Microsoft’s Implementation of Smart Cards for Remote Access Published January 2002 Agenda Solution Overview Products & Technology Smart Card Features Business Benefits Architecture Deployment Challenges Future Plans Lessons Learned Summary Solution Overview ? ! Situation Enterprises that allow for remote access to network assets are becoming increasingly vulnerable to hackers and malicious intruders. Solution Using the existing Microsoft® Windows® 2000 Server infrastructure, enterprises can employ Smart Cards to substantially increase the strength of their network security. In addition, the extensible Smart Card platform allows IT organizations to leverage the investment in Smart Cards for many other applications to strengthen security and add convenience to their employees. Benefits Strengthens security Flexible Simple Leverages existing server infrastructure Products & Technologies Windows 2000 Server, Windows 2000, the Active Directory™ directory service, Certificate Services Smart Cards “The use of Smart Cards will significantly increase the security of our corporate network by improving our ability to authenticate each employee and business partner as they remotely connect to Microsoft.” Greg Wood, General Manager, Corporate Security, Microsoft Corporation Remote Access Services (RAS) at Microsoft Microsoft’s Information Technology Group Manages RAS security risks 50,000 employees, contingent staff & vendors using RAS 400 locations worldwide Addressing authentication Valid username and associated password Two-factor authentication Something you have (the Smart Card) as well as something you know (the card’s Personal Identification Number, or PIN) Home computer vulnerabilities Viruses, Trojan horse applications, computer worms Always-on, broadband Internet access heightens exposure Smart Cards were chosen over alternative technology solutions due to reliability, cost, features, and mobility Smart Card Features Tamper resistant Requires a Smart Card reader PIN Takes advantage of technologies in Microsoft’s Windows 2000 Server infrastructure Certificate Services feature Public Key Infrastructure (PKI) security Cryptographic Service Provider (CSP), Extensible Authentication Protocol/Transport Layer Security (EAP/TLS) Current user interface View Smart Card contents, reset the PIN, and add personal data Future user interface Add new certificates for different applications for added functionality Smart Card Business Benefits Smart Cards offer two-factor authentication Lost Smart Cards are easily rendered invalid by revoking the network logon certificate Intruder would need the PIN to unlock access to a valid Smart Card Extensible, open platform and secured memory contents provide potential future development benefits Personal payment systems, data storage, and data ported between applications “One thing we’ve seen as a potential benefit at Microsoft is password consolidation and storage. For the most part we’ve got a fairly robust single sign-on approach in our environment but a lot of enterprise customers don’t. They find it attractive to use the Smart Card and the Personal Identification Number (PIN) that unlocks the Smart Card as their one password.” Pete Boden, Group Program Manager, ITG Smart Card Project, Microsoft Corporation Architecture Replacement photo ID building access badges for all employees Includes embedded 32 KB cryptographic processor Smart Card chip Client computer requirements Windows XP Professional Smart Card reader with appropriate port connector Antivirus application Additional client-side software Several OEM-based Smart Card client features in Windows XP Professional Preconfigured version of Connection Manager standardizes all Smart Card security configuration settings upon installation Future development Extending Connection Manager scripts to check overall security of RAS client PC Server-side changes Logon certificates on the Smart Card and in the Active Directory are issued by Windows 2000 Server Certificate Services feature using PKI technology Deployment Acquired 32 KB Crypto processor Smart Card chip embedded in standard RFID cardkeys Centralized card management team formed Issuance, card distribution management, second tier end-user support Smart Card security officers distributed new Smart Cards Verification of identity Exchanged old building access badges for new Smart Card badges User required to change initial PIN prior to remotely logging onto the network PIN required to be alphanumeric, 5 - 15 characters in length Used PKI infrastructure to create logon certificates, delivered through Windows 2000 Server’s Certificate Services Delegated solution for regional distribution and administrative responsibilities to minimize cost Authorized to distribute replacement cards after acquiring Redmond Security team approval Supplied with pre-build Smart Cards whose unique serial numbers were carefully tracked Challenges Mobile users PDA users cannot gain RAS access (no support for the EAP/TLS protocol) Device issues Home users using Macintosh, UNIX, and Linux computers cannot gain RAS access (no support for the EAP/TLS protocol) Home computers Home systems not upgrading to the Smart Card solution can use the HTTPS secure alternative to access essential data via OWA Integrated Services Digital Network (ISDN) ISDN channel bonding is not supported, forcing potentially significant reduction in user ISDN performance Product selection Smart Card models are evolving quickly, so enterprise-wide standardization on one model may be challenging Future Plans Smart Card industry still maturing Interoperability problems with various business systems Likely consolidation in the next 12-24 months Expect improved product standards, including plug-and-play compatibility and greater integration with Windows platform Better management of accounts with elevated privileges Installed mapped certificate to minimize compromise and improve audit trail Portable digital signatures Expanding applications support Signing stock grants, securing financial/HR data, signing source code, etc. Lessons Learned Planning Understand Smart Card capabilities Set deployment goals Anticipate where Smart Card benefits can save money and time Anticipate changes in technology over the next 12-24 months Ensure staff is well trained in PKI Deployment considerations Not a solution to cover 100% of user population Understand impact to non-standard clients and devices Initial logon performance penalty adds ~30 seconds to logon process Increased network security benefits far outweigh logon delay Summary New focus on Security for corporations and governments Microsoft sought to implement a two-factor authentication security solution Smart Card technology offered several advantages over competing two-factor security technologies Not burdensome for users to employ Takes advantage of existing Windows 2000 Server PKI infrastructure Provides ITG with an extensible platform for future internal application development For More Information Additional IT Showcase white papers, case studies and presentations on ITG deployments and best practices can be found on http://www.microsoft.com Microsoft’s TechNet http://www.microsoft.com/technet/itshowcase The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is provided for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. 2002 Microsoft Corporation. All rights reserved. Microsoft, Outlook, Where do you want to go today?, Windows, Windows NT, and Windows 2000 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners.