Modern Multi-factor and Remote Access Technologies



Similar documents
Security Considerations for DirectAccess Deployments. Whitepaper

1. Introduction to DirectAccess. 2. Technical Introduction. 3. Technical Details within Demo. 4. Summary

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Implementing Core Cisco ASA Security (SASAC)

Load Balancing Microsoft 2012 DirectAccess. Deployment Guide

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Advanced Administration

Cisco VPN Concentrator Implementation Guide

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Building Your Complete Remote Access Infrastructure on Windows Server 2012

70-685: Enterprise Desktop Support Technician

VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014

Introduction to the Mobile Access Gateway

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Windows 7, Enterprise Desktop Support Technician

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

PULSE. Pulse for Windows Phone Quick Start Guide. Release Published Date

How To Configure L2TP VPN Connection for MAC OS X client

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

Getting Started with Clearlogin A Guide for Administrators V1.01

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

iphone in Business How-To Setup Guide for Users

ADAPTIVE USER AUTHENTICATION

University of Central Florida UCF VPN User Guide UCF Service Desk

Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016

Understanding the Cisco VPN Client

Vidder PrecisionAccess

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

This section provides a summary of using network location profiles to identify network connection types. Details include:

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Security. TestOut Modules

Multi-Factor Authentication Job Aide

VPN_2: Deploying Cisco ASA VPN Solutions

Securing Networks with Cisco Routers and Switches ( )

Course 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile

Scenario: IPsec Remote-Access VPN Configuration

HOTPin Integration Guide: DirectAccess

Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Using Entrust certificates with VPN

Leveraging SAML for Federated Single Sign-on:

A Guide to New Features in Propalms OneGate 4.0

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Security Technology: Firewalls and VPNs

Lesson Plans Administering Security in a Server 2003 Network

Scenario: Remote-Access VPN Configuration

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Get Success in Passing Your Certification Exam at first attempt!

Configuration Guide BES12. Version 12.2

Virtual Private Networks (VPN) Connectivity and Management Policy

Apache Server Implementation Guide

Integration Guide. SafeNet Authentication Service. Using RADIUS and LDAP Protocols for Cisco Secure ACS

Endpoint Security VPN for Mac

ipad in Business Security

VPN. Date: 4/15/2004 By: Heena Patel

Configuration Guide. BES12 Cloud

Mobile Admin Security

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: Copyright 2013, Juniper Networks, Inc.

ADDING STRONGER AUTHENTICATION for VPN Access Control

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

Deploying iphone and ipad Virtual Private Networks

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Deploying iphone and ipad Security Overview

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

API-Security Gateway Dirk Krafzig

Ensuring the security of your mobile business intelligence

iphone in Business How-To Setup Guide for Users

iphone in Business Security Overview

Connecting an Android to a FortiGate with SSL VPN

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

A new Secure Remote Access Platform from Giritech. Page 1

802.1x in the Enterprise Network

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

FileCloud Security FAQ

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Deploying Cisco ASA VPN Solutions

The Secure Web Access Solution Includes:

How To Configure Apple ipad for Cyberoam L2TP

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

On-boarding and Provisioning with Cisco Identity Services Engine

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Enhancing Web Application Security

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Transcription:

Modern Multi-factor and Remote Access Technologies ANDREW BRICKEY Senior IT Engineer Identity and Access Management / Core Computing Services NLIT Summit 2016 May 11, 2016 1

Agenda Problem and solution statements Overview of multifactor requirements and potential technologies Overview of remote access requirements and potential technologies Path forward May 11, 2016 2

Problem and solution statements Traditional VPN paired with traditional multi-factor solutions are inflexible and at times too costly (hardware, software, etc) Why can t I have the same remote access for my Microsoft Surface that I get with my iphone and ipad? Is the comparison fair and what can be done to achieve the same level? Is traditional multi-factor used with remote access LOA3? Is it assumed that remote access means full or partial network access? LOA2 x 2 = LOA3 LOA3 < LOA4 (Say what?) LOA3 is fine for remote access transport but not authentication? How do we do what is compliant but maintain seamless access while also increasing functionality and flexibility? Is this impossible? May 11, 2016 3

