35
Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Embed Size (px)

Citation preview

Page 1: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Microsoft® Official Course

Module 8

Deploying and Managing Certificates

Page 2: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Module Overview

Deploying and Managing Certificate Templates

Managing Certificates Deployment, Revocation, and Recovery

Using Certificates in a Business Environment• Implementing and Managing Smart Cards

Page 3: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Lesson 1: Deploying and Managing Certificate Templates

What Are Certificates and Certificate Templates?

Certificate Template Versions in Windows Server 2012

Configuring Certificate Template Permissions

Configuring Certificate Template Settings

Options for Updating a Certificate Template•Demonstration: Modifying and Enabling a Certificate Template

Page 4: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

What Are Certificates and Certificate Templates?

A certificate contains information about users, devices, usage, validity, and a key pair

A certificate template defines:• The format and contents of a certificate• The process for creating and submitting a valid certificate request• The security principles that are allowed to read, enroll, or use autoenrollment for a certificate that will be based on the template• The permissions required to modify a certificate template

Page 5: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Certificate Template Versions in Windows Server 2012

• Introduced in Windows 2000 Server, provided for backward compatibility in newer versions

• Created by default when a CA is installed• Cannot be modified (except for permissions) or removed, but can be

duplicated to become version 2 or 3 templates, which can then be modified

Version 1:

• Default template introduced with Windows Server 2003• Allows customization of most settings in the template• Several preconfigured templates are provided when a CA is installed

Version 2:

• Supports advanced Suite B cryptographic settings• Includes advanced options for encryption, digital signatures, key

exchange, and hashing• Only supports Windows Server 2008 and Windows Server 2008 R2

servers• Only supports Windows Vista and Windows 7 client computers

Version 3:

• Available only for Windows Server 2012 and Windows 8 clients• Supports both CSPs and key storage providers• Supports renewal with the same key

Version 4:

Page 6: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Configuring Certificate Template Permissions

Permission Description

Full ControlAllows a designated user, group, or computer to modify all attributes—including ownership and permissions.

ReadAllows a designated user, group, or computer to read the certificate in AD DS when enrolling

WriteAllows a designated user, group, or computer to modify all attributes except permissions

EnrollAllows a designated user, group, or computer to enroll for the certificate template

AutoenrollAllows a designated user, group, or computer to receive a certificate through the autoenrollment process

Page 7: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Configuring Certificate Template Settings

For each certificate template, you can customize several settings, such as validity time, purpose, CSP, private key exportability, and issuance requirements

Category Single-purpose example

Multi-purposes example

Users

• Basic EFS

• Authenticated session

• Smart card logon

• Administrator

• User

• Smart card user

Computers• Web server

• IPsec

• Computer

• Domain controller

Page 8: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Options for Updating a Certificate Template

Modify the original certificate template to incorporate the new settings

Modifying

Replace one or more certificate templates with an updated certificate template

Superseding

UpdatedOriginal

Smart Card 1

Smart Card 2

Smart Cards (new)

Page 9: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Demonstration: Modifying and Enabling a Certificate Template

In this demonstration, you will see how to modify and enable a certificate template

Page 10: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Lesson 2: Managing Certificates Deployment, Revocation, and Recovery

Certificate Enrollment Methods

Certificate Autoenrollment Overview

Enrollment Agent Overview

How Does Certificate Revocation Work?

Overview of Key Archival and Recovery

Configuring Automatic Key Archival•Demonstration: Configuring a CA for Key Archival

Page 11: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Certificate Enrollment Methods

Method Use

Autoenrollment• To automate the request, retrieval,

and storage of certificates for domain-based computers

Manual enrollment

• To request certificates by using the Certificates Templates console or Certreq.exe when the requestor cannot communicate directly with the CA

CA Web enrollment

• To request certificates from a website that is located on a CA

• To issue certificates when autoenrollment is not available

Enroll on behalf• To provide IT staff with the right to

request certificates on behalf of another user (Enrollment Agent)

