150 likes | 305 Views
Windows Server 2003 建立網域間之信任關係. 林寶森 jeffl@ms11.hinet.net. Domain A. Domain B. Trusting and Trusted Domains. Trusting. Trusted. Trust. Resources. Accounts. One-Way and Two-Way Trust. One-Way. Trust. Resources. Accounts. Two-Way. Trust. Trust. Resources/Accounts.
E N D
Windows Server 2003建立網域間之信任關係 林寶森 jeffl@ms11.hinet.net
Domain A Domain B Trusting and Trusted Domains Trusting Trusted Trust Resources Accounts
One-Way and Two-Way Trust One-Way Trust Resources Accounts Two-Way Trust Trust Resources/Accounts Resources/Accounts
Transitive vs. Non-Transitive Trust B B A C A C
Kerberos Realm Types of Trusts Tree/Root Trust Forest 1 Forest Trust Forest 2 Parent/ChildTrust Forest (root) Forest (root) Domain D Domain B Domain Q Domain A Domain P Domain E Shortcut Trust External Trust Realm Trust Domain F Domain C
Trust Types Associated with Server Operating Systems Operating System Trust Type Between Windows Server 2003 forests Forest trusts, one-way or two-way external trusts Windows Server 2003 and Windows 2000 forests One-way or two-way external trusts Windows Server 2003 and Windows NT 4.0 forests One-way or two-way external trusts Windows Server 2003 and servers running other operating systems Realm trust
nwtraders.msft Properties Trusts General Managed By Domains trusted by this domain: Relationship Tran… Domain Name sales.contoso.msft marketing.contoso.ms contoso.msft Shortcut Shortcut Tree Root Yes Yes Yes Add… Verify a trust contoso.msft Properties Edit… General Remove To verify and if necessary reset this trust relationship, click Verify. This is useful as a troubleshooting tool. Verify Domains that trust this domain: Domain Name Relationship Tran… sales.contoso.msft contoso.msft Shortcut Tree Root Yes Yes Add… Edit… OK Cancel Apply Revoke a trust Remove Netdom Command Line NETDOM TRUST trusting_domain_name /Domain:trusted_domain_name /Verify NETDOM TRUST trusting_domain_name /Domain:trusted_domain_name /Remove Verifying and Revoking Trusts
When a domain administrator from a trusted domain attaches a well-known security principal onto the SID of a privileged user account from the trusted domain SID spoofing Enables administrators to discard credentials that use SIDs that are likely candidates for spoofing SID filtering SID filtering must be disabled to allow migrated users and groups from other domains to access this domain’s resources by using SIDHistory Disabling SID filtering How to Prevent SID Spoofing Using SID Filtering netdom trust <TrustingDomainName> /domain:<TrustedDomainName> /quarantine:No
How Name Suffix Conflicts Are Detected and Resolved • Name suffix conflicts occur when • A DNS name is already in use • A NetBIOS name is already in use • A domain SID conflicts with another name suffix SID • Name suffix conflicts in a domain cause access to that domain from outside the forest to be denied
Parent/Child and Tree/Root Trust Created Automatically Two-Way Transitive by Default Shortcut Trust Intra-Forest Only Partially One-Way Transitive Forest Trust Windows 2003 Forest Only Partially One-Way Transitive Realm Trust Trust Relationships with Other Operating Systems that also Support Kerberos Protocol One-Way Transitive or One-Way Non-Transitive Use Kerberos Authentication Only External Trust Trust Relationships with Windows Domains that are not in the same Forest One-Way Non-Transitive Use NTLM Authentication Only Characteristic of Trusts
User Password Hash→Nonce 3 User Name, Domain 1 2 Nonce 4 4 User Password Hash 5 User Password Hash→Nonce User Password Hash ← How NTLM Authentication Works Domain Controller Client SecurityAccountsDatabase
User Name TGT+Timestamp TGT+SA KAB KAB How Kerberos Authentication Works KDC & TGS User Target Server The TGS creates a pair of tickets, one for the client and one for the server the client wants to access resources on. Each ticket contains the name of the user requesting the service, the recipient of the request, a timestamp that declares when the ticket was created, and a time duration that says how long the tickets are valid. Both tickets also contain a new key (KAB). The KDC looks up the user’s master key (KA), which is based on the user’s password. The KDC then creates two items, a session key (SA) to share with the user, and a Ticket Granting Ticket (TGT). The client computer now has a session key and a TGT. To access a resource, the client presents its TGT and a timestamp encrypted with the session key that is already shared with the KDC When a user enters a user name and password, the computer sends the user name to the Key Distribution Centre (KDC).
nwtraders.msft KDC 3 KDC 4 Server 1 5 How Kerberos V5 Works contoso.msft Forest Root Domain Kerberos Authentication KDC 2 KDC Session Ticket marketing.contoso.msft Client sales.nwtraders.msft
Shortcut Trust How Trusts Work in a Forest Forest Root Domain Tree One Tree Root Domain Domain 1 Domain A Domain 2 Tree Two Domain B Domain C
6 nwtraders.msft contoso.msft 4 2 5 7 3 8 1 9 How Trusts Work Across Forests Forest 1 Forest 2 Forest trust Global catalog Global catalog Seattle Vancouver vancouver.nwtraders.msft seattle.contoso.msft