470 likes | 872 Views
Windows Vista PKI Enhancement in Windows 7 and Windows Server 2008 R2. Agenda. Background PKI Enhancements Server consolidation Improved existing scenarios HTTP based enrollment Strong Authentication Enhancements. Windows PKI Today. A strategic investment
E N D
Windows Vista PKI Enhancement in Windows 7 and Windows Server 2008 R2
Agenda • Background • PKI Enhancements • Server consolidation • Improved existing scenarios • HTTP based enrollment • Strong Authentication Enhancements
Windows PKI Today • A strategic investment • Windows 2000, Windows XP, Windows Vista and keep on investing • Existing abilities: • Server role: CA, OCSP, SCEP • Client components: API, UI, Client services • Active Directory integration • Protocols and application adoption • For more info • http://technet.microsoft.com/en-us/library/cc753254.aspx • http://technet.microsoft.com/en-us/library/cc770357.aspx
PKI Trends • Governments – the biggest cert issuers!!! • SMBs need PKI solution • Enterprises need PKI for heterogeneous environments • Applications use certificates as authorization tokens (short validity period) • Industry extends usage of X.509 certificates • Extended Validation (EV) certificates • Logo types • Advanced crypto is picking up
Windows 7 Investments Strong Authentication Public Key Infrastructure Server Consolidation Improved Existing Scenarios HTTP Based Enrollment
Server ConsolidationNot persistent requests • New PKI Scenarios use short-lived certificates • Network Access Protection (NAP) • OCSP signing certificates • Existing workarounds for DB growth: dedicated servers or high management cleanup cost • Windows Server 2008 R2 • Administrator can configure whether the CA writes to the database
Server ConsolidationNot persistent requests No-Persist No-Revocation
Server ConsolidationServer core support • CA is supported on Server Core • Local command line utilities • Remote UX management • Key management by HSM vendor • No other ADCS service is supported on Server Core
How does it work today?Single forest CA • CA starts and reads certificate templates from AD • Client reads certificate templates from AD • Client sends enrollment request to CA • CA constructs Subject information based on client object in AD • CA issues certificate and returns to client 3 5 Client Workstations Active Directory (AD) 1 2 4
How does it work today?Multiple forests • Multiple forests implies: • Multiple servers • Multiple CA keys • Multiple HSM • Multiple certificate databases • Etc.
How will it work?Cross forest enrollment CA 3 5 Client Workstations Client Workstations Active Directory Active Directory (AD) Account Forest Resource Forest 1 2 4
Server ConsolidationCross forest enrollment • Windows will support certificate enrollment and issuance across AD forest boundaries • Requires AD forest two-way trust between account and resource forest • Requires Windows Server 2008 R2 CA • Requires Windows XP and above
Server ConsolidationCross forest enrollment: management • CA reads templates from the resource forest • Client reads templates from account forest • This require manual steps to make sure templates are in sync • Initial consolidation • Ongoing synchronization • Best Practice Whitepaper For PKI Consolidation
Server Consolidation Simplify management for NAP deployment Support CA installations on Server Core Support Cross Forest Enrollment
Windows 7 Investments Strong Authentication Public Key Infrastructure Server Consolidation Improved Existing Scenarios HTTP Based Enrollment
Improved Existing ScenariosStandard SKU supports V2 templates • W2K introduced V1 certificate templates • W2K3 introduced V2 certificate templates • Not supported on W2K3 Standard Edition • W2K8 introduced V3 certificate templates • Not supported on W2K8 Standard Edition • CA installed on Windows Server 2008 R2 Standard Edition supports allcertificate template versions • Supports auto enrollment • Supports key archival • Etc.
