Endpoint Encryption Manager and PKI Tokens

advertisement
McAfee® Endpoint Encryption and PKI
Tokens
1|
Endpoint Encryption and PKI Integration
Endpoint Encryption and PKI
Integration
Endpoint Encryption PKI Connector and PKI
Token Architecture
Overview
Endpoint Encryption uniquely amongst full-disk encryption products is able to utilize
existing PKI certificates stored on tokens such as USB keys and smartcards for
authentication. This has many advantages, such as:
•
re-use of existing tokens – no investment in new technology
•
no need to reinitialize tokens for users
•
revocation of a certificate results in a denial of access to PC’s and Laptops
Using its Connector technology, the Endpoint Encryption Manager integrates
transparently with back-end PKI public key directories such as Microsoft Active
Directory, Novell NDS, and other LDAP systems.
This paper, written by McAfee’s Sale Engineer team explains how the integration with
Endpoint Encryption is performed, and documents some of the advantages of this
solution.
Endpoint Encryption Certified System Engineers
The SCSE award is only issued to the highest caliber Endpoint Encryption trained
engineers who have passed both the SCSA exam and shown complete understanding
of Endpoint Encryption implementation and management. For information on SCSA
and SCSE training courses, please contact your local McAfee representative.
Introduction
PKI, or “Public Key Infrastructure” has become the method of choice for many large
organizations to provide authentication and security services to their users. The unique
advantages of PKI makes the investment worthwhile, for example, being able to host a
public directory of user keys; being able to use the key material for multiple purposes.
The more applications that can make use of this key material, the better the TCO
(Total Cost of Ownership) return.
2|
Endpoint Encryption and PKI Integration
Endpoint Encryption for PC has been able to support tokens such as smart cards and
USB keys within its pre-boot operating system for many years, in fact, the very first
version of Endpoint Encryption in 1992 did not support simple password logon – it
ONLY supported tokens.
Storage Tokens
Typically Endpoint Encryption uses tokens in “storage mode” – this is where a unique
Endpoint Encryption key is stored on the token, protected by the tokens authentication
system.
In a smart card this would be the smart card PIN or password, on a fingerprint token,
the template of the user’s finger. In either case Endpoint Encryption relies on the
token to secure the key, and each token needs to be initialized separately for each
user.
Crypt-Only Tokens
Endpoint Encryption 4.x also supports a special type of token called a “crypt only”
token. This is a token which has no storage (or we choose not to use the storage), but
can perform cryptographic operations under the authentication of a PIN or password.
This type of token is especially useful if we can request the token use asymmetric
(PKI) encryption functions.
Authenticating using a Crypt-Only Token
With a crypt-only token, the Endpoint Encryption key material is not stored in the
token as with a storage token, but within the Endpoint Encryption user profile stored
on the user’s hard disk. This key is stored encrypted with the counterpart to the key
stored on the crypt-only token – with the user’s public key.
To retrieve the user’s Endpoint Encryption key and logon with a storage token, we
simply ask the user to enter the token PIN, then read the key from the device. With a
crypt-only token Endpoint Encryption asks the user to enter the token PIN, then sends
the stored encrypted key to the token with the request that it decrypt it (with the ontoken private key) and send it back.
With a crypt-only token, the user’s decryption key never need leave the token
Comparison of Crypt-only vs Storage Tokens
Storage Tokens:
•
Require initialisation for each user
•
Need to store Endpoint Encryption keys
|3
Endpoint Encryption and PKI Integration
•
Need to share storage between multiple applications
Crypt-Only Tokens:
•
No requirement to Initialise token
•
No storage requirement
•
No shared storage
•
Require Connector architecture
Setting UP Crypt-Only Tokens
Using Endpoint Encryption’s connector architecture, a PKI can be leveraged to set up
PKI tokens without actually needing to touch the physical tokens themselves.
An Endpoint Encryption G2 connector (such as the Active Directory or LDAP
connectors) can obtain a user’s public key from the PKI directory and encrypt the
user’s virtual Endpoint Encryption token key with it. This is stored in the user’s Policy
and distributed to any connected Endpoint Encryption application, such as Endpoint
Encryption for PC or Endpoint Encryption for Files and Folders.
As this data is purely logical, there’s no need for the user’s physical token at this point
– the initialization can occur in the background with no user or administrator
intervention.
By setting up rules within the G2 connector configuration, it will set up users who
match certain criteria, set their policy, and update their policy as their details in the
PKI change. The connector will even move the users between groups, and may
enable/disable their access to certain machines depending on how their policy
changes.
All these activities occur automatically without any administration intervention.
Revocation Lists and Certificate Expiry
There are other advantages in using Endpoint Encryption G2 connectors to manage
the token initialization process. As well as being able to automatically create the user
and allow them to login without ever touching their physical token, the G2 Connector
will also ensure that if the user’s PKI certificate expires or is revoked, the user will be
disabled in the Endpoint Encryption database. Also if a user’s certificate rolls-over the
connector will automatically roll the user’s policy across to use the new certificate
when it becomes active (based on the old and new certificate valid from/valid until
dates).
4|
Endpoint Encryption and PKI Integration
What you need to use this technology
To make use of this technology you need the following Endpoint Encryption
components:
•
PKI Public certificate server, for example LDAP or Active Directory, with
Entrust / Microsoft / Verisign / T-Systems certificates
•
Endpoint Encryption Manager v4.2.12 or above
•
Endpoint Encryption G2 Connector (Active Directory or LDAP)
•
Supported PKI Token (Activcard v2 smart card, eToken 64KB, Setec smart
card, T-Systems smart card, Estonian NationaID smartcard
•
Endpoint Encryption product, such as Endpoint Encryption for PC or Endpoint
Encryption for Files and Folders
Endpoint Encryption is continuously adding support for other tokens and PKI
environments – if your environment is not listed please contact your McAfee
representative for the latest compatibility information.
|5
Endpoint Encryption and PKI Integration
Summary of PKI Usage in Endpoint Encryption
1 The Endpoint Encryption
Connector automatically collects
User Certificates from the PKI,
creates users, and creates logical
tokens. It also configures the
user policy as it goes. There is
no need to access the user’s
physical token.
2
The Endpoint Encryption key
encrypted with the user’s Public
key distributed to laptops and
desktops via Endpoint
Encryption’s automated policy
deployment. The policy also
contains other items collected
from the PKI, such as the user’s
expiry date, logon hours and
other policy details.
3 To logon, the encrypted
Endpoint Encryption key is sent
to user’s physical token for
decryption using the private key
stored on the token. The private
key never leaves the token.
6|
Download