SlideShare a Scribd company logo
1 of 40
Dan Usher
Joel Ward
Who we are…
What we’ve seen…
Security Concerns in today’s world
Why SmartCards?
Authentication & Authorization of SharePoint
IIS and SmartCards
Implementation Considerations and Pitfalls
Dan Usher
  MCP, MCTS, Security+
  SharePoint Architect and Implementation /
  Deployment Engineer
  UVA - BS Physics
Joel Ward
  MCP, MCAD
  Solutions Developer and Architect
  Penn State - BA Integrative Arts
Large and Small SharePoint implementations
Authentication schemas using SmartCard
authentication integrated with Active Directory
and third party SSO systems
Extranet Enabled SmartCard SharePoint systems
Cyber Security
Identity Theft
Phishing
Information Assurance
Strong Passwords
Web of Trust
Two Factor Authentication
Biometrics
Confidentiality
Integrity
Authenticity
Availability
Non-repudiation
Stricter Password Policies
  Resetting Passwords More Often
  Password Enabled Screensavers

…disruptions in your daily work
…things aren’t quite as secure as they were
Simplicity…




Source: http://go.spdan.com/pki
Simplicity… to the end user
Provides a secure tamper resistant storage
physical token
Enables portability of credentials and private
information similar to other Federated
Identity…
   …like OpenID, Facebook Connect, Google
   OpenSocial, Microsoft Hailstorm
A PIN is used
…Security
Similar to a physical token
   Contains the same information
   It has an expiration date
   It can be revoked
Provides for similar IA capabilities
However…
   It can be exported
   It can be shared
   It can be purchased
   It can be stolen
Authentication
   IIS
         Username & Password
         Client Certificates
         ISAPI Filters
         Custom Membership Providers
         Federation (ADFS or Third Party Identity Handler)
Authorization
   SharePoint Groups and Permissions
   AD / LDAP / Role Provider Security Groups
Handled by IIS and ASP.NET
Checks user against AD or other auth provider




                                                Source: http://go.spdan.com/iisauth
Passes verification to IIS to proceed




ASP.NET Authentication
User attempts to access IIS   X.509 Certificate on Smart     User Enters PIN into
 User inserts smart card
                               based site that requires       Card with Private Key        middleware software
       into reader
                                      smart auth                 verified locally                prompt




          During                                            Smart Card’s Public Key is
                              Web Server receives public
                                                                                         PIN authenticates user to
authentication, challenge                                    retrieved from card and
                              key certificate and checks
based on public key within                                   verified through trusted            the card
                               validity against CA CRL
    certificate issued                                                 issuer




Challenge verifies the card
                                                                                           User’s identity from
                               Public Key – Private Key        Authentication has
has a private key and that
                                                                                          certificate UPN used to
  the private key can be               Verified                    occurred
                                                                                           reference user in AD
        leveraged




