SlideShare une entreprise Scribd logo
1  sur  43
Disclaimer: everything in this talk is based on the Developer Preview released for //Build
Virtualization That Just Works
•   Active Directory works equally well in physical, virtual or mixed environments
                      Simplified Deployment of Active Directory
•   Complete integration of environment preparation, role installation and DC promotion into a
    single UI
•   DCs can be deployed rapidly to ease disaster recovery and workload balancing
•   DCs can be deployed remotely on multiple machines from a single Windows 8 machine
•   Consistent command-line experience through Windows PowerShell to enable automation of
    deployment tasks

                     Simplified Management of Active Directory
•   GUI that simplifies complex tasks such as recovering a deleted object or managing password
    policies
•   Active Directory Windows PowerShell viewer shows the commands for actions performed in
    the GUI
•   Active Directory Windows PowerShell support for managing replication and topology data
Demo
Demo
Site
             SiteLink
             SiteLinkBridge
             Subnet
Connection
Demo
Demo
Growth of users                                    Budget
   and data                                      Constraints
                  Distributed   Regulatory and
                  computing        Business
                                 Compliance
       ?
                                    ?
CSO/CIO          Infrastructure    Content Owner               IW
 department           Support
                                      “Is my important
                    “I don’t know            data         “I don’t know if I
“I need to have    what data is in      appropriately      am complying
    the right      my repositories      protected and          with my
  compliance         and how to        compliant with      organization’s
controls to keep      control it”    regulations – how         polices”
 me out of jail”                       do I audit this”
Plumb claims into the core Authentication platform via Kerberos with Active Directory


    Enhance Authorization platform for files to author and manage richer access policies
    with claims


     Enhance audit platform for files to drive efficient Audit controls across the Enterprise



    Project User & Device Claims for consumption by .NET apps



Improve File Management infrastructure for Files in Win8
User claims                  Device claims               Resource properties
 User.Department = Finance    Device.Department = Finance   Resource.Department = Finance
   User.Clearance = High        Device.Managed = True          Resource.Impact = High




                               ACCESS POLICY
                        Applies to: @Resource.Impact == “High”
Allow | Read, Write | if (@User.Clearance == “High”) AND (@Device.Managed == True)
Windows 8 Token


         Owner


         Group


User        Groups


            Claims


Device      Groups


            Claims
Windows 7                    New in Windows 8                              Example

•   No expressions in ACL              Support for Expression             User.memberOf (USA-Employees)
                                                                      AND User.memberOf (Finance-Division)
•   Led to group bloat                with ‘AND’/’OR ’ primitives     AND User.memberOf (Authorization-Project)


•   ACLs only based on groups                                             User.Division = ‘Finance’
                                   Support for User Claims from AD
•   Led to group bloat                                                AND User.CostCenter = 20000



•   No ability to control access   Support for Static Device Claims       User.Division = ‘Finance’
    based on device state                     from AD                 AND Device.ITManaged = True



•   No way to target policy             Target Policy based on        IF (Resource.Impact = ‘HBI’)
    based on Resource Type                  Resource Type             ALLOW AU Read User.EmployeeType = ‘FTE’




                       • Claims support in ACEs managed as SDDL strings
          • Added / removed from SDDL strings via standard string manipulation functions
Windows 8
        Active Directory    Resource
                            Property
                           Definitions




Content owner

Applications               Windows 8
                           File Server
Claim
 Windows 8          Definitions
 Active Directory         Resource
                          Property
                         Definitions
                Access
                policy




                               Allow
End User                          /
                               Deny

                         Windows 8
                         File Server
Demo
Claim
      Windows 8           Definitions
      Active Directory          Resource
                                Property
                               Definitions
                   Audit Policy




                                    Audit
End User                            / No
                                    Audit

                             Windows 8
                             File Server
http://be-id.blogspot.com

Contenu connexe

En vedette

Pivotal gem fire_wp_hardest-problems-data-management_053013
Pivotal gem fire_wp_hardest-problems-data-management_053013Pivotal gem fire_wp_hardest-problems-data-management_053013
Pivotal gem fire_wp_hardest-problems-data-management_053013
EMC
 
