420 likes | 602 Views
How to Implement Secure Guest Access and Enable BYOD without Compromising your Enterprise. Shmulik Nehama, Identity Engines Portfolio Leader Avaya. The Beginning of Time…. Then came this…. …Anyone here still using flip phone?. Tablet market $45B by 2014 – Yankee 2011
E N D
How to Implement Secure Guest Access and Enable BYOD without Compromising your Enterprise Shmulik Nehama, Identity Engines Portfolio Leader Avaya
…Anyone here still using flip phone? • Tablet market $45B by 2014– Yankee 2011 • 50% Enterprise users interested in or using consumer applications– Yankee 2011 • Smartphone app revenue to triple by 2014– Yankee 2011 700 000 700 000 119 000 000 491 000 000 686 000 000 1 200 000 000 Android apps iPhone/iPad apps Tablets in 2012 Smartphones in 2011 Smartphones in 2012 Social Media Users Time Magazine cover Aug 18 1997. Bill Gates invests $150M to save Apple.
It’s not about Saying NO…It’s About Staying in Control!! NO sorry you cannot bring your iPad NO sorry you cannot connect outdoor NO sorry you cannot do video conferencing NO sorry you cannot bring your fancy laptop YES pls do bring your own iPad YES pls do you are welcome to use Wifi VOIP YES pls do you are welcome to use virtual desktop YES pls do you are welcome to do mobile collaboration
It is about a solution that combines control and flexibility!! Users
It is about a solution that combines control and flexibility!! Devices
It is about a solution that combines control and flexibility!!
It is about a solution that combines control and flexibility!!
BYOD Bring Your Own Difficulties Your Difficulties are to find AC Outlets
Avaya Identity EnginesKey Value Points… • Vendor Agnostic • Any Network • Any User • Any Device • Wired & Wireless • Unified Access • Centralized Policy • Guest Access • Audit logs • Self-service • Sponsor / Front Desk • BYOD Access • Device On-boarding • Device Fingerprinting • non-802.1x access
Avaya Identity EnginesKey Value Points… • Granular Policy Engines • XACML (eXtensible Access Control Markup Language) • Local User and Device Store • Flexible RADIUS VSAs (Vendor Specific Attributes) • Directory Federation • All major directory servers • AD, RSA, LDAP, eDirectory • Identity Routing • High Availability • Active - Active • Active - Standby • Virtual Appliance • All software solution • VMware ESXi • Windows applications
Avaya Identity EnginesKey Value Points… • Simple and affordable licensing • Network Size License • LITE • SMALL • LARGE • Feature License • TACAS+ • Posture • Guest Manager • Access Portal & CASE Wizard • Analytics no per user license no per device license
Identity-based Access Control…with Identity Engines • Identity Engines • Role-basedAccess IF(identity = HR employee) AND IF (device = corp laptop) AND IF (medium = wired) THEN GRANT FULL ACCESS Case 1 Employee withcorporate laptop IF(identity = HR employee) AND IF(device = personal iPad) AND IF (medium = wireless) THEN GRANT LIMITED ACCESS Case 2 Employeewith personal iPad
Automating network access has direct impact on reducing cost of change • Each access port is not assigned until a user/device attempts access. • Once authenticated & authorized, user/device is granted appropriate access level. • MAC address lookup: • Ignition Server local store • Manual input • Wildcards (e.g. Avaya IP Phones 00:04:0d* and Cisco IP Phones 00:15:62*) • Import CSV file with list of MAC address and other device attributes • Access Portal auto-populate EnterpriseNetwork Visitor or Business Partner IP Phone Personal Machine Corporate Desktop Network Printer Network Device Wireless Access Point Surveillance Camera Fax Machine Medical Device Local Server/App Guests & Guest Devices
Identity EnginesAuthenticated Network Architecture PolicyEnforcement Point PolicyDecision Point PolicyInformation Point NETWORK ABSTRACTION LAYER DIRECTORY ABSTRACTION LAYER Guest Access Mgmt Posture Assessment Reporting & Analytics Access Portal CASE Wizard Identity Engines
Identity EnginesAuthenticated Network Architecture • Identity Information Sources: • Active Directory • Novell eDirectory • Sun Directory • Oracle Internet Directory • Generic LDAP • Kerberos • RSA SecurID • Token Based Services • RADIUS Proxy IgnitionAccess Portal Wired IgnitionServer Wireless VPN Firewall CorporateResources IgnitionAnalytics IgnitionGuest Manager IgnitionDashboard
Identity EnginesIgnition Server • Centralized, standards-based policy engine • Vendor Agnostic • Highly-available AAA appliance for identity-based network access control • RADIUS integration with all enterprise network equipment • Quick and deep integration with major directories • Detailed logging and troubleshooting capabilities • Hitless upgrades where appropriate • VMware virtual appliance with support for VMware ESX(i)
Ignition DashboardAccess Policy • Access Policy = Authentication Policy +Identity Routing + Authorization Policy & Posture Policy
Identity EnginesGuest Manager • Guest Manager is a Web-based applicationthat manages temporary network accounts forvisitors. • Provisioning/de-provisioning in 10 sec • Front-desk or Guest Self-service • Activation options • Immediate activation • Future activation • Account duration time • Activate on first login • Choose any access method toimplement: Wireless, Wired, and VPN • Track Users: Guests, Consultants,Contractors • Complete detailed logs
Identity EnginesGuest Manager Administration • Multiple Guest Managersmay be deployed: • Against a single instance ofthe Ignition Server • Under a single GuestManager license • Authorization policies forguests are in the IgnitionServer • Guest Manager Administrator • Creates provisioners • Creates provisioning templates • Assigns provisioning templates to provisioners • Guest Manager Provisioners • May be internal or external (i.e. on LDAP / AD etc.) • Single or bulk provisioning • Provisioners are frequently called sponsors because they sponsor guest.
