Securing Windows Logons Using a Password and OTP

Total Page:16

File Type:pdf, Size:1020Kb

Securing Windows Logons Using a Password and OTP Securing Windows logons using a password and OTP A guide to enabling two-factor authentication (TFA) for local and remote access to Windows workstations and servers in the domain Enter OTP Harick Submit OTP www.adselfserviceplus.com Table of contents Why passwords aren't enough 1 Reinforcing Windows security by enabling TFA 1 How TFA for Windows works 2 Prerequisites 3 Steps for enabling TFA 4 Highlights of ADSelfService Plus’ TFA 5 Future proofing: TFA for all enterprise applications 6 About ADSelfService Plus 6 Why passwords aren't enough Passwords are the keys to unlocking access to your Active Directory (AD) kingdom, and cybercriminals will likely never stop targeting these passwords. All a hacker needs is a password cracking tool—there are a number to choose from—to gain access to your network, steal data, and wreck havoc on your enterprise. According to the Data Breach Investigation Report (2018) from Verizon, 81 percent of breaches were caused by stolen passwords. The password policy settings available in AD have not changed since 2000. Considering how far technology has come, and how adept today's cybercriminals are at using it, a password alone will no longer ensure security. With the right tools, a hacker can break into your AD domain in a matter of minutes. Knowing the risks associated with passwords, IT compliance laws such as PCI DSS have explicitly prohibited the use of passwords as the only authentication mechanism. Reinforcing Windows security by enabling TFA TFA adds an extra layer of security by authenticating users twice before granting access to valuable corporate resources—once through a standard password, and again through a unique identifier like a fingerprint or a one-time password (OTP) sent by email or SMS. TFA is a better way to authenticate users than relying solely on passwords. It ensures sensitive data remains secure, even in cases where a password is compromised. With TFA, even if an attacker gets access to a user's password, they would still need access to the user's mobile phone, email, or physical presence. TFA is almost impossible for attackers to bypass. While Microsoft provides Windows Hello for Business, which enables TFA for Windows, it comes with a lot of drawbacks and is quite costly. Windows logon TFA using ADSelfService Plus ADSelfService Plus, an integrated AD self-service password management and single sign-on (SSO) solution, provides a simple, aordable way to enable TFA for Windows machines across both local and remote desktop logons. 1 www.adselfserviceplus.com How TFA for Windows works When TFA for Windows is enabled in ADSelfService Plus, users will have to authenticate through two successive stages to access their Windows machine. While the first authentication will be through the usual Windows domain credentials, admins can choose one of the following as the second factor of authentication: SMS or email-based OTP. DUO Security. RSA SecurID. RADIUS. Admins can configure the factor of authentication based on OUs and groups. Here’s how it works: 1. When users log in to their Windows machine, Windows will prompt them to enter their AD domain username and password to prove their identity. 2. If they correctly entered their password, then the ADSelfService Plus authentication wizard will open. 3. Next, users must authenticate themselves with an OTP or through a third-party identity provider. 4. Users will now be successfully logged in to their Windows machines. User Name First Factor of Authentication using Second Factor of Authentication in Access to Windows machine Windows Login credentiails ADSelService Plus 1. SMS or email verification codes 2. DUO Security 3. RSA SecurID 4. RADIUS Server If the user fails the second factor of authentication, they will be taken back to the Windows logon screen and will have to start the process from the beginning. 2 www.adselfserviceplus.com How to enable TFA for Windows in ADSelfService Plus ADSelfService Plus comes with a built-in logon agent for Windows, which is a custom Credential Provider. You must install this logon agent to enable TFA for Windows. The logon agent must be pushed to the Windows clients and servers from the ADSelfService Plus web console itself. ADSelfService Plus also comes with a scheduler that will automatically scan your network for new computers added to the domain and install the logon agent in them. Let’s learn how to enable TFA for Windows. Prerequisites Download and install ADSelfService Plus. Deploy the logon agent for Windows (Credential Provider): You must install the logon agent through the GINA/Mac installation console (Configuration > Administrative Tools > GINA/Mac (Ctrl + Alt + Del) > GINA/Mac Installation) available in ADSelfService Plus. Enable SSL and login TFA: 1. Log in to the ADSelfService Plus web-console with admin credentials; if you're logging in for the first time, the username and password are both admin. 