Multifactor Requirements and Solutions Level of assurance (LOA) defined: The level of assurance is measured by the strength and rigor of the identity proofing process, the strength of the token used to authenticate the identity claim, and the management processes the identity provider applies to it. LOA1: Provides some assurance that the Claimant who participated in previous transactions is accessing the protected transaction or data LOA2: Provides single factor network authentication. Identity presentation is required during enrollment. (Secret tokens, Knowledge Tokens, Look-up Secrets, Out of band tokens, OTP devices) LOA2(secret you know) + LOA2(OTP device you have) = LOA3 LOA3: Provides multi-factor network authentication. Identity proofing is required and verified during enrollment. At least two authentication factors are required. (Know, Have, Are) Multi-factor software cryptographic tokens are allowed at LOA3 LOA4: Provides highest assurance. In-person identity proofing is required. Based upon proof of possession of a key through cryptographic protocol Similar to LOA3 but requires hard cryptographic tokens (FIPS 140-2 L3) May 11, 2016 4

Multifactor Requirements and Solutions May 11, 2016 https://gsa.github.io/ficam-arch/usecases/index/ 5

Multifactor Requirements and Solutions (Continued) Traditional/Proven Examples: LOA1 = An email address or randomly generated PIN LOA2 = An assigned/trusted username & complex password combination An x509 certificate issued from a trusted source A single-factor OTP like RSA without PIN LOA3 = RSA token + PIN, x509 Cert + PIN (LOA2 + LOA2) FIPS 140-2 Level 1 cryptographic solution LOA4 = HSPD12 PIV badge, RSA token with integrated PIN keypad FIPS 140-2 Level 3 cryptographic devices May 11, 2016 6

Multifactor Requirements and Solutions (Continued) Modern/Future Examples: LOA1 = Google, Facebook, Microsoft account LOA2 = A single-factor OTP like Google Authenticator FIDO U2F Security Key And many more LOA3 = Microsoft Virtual Smart Card (VSC) protected by TPM Windows Hello (Facial, Biometric)? Mobile device with software certificate + device PIN And many more FIPS 140-2 Level 1 cryptographic solutions LOA4 = USB based YubiKey, Gemalto, PIVKey cryptographic tokens FIPS 140-2 Level 3 cryptographic devices May 11, 2016 7

Multifactor Requirements and Solutions (Continued) Thoughts on future multi-factor implementation(s): Be compliant but be feature and option rich for the end users Embrace multi-platform technologies but don t limit all devices to the least common of functionality Increase the overall security posture of the network by making it more convenient for system admins to use MFA Embrace future multi-factor technologies by being foundationally prepared to allow for newer credential types May 11, 2016 8

Multifactor Requirements and Solutions (Continued) May 11, 2016 9

Remote Access Requirements and Solutions.. In recent years traditional multi-factor based remote access has evolved but hasn t evolved at the same pace of mobile devices Still using RSA tokens + PIN and Cisco AnyConnect ios and Android devices leveraged a certificate based solution paired with a device PIN to provide limited access to network services Limited access to the network because the devices are BYOD Limited access to the network because device cert + device PIN on BYOD can be iffy when a 5 year old is watching Netflix in the back seat Where can we go from here now that we have newer multi-factor technologies and modern operating systems? May 11, 2016 10

Remote Access Requirements and Solutions.. To find out where we can take newer technologies, we must first define how we want the modern remote access solution to function Requirement #1 Convenient for consumers to use Always connected or easily connected remote experience Token-less experience on many devices Requirement #2 A net increase in functionality for consumers While traditional VPN gave 100% access to the network, maybe it s time to reduce access to 95% of the network while decreasing frustration by 80% Requirement #3 A net increase in security for the network Leverage always on connectivity to stream security telemetry data back to incident response personnel 24/7 rather than waiting for the device to come home Requirement #4 A net increase in supportability for IT support staff Leverage always on connectivity to push updates, configuration changes and other IT related activities 24/7 rather than waiting for the device to come home Requirement #5 Be platform agnostic as much as possible Leverage what Microsoft and other OS platforms have to offer without sacrificing one for the other May 11, 2016 11

Remote Access Requirements and Solutions.. Requirements Summary A remote access technology that provides the device access to a limited subset of the network to provide authentication, monitoring, management and other device functionality This tunnel will leverage a device certificate at minimum with device password being a secondary nice to have requirement. Assumption: Device requires a PIN to boot up, thus adding additional layers A remote access technology that provides the user access to a large subset of the network to provide access to applications, email, files and other user focused services This tunnel will leverage LOA3 or LOA4 (preferably) multi-factor technologies through a convenient user friendly experience Assumption: Before the user tunnel is initiated, the device tunnel must be connected and secure The user tunnel will operate in split tunnel mode allowing the user access to local resources at home (printers, etc) and services while traveling May 11, 2016 12

