+ All Categories
Home > Documents > Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a...

Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a...

Date post: 29-Jan-2016
Category:
Upload: roger-young
View: 224 times
Download: 0 times
Share this document with a friend
Popular Tags:
45
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication NTLM Authentication Authenticating Down-Level Clients Planning Server Placement for Authentication Planning server placement Planning domain controller (DC) placement Planning global catalog server placement Planning PDC emulator placement
Transcript
Page 1: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Designing Authentication for a Microsoft Windows 2000 Network

Designing Authentication in a Microsoft Windows 2000 Network

Designing Kerberos Authentication NTLM Authentication Authenticating Down-Level Clients Planning Server Placement for Authentication

Planning server placement Planning domain controller (DC) placement Planning global catalog server placement Planning PDC emulator placement

Page 2: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Designing Authentication in a Microsoft Windows 2000 Network

Business requirements Reduce total cost of company's ownership Identify security risks in the network

Technical requirements Network authentication must be available even if

WAN links are not. Network authentication must occur in a timely

manner. DCs must not be overloaded with authentication

requests.

Page 3: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Business Requirements

Reduce total cost of company’s ownership Identify security risks in the network

Page 4: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Technical Requirements

Network authentication must be available even if WAN links are not.

Network authentication must occur in a timely manner.

DCs must not be overloaded with authentication requests.

Page 5: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Designing Kerberos Authentication

Advantages of Kerberos authentication Understanding the Kerberos message

exchanges Analyzing Kerberos authentication Making the decision: designing Kerberos

authentication Applying the decision: designing Kerberos

authentication

Page 6: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Advantages of Kerberos Authentication

Mutual authentication Single sign-on Ticket caching Delegation Standards-based protocol Interoperability

Page 7: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Understanding the Kerberos Message Exchanges

Authentication Service Exchange Ticket Granting Service Exchange Client/Server Authentication Exchange

Page 8: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Initial Authentication with the Network

The Authentication Service Exchange is used when a user initially logs on.

This provides the user with a logon session key and a ticket granting ticket (TGT ) that will be used to acquire service tickets (STs) during the session.

Information contained within the KRB_AS_REP message is encrypted with the user's long-term key.

Each user shares a long-term key with the key distribution center (KDC).

The long-term key is derived from the account's password.

Page 9: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

The Kerberos Authentication Exchange

Page 10: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Acquiring a Service Ticket for the Computer

Page 11: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Network Authentication

Page 12: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Smart Card Authentication

Page 13: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Multiple Domain Authentication

Page 14: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Criteria for Delegation

The following computers must be running Microsoft Windows 2000 in a Windows 2000 domain:

Computers hosting the client process Computers running the service process Computers running processes for any back-end

services The client's user account must be enabled for

delegation. The service's account must be enabled for

delegation.

Page 15: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Delegation and Kerberos Authentication

Page 16: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Making the Decision: Designing Kerberos Authentication

Microsoft Windows 2000 DCs must be available on the network.

DNS services must be available to find Windows 2000 DCs.

The authenticating DC must contact a global catalog server.

Global catalog server SRV resource records are stored in the _msdcs.forestrootdomain zone.

Only Windows 2000 and UNIX clients use Kerberos authentication.

Smart card logon requires Kerberos authentication. Kerberos settings are part of the domain account

policy.

Page 17: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Applying the Decision: Designing Kerberos Authentication at Market Florist

Each domain has sufficient DCs at each of the four sites.

The San Francisco site does not have a dedicated DNS server.

The DNS servers in Winnipeg and Monterrey do not have a secondary zone for the _msdcs.marketflorit.tld domain.

The Winnipeg and Monterrey sites do not have a local global catalog server.

Page 18: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

NTLM Authentication

Only Windows 2000 clients and UNIX clients can use Kerberos authentication.

Windows 2000 continues to support NTLM. NTLM can also be used to authenticate logons

to Windows 2000 computers that are not participating in a domain.

