




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、1Practical Security for Intranet Solutions 孫巍孫巍2Session Overview Introduction to Security for Intranet Applications Data Security Fundamentals Managing Identities Authenticating Identities in Intranet Applications Authorizing Identities in Intranet Applications3Introduction to Security for Intranet
2、Applications Introduction to Security for Intranet Applications Data Security Fundamentals Managing Identities Authenticating Identities in Intranet Applications Authorizing Identities in Intranet Applications4Characteristics of Intranet Environments Users are known Data is sensitive Biggest threat
3、is internal5Securing Data Store sensitive data securely Treat the storage medium as if it were at riskData ThreatsData TamperingAccess to SensitiveData in Storage6Storing Identity InformationDirectoryActive DirectoryADAMGeneric LDAPDatabaseSQLA repository that contains digital identitiesIdentity Sto
4、re Directory or database Centralized or distributed Well-defined schema Encryption or hashing7Authenticating IdentitiesA process that checks the credentials of a security principal against values in an identity storeAuthenticationAuthentication ThreatsUser ImpersonationAccount Hijacking8Authorizing
5、IdentitiesThe process of resolving a users entitlements with the permissions configured on a resource to control accessAuthorizationAuthorization ThreatsData TamperingDisclosure of Confidential DataElevationof PrivilegeUnauthorized Access9Securing Communication Treat intranet applications like Inter
6、net applications Use SSL to secure communicationCommunication ThreatsMan in the MiddleWireless DataInterceptionSecuring the data stream between the application and the client or between two applicationsSecuring Communication10 Introduction to Security for Intranet Applications Data Security Fundamen
7、tals Managing Identities Authenticating Identities in Intranet Applications Authorizing Identities in Intranet ApplicationsData Security Fundamentals11Data Security in Applications Data security is essential to ensure that: Confidential data remains private Important data is not tampered with or del
8、eted Authorized users have access to their data Data can be secured using: Permissions Encryption12Data Security and Permissions Typically, data files provide permissions based on the following actions: Full control Modify Read & Execute Read Write File based data security scheme that limits acc
9、ess based on the users authorization levelPermissions13What Is Encryption? There are two main approaches to encryption: Symmetric encryption Asymmetric encryption Both approaches can be used within the same sessionA method of transforming data by passing it through a cryptographic function to genera
10、te data in a format that can read only by an entity that knows the specific decryption key and algorithmEncryptionDo not write your own encryption routines Use the ones provided14Data Security and Encryption Use encryption when storing or transmitting sensitive data Longer encryption key = Stronger
11、encryptionStoring DataRetrieving Data1Collect2Encrypt3Transmit4Store1Retrieve2Transmit3Decrypt4Read15SymmetricDESTripleDESRijndaelRC2 AsymmetricDSARSAData Encryption in the .NET FrameworkAn electronic signature used to ensure the authenticity, integrity, and non-repudiation of an electronic document
12、Digital signature16Best Practices for Data SecuritySecure all sensitive data as if the media itself were at riskChange symmetric keys oftenUse existing cryptographic functions 17Managing Identities Introduction to Security for Intranet Applications Data Security Fundamentals Managing Identities Auth
13、enticating Identities in Intranet Applications Authorizing Identities in Intranet Applications18 ApplicationsConsume digital identity Evaluate entitlements Common intranet identity storesActive DirectoryADAMSQLGeneric LDAPApplications and Identity StoresDo not invent identity stores for your applica
14、tion 19Access ManagementControlling user access to resources Authentication Credential mapping AuthorizationA state that describes the agreements between different parties and systems for sharing identity informationTrust20Identity Flow There are three models for flowing the identity of an authentic
15、ated user in distributed environments: Impersonation/delegation Trusted subsystem Credential mappingThe action of passing identity information between resourcesIdentity Flow21Designing Access-Management StrategiesThe following steps identify a process that will help you develop an authentication and