                                 Virtual Path Provider      SharePoint verifies user’s   IIS receives users identity
Site is rendered to the end
                              directs user to appropriate    authorization to specific       and hands them to
            user
                                          site                         site                      SharePoint
Option 0: SharePoint on an Intranet with
integrated authentication
Option 1: SharePoint in a DMZ with client
certificates and AD integration
Option 2a: SharePoint published through
Internet Security and Acceleration (ISA) Server
Option 2b: SharePoint published through
Intelligent Application Gateway (IAG) Server
Option 3: Custom Membership Provider
SharePoint is Intranet based only
Client Desktop utilizes the “SmartCard Enabled
Login Required” security policy setting
SharePoint utilizing Integrated Windows
authentication
   Kerberos or NTLM
Intranet only situation
   Need to be within the network boundary for
   authentication tokens to pass properly
User’s account must be linked to their
SmartCard user principal name
Certificate Authority (CA) availability for CRL
check may affect system availability
Web Server in DMZ
Utilize Authentication Store (AD)
IIS Configured to Require Client Certificate
Relatively easy to configure
Install a SSL certificate that belongs to a
managed PKI environment
Within IIS in the specific web
application, enable:
   Require Secure Channel (SSL)
   Require 128-bit encryption (optional)
   Require client certificate
Certificate Revocation List (CRL) ports open
   LDAP or LDAP-S
OCSP or CRL checking could cause
authentication to fail if CRL is not available
Depending on number of requests, CRL
checking could cause server load
Puts server in DMZ, increases attack surface
area – wfetch will show your SharePoint Version
User’s account must be linked to their
SmartCard user principal name
User selecting certificate that does not contain
UPN
Internet Security and Acceleration 2006 (ISA)
Server Web Site Publishing with Constrained
Kerberos Delegation
Internal Windows Networking Infrastructure
system utilizing Kerberos
Users authenticate to their client machine using
different account than SmartCard linked to their
AD user object
Windows XP + Office 2007 requires a hot fix to
allow for documents to open using ISA
Increases authentication requirements for
external facing or extranet systems
User’s account must be linked to their
SmartCard user principal name
Multi-Forest trusts do not always work
Reauthentication issues
Only leverages Active Directory
Intelligent Application Gateway (IAG) Server
Publishing Web Front End Server
Similar to Option 2a (ISA Server), but better
experience for the end user
Stable session - Prevents constant requests for
re-authorization using SmartCard
Allows for NAP like capabilities
Allows for mapping to something than AD
Additional hardware to maintain
   Current IAG is a hardware appliance
   IAG 2007 available as a virtual machine for
   demonstration purposes
   Future IAG will potentially be available as software
   and hardware
     IAG -> Forefront Unified Access Gateway (UAG)
Costly
Requires authenticating to IAG dashboard
Custom Membership provider for SmartCard
IIS or SSO/ISAPI filter handshakes with the
SmartCard
Does not require Active Directory: Can use
LDAP, SQL Server, or another authentication
provider
Custom SharePoint login page (using Forms
Based Authentication) completes the login
process seamlessly without user input
Can optionally create user account on the
fly, based on SmartCard credentials
Can add in logic for account approval, different
access levels based on SmartCard
credentials, etc.
Requires additional configuration in SharePoint
Requires custom development
If requiring client certificate in IIS (instead of
SSO or ISAPI filter), OCSP or CRL checking could
cause authentication to fail if CRL is not
available
Must secure server if in DMZ
Must add in appropriate security logic to
custom login page
1) Configure domain name and SSL certificate for
   web application
2) Implement Forms Based Authentication with
   SharePoint using appropriate membership and
   role provider (AD, LDAP, ASPNET, etc.)
3) Configure IIS to accept client certificates (or
   custom SSO)
4) Create custom login page for SharePoint
   _layouts folder
//Get client certificate and appropriate user ID
HttpClientCertificate cert = Request.ClientCertificate;
string userID;
userID = cert.Get(quot;[fieldname]quot;);

//Create new user and add to Visitor role
MembershipUser user =
Membership.CreateUser(userID,[randomPassword],[email]);
Roles.AddUserToRole(userID, quot;Visitorsquot;);

//If user exists in membership provider, login using FBA
if (Membership.GetUser(userID).UserName == userID)
FormsAuthentication.RedirectFromLoginPage(userID, false);
For SmartCard authentication to work
properly, it relies heavily on the surrounding
Windows networking infrastructure that it
resides within
SmartCard authentication can be done several
different ways depending on the surrounding
infrastructure
SmartCards works well when the user base
understands their responsibility in upholding IA.
Dan Usher
  dan@spdan.com
  http://www.sharepointdan.com
  @usher

Joel Ward
  joel@wardworks.com
  http://joelsef.blogspot.com
  @joelsef

More Related Content

What's hot

TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer
 
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCloudIDSummit
 
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkOAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkNov Matake
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicHarihara sarma
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer
 
Single SignOn with Federation using Claims
Single SignOn with Federation using ClaimsSingle SignOn with Federation using Claims
Single SignOn with Federation using ClaimsVolkan Uzun
 
ASP.NET Single Sign On
ASP.NET Single Sign OnASP.NET Single Sign On
ASP.NET Single Sign Onleastprivilege
 
FIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO Alliance
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web ApplicationsOlivier Potonniée
 
OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2Mike Schwartz
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Brian Spector
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2dP2PSystem
 
The Client is not always right! How to secure OAuth authentication from your...
The Client is not always right!  How to secure OAuth authentication from your...The Client is not always right!  How to secure OAuth authentication from your...
The Client is not always right! How to secure OAuth authentication from your...Mike Schwartz
 
FIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO Alliance
 
Patterns and Antipatterns in Enterprise Security
Patterns and Antipatterns in Enterprise SecurityPatterns and Antipatterns in Enterprise Security
Patterns and Antipatterns in Enterprise SecurityWSO2
 