Security weaknesses were found with the NTLM protocol.

NTLM version 2 was developed for Microsoft Windows NT 4.0 Service Pack 4 (SP4).

Page 19: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Additional NTLMv2 Security

Unique session keys per connection Session keys protected with a key exchange Unique keys generated for the encryption and

integrity of session data

Page 20: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

NTLMv2 Authentication

Page 21: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Making the Decision: Implementing NTLMv2 Authentication When Windows 2000 is authenticating with

Local SAM database of a standalone Windows 2000–based computer

Microsoft Windows NT 4.0 computer with SP4 or later installed

When Windows NT 4.0 is authenticating with Windows 2000 and Windows NT 4.0 servers and the client

has SP4 or later applied Windows 2000 and Windows NT 4.0 servers and the client

has the Directory Services Client installed When Microsoft Windows 95 or Microsoft Windows 98 is

authenticating with Windows 2000 and Windows NT 4.0 servers using the

Directory Services Client

Page 22: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Applying the Decision: Implementing NTLMv2 Authentication at Market Florist

Microsoft Windows 95 and Microsoft NT 4.0 Workstation cannot use Kerberos authentication.

The Directory Services Client must be deployed to Windows 95 clients.

Windows NT 4.0 Workstation will not require the Directory Services Client.

Page 23: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Authenticating Down-Level Clients

Analyzing standard authentication Analyzing the Directory Services Client

Page 24: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Analyzing Standard Authentication:Windows NT 4.0 Clients

Windows NT 4.0 clients without service packs use NTLM.

Information exchanged between a DC and an authenticating client is not secure with only NTLM protection.

NTLMv2, introduced with SP4, provides added security.

Page 25: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Analyzing Standard Authentication:Windows 95 and Windows 98 Clients

These clients use LAN Manager (LM) authentication protocol.

LM authentication is the weakest of the authentication protocols.

LM authentication is not case sensitive. The LM password protection scheme is easily

cracked. Sensitive account passwords can be decrypted

if they are maintained in LM format within Active Directory.

Page 26: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Analyzing Standard Authentication:Microsoft DSClient

Microsoft Directory Services Client (DSClient) was designed to counteract the weaknesses in LM authentication.

Allows Windows NT 4.0, Windows 95, and Windows 98 clients to use NTLMv2 for authentication in the Windows 2000 network.

Page 27: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

DSClient Functionality

NTLMv2 authentication protocol Site awareness Search for objects in Active Directory Reduced dependency on the PDC ADSI Distributed File System (DFS) fault tolerance

client Active Directory Windows Address Book (WAB)

property pages

Page 28: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Features DSClient Does Not Provide

Kerberos support Group Policy/Intellimirror support IPSec/L2TP support SPN/Mutual authentication Dynamic DNS support User principal name (UPN) authentication

Page 29: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Controlling Authentication Level with Group Policy

The LMCompatibilityLevel setting can be deployed using Group Policy.

Set LMCompatibilityLevel at the container where the Windows 2000 computer accounts reside.

For DCs, set LMCompatibilityLevel at the Domain Controllers OU.

Page 30: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Making the Decision: Authenticating Down-Level Clients

Plan for distribution of the DSClient software. Ensure that all Windows NT 4.0 clients have

the latest service pack installed. Identify any registry updates to be performed

for client computers after DSClient installation. After DSClient installation, set the

LMCompatibilityLevel at the servers to require NTLMv2 authentication.

Replace or upgrade all older client computers from the network if they cannot support NTLMv2 authentication.

Page 31: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Applying the Decision: Authenticating Down-Level Clients at Market Florist

Distribute the DSClient software to all down-level client computers.

Ensure that all necessary registry settings are deployed to Windows NT 4.0 and Windows 95 clients.

After the DSClient software is fully deployed, configure Group Policy to allow only NTLMv2 authentication.

