net view \\printserver1.hq hq.microsoft.com DNS names work in admin tools

Microsoft DNS ADS Replication Integration z z DNS zone-xfer is single master Alternative - store zone in ADS Name is object, RRset is attribute Zone file: microsoft.com IN A 207.68.156.54 microsoft.com IN MX 10 mail1.microsoft microsoft.com. ADS object: dnsnode = microsoft.com A = 207.68.156.54 MX = 10 mail1.microsoft microsoft.com.

Microsoft DNS ADS Replication Integration (cont d) 1) receive update 3) send NOTIFY 4) pull AXFR 2) write to zone file 5) write to zone file Primary Secondary Zone files

Microsoft DNS ADS Replication Integration (cont d) 1) receive update 2) write to ADS 4) change notify, read from ADS ADS DNS 3) ADS replicates ADS DNS primary zones

Microsoft DNS DNS Manager z z z z Microsoft Management Console Snap-in Wizards for Setting up new servers Managing zones, creating common records Flexible access control Assign access using ADS groups Per-server and per-zone control Monitoring

Windows NT 5.0 Kerberos Implementation z Single sign on to Windows NT domains and Kerberos-based services z Integrated Windows NT authorization z PK extensions for smart card logon z Active Directory support for account management z Active Directory trust hierarchy z Application support through SSPI

Kerberos Protocol Benefits z z z z z Faster connection authentication Server scalability for high-volume connections Reuse session tickets from cache Mutual authentication of both client, server Delegation of authentication Impersonation in three-tier client/server architectures Transitive trust between domains Simplify inter-domain trust management Mature IETF standard for interoperability Testing with MIT Kerberos V5 Release

Client Kerberos Integration Server KDC relies on the Active Directory as the store for security principals and policy Kerberos SSPI provider manages credentials and security context; LSA manages ticket cache Key Distribution Center (KDC) Session ticket authorization data supports NT access control model Windows NT Active Directory Windows NT Domain Controller

Kerberos Authentication Interactive Domain Logon TGT 2. Use hash(pwd pwd) to sign pre-auth data in AS request 3. Group membership expanded by KDC, added to TGT auth data 4. Send TGS request for session ticket to workstation Ticket - NTW Key Distribution Center (KDC) 1. Locate KDC for domain by DNS lookup for AD service Windows NT Active Directory Windows NT Domain Controller

Security Support Provider Interface Client SSPI Kerberos Security Package SSPI Server Kerberos Security Package Application protocol carries all data Kerberos SSP manages security context

Kerberos Authentication Network Server connection Application Server (target) 2. Present session ticket at connection setup Target 3. Verifies session ticket issued by KDC 1. Send TGT and request TGT session ticket from KDC for target server Key Distribution Center (KDC) Windows NT Active Directory Windows NT domain controller

Cross-domain Authentication company.com west.company.com east.company.com KDC TGT 2 TGT 3 KDC TGT 1 TICKET 4 srv1.east.company.com Windows NT Workstation Windows NT Server

Windows NT 5.0 Integration Kerberos Authentication Use z LDAP to Active Directory z CIFS/SMB remote file access z Secure dynamic DNS update z Distributed file system management z Host-host IP security using ISAKMP z Secure Intranet web services in IIS z Authenticate certificate request to Enterprise CA z DCOM/RPC security provider

Secure Dynamic DNS Update 157.55.20.100 DHCP KDC Windows NT Active Directory host.domain.company.com DNS Microsoft DNS Server

Authentication and Authorization z Authenticate using domain credentials User account defined in Active Directory z Authorization based on group membership Centralize management of access rights z Distributed security tied to the Windows NT Security Model Network services use impersonation Object-based access control lists

Authorization Data z What is the client allowed to do? Based on Windows NT group membership Identified by Security Ids (SIDs) in NT security architecture z NT KDC supplies auth data in tickets At interactive logon (AS exchange): z User SID, global, universal group SIDs At session ticket request (TGS exchange) z Domain local group SIDs

Authorization Data z Kerberos protocol supports auth data in tickets Examples: DCE and Sesame architectures z Revision to RFC 1510 Clarifications on client, KDC supplied data Submitted by Ted Ts o, Clifford Neuman z Interoperability issues are minimum NT auth data ignored by UNIX implementations

Building An Access Token From A Kerberos Ticket z z z Kerberos package gets auth data from session ticket LSA builds access token for security context Server thread impersonates client context Target Session ticket LSA Kerberos Server application Impersonation token Auth data: User SID Group SIDs Privileges Token

Remote File Access Check Client File application SSPI Rdr Kerberos SSP Token SMB protocol Ticket Server Kerberos SSP \\infosrv\share NTFS Token Access check KDC SD File

Interoperability Goals z Cross-platform protocol interoperability Authentication Message integrity (sign/verify) Confidentiality (seal/unseal) z Single user account store Scalability and ease of administration z Use existing authorization mechanisms Name-based authorization Integrated Windows NT authorization

Summary z Standards-based secure protocol implementation z Integration with Active Directory for scalability, ease of management z Integration with Windows NT distributed system services