What's hot (19)

TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
 
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkOAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
Single SignOn with Federation using Claims
Single SignOn with Federation using ClaimsSingle SignOn with Federation using Claims
Single SignOn with Federation using Claims
 
ASP.NET Single Sign On
ASP.NET Single Sign OnASP.NET Single Sign On
ASP.NET Single Sign On
 
FIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO2 Specifications Overview
FIDO2 Specifications Overview
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web Applications
 
OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
PKI Interoperability
PKI InteroperabilityPKI Interoperability
PKI Interoperability
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
 
Certification Authority - Sergio Lietti
Certification Authority - Sergio LiettiCertification Authority - Sergio Lietti
Certification Authority - Sergio Lietti
 
The Client is not always right! How to secure OAuth authentication from your...
The Client is not always right!  How to secure OAuth authentication from your...The Client is not always right!  How to secure OAuth authentication from your...
The Client is not always right! How to secure OAuth authentication from your...
 
FIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO2 Specifications Overview
FIDO2 Specifications Overview
 
Patterns and Antipatterns in Enterprise Security
Patterns and Antipatterns in Enterprise SecurityPatterns and Antipatterns in Enterprise Security
Patterns and Antipatterns in Enterprise Security
 

Similar to Smart Card Authentication

Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
Certification authority
Certification   authorityCertification   authority
Certification authorityproser tech
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewNick Owen
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
Certificate fundamental from avaya smgr perspective
Certificate fundamental from avaya smgr perspectiveCertificate fundamental from avaya smgr perspective
Certificate fundamental from avaya smgr perspectiveShashank Kapil
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
Explain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfExplain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfashokarians
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10githe26200
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSylvain Maret
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Accessbluntm64
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
Verviam Identity Management as a Service
Verviam Identity Management as a Service Verviam Identity Management as a Service
Verviam Identity Management as a Service Nya
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 

Similar to Smart Card Authentication (20)

Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems Overview
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
Certificate fundamental from avaya smgr perspective
Certificate fundamental from avaya smgr perspectiveCertificate fundamental from avaya smgr perspective
Certificate fundamental from avaya smgr perspective
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Explain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfExplain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdf
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
CERTIFYING AUTHORITY
CERTIFYING AUTHORITYCERTIFYING AUTHORITY
CERTIFYING AUTHORITY
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Access
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Verviam Identity Management as a Service
Verviam Identity Management as a Service Verviam Identity Management as a Service
Verviam Identity Management as a Service
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 

More from Dan Usher

SPS Pittsburgh - Getting Started with Office 365
SPS Pittsburgh - Getting Started with Office 365SPS Pittsburgh - Getting Started with Office 365
SPS Pittsburgh - Getting Started with Office 365Dan Usher
 
SPS NYC - Getting started with Office 365 for IT Pros
SPS NYC - Getting started with Office 365 for IT ProsSPS NYC - Getting started with Office 365 for IT Pros
SPS NYC - Getting started with Office 365 for IT ProsDan Usher
 
2014 09-20 - SPSNJ - Worst Practices of SharePoint
2014 09-20 - SPSNJ - Worst Practices of SharePoint2014 09-20 - SPSNJ - Worst Practices of SharePoint
2014 09-20 - SPSNJ - Worst Practices of SharePointDan Usher
 
2014 09-20 - SPSNJ - Getting Started with Office 365
2014 09-20 - SPSNJ - Getting Started with Office 3652014 09-20 - SPSNJ - Getting Started with Office 365
2014 09-20 - SPSNJ - Getting Started with Office 365Dan Usher
 
SPTechCon 2014 - Boston - Worst practices of SharePoint
SPTechCon 2014 - Boston - Worst practices of SharePointSPTechCon 2014 - Boston - Worst practices of SharePoint
SPTechCon 2014 - Boston - Worst practices of SharePointDan Usher
 
SPTechCon - Boston 2014 - Getting started with Office 365
SPTechCon - Boston 2014 - Getting started with Office 365SPTechCon - Boston 2014 - Getting started with Office 365
SPTechCon - Boston 2014 - Getting started with Office 365Dan Usher
 
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp UpDan Usher
 
SPSNYC 2014 - Authentication and Authorization
SPSNYC 2014 - Authentication and AuthorizationSPSNYC 2014 - Authentication and Authorization
SPSNYC 2014 - Authentication and AuthorizationDan Usher
 