2. Navigate to Configuration > Administrative Tools > GINA/Mac (Ctrl+Alt+Del) > Windows Logon TFA. 3. Click SSL(HTTPS). Check Enable SSL Port, and click Save. Restart ADSelfService Plus. For information on how to enable SSL using a self-signed or CA-signed certificate, refer to this guide. 3 www.adselfserviceplus.com 4. Back in the Windows Logon TFA screen, click Login TFA. In Logon TFA settings, check Enable Two-Factor Authentication, and configure any one of the authentication methods provided. 5. Click OK. Steps for enabling TFA Log in to the ADSelfService Plus web console with admin credentials. Navigate to Configuration > Administrative Tools > GINA/Mac (Ctrl + Alt + Del) > Windows Logon TFA. Check Enable Windows Logon TFA. 4 www.adselfserviceplus.com By default, the Bypass TFA if ADSelfService Plus is down box is checked when you enable Windows Logon TFA. Checking this box ensures that users will still be able to access their machines if ADSelfService Plus, for any reason, is inaccessible. Click Configure Access and make sure that the access URL has HTTPS as its selected Protocol. Click Save. That’s it! TFA has now been enabled for Windows machines in your organization using ADSelfService Plus. Highlights of ADSelfService Plus’ TFA Mitigates risks associated with poor passwords Users nowadays have multiple accounts—both for personal and business use. To avoid forgetting the numerous passwords they have to remember, they often use the same password across all accounts, or set weak passwords. You can mitigate the risks of poor password behavior by enabling TFA. Granularly enforce TFA You can enforce TFA for all users or only for select individuals—such as those that have elevated privileges and are at higher risk of security attacks—through OU and group-based policies. Comply with PCI DSS and the GDRP TFA is a requirement in the latest version of PCI DSS (3.2). The European Union Agency for Network and Information Security (ENISA) also recommends implementing TFA as a technical measure to comply with the GDPR. 5 www.adselfserviceplus.com Future proofing: TFA for all enterprise applications ADSelfService Plus allows you to provide a simple, secure, and seamless logon experience to users across all their enterprise applications—not just AD. By enabling SSO in ADSelfService Plus, you can allow users to access all their SAML-based enterprise applications, even those that were developed in-house, by authenticating once using the same factors that they use to log in to their Windows machines. SSO saves users from entering their credentials multiple times a day, cuts down the number of passwords they need to remember to one, and improves their overall experience of using multiple applications. To learn more about enabling TFA and SSO for all enterprise applications, read this guide. About ADSelfService Plus ADSelfService Plus is an integrated Active Directory self-service password management and single sign-on solution. It offers password self-service, password expiration reminders, a self-service directory updater, a multiplatform password synchronizer, and single sign-on for cloud applications. Facilitate self-service for end users anywhere at any time with mobile apps for both Android and iPhone users. ADSelfService Plus supports the IT help desk by reducing password reset tickets and spares end users the frustration caused by computer downtime. For more information, please visit www.manageengine.com/products/self-service-password..
Recommended publications
  • Passwordless Authentication: How Giving up Your Password Might Make You More Secure
    thalesgroup.com Passwordless Authentication: How Giving Up Your Password Might Make You More Secure White Paper Why Passwords Are Bad Passwords are one of the oldest security tools in the world of software and the internet. But in today’s environment, passwords cannot provide enough protection for businesses for several reasons. Password Fatigue Leads to Bad Hygiene Policy-driven password strengths and rotation leads to password fatigue, thereby contributing to poor password management. Verizon’s Data Breach Investigation Report1 indicates that over 70 percent of employees reuse passwords for work and personal accounts. A malicious actor could therefore abuse an employee’s credentials to access other applications and sensitive customer information. % out “123456” 81 ~40 4 of 5 “password” of breaches involve Average person People reuse same still among most use of weak or has roughly 40 passwords across popular password stolen credentials online accounts dierent accounts choices in 2018 People also tend to pick easy-to-hack passwords because of the trouble they have with remembering passwords. An analysis of over five million leaked passwords showed that 10 percent of people used one of the 25 worst passwords2. Seven percent of enterprise users had extremely weak passwords. Passwords Hurt User Experience Research by Carnegie Mellon University indicates that a properly written password policy can provide an organization with increased security. However, there is less accord over what should be in this policy to make it effective. To illustrate this fact, users commonly react to a policy rule that requires them to include numbers by picking the same number or by using the number in the same location in their passwords3.
