EFS

advertisement
What Is Public Key Encryption?
Definition
Public key encryption, also called asymmetric encryption, is an encryption
method that uses a public key and private key pair to encrypt data. Public keys
are available to anyone. Private keys must be kept secret by the account that has
encrypted the file.
Public key
characteristics
Public key encryption has the following characteristics:
How encryption works

Anyone can encrypt data by using a public key, which is available as public
information. However, only the account possesses the corresponding private
key, so only that account can decrypt the data.

The account that uses the private key generates the key pair.

A key pair is created by using a program that generates keys. For example,
EFS can be used to create a key pair to encrypt files on your domain.

The private key is never exposed to network users, and is protected either in
a user or computer profile, or on a physical device such as a smart card.

The public key, an attribute of the certificate, is widely distributed, in
locations such as the Active Directory® directory service, to ensure that
other users can obtain the public key for both encryption and digital signing
of data.
EFS encryption uses a public-private key pair and a per file encryption key to
encrypt and decrypt data. The following paragraphs show the process that is
used to encrypt and decrypt data.
1. When a user encrypts a file, EFS generates a file encryption key (FEK) to
encrypt the data. The FEK is encrypted with the user's public key, and the
encrypted FEK is then stored with the file. After a user encrypts a file, the
file remains encrypted for as long as it is stored on the disk.
2. To decrypt files, the user opens the file, removes the encryption attribute, or
decrypts the file by using the cipher command. EFS decrypts the FEK by
using the user's private key, and then decrypts the data by using the FEK.
Note You can either encrypt or compress a file, but you cannot do not both on
the same file. When a file has been compressed, and a user tries to encrypt it,
the file will decompress. Encryption and compression are mutually exclusive.
Last Saved: 2/16/2016 1:46:00 AM
2
Error! No text of specified style in document.
How EFS Uses Certificates
Introduction
Each user who logs on can encrypt files. EFS generates a unique certificate and
key pair for each user. Unless a user shares the encrypted files for others to
access, no user can access another user's files.
What is a certificate?
A certificate is a digital statement issued by an authority that vouches for the
identity of the certificate holder. A certificate binds a public key to the identity
of the person, computer, or service that holds the corresponding private key.
Certificates are used by a variety of public key security services and
applications that provide authentication, data integrity and secure
communications across networks such as the Internet.
How EFS Uses
Certificates
EFS must find a certificate for a user before it will allow the user to access an
encrypted file. How EFS finds and uses certificates to open an encrypted file is
described below.
1. When a user sets the encrypted attribute for a file or folder, EFS attempts to
locate the user's certificate in the personal certificate store.
2. If the user does not have a certificate that has been authorized for use with
EFS, EFS requests a certificate from an available enterprise certification
authority (CA).
3. If an enterprise CA is not available, EFS automatically generates its own
self-signed certificate for the user.
If the EFS user certificate expires, EFS ensures that the certificate is renewed if
possible or if not, that a new public-private key pair and a new public key
certificate are issued for the user the next time an EFS operation is performed
for that user.
Note Certificates that EFS generates are self-signed rather than signed by a
CA. Therefore, the certification path is the same as for root CA
certificates, which are also self-signed. EFS certificates that are self-signed are
identified as "not trusted" because the certifying authority does not have a
certificate in the Trusted Root Certification Authorities store. Nevertheless,
self-signed EFS certificates are valid for use by EFS.
Last Saved: 2/16/2016 1:46:00 AM
Last Printed: 2/16/2016 1:46:00 AM
Error! No text of specified style in document.
3
Why Share an Encrypted Folder?
Introduction
You can share your encrypted files with other users on your network. Using
encrypted files is a great way to protect your data while still sharing it with
other, authorized, users on your computer or file servers.
Shared EFS not file
shares
Shared EFS files are not file shares. However, if authorized users need to access
shared EFS files over the network, a file share or a Web folder is required.
Alternatively, users could establish remote sessions with computers that store
encrypted files.
Who can authorize user
access?
Any user who is authorized to decrypt a file can authorize other users to access
the file. Caution users to share files only with trusted accounts, because those
accounts can authorize other accounts. Removing the Write permission from a
user or group of users can prevent this problem, but it also prevents the user or
group from modifying the file. You can add authorized individuals to files, but
not folders
Requires EFS
certificates
EFS sharing requires that the users who are authorized to access the encrypted
file have EFS certificates. These certificates can be located in roaming profiles
or in the user profiles on the computer on which the file to be shared is stored,
or they can be stored in and retrieved from Active Directory.
Last Saved: 2/16/2016 1:46:00 AM
Last Printed: 2/16/2016 1:46:00 AM
4
Error! No text of specified style in document.
What Is an EFS Recovery Agent?
Definition
A recovery agent is an individual authorized to decrypt data that was encrypted
by another user. Recovery agents do not need any other permissions to function
in this role.
Uses of data recovery
Data recovery is important when you need to be able to recover data encrypted
by an employee after the employee leaves, or when a user loses the private key.
Data recovery is available through the Encrypting File System (EFS) as a part
of the overall security policy for the system. For example, if you should ever
lose your file encryption certificate and associated private key through disk
failure, damage, or any other reason, the person who is the designated recovery
agent can recover the data.
Special certificate and
private key
Each recovery agent has a special certificate and associated private key that
allows data recovery wherever the recovery policy applies. If you are the
recovery agent, you should be sure to use the Export command in Certificates
in the Microsoft Management Console (MMC) to back up the recovery
certificate and the associated private key to a secure location.
After backing them up, you should use Certificates in MMC to delete the
recovery certificate. Then, when you need to perform a recovery operation for a
user, you should first restore the recovery certificate and associated private key
using the Import command from Certificates in MMC. After recovering the
data, you should again delete the recovery certificate. You do not have to repeat
the export process.
Last Saved: 2/16/2016 1:46:00 AM
Last Printed: 2/16/2016 1:46:00 AM
Error! No text of specified style in document.
5
What Are Recovery Policies?
Introduction
EFS uses recovery policies to provide built-in data recovery. A recovery policy
is a public key policy that provides for one or more user accounts to be
designated as recovery agents.
Recovery policies
A recovery policy is configured locally for stand-alone computers. For
computers that are part of a network, a recovery policy is configured at the
domain, organizational unit, or individual computer level. These recovery
policies apply to all Windows 2000, Windows XP and Windows Server 2003
family-based computers. A certification authority (CA) issues recovery
certificates, and you use Certificates in Microsoft Management Console (MMC)
to manage them.
Tools for recovery
policy
You can use the Group Policy snap-in to define a data recovery policy for
domain member servers, or for stand-alone or workgroup servers. You can
either request a recovery certificate, or export and import your recovery
certificates.
Who can administer the
recovery policy?
You may want to delegate administration of the recovery policy to a designated
administrator. Although you should limit who is authorized to recover
encrypted data, allowing multiple administrators to act as recovery agents
provides you with an alternate source if recovery is necessary.
Last Saved: 2/16/2016 1:46:00 AM
Last Printed: 2/16/2016 1:46:00 AM
Download