Remote Access Requirements and Solutions.. Solution : Microsoft DirectAccess Fully functional and secure remote access solution built into Windows Server 2012 R2 DirectAccess client built into Windows 8 Enterprise and above DirectAccess provides multiple independent tunnels for the device and the logged on users (Infrastructure and User) Leverages IPv6 technologies but does not require external or internal IPv6 addressing for your enterprise network Traffic is tunneled using IP-HTTPS over TCP port 443* Can be configured to work with existing smart card authentication to provide a seamless single sign-on experience for end-user Is scalable and redundant through the use of load-balancers and Multisite May 11, 2016 13

Remote Access Requirements and Solutions.. DirectAccess : How does it work?. and other Magic DNS64 and NAT64 are used in conjunction with IP-HTTPS auto-assigned 2002::/16 global unicast address (GUA) or internally defined IPv6 prefix * Intranet IPv4 resources are translated via DNS64 into IPv6 addresses to be tunneled by DA server(s) and NAT d via NAT64. IPv6 unique local address (ULA) prefix + internal IPv4 in hex fd86:9f51:a64b:7777 + a70:13 (10.112.0.19) = fd86:9f51:a64b:7777::a70:13 Client IPsec supplicant (aka Windows Advanced Firewall) is leveraged to create IPsec tunnels for intranet traffic going to DA server (gateway) DNS client utilizes name resolution policy table (NRPT) to communicate with DNS64 and determines what traffic flows down the tunnel IPsec connections security rules enforce multi-factor authentication (computer certificate, computer password, user Kerberos/smart card) Multiple IPsec tunnels created Infrastructure Tunnel = System services (Authentication, agents, etc) Intranet Tunnel = User services (Email, Files, etc) [CERT + PW] [CERT + User Kerberos] May 11, 2016 14

Remote Access Requirements and Solutions.. DirectAccess Infrastructure and User Tunnels DirectAccess Client Windows Advanced Firewall managed IPsec tunnels Settings controlled by GPOs IPv6 IPsec tunnel over IP HTTPS Name Resolution Policy Table (NRPT) *.internal.local is tunneled Exclusions: Network location server(s) DirectAccess server(s) Legacy VPN concentrator Infrastructure Tunnel Device certificate + Device authentication Established at system startup Intranet Tunnel (User) Device certificate + User authentication Established at user logon Requires smart card authentication DirectAccess Server Windows Advanced Firewall managed IPsec tunnels Settings controlled by GPOs IPv6 IP HTTPS endpoint IPv6 to IPv4 NAT service DNS IPv4 to IPv6 service Two NICs Internet / DMZ Intranet May 11, 2016 15

Remote Access Requirements and Solutions.. DirectAccess : How it looks to normal users? When a user takes their Windows 8/10 device on travel or home, as soon as their device connects to wireless the device infrastructure tunnel immediately starts connecting to the DA server using the LOA2 device certificate and LOA2 password (LOA2+LOA2=LOA3) When a user logs on or unlocks their session using their Microsoft Virtual Smart Card (LOA3) or their YubiKey USB token (LOA4), the user tunnel connects after a short delay without interaction. Access to email, file shares, applications seamlessly work* If a user performs a run as using another account, a separate user tunnel is created using those smart card credentials May 11, 2016 16

Remote Access Requirements and Solutions.. DirectAccess : What are the concerns? DirectAccess is enabled per computer so ANY smart card mapped to a user account can connect Traditional internet proxy vs transparent proxy changes the world when tunneling is not forced (Good ol split tunnel discussions) DirectAccess is really easy to setup but majority of the problems with it are not DirectAccess related Smart card logon Applications with hard-coded IPv4 addresses Legacy client OS configurations that simply break DA When DirectAccess works, it works great. When it doesn t work, it s very difficult at times to troubleshoot with no single DirectAccess client log to troubleshoot. Mostly due to DA being integrated into the DNS client, Windows Firewall, IPv6 stack, etc May 11, 2016 17

Bringing is all together.. Multi-factor authentication paired with future remote access technologies.. What does it look like? DirectAccess is not the only solution available that can satisfy the previously defined requirements Cisco AnyConnect currently has most of the features and/or is working to incorporate similar functionality The future of remote access is less about the methodology of creating the transport layer and more about how convenient it is for users to consume the service while not reducing the level of assurance An HSPD-12 PIV card is LOA4 but is just about the most inconvenient multifactor solution available but is the most compliant Windows Hello uses Biometric and Facial recognition to log into a Windows device BUT is not yet smart card authentication therefore does not satisfy checking the box on required smart card logon A device PIN paired with a device certificate is seamless but not as secure as a cryptographic module secured with a PIN May 11, 2016 18

Questions? May 11, 2016 19