Identity EnginesGuest Manager Administration • Administration • Notification options • Password complexity • Password generation • Username generation • Users bulk load • Expiration • Activation
Identity EnginesIgnition Access Portal • Access Portal can deployed forfollowing use cases: • Access without 802.1x enablement • Contractor & Employee Access withdifferent modes of 8021.xenablement. • CASE Wizard hosting for Auto-configuration of 802.1x • iOS Profile file hosting (from AppleiPhone/iPad Configuration Utility) • BYOD On-boarding of managedand un-managed consumerdevices attributes • Device profiling • Auto-registration • Auto-updates • Serves as a Captive Portal for non-802.1x clients • Unifies Wired and Wireless access • Performs device fingerprinting • BYOD On-boarding • Hosting place for the CASE Wizard
Identity EnginesIgnition Access Portal • Device Fingerprinting • Access the Captive Portal on the INinterface for wired and wireless users • User opens browser and enterscorporate or guest account credentials • User authenticated against IgnitionServer • If successful authentication, user sessionis inline through the OUT interface • Upon successful authentication, AccessPortal, if enabled, also performs profilingof user devices and sends deviceFINGERPRINT to the Ignition server • Devices Type, Devices Sub-Type,Device OS, Devices OS Version • New Avaya RADIUS VSAs are used forsending the device fingerprint • If trusted, Ignition server automaticallycreates a device fingerprint records
Identity EnginesIgnition Access Portal • Device Fingerprinting • Access the Captive Portal on the INinterface for wired and wireless users • User opens browser and enterscorporate or guest account credentials • User authenticated against IgnitionServer • If successful authentication, user sessionis inline through the OUT interface • Upon successful authentication, AccessPortal, if enabled, also performs profilingof user devices and sends deviceFINGERPRINT to the Ignition server • Devices Type, Devices Sub-Type,Device OS, Devices OS Version • New Avaya RADIUS VSAs are used forsending the device fingerprint • If trusted, Ignition server automaticallycreates a device fingerprint records Wireless UserDevices RADIUS Access Portal IgnitionServer IN D E V I C E P R O F I L I N G ADMIN HTTP Capturing RADIUS Wired RADIUS OUT
Identity EnginesIgnition Access Portal • Multiple Access Portals maybe deployed: • Against a single instance ofthe Ignition Server • w/single Access Portal license • Device Profiling • Administrator will be able toset the Access Portal toperform device profiling of wired and wireless devices • Device fingerprinting: • Devices Type, Devices Sub-Type, Device OS, Devices OS Version • Devices attributes are sent to the Ignition Server for registration and association with user • BYOD On-boarding • Auto-register of Guest Visitor and Employee Guest devices • Device profiling of registering devices • Auto-association of devices with guest / employee records in Ignition Server • Populating device records in Ignition Server with device profile attributes
Identity EnginesIgnition Access Portal Authorization Policy on the Ignition Server Employee with personal iPad will gain access with Employee with personal Blackberry will NOT gain access with
Identity EnginesIgnition Access Portal • Pages Customization • Login page • Success page • Failure page
Identity EnginesIgnition CASE Wizard • CASE Wizard • CASE = Client Access to the Secure Enterprise • A transient application to automate configuration of managed and un-managed Windows devices: • Auto-config of 802.1x • Auto-config of MS-NAP • Dissolvable application • Revertible or permanent configuration • Wired and / or Wireless • Network Profiles & Packages • Set of network and security settings thatdefine how a user connects to aparticular defined network • This profile is saved as an XML file andbundled into a CASE package, which inturn applies the settings to the user’scomputer system
Identity EnginesIgnition CASE Wizard • Ignition CASE Wizard • CASE Wizard package hosted on acustomer internal web site or on theAccess Portal • Different packages may be createdfor different network connectivityneeds • Exit Behavior • CASE Wizard may be customized toeither exit or reside in the System tray. • Revert Settings • CASE Wizard may be customized tolet the user revert the settings • Reverting is achieved by clicking the“Revert Settings” in the System Tray.