Page 12: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Certificate Autoenrollment Overview

• A certificate template is configured for Allow, Enroll, and Autoenroll permissions for users who receive the certificates

•The CA is configured to issue the template

•An AD DS GPO should be created to enable autoenrollment

•The GPO should be linked to the appropriate site, domain, or OU

•The client machine receives the certificates during the next Group Policy refresh interval

Page 13: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Enrollment Agent Overview

•An Enrollment Agent is a user who has the appropriate certificate assigned and and has the ability to request certificates on behalf of other users or computers

The restricted Enrollment Agent has limited permissions:• Limits permissions of the enrollment agent:• For specific group of users• For specific certificate templates

•Requires Windows Server 2008 Enterprise edition or Windows Server 2012 CA

Page 14: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

How Does Certificate Revocation Work?

The following are steps to revoke a certificate:1. Certificate is revoked2. Certificate revocation is published3. Client computer verifies certificate validity

and revocation

Page 15: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Overview of Key Archival and Recovery

• Private keys can get lost when:• A user profile is deleted• An operating system is reinstalled • A disk is corrupted• A computer is lost or stolen

• It is critical that you archive private keys for for certificates that are used for encryption• The KRA is needed for key recovery• Key archival must be configured on the CA and on the certificate template• Key recovery is a two-phases process:

1. Key retrieval

2. Key recovery

• The KRA certificate must be protected

Page 16: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Configuring Automatic Key Archival

•Steps to configure automatic key archival:1. Configure and issue the KRA certificate

template2. Designate a person as the KRA and enroll for

the certificate3. Enable key archival on the CA4. Modify and enable certificate templates for key

archival

Page 17: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Demonstration: Configuring a CA for Key Archival

In this demonstration, you will see how to configure a CA for key archival

Page 18: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Lesson 3: Using Certificates in a Business Environment

Using Certificates for SSL

Using Certificates for Digital Signatures

Demonstration: Signing a Document Digitally

Using Certificates for Content Encryption

Demonstration: Encrypting a File with EFS•Using Certificates for Authentication

Page 19: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Using Certificates for SSL

• The purpose of securing a connection with SSL is to protect data during communication• For SSL, a certificate must be installed on the server• Be aware of trust issues • The SSL works in the following steps:

1. The user types an HTTPS URL 2. The web server sends its SSL certificate.3. The client performs a check of the server

certificate4. The client generates a symmetric encryption

key5. The client encrypts this key with the server’s

public key6. The server uses its private key to decrypt the

encrypted symmetric key• Make sure that you configure the SSL certificate properly

Page 20: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Using Certificates for Digital Signatures

• Digital signature ensure:• Content is not modified during transport• The identity of the author is verifiable

• Digital signatures works in the following steps:1. When an author digitally signs a document or a message,

the operating system on his or her machine creates a message cryptographic digest

2. The cryptographic digest is then encrypted by using author’s private key and added to the end of the document or message

3. The recipient uses the author’s public key to decrypt the cryptographic digest and compare it to the cryptographic digest created on the recipient’s machine

• Users need to have certificate based on a User template to use digital signatures

Page 21: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Demonstration: Signing a Document Digitally

In this demonstration, you will see how to sign a document digitally

Page 22: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Using Certificates for Content Encryption

• Encryption protectsdata from unauthorizedaccess• EFS uses certificates forfile encryption

• To send an encryptedmessage, you must bepossess the recipient’spublic key

File encryption key:Encrypted with the file owner’spublic key

File encryption key:Encrypted with the public key of Recovery agent 1

File encryption key:Encrypted with the public key ofRecovery agent 2 (optional)

• • • •

Encrypted Data

DataDecryptionField

DataRecoveryFields

Header

Page 23: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Demonstration: Encrypting a File with EFS

In this demonstration, you will see how to encrypt a file with EFS

Page 24: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Using Certificates for Authentication

You can use certificates for user and device authentication, and in network and application access scenarios such as:• L2TP/IPsec VPN• EAP-TLS• PEAP• NAP with IPsec• Outlook Web App • Mobile device authentication

Page 25: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Lesson 4: Implementing and Managing Smart Cards

What Is a Smart Card?