2014 05-19 - getting started with office 365.release
2014 05-19 - getting started with office 365.release2014 05-19 - getting started with office 365.release
2014 05-19 - getting started with office 365.releaseDan Usher
 
2014-05-17 SPS Baltimore - Worst Practices of SharePoint
2014-05-17 SPS Baltimore - Worst Practices of SharePoint2014-05-17 SPS Baltimore - Worst Practices of SharePoint
2014-05-17 SPS Baltimore - Worst Practices of SharePointDan Usher
 
2014-005-17 SPS Baltimore - Getting Started with Office 365
2014-005-17 SPS Baltimore - Getting Started with Office 3652014-005-17 SPS Baltimore - Getting Started with Office 365
2014-005-17 SPS Baltimore - Getting Started with Office 365Dan Usher
 
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the CloudSharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the CloudDan Usher
 
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...Dan Usher
 
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT ProsSharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT ProsDan Usher
 
2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and Authorization2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and AuthorizationDan Usher
 
2014-04-05 - SPSPhilly - Getting Started with Office 365
2014-04-05 - SPSPhilly - Getting Started with Office 3652014-04-05 - SPSPhilly - Getting Started with Office 365
2014-04-05 - SPSPhilly - Getting Started with Office 365Dan Usher
 
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 3652014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365Dan Usher
 
2014 03-19 - CapArea.net SSIG - Getting Started with Office 365
2014 03-19 - CapArea.net SSIG - Getting Started with Office 3652014 03-19 - CapArea.net SSIG - Getting Started with Office 365
2014 03-19 - CapArea.net SSIG - Getting Started with Office 365Dan Usher
 
2014-03-13 - Getting Started with Office 365 at SUGDC
2014-03-13 - Getting Started with Office 365 at SUGDC2014-03-13 - Getting Started with Office 365 at SUGDC
2014-03-13 - Getting Started with Office 365 at SUGDCDan Usher
 
2014 02-26 - Princeton SUG presents - Getting Started with Office 365
2014 02-26 - Princeton SUG presents - Getting Started with Office 3652014 02-26 - Princeton SUG presents - Getting Started with Office 365
2014 02-26 - Princeton SUG presents - Getting Started with Office 365Dan Usher
 

More from Dan Usher (20)

SPS Pittsburgh - Getting Started with Office 365
SPS Pittsburgh - Getting Started with Office 365SPS Pittsburgh - Getting Started with Office 365
SPS Pittsburgh - Getting Started with Office 365
 
SPS NYC - Getting started with Office 365 for IT Pros
SPS NYC - Getting started with Office 365 for IT ProsSPS NYC - Getting started with Office 365 for IT Pros
SPS NYC - Getting started with Office 365 for IT Pros
 
2014 09-20 - SPSNJ - Worst Practices of SharePoint
2014 09-20 - SPSNJ - Worst Practices of SharePoint2014 09-20 - SPSNJ - Worst Practices of SharePoint
2014 09-20 - SPSNJ - Worst Practices of SharePoint
 
2014 09-20 - SPSNJ - Getting Started with Office 365
2014 09-20 - SPSNJ - Getting Started with Office 3652014 09-20 - SPSNJ - Getting Started with Office 365
2014 09-20 - SPSNJ - Getting Started with Office 365
 
SPTechCon 2014 - Boston - Worst practices of SharePoint
SPTechCon 2014 - Boston - Worst practices of SharePointSPTechCon 2014 - Boston - Worst practices of SharePoint
SPTechCon 2014 - Boston - Worst practices of SharePoint
 
SPTechCon - Boston 2014 - Getting started with Office 365
SPTechCon - Boston 2014 - Getting started with Office 365SPTechCon - Boston 2014 - Getting started with Office 365
SPTechCon - Boston 2014 - Getting started with Office 365
 
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
 
SPSNYC 2014 - Authentication and Authorization
SPSNYC 2014 - Authentication and AuthorizationSPSNYC 2014 - Authentication and Authorization
SPSNYC 2014 - Authentication and Authorization
 
2014 05-19 - getting started with office 365.release
2014 05-19 - getting started with office 365.release2014 05-19 - getting started with office 365.release
2014 05-19 - getting started with office 365.release
 