Improved Existing Scenarios Best practice analyzer • Most of PKI support calls are caused by configuration issues • Windows Server 2008 R2 introduces Best Practice Analyzer (BPA) tool • CA defines rules that can be checked by the BPA tool after each CA configuration change
Improved Existing Scenarios Certificate selection Windows Vista Windows 7 Icons to differentiate software vs. smartcard certificates Removed duplicate and archived certificates
Improved Existing Scenarios Enterprise SSL EV certificate • Mark an enterprise root CA as an extended validation (EV) root and add the EV policy OID • Configurable through group policy
Improve Existing Scenarios V2 Certificate Templates Best Practice Analyzer Certificate Selection Enterprise SSL EV Certificate
Windows 7 Investments Strong Authentication Public Key Infrastructure Server Consolidation Improved Existing Scenarios HTTP Based Enrollment
HTTP Based EnrollmentDesign goal Enable new scenarios to leverage the Windows PKI client • Server certificates issued by a public CA • Issuance across company boundary • Partnership scenario • Issuance to non-domain-joined machines • B2C issuance • My bank issues me certificates • And more…
HTTP Based EnrollmentDesign overview • Specified two new http based protocols for certificate enrollment • Implemented client services on top of new protocols • Implemented server side for these new protocols • Work (in progress) with related ISVs to provide interoperable solutions
HTTP Based Enrollment Active Directory (AD) Certificate Enrollment Policy WS HTTP Only 3 4 6 7 Client Workstations Certificate Enrollment WS CA 1 2 5 1
HTTP Based EnrollmentAuto-enrollment enhancements • Ensure the system has a valid certificate for each one of the enrollment policies that are configured for the end entity • Implements client role for both protocols • Maintains list of policy server URI’s • Maintains a cache of the enrollment policies returned from all policy servers • Runs on non-domain-joined machines
HTTP Based EnrollmentAuthentication • Windows client will use the same authentication mechanism for policy and enrollment servers • Kerberos • Username/Password • Certificate based • Supports credentials storage (optional) • Implements renewal through proof of possession • Requires SSL
HTTP Based Enrollment Enrollment wizard • Added additional step to the Enrollment Wizard Enrollment Policy Entry
HTTP Based Enrollment Group policy UX • Allows admins to publish Policy Servers to client machines • Ensures the policy server URI is valid • Same UX is used on client machines to configure local policy and users configured entries
HTTP Based Enrollment Cross forest support Active Directory (AD) Active Directory (AD) Certificate Enrollment Policy WS 7 6 4 3 Client Workstations Certificate Enrollment WS Account Forest CA Resource Forest 5 1 1 2
HTTP Based Enrollment Web server scenario: enrollment and renewal • Admin logs on to a web server • Admin opens IE browses to public CA web site and creates an account • Admin clicks OK to elevation dialog: • Set policy server URL in the local policy store • Set credentials for policy server (admin or control) • Enroll for this policy server • Dynamic Enrollment policy • After enrollment is done, certificate installed
HTTP Based Enrollment Web server scenario: recover from revocation • System configured with Policy Server Entry • Cached U/P credentials • Enabled for Auto-Enrollment • CA revokes the system’s certificate and publish new CRL • Within eight hours after old CRL expire: • AE downloads new CRL • AE marks existing cert as revoked • AE retrieves policies from policy server and enrolls for a new certificate
HTTP Based Enrollment Web server scenario: dynamic policy updates • System configured with Policy Server • One enrollment policy for SSL 1Year 1024 key size • Policy needs to be updated every week • CA increases key size to 2048 and update the revision number on the enrollment policy object • Within a week: • AE downloads new policies • AE marks existing cert as archived • AE enrolls for a new certificate
Windows 7 Investments Strong Authentication Public Key Infrastructure Server Consolidation Improved Existing Scenarios HTTP Based Enrollment
Strong AuthenticationBiometric • New platform for Biometric Devices • Focused on fingerprint based authN in consumer scenarios • New driver model and basis for future certification program • Integrated user experience • Windows logon, local and domain • Device and feature discovery • Enterprise management • Disable Windows Biometric Framework via Group Policy • Allow use for applications but not for domain logon
Strong AuthenticationSmartCard • Smart card Plug-and-Play • Windows Update and WSUS/SUS based driver installation • Pre-Logon driver installation • Non-Admin based driver installation • Smart card class mini-driver • NIST SP800-73-1 (PIV) support • INCITS GICS (Butterfly) support • Windows 7 Smartcard Framework improvements • Improved support for Biometric Based Smart card unlock • New APIs enabling Secure Key Injection
Strong AuthenticationECC based Smartcard logon • Windows 7 supports: • smartcard enrollment for ECC certificate • logon with ECC based certificate
Strong AuthenticationStrong authentication based access control • ‘Smart card required’ for remote access checks
Strong Authentication Biometric Smartcard
Windows 7 Investments Strong Authentication Public Key Infrastructure Server Consolidation Improved Existing Scenarios HTTP Based Enrollment
Q & A Meet me in the Ask-the-Experts pavilion! WEDNESDAY - DAY 312:15 - 12:45
Related Content IDA02-ILL: Setting Up and Configuring Active Directory Certificate Services (AD CS) November 5 09:00 - 10:15 November 6 16:20 - 17:35 IDA04-IS: All You Ever Wanted to Ask about Designing and Operating an Enterprise PKI November 6 14:40 - 15:55
Now extended from2 to 24 hours after sessionfor more chance to WIN • Don’t forget to completeyour session feedbackforms via theCommNet terminalsor theRegistered Delegate Pages foryour chance towin aHTC Touch Dual! • With an amazing line up of international speakers, there are even more chances to win an evaluation prize! So make sure you submit feedback for all the sessions you attend! • http://www.microsoft.com/emea/teched2008/itpro/feedback.aspx
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.