    [Show full text]
  • Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System
    Modern password security for system designers What to consider when building a password-based authentication system By Ian Maddox and Kyle Moschetto, Google Cloud Solutions Architects This whitepaper describes and models modern password guidance and recommendations for the designers and engineers who create secure online applications. A related whitepaper, Password security ​ for users, offers guidance for end users. This whitepaper covers the wide range of options to consider ​ when building a password-based authentication system. It also establishes a set of user-focused recommendations for password policies and storage, including the balance of password strength and usability. The technology world has been trying to improve on the password since the early days of computing. Shared-knowledge authentication is problematic because information can fall into the wrong hands or be forgotten. The problem is magnified by systems that don't support real-world secure use cases and by the frequent decision of users to take shortcuts. According to a 2019 Yubico/Ponemon study, 69 percent of respondents admit to sharing passwords with ​ ​ their colleagues to access accounts. More than half of respondents (51 percent) reuse an average of five passwords across their business and personal accounts. Furthermore, two-factor authentication is not widely used, even though it adds protection beyond a username and password. Of the respondents, 67 percent don’t use any form of two-factor authentication in their personal life, and 55 percent don’t use it at work. Password systems often allow, or even encourage, users to use insecure passwords. Systems that allow only single-factor credentials and that implement ineffective security policies add to the problem.
    [Show full text]
  • The Tangled Web of Password Reuse
    The Tangled Web of Password Reuse Anupam Das∗, Joseph Bonneauy, Matthew Caesar∗, Nikita Borisov∗ and XiaoFeng Wangz ∗University of Illinois at Urbana-Champaign fdas17, caesar, [email protected] yPrinceton University [email protected] zIndiana University at Bloomington [email protected] Abstract—Today’s Internet services rely heavily on text-based password meters to help users understand the strength of their passwords for user authentication. The pervasiveness of these passwords. Studies have shown that password composition services coupled with the difficulty of remembering large numbers policies along with password meters (or verbal notifications) of secure passwords tempts users to reuse passwords at multiple do help users to choose stronger passwords [35], [44], [46]. sites. In this paper, we investigate for the first time how an However, they also increase user fatigue. attacker can leverage a known password from one site to more easily guess that user’s password at other sites. We study several Unfortunately, the number of passwords a user must re- hundred thousand leaked passwords from eleven web sites and member continues to increase, with typical Internet user es- conduct a user survey on password reuse; we estimate that 43- timated to have 25 distinct online accounts [10], [11], [32]. 51% of users reuse the same password across multiple sites. Because of this, users often reuse passwords across accounts We further identify a few simple tricks users often employ to on different online services. Password reuse introduces a secu- transform a basic password between sites which can be used by an attacker to make password guessing vastly easier. We develop the rity vulnerability as an attacker who is able to compromise one first cross-site password-guessing algorithm, which is able to guess service can compromise other services protected by the same 30% of transformed passwords within 100 attempts compared to password, reducing overall security to that of the weakest site.
