Title: Session 1: Identity and Access Management
1Session 1 Identity and Access Management
- Kim Mikkelsen
- Senior Technology Specialist
- Microsoft
2Session Overview
- Overview of Identity and Access Management
Concepts - Identity Management
- Intranet Access Management
- Extranet Access Management
3Overview of Identity and Access Management
Concepts
- Overview of Identity and Access Management
Concepts - Identity Management
- Intranet Access Management
- Extranet Access Management
4Managing Digital Identities What Are the
Challenges?
Challenges to managing digital identities include
- Multiple identity stores
- Intranet access management
- Extranet access management
5What Is Identity and Access Management?
Identity Life CycleManagement
Access Management
Directory Services
Application Integration
6How Can Identity and Access Management Reduce
Directory Management Effort?
Initiatives that reduce directory management
effort include
- Automating provisioning and deprovisioning
- Implementing identity aggregation and
synchronization - Establishing directory service and security
standards - Establishing software development and
procurement standards - Reducing TCO
7How Can Identity and Access Management Simplify
the End User Experience?
Initiatives that simplify the end user experience
include
- Consolidating identity stores
- Improving password management
- Enabling SSO
- Improving access for employees, customers, and
partners
8How Can Identity and Access Management Increase
Security?
Initiatives that increase security include
- Establishing security and access policies
- Improving password management
- Strengthening authentication mechanisms
- Establishing security audit policy
- Developing identity-aware applications
9Understanding Identity and Access Management
Technologies
10Identity Management
- Overview of Identity and Access Management
Concepts - Identity Management
- Intranet Access Management
- Extranet Access Management
11Managing Identities What Are the Challenges?
Challenges related to managing multiple identity
stores include
- Management costs
- Employee productivity
- Security
- Customer service and supply chain integration
12Understanding the Identity Life Cycle
13Managing Identity Integration
Approaches to managing identity integration among
directory stores include
- Identity integration products
14Understanding Identity Integration Products and
Services
You can implement identity integration by using a
number of identity integration products and
services
- Identity Integration Feature Pack
- Microsoft Identity Integration Server 2003
- Services for UNIX
- Services for NetWare
- Host Integration Server
- Active Directory Connector
- Active Directory to ADAM Synchronizer
15Using the Identity Integration Feature Pack to
Manage Identities
IIFP is a free product that provides connections
to only the following directories and e-mail
applications
- Active Directory for Windows 2000 Server and
later - Active Directory Application Mode (ADAM)
- GAL synchronization for Exchange 2000 Server and
Exchange Server 2003
16Using Microsoft Identity Integration Server to
Manage Identities
MIIS 2003 provides the following set of features
Identity aggregation and synchronization
- Support for over 20 repositories
- Provides a single enterprise view of a user
- Uses SQL Server as the information repository
Account provisioning
- Automated account creation/deletion
- Group distribution list management
- Workflow
- Password management
17Understanding Identity Integration Using MIIS
- Synchronizes multiple repositories
- Agentless connection to other systems
- Attribute level control
- Manage global address lists
- Automate group and DL management
Intranet Active Directory
Sun ONE Directory
Extranet Active Directory
Legend CSConnector Space MAManagement
Agent MVMetaverse
MIIS 2003
Lotus Notes
18Implementing Account Provisioning
Typical ways of implementing account provisioning
include
- HR-driven provisioning
- Web-driven provisioning
- Complex workflow provisioning using Microsoft
BizTalk Server 2004 orchestration
19Managing Passwords
MIIS 2003 provides the ability to manage
passwords through
- Help desk reset
- Windows-initiated changes
- Web-initiated changes
- Other systeminitiated changes through
non-Microsoft software
20Identity Management Best Practices
Define all business rules before implementation
ü
Determine service-level agreements
ü
Identify all existing systems or processes that
might conflict with identity synchronization
ü
Train development and support staff
ü
Plan for custom code development
ü
Implement a disaster recovery plan and secure the
MIIS service accounts
ü
21Intranet Access Management
- Identity and Access Management Concepts
- Identity Management
- Intranet Access Management
- Extranet Access Management
22Intranet Access Management What Are the
Challenges?
Common business challenges related to intranet
access management include
- No single sign-on capabilities
- A higher number of password reset requests
- Multiple, inconsistent approaches to security
services
23Approaches to Single Sign-on
Approaches to single sign-on, in order of
preference, include
- Application integration with Windows security
services - Platform integration with Windows directory and
security services - Application integration with Windows directory
services - Indirect integration through credential mapping
- Synchronized accounts and passwords
24Implementing Single Sign-on
Approaches to implementing single sign-on include
- Credential mapping, or Enterprise SSO
25Using Credential Manager
Credential Manager is used to save the users
credentials automatically and use them for future
access to a resource
Credential Manager supports the following types
of credentials
- User name and password combinations
- X.509 digital certificates
- Microsoft Passport credentials
26Understanding Windows Authorization Options
Windows Server 2003 supports a number of
authorization mechanisms
- The Windows access control listbased
impersonation model - Role-based authorization
- ASP.NET authorization
27Understanding Windows Server 2003 Authorization
Manager
Authorization Manager organizes users into
various roles within the application, as shown
Authorization Policy Store
Mary
Mary Manager
Bob
Role-based Access to Resources
Authorization Checked at Application Server
28Extranet Access Management
- Overview of Identity and Access Management
- Identity Management
- Intranet Access Management
- Extranet Access Management
29Extranet Access Management What Are the
Challenges?
Challenges related to extranet access management
include
- Providing secure sessions over the Web
- The need for a robust authentication and access
control mechanism - The need for a common security model that
includes authentication, Web SSO, authorization,
and personalization
30Identifying Extranet Considerations
Considerations that may affect your extranet
access management approach include
- Virtual Private Network or Web SSO access
- Directory service selection
- Existing applications
- Identity life-cycle management
- Password security
31Understanding Authentication Methods for Extranet
Access
Protocols used for extranet access include
- Forms-based authentication
32Understanding Authorization Techniques for
Extranet Access
Extranet authorization techniques can include the
following
33Using Trusts and Shadow Accounts for Extranet
Access
Alternatives to using trusts include
- Using shadow accounts
- Implementing public key infrastructure trusts
- Using qualified subordination
34Implementing Security Auditing
Use security auditing to monitor the following
services
- Directory services
- Authentication
- Authorization
The following products and technologies can be
used for security auditing and reporting
- Windows Security Event Log
- WMI
- MOM
35Session Summary
36Next Steps
- Find additional security training events
- http//www.microsoft.com/seminar/events/security.
mspx - Sign up for security communications
- http//www.microsoft.com/technet/security/signup/
default.mspx - Order the Security Guidance Kit
- http//www.microsoft.com/security/guidance/order/
default.mspx - Get additional security tools and content
- http//www.microsoft.com/security/guidance
-
37Questions and Answers