Identity EnginesiOS Devices • Apple configuration utility foriOS devices • Config profile contains settings: • Passcode policies • Restrictions on device features • Wi-Fi settings • VPN settings • Exchange ActiveSync • Credentials and keys • More… • Ways to deploy config profiles • Physically connecting to thedevice • In an email message • On a webpage • Using over-the air
Identity EnginesBYOD Examples Access Portal for ITregistration of managed devices Access Portal for Employee registrationof un-managed devices • Employee login w/AD • Device attributescaptured • Config option with CASEfor Windows or iOS • Employee access via802.1x or Access Portal IgnitionAccess Portal Wired • IT login w/Admincredentials • Device attributescaptured • Associate devicewith Device Groupin the Dashboard • Handover deviceto employee • Policy in Ignition Server handles access Wireless VPN IgnitionServer Firewall CorporateResources IgnitionGuest Manager IgnitionAccess Portal
Real Life Avaya Use-case:Self-Service Guest Wi-Fi Access WiFi access as a self-service based on Identity Engines Guest Manager & Access Portal Avaya Wi-Fi Guest Access Management Identity Engines R8.0 Live inSanta Clara &Baskin Ridgecampuses Option 1 Guest Self-service Avaya WLANInfrastructure Option 2 Employee sponsor www.avaya.com/sponsor
Identity EnginesResources • Product Management • Shmulik Nehama • Email snehama@avaya.com • Office 408-496-3110 • Mobile 408-569-3635 • YouTube Video • http://www.youtube.com/watch?v=0ZrMOqzGMpE • 30-Days Free Trial • www.avaya.com/identitytrial • Long term lab licenses available fromproduct management
Identity EnginesSanta Clara Lab Topology (Rack F-14) DELL SERVER Ignition Server Guest Manager CASE Administration Internet AD SERVER (Windows 2008) Red Hat Enterprise Linux 10.1.2.234 Windows 7 10.1.2.232 AVAYA-NET 10.1.2.219 AVAYA-NET.219 NIC 1 NIC 2 Access Portal RADIUS NIC 1 Free BSD 10.1.2.229 SECURE ROUTER NAC SWITCH (ERS 2550PWR) 10.1.2.250 VLAN1 17-23 48 VLAN1 16 24 14 OUT LAN DHCP RANGE 10.1.2.10 - 49 DHCPServer 1 2 VLAN24 VLAN14 VLAN14 VLANX VLAN1 ADMIN WAN 4 x NAC Clients IN AVAYA-NET.216 10.1.2.240 Windows XP DHCP NIC 2 NIC 1 NIC 2 DHCP RANGE 10.1.2.50 - 99 DHCPServer 10.1.2.218 AVAYA-NET.218 LAN 10.1.2.244 VMware ESX1 4.1 10.1.2.220 / 222 SECURE ZONE (Windows 2003)
Identity EnginesSanta Clara Lab Topology Remote Desktop (AVAYA-NET.IP) VMware vSphere Client Dashboard Web Browser Ignition Server NAC Clients Ignition Server Guest Manager Access Portal NAC Switch DELL SERVER Guest Manager CASE Administration Ignition Server Internet AD SERVER (Windows 2008) Red Hat Enterprise Linux 10.1.2.234 Windows 7 10.1.2.232 AVAYA-NET 10.1.2.219 AVAYA-NET.IP NIC 1 NIC 2 Access Portal RADIUS NIC 1 Free BSD 10.1.2.229 SECURE ROUTER NAC SWITCH (ERS 2550PWR) 10.1.2.250 VLAN1 17-23 48 VLAN1 16 24 14 OUT LAN DHCP RANGE 10.1.2.10 - 49 DHCPServer 1 2 VLAN24 VLAN14 VLAN14 VLANX VLAN1 ADMIN WAN 4 x NAC Clients IN AVAYA-NET.216 10.1.2.240 Windows XP DHCP NIC 2 NIC 1 NIC 2 DHCP RANGE 10.1.2.50 - 99 DHCPServer 10.1.2.218 AVAYA-NET.218 LAN 10.1.2.244 VMware ESX1 4.1 10.1.2.220 / 222 SECURE ZONE (Windows 2003)