    [Show full text]
  • Nfront Password Filter Documentation 2
    nFront Password Filter Multiple Policy Edition for Domain Controllers Single Policy Edition for Domain Controllers Single Policy Edition for Member Servers Multiple Policy Edition for Member Servers Desktop Edition Version 7.1.0 © 2000 – 2021 nFront Security. Documentation All Rights Reserved. nFront Security, the nFront Security logo and nFront Password Filter are trademarks of Altus Network Solutions, Inc. All other trademarks or registered trademarks are the property of their Copyright © 2021 nFront Security. All Rights Reserved. Contents 1.0 nFront Password Filter Overview ........................................................................... 2 1.1 Versions ................................................................................................................. 2 1.2 Compatibility and System Requirements ................................................................ 3 1.3 What’s New ............................................................................................................ 4 1.3 Notes to Evaluators ................................................................................................ 5 1.4 Overview of Features ............................................................................................. 7 1.4.1 The logic behind multiple policies (MPE version only) ................................................... 8 1.4.2 The Message Box for Rejected Passwords ...................................................................... 8 1.5 Information about your Evaluation Copy. ...............................................................
    [Show full text]
  • Security Controls and Best Practices for Financial Institutions Content I
    Security Controls and Best Practices for Financial Institutions Content I. Overview. 3 II. The Threat Landscape and Compliance . 4 III. Combating Compromised Credentials . 5 A. Password Security . 5 B. Enhanced MFA (EMFA). 6 C. Hardware Tokens (Business/Commercial Banking Only) . 6 IV. Combating Local Malicious Software and Phishing . 7 A. Trusteer’s Browser Security . 7 B. VeriSign Extended Validation Certificates . 7 C. RSA Fraud Shutdown . 7 D. Separation of Duty, Positive Pay, & Limits (Business/Commercial Banking Only). 7 E. Limits . 7 V. Alerting (Business Banking and Business Financial Services only) . 8 VI. Training & Best Practices . 8 VII. Action Plan . 10 VIII. Glossary . 11 Guidance Materials . 14 Additional Resources . 14 Overview The intent of this document is to inform Financial Institutions about the online fraud threats they currently face. For each threat we discuss, we will provide some basic guidance about an available control that could mitigate the threat. This guidance represents a starting point for improving security. Digital Insight strongly recommends that you review your current security plans and policies, make any updates necessary, and communicate improvements to your customers or members. The Threat Landscape and Compliance In order to commit online fraud, a fraudster simply needs to authenticate as the victim, using that victim’s online credentials. For environments that rely on Single Factor Authentication (something the user knows), the fraudster can coax this information from a real user through compelling On June 28, 2011, the phishing campaigns, key logging, or Man-in-the-Middle proxy attacks. FFIEC issued a Supplement to the Authentication in an Internet Banking For environments that have deployed Two Factor Authentication (something the user Environment guidance.
    [Show full text]
  • Draft NIST SP 800-118, Guide to Enterprise Password Management
    RETIRED DRAFT April 1, 2016 The attached DRAFT document (provided here for historical purposes): Draft NIST Special Publication (SP) 800-118, Guide to Enterprise Password Management (posted for public comment on April 21, 2009) has been RETIRED. Information on other NIST cybersecurity publications and programs can be found at: http://csrc.nist.gov/. The following information was originally posted with the attached DRAFT document: Apr. 21, 2009 SP 800-118 DRAFT Guide to Enterprise Password Management NIST announces that Draft Special Publication (SP) 800-118, Guide to Enterprise Password Management, has been released for public comment. SP 800-118 is intended to help organizations understand and mitigate common threats against their character-based passwords. The guide focuses on topics such as defining password policy requirements and selecting centralized and local password management solutions. NIST requests comments on draft SP 800-118 by May 29, 2009. Please submit comments to 800-118comments @nist.gov with "Comments SP 800-118" in the subject line. Special Publication 800-118 (Draft) Guide to Enterprise Password Management (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya NIST Special Publication 800-118 Guide to Enterprise Password (Draft) Management (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 April 2009 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr.