16、 authorization strategy for your application:Identify resources1Choose an authorization strategy2Choose the identities used for resource access3Consider identity flow4Choose an authentication approach5Decide how to flow identity622Best Practices for Identity ManagementMinimize the number of identity
17、 stores within your organizationUse Active Directory for your identity storeUse an identity store that exists rather than creating your own 23 Introduction to Security for Intranet Applications Data Security Fundamentals Managing Identities Authenticating Identities in Intranet Applications Authoriz
18、ing Identities in Intranet ApplicationsAuthenticating Identities in Intranet Applications24Authentication Options for Intranet ApplicationsThe following are common authentication methods for intranet applications:Least SecureMost SecureBasicAnonymousDigest, NTLMKerberos, X.509 client certificate25An
19、onymous Authentication No authentication = Anonymous access Anonymous access does not provide any identity information Anonymous access provides no security Give anonymous users read-only access26Basic Authentication Specified in HTTP 1.0 Inherently insecurepasswords sent in Base64 encodingUsername
20、& PasswordAccess or DenySecure the authentication stream by using an SSL connection 27Integrated Windows Authentication Preferred authentication mechanism for intranet applications Kerberos is replacing NTLM KerberosWindows 2000 ServerWindows Server 2003NTLMWindows NT ServerWindows 2000 ServerWi
21、ndows Server 200328User name and hashed password 2Compares hashed password3Access or deny access4Challenge with code1Digest Authentication and NTLM Digest credentials: user name & hashed password NTLM credentials: domain name, user name, & hashed passwordDoes not secure the data stream29Kerb
22、eros Authentication Relies on public-key cryptography and digital-signature technology Windows provides certificate authority serviceClient requests a client ticket1Client requests session ticket to application3Kerberos server replies with ticket4Client sends tickets to application5Application sends
23、 validation (optional)6Kerberos server replies with ticket2345621ClientApplicationKerberos Server30X.509 Client Authentication Requires the exchange of digital certificates Level of security is related to contents of certificate Trusted certificate authority issues certificate Commonly used in extra
24、net access, not intranet, accessClient requests certificate from authority1Client sends certificate to application3Application decodes certificate4Certificate authority replies with certificate2321ClientApplicationCertificateAuthority31Best Practices When Using AuthenticationUse SSL to secure the au
25、thentication stream when necessarySecure the data streamUse Windows Integrated authentication for intranet applications 32 Introduction to Security for Intranet Applications Data Security Fundamentals Managing Identities Authenticating Identities in Intranet Applications Authorizing Identities in In
26、tranet ApplicationsAuthorizing Identities in Intranet Applications33Two options for authorization in intranet applications:Access control list - A list of security identities and actionsaccess control entriesthat apply to an objectRole-based access controlAuthorization Options for Intranet Applicati
27、ons34Access Control Lists Discretionary ACL (DACL) - identifies the trustees that are allowed or denied access to a securable object System ACL (SACL) - enables administrators to log attempts to access a secured object Use APIs to write ACLs; do not try to manipulate them directly35Impersonation Authentication package authenticates and builds security context Application or service uses the security context to impersonate the
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 教育走向生本讀書(shū)反思
- 《數(shù)據(jù)網(wǎng)組建與維護(hù)》課件-9.2任務(wù)2 Telnet遠(yuǎn)程登陸網(wǎng)絡(luò)設(shè)
- 管理會(huì)計(jì)(第三版)課件全套 徐艷 模塊1-10 管理會(huì)計(jì)概述 - 責(zé)任會(huì)計(jì)
- 母嬰用品創(chuàng)業(yè)計(jì)劃
- 提高廣告點(diǎn)擊率的關(guān)鍵策略
- 2025年護(hù)士基礎(chǔ)護(hù)理學(xué)專項(xiàng)題庫(kù):護(hù)士執(zhí)業(yè)資格考試復(fù)習(xí)全書(shū)
- 2025年輔導(dǎo)員招聘考試題庫(kù):班級(jí)管理策略與班級(jí)心理健康教育法律法規(guī)實(shí)施效果試題
- 胸骨骨折治療方案
- 著裝安全教案
- 腎癌免疫治療
- 2024年貴州現(xiàn)代物流產(chǎn)業(yè)集團(tuán)有限公司招聘筆試參考題庫(kù)含答案解析
- 20222023八下語(yǔ)文提優(yōu)輔導(dǎo)02(教師+學(xué)生)
- 共和國(guó)史(自己整理-僅供參考)
- 視頻監(jiān)控維保項(xiàng)目投標(biāo)方案(技術(shù)標(biāo))
- 涉農(nóng)(農(nóng)、林、水)地方標(biāo)準(zhǔn)宣貫推廣實(shí)施方案(試行)
- NB-T 11076-2023 高壓交流故障電流限制器通用技術(shù)規(guī)范
- 整縣(市、區(qū))屋頂分布式光伏開(kāi)發(fā)方案書(shū)-V5
- 透水磚鋪裝施工方案
- 《十步訊問(wèn)法》讀書(shū)筆記
- GB/T 42599-2023風(fēng)能發(fā)電系統(tǒng)電氣仿真模型驗(yàn)證
- 質(zhì)量問(wèn)題解決方法之7鉆流程法
評(píng)論
0/150
提交評(píng)論