Linux kursu-beyoglu
Linux kursu-beyogluLinux kursu-beyoglu
Linux kursu-beyoglu
sersld67
 
20140727soifvol3 madrebonita
20140727soifvol3 madrebonita20140727soifvol3 madrebonita
20140727soifvol3 madrebonita
Maco Yoshioka
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformation
Rene Summer
 
บทที่ 1
บทที่ 1บทที่ 1
บทที่ 1
einscream
 

En vedette (20)

Pivotal gem fire_wp_hardest-problems-data-management_053013
Pivotal gem fire_wp_hardest-problems-data-management_053013Pivotal gem fire_wp_hardest-problems-data-management_053013
Pivotal gem fire_wp_hardest-problems-data-management_053013
 
Windows 8 Dynamic Access Control
Windows 8 Dynamic Access ControlWindows 8 Dynamic Access Control
Windows 8 Dynamic Access Control
 
Linux kursu-beyoglu
Linux kursu-beyogluLinux kursu-beyoglu
Linux kursu-beyoglu
 
RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
Eq price practice
Eq price practiceEq price practice
Eq price practice
 
Day 5
Day 5Day 5
Day 5
 
Hadoop Hands-On by @techmilind
Hadoop Hands-On by @techmilindHadoop Hands-On by @techmilind
Hadoop Hands-On by @techmilind
 
Beetle 20 operating_manual_english
Beetle 20 operating_manual_englishBeetle 20 operating_manual_english
Beetle 20 operating_manual_english
 
Day 2 rebellion
Day 2 rebellionDay 2 rebellion
Day 2 rebellion
 
Flash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array DesignsFlash Implications in Enterprise Storage Array Designs
Flash Implications in Enterprise Storage Array Designs
 
Day 3 mon world
Day 3 mon worldDay 3 mon world
Day 3 mon world
 
20140727soifvol3 madrebonita
20140727soifvol3 madrebonita20140727soifvol3 madrebonita
20140727soifvol3 madrebonita
 
Manage vm’s and services across private clouds and windows azure with system ...
Manage vm’s and services across private clouds and windows azure with system ...Manage vm’s and services across private clouds and windows azure with system ...
Manage vm’s and services across private clouds and windows azure with system ...
 
Propuesta de informática
Propuesta de informáticaPropuesta de informática
Propuesta de informática
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformation
 
บทที่ 1
บทที่ 1บทที่ 1
บทที่ 1
 
Ամանորն իմ ընտանիքում
Ամանորն իմ ընտանիքումԱմանորն իմ ընտանիքում
Ամանորն իմ ընտանիքում
 
Pg hiring process linked in
Pg hiring process   linked inPg hiring process   linked in
Pg hiring process linked in
 
Tech Book: WAN Optimization Controller Technologies
Tech Book: WAN Optimization Controller Technologies  Tech Book: WAN Optimization Controller Technologies
Tech Book: WAN Optimization Controller Technologies
 

Similaire à Discover what´s new in Windows 8 Active Directory

01 power center 8.6 basics
01 power center 8.6 basics01 power center 8.6 basics
01 power center 8.6 basics
uthayan87
 
Application hardening
Application hardeningApplication hardening
Application hardening
Jayesh Naik
 

Similaire à Discover what´s new in Windows 8 Active Directory (20)

Windows Server 8 Security Improvement
Windows Server 8 Security ImprovementWindows Server 8 Security Improvement
Windows Server 8 Security Improvement
 
01 power center 8.6 basics
01 power center 8.6 basics01 power center 8.6 basics
01 power center 8.6 basics
 
MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03
 
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
SwiftKnowledge Multitenancy
SwiftKnowledge MultitenancySwiftKnowledge Multitenancy
SwiftKnowledge Multitenancy
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
Internet Explorer 8
Internet Explorer 8Internet Explorer 8
Internet Explorer 8
 
LinkedIn's Logical Data Access Layer for Hadoop -- Strata London 2016
LinkedIn's Logical Data Access Layer for Hadoop -- Strata London 2016LinkedIn's Logical Data Access Layer for Hadoop -- Strata London 2016
LinkedIn's Logical Data Access Layer for Hadoop -- Strata London 2016
 