    [Show full text]
  • Protecting Passwords in the Event of a Password File Disclosure
    PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres New York University New York University [email protected] [email protected] Abstract—Over the years, we have witnessed various the plain-text passwords from disk. Salting inserts a random password-hash database breaches that have affected small and value that complicates the use of tables that allow hackers to large companies, with a diversity of users and budgets. The indus- immediately look up passwords to match most hashes. Storing try standard, salted hashing (and even key stretching), has proven passwords with a salted hash is widely considered to be the to be insufficient protection against attackers who now have access best practice because of the level of protection offered and to clusters of GPU-powered password crackers. Although there the ease of implementation (e.g., salted hashing requires no are various proposals for better securing password storage, most do not offer the same adoption model (software-only, server-side) additional hardware or client software). as salted hashing, which may impede adoption. However, storing passwords with a salted hash is not a In this paper, we present PolyPasswordHasher, a software- panacea. That is, when stored password data has been com- only, server-side password storage mechanism that requires min- promised, attackers have proven themselves adept at quickly imal additional work for the server, but exponentially increases cracking large numbers of passwords, even when salted- the attacker’s effort. PolyPasswordHasher uses a threshold cryp- password hashes comprise the stored data. For example, Troy tosystem to interrelate stored password data so that passwords Hunt, a security researcher, showed that cracking 60% of a cannot be individually cracked.
    [Show full text]
  • Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling
    Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling Vijay Kothari Jim Blythe Sean W. Smith Department of Computer Information Sciences Institute Department of Computer Science University of Southern Science Dartmouth College California Dartmouth College [email protected] [email protected] [email protected] Ross Koppel Department of Sociology University of Pennsylvania [email protected] ABSTRACT dash [1, 2], an agent-based simulation framework that Agent-based modeling can serve as a valuable asset to secu- supports the dual-process model of cognition, reactive plan- rity personnel who wish to better understand the security ning, modeling of human deficiencies (e.g., fatigue, frustra- landscape within their organization, especially as it relates tion), and multi-agent interactions, enables us to create such to user behavior and circumvention. In this paper, we ar- tools. In dash, users are represented as agents with weighted gue in favor of cognitive behavioral agent-based modeling goals, plans to achieve those goals, attributes, knowledge, for usable security and report on our work on developing and abilities. These agents use mental models and have an agent-based model for a password management scenario. perceptions of the world that often depart from reality. In We perform a number of trials and a sensitivity analysis that accordance with their mental models, they take actions, ob- provide valuable insights into improving security (e.g., an or- serve and interpret events, and communicate. They dynam- ganization that wishes to suppress one form of circumvention ically compute and recompute goals and the plans they use may want to endorse another form of circumvention).
    [Show full text]
  • Configuring Self Service Password Reset 21 Configuring Basic Settings
    Self Service Password Reset 4.4 Administration Guide April 2019 Legal Notice © Copyright 2018-2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors ("Micro Focus") are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. For additional information, such as certification-related notices and trademarks, see http://www.microocus.com/about/ legal/. 2 Contents About this Book 9 1 Self Service Password Reset Overview 11 Self Service Password Reset Key Features. .11 Self Service Password Reset Architecture . .12 Understanding Challenge-Response Storage Methods . .13 2 Getting Started 15 Logging in to the Administration Console. .15 Working with Configuration Editor . .16 Working with the Configuration Manager . .17 Using the Dashboard . .18 Configuring Macros for Messages and Actions . .19 3 Configuring Self Service Password Reset 21 Configuring Basic Settings . .21 Configuring Application Settings . .21 Configuring Localization Settings . .22 Configuring Session Management Settings . .22 Configuring the Telemetry Options . .22 Configuring Profiles. .23 Creating a Profile . .23 Managing Profiles . .24 Configuring Security Settings . .25 Configuring Security for Self Service Password Reset. .25 Configuring Web Security . .25 Importing Certificates to Create an HTTPS Connection to Browsers . 26 Configuring Intruder Detection . .27 Configuring External Web Services with REST . .27 4 Configuring LDAP Profiles and Settings 29 Configuring LDAP Directory Profile . .29 Configuring LDAP Settings .
