CIS 3500 1 Identity and Access Services
Total Page:16
File Type:pdf, Size:1020Kb
. Chapter Objectives n Learn how to install and configure identity and access services n Understand how to compare and contrast the different Chapter #19: identity and access services Identity and Access Management Identity and Access Services 2 Identity and Access Services Identity and Access Services LDAP n To use a system, one must identify themselves with the n A directory is a data storage mechanism system in some form or fashion n It is designed and optimized for reading data n Identity and access services are comprised of hardware, n A directory offers a static view of data - easy to change software, and protocol elements n The Lightweight Directory Access Protocol (LDAP) is used to handle user authentication and authorization and to control access to Active Directory objects n To enable interoperability, the X.500 standard was created n Works over TCP 3 Identity and Access Services 4 Identity and Access Services CIS 3500 1 . Kerberos Kerberos n Kerberos is a network authentication protocol designed for a n The user presents credentials and requests a ticket from the Key client/server environment Distribution Server (KDS) n It is built around a trusted third party – key distribution center (KDC), n The KDS verifies credentials and issues a TGT (ticket-granting ticket) which has two logically separate parts: n The user presents a TGT and request for service to the KDS n an authentication server (AS) and n The KDS verifies authorization and issues a client-to-server ticket n The user presents a request and a client-to-server ticket to the n a ticket- granting server (TGS) n Kerberos communicates via “tickets” that proves the identity of users; desired service knows all the users IDs and has shared secrets with other services n If the client-to-server ticket is valid, service is granted to the client n Kerberos uses strong encryption so that the players can check each other’s identity 5 Identity and Access Services 6 Identity and Access Services TACACS+ TACACS+ n The Terminal Access Controller Access Control System+ n Typically operating over TCP port 49 (both TCP and UDP are reserved) n AAA protocol – with separated optional functions for each n Client/server protocol 7 Identity and Access Services 8 Identity and Access Services CIS 3500 2 . TACACS+ Authentication TACACS+ Authorization n Allows arbitrary le n g th a n d co n te n t in th e a u th e n tica tio n enabling many n TACACS+ authorization – determining permission associated different mechanisms to be used with a user action; site specific, can be optional n Authentication is o p tio n a l – site- configurable option n Default state is “unknown user” n Supports Point- to- Point Protocol (PPP) with Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), or n Authorization follows the authentication process (optional) and Extensible Authentication Protocol (EAP), token cards, and Kerberos uses the confirmed user identity n T hree different packet types: START, CONTINUE, and REPLY n It is using two message types: REQUEST and RESPONSE START and CONTINUE packets originate from the client and are directed The client issues an authorization REQUEST message to the TA C A C S + server The RESPONSE message is not a simple yes or no: can include The REPLY packet is used to com m unicate from the TACACS+ server to qualifying information, such as a user time limit or IP restrictions the client 9 Identity and Access Services 10 Identity and Access Services TACACS+ Accounting CHAP n When utilized, it typically follows the other services n Challenge Handshake Authentication Protocol (CHAP) provides authentication n Records what a user or process has done across a point- to- point link using PPP n Purpose: n A fter the link has been established authentication is not mandatory n account for services, possibly for billing purposes n CHAP provides authentication periodically through the use of a challenge/response system n generating security audit trails n It has inform ation from authentication and authorization n The initial challenge (a randomly generated number) is sent to the client n The client uses a one-way hashing function to calculate what the response should be and then n T hree types of records: START, STO P, and UPDATE sends this back n T hese are record types, not message types n The server compares the response to what it calculated the response should be START records the tim e and user or process that began n If they match, communication continues STOP records the stop tim es for specific actions n If the two values don’t match, then the connection is terminated n This mechanism relies on a shared secret between the two entities so that the correct values can UPDATE records in term ed iary n o tices th at a p articu lar task is still b ein g 11 Identity and Access Services 12 be calculated Identity and Access Services performed CIS 3500 3 . PAP MSCHAP n Password Authentication Protocol (PAP) authentication