Windows 2000 Kerberos Authentication

The next generation of the Microsoft® Windows® operating system will adopt Kerberos as the default protocol for network authentication. An emerging standard, Kerberos provides a foundation for interoperability while enhancing the security of enterprise-wide network authentication. Windows 2000 implements Kerberos version 5 with extensions for public key authentication. The Kerberos client is implemented as a security provider through the Security Support Provider Interface. Initial authentication is integrated with the Winlogon single sign-on architecture. The Kerberos Key Distribution Center (KDC) is integrated with other Windows 2000 security services running on the domain controller and uses the domain¡¦s Active DirectoryTM directory service as its security account database. This white paper examines components of the protocol and provides detail on its implementation. 

Introduction

This paper provides a technical introduction to how the Microsoft® Windows®  2000 operating system implements the Kerberos version 5 authentication protocol. The paper includes detailed explanations of important concepts, architectural elements, and features of Kerberos authentication. The first section, ¡§Overview of the Kerberos Protocol,¡¨ is for anyone unfamiliar with Kerberos authentication. Following this introduction to the protocol are several sections with details of Microsoft¡¦s implementation in Windows 2000. The paper concludes with a brief discussion of requirements for interoperability with other implementations.

Authentication in Windows 2000

Windows 2000 supports several protocols for verifying the identities of users who claim to have accounts on the system, including protocols for authenticating dial-up connections and protocols for authenticating external users who access the network over the Internet. But there are only two choices for network authentication within Windows 2000 domains:

Computers with Windows 3.11, Windows 95, Windows 98, or Windows NT 4.0 will use the NTLM protocol for network authentication in Windows 2000 domains. Computers running Windows 2000 will use NTLM when authenticating to servers with Windows NT 4.0 and when accessing resources in Windows NT 4.0 domains. But the protocol of choice in Windows 2000, when there is a choice, is Kerberos version 5.

Benefits of Kerberos Authentication

The Kerberos protocol is more flexible and efficient than NTLM, and more secure. The benefits gained by using Kerberos authentication are:


Smart Cards

The Microsoft® Windows® operating system is smart card¡Venabled and is the best and most cost-effective computing platform for developing and deploying smart-card solutions. Smart-card requirements have been incorporated into the PC98 and Net PC design specifications and into future releases of the Windows operating system. Microsoft has released its implementation of the PC/SC 1.0 specifications for the Windows NT® 4.0, Windows 95, and Windows 98 operating system. Future releases of the Windows platform will also contain smart-card support as part of the base platform. This paper presents an overview of Smart Card technology including interoperability, software development, and deployment issues.

Introduction

The need for security and enhanced privacy is increasing as electronic forms of identification replace face-to-face and paper-based ones. The emergence of the global Internet and the expansion of the corporate network to include access by customers and suppliers from outside the firewall have accelerated the demand for solutions based on public-key technology. A few examples of the kinds of services that public-key technology enables are secure channel communications over a public network, digital signatures to ensure image integrity and confidentiality, and authentication of a client to a server (and vice-versa).

Smart cards are a key component of the public-key infrastructure that Microsoft is integrating into the Windows® operating system because smart cards enhance software-only solutions, such as client authentication, logon, and secure e-mail. Smart cards are essentially a point of convergence for public-key certificates and associated keys because they:

The smart card will become an integral part of the Windows platform because smart cards provide new and desirable features as revolutionary to the computer industry as the introduction of the mouse or compact disc.

¡@


Encrypting File System for Windows 2000

The Encrypting File System (EFS) that is included with the Microsoft® Windows® 2000 operating system provides the core file encryption technology to store NTFS files encrypted on disk. EFS particularly addresses security concerns raised by tools available on other operating systems that allow users to physically access files from an NTFS volume without an access check.

This document provides an executive summary and a technical overview of EFS and looks at the issues of data access scenarios and the limitations of the approaches that some products on the market have in trying to solve system, file, and data security problems.

Introduction

A standard safety measure on a personal computer system is to attempt to boot from a floppy disk before trying to boot from the hard disk. This guards users against hard drive failures and corrupted boot partitions. It also adds the convenience of booting different operating systems. Unfortunately, this can mean someone with physical access to a system can bypass the built-in security features of the Windows® 2000 operating system file system access control by using a tool to read Windows NTFS on-disk structures. Many hardware configurations provide features like a boot password to restrict this kind of access. Such features are not in widespread use, and in a typical environment, where multiple users are sharing a workstation, they do not work very well. Even if these features were universal, the protection provided by a password is not very strong.