    [Show full text]
  • Evidian Self-Service Password Reset
    Evidian Self-Service password reset Trusted partner for your Digital Journey Because one security measure doesn’t fit all situations One help desk call for a password reset costs around 15 euros and is time-consuming (about 20 minutes). Three to four password resets are performed per employee and year (According to the Gartner Research - Note T-15-6454). A self-service password reset reduces this cost and frees up your IT. Evidian Self-Service Password Reset offers several different authentication methods. From a web portal or from their workstation, users can securely reset their Windows passwords without having to contact the helpdesk. Evidian Self-Service Password Reset is also available in offline mode. Evidian Self-Service Password Reset (SSPR) identifies the user with different means: Questions and Answers, Scan of a QR Code, Confirmation code sent via email or SMS, Push notification on mobile and subsequently executes the reset of a new password or generates a temporary password (TPA). Evidian Self-Service Password Reset Strong password policy enforcement It fits perfectly into digital workplaces with features enable users to change their with Evidian Self Service Password Reset a large range of terminals as well as on Windows password securely (network Evidian SSPR can enforce a strong VDI infrastructure (Citrix XenApp, Windows login, Windows login), connected or not password policy for the network login. You RDS and VMware). connected to the network. The solution can define the network login password provides a large range of authentication format such as the type of characters as Identity proofing methods and full audit trails to well as their position, the minimum and Questions & Answers mechanism can also demonstrate the implementation of the maximum number of characters, etc… be used to identify the user.
    [Show full text]
  • Adselfservice Plus
    Solutions offered by ADSelfService Plus. Self-Service Password Endpoint Security One Identity Management Password policy enforcer and endpoint Enterprise single sign-on (SSO) and Self-service password reset and account multi-factor authentication (MFA). real-time password synchronizer. unlock. Password and account expiration notifier Download Now Highlights of self-service password management 1. Password self-service, anywhere, at any time: Enable users reset passwords and unlock accounts in office, at home, and on the move. 2. Password/account expiration notifer: Automate password and account expiration reminders to users via email, push, and SMS alerts. 3. Force password change: Force users to change their password at the next logon after a password reset by the help desk admin. Highlights of endpoint secuity 1. Endpoint MFA: Secure remote and local machine (Windows, macOS, and Linux), VPN, and OWA logons with advanced MFA techniques like biometrics or QR codes for local and remote access to network resources. 2. Custom password polices: Ensure strong user passwords across all their business accounts with advanced password policy settings. 3. Comply with regulatory mandates: Helps comply with NIST SP 800-63B, FFIEC, GDPR and HIPPA regulations. Highlights of one identity 1. Enterprise SSO: Allow users to access multiple enterprise applications with just one identity. 2. Real-time password sync: Synchronize Active Directory (AD) password resets and changes with connected enterprise applications in real time. Other highlights. 1. Directory Self-Update: Enable users to update their information like their phone number, email address, etc in AD. 2. Mail group subscription: Allow users to opt-in and opt-out of distribution groups.
    [Show full text]
  • Autopass: an Automatic Password Generator
    AutoPass: An Automatic Password Generator Fatma Al Maqbali and Chris J Mitchell Information Security Group, Royal Holloway, University of London [email protected], [email protected] March 9, 2017 Abstract Text password has long been the dominant user authentication technique and is used by large numbers of Internet services. If they fol- low recommended practice, users are faced with the almost insuperable problem of generating and managing a large number of site-unique and strong (i.e. non-guessable) passwords. One way of addressing this prob- lem is through the use of a password generator, i.e. a client-side scheme which generates (and regenerates) site-specific strong passwords on demand, with the minimum of user input. This paper provides a detailed specification and analysis of AutoPass, a password genera- tor scheme previously outlined as part of a general analysis of such schemes. AutoPass has been designed to address issues identified in previously proposed password generators, and incorporates novel tech- niques to address these issues. Unlike almost all previously proposed schemes, AutoPass enables the generation of passwords that meet im- portant real-world requirements, including forced password changes, use of pre-specified passwords, and generation of passwords meeting site-specific requirements. 1 Introduction Despite its widely-discussed shortcomings, text password authentication is widely used to authenticate users to online services. Many attempts have been made to replace simple password authentication, e.g. using biometrics, arXiv:1703.01959v2 [cs.CR] 8 Mar 2017 tokens and multi-factor authentication [4]. However, single-factor password- based authentication remains very widely used.
    [Show full text]