2014-05-17 SPS Baltimore - Worst Practices of SharePoint
2014-05-17 SPS Baltimore - Worst Practices of SharePoint2014-05-17 SPS Baltimore - Worst Practices of SharePoint
2014-05-17 SPS Baltimore - Worst Practices of SharePoint
 
2014-005-17 SPS Baltimore - Getting Started with Office 365
2014-005-17 SPS Baltimore - Getting Started with Office 3652014-005-17 SPS Baltimore - Getting Started with Office 365
2014-005-17 SPS Baltimore - Getting Started with Office 365
 
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the CloudSharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
 
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
 
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT ProsSharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
 
2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and Authorization2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and Authorization
 
2014-04-05 - SPSPhilly - Getting Started with Office 365
2014-04-05 - SPSPhilly - Getting Started with Office 3652014-04-05 - SPSPhilly - Getting Started with Office 365
2014-04-05 - SPSPhilly - Getting Started with Office 365
 
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 3652014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
 
2014 03-19 - CapArea.net SSIG - Getting Started with Office 365
2014 03-19 - CapArea.net SSIG - Getting Started with Office 3652014 03-19 - CapArea.net SSIG - Getting Started with Office 365
2014 03-19 - CapArea.net SSIG - Getting Started with Office 365
 
2014-03-13 - Getting Started with Office 365 at SUGDC
2014-03-13 - Getting Started with Office 365 at SUGDC2014-03-13 - Getting Started with Office 365 at SUGDC
2014-03-13 - Getting Started with Office 365 at SUGDC
 
2014 02-26 - Princeton SUG presents - Getting Started with Office 365
2014 02-26 - Princeton SUG presents - Getting Started with Office 3652014 02-26 - Princeton SUG presents - Getting Started with Office 365
2014 02-26 - Princeton SUG presents - Getting Started with Office 365
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Smart Card Authentication

