Comptia Security+ Domain
Total Page:16
File Type:pdf, Size:1020Kb
CompTIA Security+ 501 CompTIA Security+ SY0-501 Instructor: Ron Woerner, CISSP, CISM CompTIA Security+ a Domain 4 – Identity and Access Management 4.2 Given a scenario, install and configure identity and access services Cybrary - Ron Woerner 1 CompTIA Security+ 501 4.2 Configuring Identity and Access Services ● LDAP ● SAML ● Kerberos ● OpenID Connect ● RADIUS ● OAUTH ● TACACS+ ● Shibboleth ● CHAP ● Secure token ● MSCHAP ● NTLM ● PAP Directories / Directory Service Protocols ● Repositories of an organization’s network resources and users ● Most follow a hierarchical database format, based on X.500 standard ● A directory service manages the entries and data in the directory and enables access control and identity management. ● Types: Microsoft Active Directory (AD), & LDAP Cybrary - Ron Woerner 2 CompTIA Security+ 501 Lightweight Directory Access Protocol (LDAP) ● A standardized directory access protocol ● Main purpose is the query the LDAP user database – pared-down X.500-based directories ● Supported by most major vendors including Microsoft AD and OpenLDAP ● Hierarchical structure CN=Pitchers Name, OU=Pitchers, O=Baseball Team, DN=example.com, C=US. LDAP Security ● LDAP is vulnerable to snooping ● Encrypt communications using SSL/TLS to secure LDAP transmissions ● Certificates can validate authentication requests ● LDAPv3 bind requests should use Simple Authentication and Security Layer ( SASL ) Cybrary - Ron Woerner 3 CompTIA Security+ 501 Kerberos ● A symmetric key authentication protocol ● Kerberos v5 uses mutual authentication between the requesting client and the supporting sever through a Key Distribution Center (KDC) ● Once authenticated with the KDC, user is given a ticket granting ticket (TGT) ○ Tickets are encrypted and have a limited life span ○ Ticket lists user’s privileges. ● Each time the user wishes to access some resource on the network, the user’s computer presents the KDC with the TGT; the TGT then sends that user’s computer a service ticket , granting the user access to that service Kerberos Authentication Process ● Each time the user wishes to access some resource on the network, the user’s computer presents the KDC with the TGT ● The TGT then sends that user’s computer a service ticket , granting the user access to that service. ● User’s computer then sends the service ticket to the server the user is trying to access. ● As a final authentication check, that server then communicates with the TGT to confirm and validate the service ticket Cybrary - Ron Woerner 4 CompTIA Security+ 501 Kerberos Authentication Process Remote Authentication Dial-In User Service (RADIUS) ● An IETF standard ● Implemented by most of the major operating system manufacturers ● Uses UDP transport to a centralized server providing authentication and access control for networks Cybrary - Ron Woerner 5 CompTIA Security+ 501 Terminal Access Controller Access Control System Plus (TACACS+) ● Handles authentication, authorization, and accounting (AAA) services ● Similar to RADIUS ● TCP rather than UDP as it’s transport method ● Client/server model ● TACACS+ advantages over RADIUS ○ TCP rather than UDP as it’s transport method – more reliable ○ Encrypts the entire packet, not just authentication ○ Controls the authorization of router commands Password Authentication Protocol (PAP) ● Legacy ● User ID and password sent clear text ● No protection for playback or trial-and-error attacks Cybrary - Ron Woerner 6 CompTIA Security+ 501 CHAP ● Challenge Handshake Authentication Protocol (CHAP) provides on-demand authentication over encrypted channels ● Server first authenticates client ● Client generates a one-way hashing function (MD5 algorithm) and sends to the service ● Client hash is compared against service’s hash by the authenticator service. ● Process is repeated at random intervals to prevent replay attacks MSCHAP & PEAP ● MSCHAPv2 – Microsoft proprietary version ○ Uses a new string each time for authentication ○ the client and server mutually authenticate and use two encryption keys ● Should not be used alone ● Use MS-CHAP with Protected Extensible Authentication Protocol (PEAP) or L2TP/IPSec ● PEAP ○ Provides a TLS/SSL tunnel ○ Protects the authentication traffic. ○ Uses a certificate on the authentication server Cybrary - Ron Woerner 7 CompTIA Security+ 501 NTLM (NT LAN Manager) ● Legacy authentication from Microsoft ● Replaced by Kerberos ● Similar to CHAP and MSCHAP ● All NTLM versions use a relatively weak cryptographic scheme ● Lacks MFA support Federated Services ● Security Assertion Markup Language (SAML) ● OAuth ● Simple Web Tokens, and JSON Web Tokens ● OpenID Connect Cybrary - Ron Woerner 8 CompTIA Security+ 501 Security Assertion Markup Language (SAML) ● An Extensible Markup Language (XML) framework for creating and exchanging security information between online systems ● Main purpose is SSO for enterprise users over the web ● Three main functions: ○ The user seeking to verify its identity is the principal. ○ The entity that can verify the identity of the end user is the Identity Provider. ○ The entity that uses the Identity Provider to verify the identity of the end user is the Service Provider. ● Shibboleth system uses SAML Open Authorization (OAuth) ● Framework used for Internet token-based authorization ● Purpose is API authorization between applications ● Current version is 2.0 ● Allows access tokens to be issued to third-party clients (resource consumers ) with the approval of the resource owner , such as a social media site. ● OAuth2.0 uses the JSON and HTTP protocols ● Use SSL/TLS to prevent eavesdropping Cybrary - Ron Woerner 9 CompTIA Security+ 501 OpenID & OpenID Connect ● An identity layer based on OAuth 2.0 specifications ● Used for consumer single sign-on ● OpenID Connect implements authentication as an extension to the OAuth 2.0 authorization process Provides additional security - signing, encryption of identity data, and session management ● Uses an ID token structure including the authentication of an end user via a JSON web token (JWT) . A JWT is used to prove that an authentic source created the originating data Exam Preparation This access control protocol for use on networks uses UDP transport to sent authentication information to a central server? A. CHAP B. Kerberos C. OpenIDv2 D. RADIUS Cybrary - Ron Woerner 10 CompTIA Security+ 501 Exam Preparation This protocol uses a key distribution center (KDC) to orchestrate the authentication process.? A. RADIUS B. Federated identity C. Kerberos D. LDAP Security+ Lab Guide Cybrary - Ron Woerner 11 CompTIA Security+ 501 CompTIA Security+ a Domain 4 – Identity and Access Management 4.2 Given a scenario, install and configure identity and access services Cybrary - Ron Woerner 12.