n Microsoft Challenge Handshake Authentication Protocol (MSCHAP) involves a two-way handshake is the Microsoft variant of CHAP n The username and password are sent across the link in n MSCHAPv1, defined in RFC 2433, has been deprecated and dropped in Windows Vista clear text n MSCHAPv2, RFC 2759, which was introduced with Windows 2000 n PAP authentication does not provide any protection against n It offers mutual authentication, verifying both users in an playback and line sniffing exchange n PAP is now a deprecated standard n It also offers improved cryptographic support including separate cryptographic keys for transmitted and received data 13 Identity and Access Services 14 Identity and Access Services RADIUS RADIUS n Remote Authentication Dial-In User Service (RADIUS) is an AAA protocol n Connectionless protocol utilizing UDP port 1812 for authentication and authorization and 1813 for accounting functions n RADIUS is a client/server protocol n The RADIUS client is typically a network access server (NAS) n The RADIUS server is a process or daemon running on a UNIX or Wi ndows Server machi ne n Communications between a RADIUS client and RADIUS server are encrypted using a shared secret 15 Identity and Access Services 16 Identity and Access Services CIS 3500 4 . RADIUS Authentication RADIUS Authentication n Remote Authentication Dial-In User Service (RADIUS) is an n It can support PPP, PAP, CHAP, or UNIX login AAA protocol n A user initiates PPP authentication to the NAS n Connectionless protocol utilizing User Datagram Protocol n The NAS prompts for username and password (if PAP), port 1812 for authentication and authorization and 1813 for or challenge (if CHAP) accounting functions n User replies with credentials. n RADIUS client sends username and encrypted password to the n RADIUS is a client/server protocol RADIUS server n RADIUS server responds with Accept, Reject, or Challenge n The RADIUS client acts upon services requested by user 17 Identity and Access Services 18 Identity and Access Services RADIUS Authorization RADIUS Accounting n Authentication and authorization steps are performed n It is performed independently together in response to a single Access-Request message – n Functions are designed to allow data to be transmitted at although they are sequential steps the beginning and end of a session n Authorization parameters include n It can indicate resource utilization, such as time, bandwidth n the service type allowed (shell or framed), n When RADIUS was first designed, the role of ISP NASs was n the protocols allowed, relatively simple n the IP address to assign to the user (static or dynamic), and n Today, the Internet and its access methods have changed, n the access list to apply or static route to place in the NAS and so have the AAA requirements routing table 19 Identity and Access Services 20 Identity and Access Services CIS 3500 5 . SAML OAUTH n Security Assertion Markup Language (SAML) is a single sign- on (SSO) capability used n OAuth (Open Authorization) is an open protocol for secure, for w eb applications token-based authorization on the Internet from web, mobile, n It defines standards for exchanging authentication and authorization data between and desktop applications security domains n Im portant with cloud- based solutions and with Software- as- a - Service (SaaS) n Users can share information about their accounts with third- applications party applications or websites n It is an XM L- based protocol that uses security tokens and assertions to pass inform ation about a “principal” (typically an end user) w ith a SAM L authority (an n OAuth 1.0 was a Twitter OpenID implementation “identity provider” or IdP) and the service provider (SP) n OAuth 2.0 (not backward compatible) – main strength is that it n The principal requests a service from the SP, which then requests and obtains an identity assertion from the IdP can be used by an external partners without having to re- n The SP can then grant access or perform the requested service for the principal authenticate the user - instead submit a token 21 Identity and Access Services 22 Identity and Access Services OpenID Connect Shibboleth n OpenID Connect is a simple identity layer on top of the OAuth n Shibboleth – single sign-on and federated identity-based 2.0 protocol authentication and authorization across networks n Allows clients of all types, including mobile, JavaScript, and n It is a web-based technology that is built using SAML web-based clients, to request and receive information about n Shibboleth uses the HTTP/POST to push profiles of SAML, authenticated sessions and end users including both identity provider (IdP) and service provider n OpenID is commonly paired with OAuth 2.0 (SP) components n Federated authentication that lets a third party authenticate n It is included by many services that use SAML for identity users using accounts that they already have management 23 Identity and Access Services 24 Identity and Access Services CIS 3500 6 .