  • 2. Who we are… What we’ve seen… Security Concerns in today’s world Why SmartCards? Authentication & Authorization of SharePoint IIS and SmartCards Implementation Considerations and Pitfalls
  • 3.
  • 4.
  • 5.
  • 6. Dan Usher MCP, MCTS, Security+ SharePoint Architect and Implementation / Deployment Engineer UVA - BS Physics Joel Ward MCP, MCAD Solutions Developer and Architect Penn State - BA Integrative Arts
  • 7. Large and Small SharePoint implementations Authentication schemas using SmartCard authentication integrated with Active Directory and third party SSO systems Extranet Enabled SmartCard SharePoint systems
  • 9. Strong Passwords Web of Trust Two Factor Authentication Biometrics
  • 11. Stricter Password Policies Resetting Passwords More Often Password Enabled Screensavers …disruptions in your daily work …things aren’t quite as secure as they were
  • 13. Simplicity… to the end user Provides a secure tamper resistant storage physical token Enables portability of credentials and private information similar to other Federated Identity… …like OpenID, Facebook Connect, Google OpenSocial, Microsoft Hailstorm A PIN is used …Security
  • 14. Similar to a physical token Contains the same information It has an expiration date It can be revoked Provides for similar IA capabilities However… It can be exported It can be shared It can be purchased It can be stolen
  • 15. Authentication IIS Username & Password Client Certificates ISAPI Filters Custom Membership Providers Federation (ADFS or Third Party Identity Handler) Authorization SharePoint Groups and Permissions AD / LDAP / Role Provider Security Groups
  • 16. Handled by IIS and ASP.NET Checks user against AD or other auth provider Source: http://go.spdan.com/iisauth Passes verification to IIS to proceed ASP.NET Authentication
  • 17. User attempts to access IIS X.509 Certificate on Smart User Enters PIN into User inserts smart card based site that requires Card with Private Key middleware software into reader smart auth verified locally prompt During Smart Card’s Public Key is Web Server receives public PIN authenticates user to authentication, challenge retrieved from card and key certificate and checks based on public key within verified through trusted the card validity against CA CRL certificate issued issuer Challenge verifies the card User’s identity from Public Key – Private Key Authentication has has a private key and that certificate UPN used to the private key can be Verified occurred reference user in AD leveraged Virtual Path Provider SharePoint verifies user’s IIS receives users identity Site is rendered to the end directs user to appropriate authorization to specific and hands them to user site site SharePoint
  • 18. Option 0: SharePoint on an Intranet with integrated authentication Option 1: SharePoint in a DMZ with client certificates and AD integration Option 2a: SharePoint published through Internet Security and Acceleration (ISA) Server Option 2b: SharePoint published through Intelligent Application Gateway (IAG) Server Option 3: Custom Membership Provider
  • 19. SharePoint is Intranet based only Client Desktop utilizes the “SmartCard Enabled Login Required” security policy setting SharePoint utilizing Integrated Windows authentication Kerberos or NTLM
  • 20.
  • 21. Intranet only situation Need to be within the network boundary for authentication tokens to pass properly User’s account must be linked to their SmartCard user principal name Certificate Authority (CA) availability for CRL check may affect system availability
  • 22. Web Server in DMZ Utilize Authentication Store (AD) IIS Configured to Require Client Certificate Relatively easy to configure
  • 23. Install a SSL certificate that belongs to a managed PKI environment Within IIS in the specific web application, enable: Require Secure Channel (SSL) Require 128-bit encryption (optional) Require client certificate Certificate Revocation List (CRL) ports open LDAP or LDAP-S
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. OCSP or CRL checking could cause authentication to fail if CRL is not available Depending on number of requests, CRL checking could cause server load Puts server in DMZ, increases attack surface area – wfetch will show your SharePoint Version User’s account must be linked to their SmartCard user principal name User selecting certificate that does not contain UPN
  • 29. Internet Security and Acceleration 2006 (ISA) Server Web Site Publishing with Constrained Kerberos Delegation Internal Windows Networking Infrastructure system utilizing Kerberos Users authenticate to their client machine using different account than SmartCard linked to their AD user object
  • 30. Windows XP + Office 2007 requires a hot fix to allow for documents to open using ISA Increases authentication requirements for external facing or extranet systems User’s account must be linked to their SmartCard user principal name Multi-Forest trusts do not always work Reauthentication issues Only leverages Active Directory
  • 31. Intelligent Application Gateway (IAG) Server Publishing Web Front End Server Similar to Option 2a (ISA Server), but better experience for the end user Stable session - Prevents constant requests for re-authorization using SmartCard Allows for NAP like capabilities Allows for mapping to something than AD
  • 32. Additional hardware to maintain Current IAG is a hardware appliance IAG 2007 available as a virtual machine for demonstration purposes Future IAG will potentially be available as software and hardware IAG -> Forefront Unified Access Gateway (UAG) Costly Requires authenticating to IAG dashboard
  • 33. Custom Membership provider for SmartCard IIS or SSO/ISAPI filter handshakes with the SmartCard Does not require Active Directory: Can use LDAP, SQL Server, or another authentication provider
  • 34. Custom SharePoint login page (using Forms Based Authentication) completes the login process seamlessly without user input Can optionally create user account on the fly, based on SmartCard credentials Can add in logic for account approval, different access levels based on SmartCard credentials, etc.
  • 35. Requires additional configuration in SharePoint Requires custom development If requiring client certificate in IIS (instead of SSO or ISAPI filter), OCSP or CRL checking could cause authentication to fail if CRL is not available Must secure server if in DMZ Must add in appropriate security logic to custom login page
  • 36. 1) Configure domain name and SSL certificate for web application 2) Implement Forms Based Authentication with SharePoint using appropriate membership and role provider (AD, LDAP, ASPNET, etc.) 3) Configure IIS to accept client certificates (or custom SSO) 4) Create custom login page for SharePoint _layouts folder
  • 37. //Get client certificate and appropriate user ID HttpClientCertificate cert = Request.ClientCertificate; string userID; userID = cert.Get(quot;[fieldname]quot;); //Create new user and add to Visitor role MembershipUser user = Membership.CreateUser(userID,[randomPassword],[email]); Roles.AddUserToRole(userID, quot;Visitorsquot;); //If user exists in membership provider, login using FBA if (Membership.GetUser(userID).UserName == userID) FormsAuthentication.RedirectFromLoginPage(userID, false);
  • 38. For SmartCard authentication to work properly, it relies heavily on the surrounding Windows networking infrastructure that it resides within SmartCard authentication can be done several different ways depending on the surrounding infrastructure SmartCards works well when the user base understands their responsibility in upholding IA.
  • 39.
  • 40. Dan Usher dan@spdan.com http://www.sharepointdan.com @usher Joel Ward joel@wardworks.com http://joelsef.blogspot.com @joelsef