350 likes | 450 Views
Identity Management. Campus Developers Meeting September 6, 2006. Agenda. Password Complexity Enforcement, Phase II Minimum Standards for Authentication Servers Kerberos Keytab Standards and Procedures Fall ‘06 CUWebAuth Release Fall ’06 NetID Cleanup Updates
E N D
Identity Management Campus Developers Meeting September 6, 2006
Agenda • Password Complexity Enforcement, Phase II • Minimum Standards for Authentication Servers • Kerberos Keytab Standards and Procedures • Fall ‘06 CUWebAuth Release • Fall ’06 NetID Cleanup • Updates • Kerberos 4 to Kerberos 5 Migration • Central Authorization System, Phase I
Password Complexity Enforcement – Phase II • Andrea Beesing
Phase I – Spring 2005 Roll-out • Technical implementation of complexity rules • Communication to campus using various mechanisms • All new NetIDs issued since then have complex passwords • Largely reliant on voluntary compliance for existing users
Phase II – Fall 2006 Roll-out • Create service to enable units and/or service owners to ensure users comply • Service to consist of • Tools (communication templates, for example) • Procedures for obtaining lists of users and verifying compliance • More info in coming weeks
Purpose of discussion • Provide background on how the standards came about • Outline general principles informing the standards • Get feedback from you • Are the standards clear? • Are there additions we should consider? • What can we do to assist with compliance?
Background • Concern with risk posed by unauthorized Kerberos proxies • Desire to incorporate in policy as preventative measure • Some details originally included in University Policy 5.8, Authentication of Information Technology Resources: http://www.cit.cornell.edu/policy/drafts/AuthenticationITR2.html
Background • Existing, more comprehensive document is result of • Preference to avoid technical implementation details in policy • Initial confusion around which authN alternatives carry the strictest requirements • Other business drivers such as adoption of SOA and expansion of user community
General principles • Stricter standards where risk is highest (i.e. Kerberos proxies) • Dual-factor authentication • Availability of detailed logs to IT Security • Encryption is desirable in most cases • Attention to the security of the host’s password or password-equivalent
General principles • Authentication and authorization should be kept separate • In general, one-to-one mapping between service ID or principle and application
Comments appreciated • Document will be posted on AADS web site in Developers Meeting section • Send feedback to amb3@cornell.edu
Defining terms • Keytab - A keytab is a host's copy of its own keylist, which is analogous to a user's password. An application server that needs to authenticate itself to the KDC has to have a keytab that contains its own principal and key. Just as it is important for users to protect their passwords, it is equally important for hosts to protect their keytabs.
Defining terms • ServiceID – The principal which identifies the server or service which is authenticating itself to Kerberos
Standards and procedures • Will cover things like • Who is authorized to request the keytab • Additional information required at time of request for tracking purposes • Two items for you to think about • Naming rules for ServiceID • Annual renewals
ServiceID name • Format of principle in Kerberos 5: name/instance@REALM • Proposed rules for name: You choose a name which is relevant to the specific service • Alternative might be a standard convention similar to that used for NetIDs, for example webapp1, webapp2
Keytab renewals • Annual renewal/reissue of all keytabs? • Two goals • Currency of information associated with the keytab, especially contact names • Security of keytab • How would annual reissue impact you?
CUWebAuth 1.3.2 Release • Updated documentation • Support for Apache 2.2 • Support for KFW 3.0 (Kerberos For Windows) • Disabled IP checking for SSL connections, more usable for AOL & other IP Pooling customers • Bug fixes • Target release date: mid to late October
Fall ’06 NetID Cleanup • What: • One (1) Student cleanup a year (in the Fall) • Two (2) Staff cleanups a year (Spring and Fall) • Who (this Fall) • Staff, Students, and Affiliates • Affiliates: Boyce Thompson, USDA, CRESP, CUMC, ROTC, Public Service Center, PRI, Cornell Alumni Magazine, Campus Club • When: • Notifications (HR, service owners): 9/6 - 9/13 • E-mail notification to cleanup candidates: 9/21 • Tag directory records, remove permits: 10/25 • HR reps can get a custom list for their dept.
K4 to K5 Migration • A Brief Update
Work Accomplished to Date • Investigations conducted to: • Understand what our peer institutions are doing • Identify all services using central authentication • Discover services which will require special attention and begin focusing on potential solutions (e.g. Netprint) • Identity software components with dependencies on Kerberos 4 • Assessment and planning of work required to move away from Kerberos 4 • Technical infrastructure • User experience • Initial design strategy
Discretionary Migration New K5 Service ID improved provisioning and management infrastructure K5 Support current provisioning and management infrastructure K4 Support (Service owners migrate at best time for their services and Users) Old K4 Service ID
Update: K4 to K5 Migration For Example: Logging Solutions Identify active srvtabs Establish srvtab ownership Identify all K4 apps User impact of potential application changes Non-CIT K4 services Uncover Independent K4 realms What other institutions are doing For Example: General requirements MIT changes, dates, and impact assessment Cornell project Interdependencies Application-specific requirements Naming conventions for K5 Roll-out requirements Back-out strategy
Keeping You Posted http://identity.cit.cornell.edu
Central Authorization System • Another Brief Update • Phase 1, Permit Server Replacement
Work Accomplished to Date Initiation Plan 02/10/06 Project Charter 10/24/05 Project Plan 07/06/06
Work Accomplished to Date • Initial investigations: • Fit-Gap analysis between Permits and I2 Grouper • Early versions of Grouper running in test • Baseline requirements and use cases • Migration strategy • Phased approach • Phase One: Permit Server replacement (I2 Grouper) • Phase Two: Privilege Management (I2 Signet)
Phase One • Transparent cutover of Permit Server to Grouper • System owners and application developers migrate at their convenience
For Example: Fit-gap analysis Permit server log analysis Testing with I2 Applications Working Group participation Known use cases For Example: General requirements New use cases Business processes Cornell project Interdependencies Application-specific requirements Name space conventions Roll-out requirements Back-out strategy Security
Project Website: http://identity.cit.cornell.edu/authz/CAP/index.html