Configure DNS services locally at each site.

Page 32: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Planning Server Placement for Authentication

Planning DNS server placement Planning DC placement Planning global catalog server placement Planning PDC emulator placement

Page 33: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Information Stored Within the_msdcs.forestrootdomain Zone

All global catalog servers in the forest The GUID representation of each domain The GUID representation of each DC

Page 34: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Making the Decision: DNS Server Placement

A DNS server should be located at each remote site to ensure DNS lookup capabilities to all clients if the WAN link is down to a central site.

Each domain must have at least two DNS servers to provide fault tolerance in the event of server or WAN link failure.

The DNS service at each site must contain zone information for all domains that must be accessed at that site.

All global catalog resource records are stored in the forest root domain.

Page 35: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Applying the Decision: DNS Server Placement at Market Florist

Page 36: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Planning DC Placement

DCs host KDC service for Windows 2000. Client will attempt to authenticate with a local

DC. If a local DC is unavailable, the site link costs

will be checked to determine what the closest site to the current site is, based on the lowest cost.

Page 37: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Making the Decision: DC Placement

Place at least two DCs at each remote site to ensure that clients authenticate locally.

If there are no client computers or users at a remote site for a specific domain, there is no reason to deploy a DC for that domain at the remote site.

If the WAN link goes down, clients are restricted to logging on to the network with cache credentials.

Page 38: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Applying the Decision: DC Placement at Market Florist

Each of the four sites for Market Florist has at least two DCs to ensure that authentication for the local domain will not occur over the WAN.

Install the DSClient software to all Windows 95 and Windows NT 4.0 clients.

Page 39: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Planning Global Catalog Server Placement

Global catalog servers are contacted during authentication when

The domain is in native mode A user logs on at a Windows 2000–based computer

using a UPN

Page 40: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Making the Decision: Global Catalog Server Placement

Place at least one global catalog server at each site.

Ensure that the _msdcs.forestrootdomain DNS domain is available at all remote sites on a local DNS server.

Designate global catalog servers, even in a single domain environment.

Page 41: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Applying the Decision: Global Catalog Server Placement at Market Florist

The current design does not include a local global catalog server at the Winnipeg and Monterrey sites.

One DC at each site should be configured as a global catalog server to ensure that global catalog access is not taking place over the WAN.

If the WAN link becomes unavailable, all Windows 2000 clients are authenticated using cached credentials.

The local DNS servers at each site should have a replica of the _msdcs.marketflorist.tld domain to ensure that a local global catalog server can be found by authenticating clients.

Page 42: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Planning PDC Emulator Placement

Down-level clients Connect to the PDC emulator for password changes Connect to the PDC emulator for system policy

application by default Continue to depend on the PDC emulator for domain

browse master functions, password changes, and system policy application until the DSClient software is installed

Page 43: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Making the Decision: PDC Emulator Considerations

If possible, reduce dependency on the PDC emulator by installing DSClient software.

Configure system policy to load balance to ensure the system policy is applied from the authenticating DC, not the PDC emulator.

Upgrade all Windows NT 4.0 BDCs to Windows 2000 DCs as soon as possible to use multimaster replication.

If the DSClient is not deployed, ensure the PDC emulator is on a central portion of the network that is easily accessible from all remote sites.

Page 44: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Applying the Decision: PDC Emulator Placement at Market Florist

The network must ensure the rapid deployment of the DSClient software to the client computers.

The San Francisco site will benefit the most from the quick deployment of the DSClient software.

The PDC emulator will be located on the local network in Monterrey and Winnipeg location, so this will not be much of an issue.

Page 45: Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.

Chapter Summary

Designing Authentication in a Microsoft Windows 2000 Network

Designing Kerberos Authentication NTLM Authentication Authenticating Down-Level Clients Planning Server Placement for Authentication

Planning server placement Planning domain controller placement Planning global catalog server placement Planning PDC emulator placement


Recommended