The root of these security concerns is sensitive information, which typically exists as unprotected files on your hard drive. You can restrict access to sensitive information that is stored on an NTFS partition if Windows 2000 is the only operating system that can be run and, if the hard drive cannot be physically removed. If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard drive. Availability of tools that allow access to NTFS files from MS-DOS® and UNIX operating systems makes bypassing NTFS security even easier.

Data encryption is the only solution to this problem. With EFS, data in NTFS files is encrypted on disk. The encryption technology used is public key-based and runs as an integrated system service, making it easy to manage, difficult to attack, and transparent to the user. If a user attempting to access an encrypted NTFS file has the private key to that file, the user is able to open the file and work with it transparently as a normal document. A user without the private key to the file is denied access.


Active Directory Architecture

Introduction

Gaining an understanding of the Active DirectoryTM directory service is the first step in understanding how the Windows® 2000 operating system functions and what it can do to help you meet your enterprise goals. This paper looks at Active Directory from the following three perspectives:

Active Directory Benefits

The introduction of Active Directory in the Windows 2000 operating system provides the following benefits:

At the end of this document, ¡§Appendix A: Tools¡¨ provides a brief overview of the software tools you use to perform the tasks associated with Active Directory.

¡@


Introduction to IntelliMirror

The IntelliMirrorTM management technologies are a set of powerful features built into the Microsoft® Windows® 2000 operating system and designed to increase availability and reduce the overall cost of supporting users of Windows. IntelliMirror uses policy-based Change and Configuration Management to enable users' data, software, and settings to follow them throughout a distributed computing environment, whether they are on- or off-line.

Introduction

The IntelliMirrorTM management technologies are a set of powerful features built into the Microsoft® Windows® 2000 operating system, designed for desktop Change and Configuration Management. IntelliMirror uses features in both Windows 2000 Server and Windows 2000 Professional to allow users' data, software, and settings to follow them.

The features of IntelliMirror increase the availability of a user¡¦s data, personal computer settings, and computing environment by intelligently managing information, settings, and software. Based on policy definitions, IntelliMirror is able to deploy, recover, restore or replace user¡¦s data, software, and personal settings in a Windows 2000¡Vbased environment.

Essentially, IntelliMirror provides users with follow-me functionality for their personal computing environment. Users have constant access to all of their information and software, whether or not they are connected to the network, with the assurance that their data is safely maintained and available.

IntelliMirror is an addition to the Zero Administration initiative for Windows (ZAW). IntelliMirror allows an administrator to set policy definitions once and be confident that the policy will be applied without further administrative intervention.

At the core of IntelliMirror are three features:

IntelliMirror features can be used separately or all together, depending on the business or organizational requirements.

This paper defines and explains IntelliMirror and its features and presents practical applications of IntelliMirror to show the overall benefit achieved by combining these features.


TCP/IP Implementation Details for Windows 2000

¡@

This white paper describes Microsoft® Windows® 2000 operating system Transmission Control Protocol/Internet Protocol (TCP/IP) implementation details and is a supplement to the Microsoft Windows 2000 TCP/IP manuals. This paper examines the Microsoft TCP/IP protocol suite from the bottom up. Throughout the paper, network traces are used to illustrate key concepts. These traces were gathered and formatted using Microsoft Network Monitor, a software-based protocol tracing and analysis tool included in the Microsoft Systems Management Server product. This paper is intended for network engineers and support professionals who are already familiar with TCP/IP.

Introduction

Microsoft has adopted TCP/IP as the strategic enterprise network transport for its platforms. In the early 1990s, Microsoft started an ambitious project to create a TCP/IP stack and services that would greatly improve the scalability of Microsoft networking. With the release of the Microsoft® Windows NT® 3.5 operating system, Microsoft introduced a completely rewritten TCP/IP stack. This new stack was designed to incorporate many of the advances in performance and ease of administration that were developed over the past decade. The stack is a high-performance, portable 32-bit implementation of the industry-standard TCP/IP protocol. It has evolved with each version of Windows NT to include new features and services and to enhance performance and reliability.

The goals in designing the TCP/IP stack were to make it:

The TCP/IP suite for Windows 2000 was designed to make it easy to integrate Microsoft systems into large-scale corporate, government, and public networks and to provide the ability to operate over those networks in a secure manner. Windows 2000 is an Internet-ready operating system.