How Does Smart Card Authentication Work?

What Is a Virtual Smart Card?

Enrolling Certificates for Smart Cards•Smart Card Management

Page 26: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

What Is a Smart Card?

•A smart card is a miniature computer, embedded in plastic with limited storage and processing capabilities

•Smart cards:• Provide options for multifactor authentication• Provide enhanced security over passwords

•A valid smart card and PIN must be used together

Page 27: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

How Does Smart Card Authentication Work?• Smart cards can be used for:• Interactive logon to AD DS• Client authentication, if you use a certificate that matches an

account • Remote logon

• Interactive logon steps:1. Logon request goes to the LSA, which is forwarded to the

Kerberos package

2. KDC verifies the certificate

3. KDC verifies the digital signature on the authentication service

4. KDC performs an AD DS query to locate user account

5. KDC generates a random encryption key to encrypt the TGT

6. KDC signs the reply with its private key and sends it to the user

• You can use smart cards for offline logon

Page 28: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

What Is a Virtual Smart Card?

•A smart card infrastructure might be expensive•Windows Server 2012 AD CS introduces Virtual Smart Cards•Virtual Smart Cards use leverage the capabilities of the TPM chip •No cost for buying smart cards and smart card readers•Computer acts like a smart card•Private keys are protected by the cryptographic capabilities of the TPM

Page 29: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Enrolling Certificates for Smart Cards

•Before issuing smart cards, you should define the method of enrollment for smart card certificates

•Smart card enrollment requires certificates require some manual intervention

• For smart card enrollment, you should:• Define the certificate template for the smart cards• Enroll one or more users for the Enrollment Agent certificate• Configure the enrollment station• Start the Enroll On Behalf Of wizard

•Ensure that users change their personal PIN

Page 30: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Smart Card Management

• Smart card management tasks:• Issuance• Revocation• Renewal• Block and Unblock• Duplication• Suspend

• FIM 2010 can:• Issue smart cards to users• Store information in a SQL database• Manage revocation, renewal, unblocking, suspension and

reinstatement procedures• Provide users and administrators with a web-based, self-

service smart card management interface• Manage smart card printing with appropriate hardware• Implement workflows for each management task

Page 31: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Lab: Deploying and Using Certificates

Exercise 1: Configuring Certificate Templates

Exercise 2: Enrolling and using certificates•Exercise 3: Configuring and Implementing Key Recovery

Logon InformationVirtual machines: 10969A-LON-DC1,

10969A-LON-SVR1,10969A-LON-CL1

User name: Adatum\AdministratorPassword: Pa$$w0rd

Estimated Time: 50 minutes

Page 32: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Lab Scenario

You are working as an administrator at A. Datum Corporation. As A. Datum expands, its security requirements also are increasing. The Security department particularly is interested in enabling secure access to critical websites, and in providing additional security for features such as EFS, digital signatures, smart cards, and the Windows 7 and Windows 8 DirectAccess feature. The Security department especially wants to evaluate digital signatures in Microsoft Office documents. To address these and other security requirements, A. Datum has decided to use certificates that are issued by the AD CS role in Windows Server 2012.

Page 33: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Lab Scenario

As one of the senior network administrators at A. Datum, you are responsible for implementing certificate enrollment. You also will be developing the procedures and process for managing certificate templates, and for deploying and revoking certificates.

Page 34: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Lab Review

What must you do to recover private keys?•What is the benefit of using a restricted Enrollment Agent?

Page 35: Microsoft ® Official Course Module 8 Deploying and Managing Certificates

Module Review and Takeaways

Review Questions

Real-world Issues and Scenarios

Tools

Best Practice•Common Issues and Troubleshooting Tips