Cache Security- The Basics
Cache Security- The BasicsCache Security- The Basics
Cache Security- The Basics
 
Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data Management
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
M meijer api management - tech-days 2015
M meijer   api management - tech-days 2015M meijer   api management - tech-days 2015
M meijer api management - tech-days 2015
 
Sp2010 high availlability
Sp2010 high availlabilitySp2010 high availlability
Sp2010 high availlability
 
Citrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile EnterpriseCitrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile Enterprise
 
Impact2014: Introduction to the IBM Java Tools
Impact2014: Introduction to the IBM Java ToolsImpact2014: Introduction to the IBM Java Tools
Impact2014: Introduction to the IBM Java Tools
 
SAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich ClientSAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich Client
 
Cairo meetup low code best practices
Cairo meetup low code best practicesCairo meetup low code best practices
Cairo meetup low code best practices
 
LinkedIn2
LinkedIn2LinkedIn2
LinkedIn2
 

Plus de Microsoft TechNet - Belgium and Luxembourg

Plus de Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 

Dernier

Dernier (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Discover what´s new in Windows 8 Active Directory

  • 1.
  • 2. Disclaimer: everything in this talk is based on the Developer Preview released for //Build
  • 3.
  • 4. Virtualization That Just Works • Active Directory works equally well in physical, virtual or mixed environments Simplified Deployment of Active Directory • Complete integration of environment preparation, role installation and DC promotion into a single UI • DCs can be deployed rapidly to ease disaster recovery and workload balancing • DCs can be deployed remotely on multiple machines from a single Windows 8 machine • Consistent command-line experience through Windows PowerShell to enable automation of deployment tasks Simplified Management of Active Directory • GUI that simplifies complex tasks such as recovering a deleted object or managing password policies • Active Directory Windows PowerShell viewer shows the commands for actions performed in the GUI • Active Directory Windows PowerShell support for managing replication and topology data
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Demo
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Site SiteLink SiteLinkBridge Subnet Connection
  • 24. Demo
  • 25.
  • 26.
  • 27. Demo
  • 28.
  • 29. Growth of users Budget and data Constraints Distributed Regulatory and computing Business Compliance ? ?
  • 30. CSO/CIO Infrastructure Content Owner IW department Support “Is my important “I don’t know data “I don’t know if I “I need to have what data is in appropriately am complying the right my repositories protected and with my compliance and how to compliant with organization’s controls to keep control it” regulations – how polices” me out of jail” do I audit this”
  • 31.
  • 32.
  • 33. Plumb claims into the core Authentication platform via Kerberos with Active Directory Enhance Authorization platform for files to author and manage richer access policies with claims Enhance audit platform for files to drive efficient Audit controls across the Enterprise Project User & Device Claims for consumption by .NET apps Improve File Management infrastructure for Files in Win8
  • 34. User claims Device claims Resource properties User.Department = Finance Device.Department = Finance Resource.Department = Finance User.Clearance = High Device.Managed = True Resource.Impact = High ACCESS POLICY Applies to: @Resource.Impact == “High” Allow | Read, Write | if (@User.Clearance == “High”) AND (@Device.Managed == True)
  • 35. Windows 8 Token Owner Group User Groups Claims Device Groups Claims
  • 36. Windows 7 New in Windows 8 Example • No expressions in ACL Support for Expression User.memberOf (USA-Employees) AND User.memberOf (Finance-Division) • Led to group bloat with ‘AND’/’OR ’ primitives AND User.memberOf (Authorization-Project) • ACLs only based on groups User.Division = ‘Finance’ Support for User Claims from AD • Led to group bloat AND User.CostCenter = 20000 • No ability to control access Support for Static Device Claims User.Division = ‘Finance’ based on device state from AD AND Device.ITManaged = True • No way to target policy Target Policy based on IF (Resource.Impact = ‘HBI’) based on Resource Type Resource Type ALLOW AU Read User.EmployeeType = ‘FTE’ • Claims support in ACEs managed as SDDL strings • Added / removed from SDDL strings via standard string manipulation functions
  • 37.
  • 38. Windows 8 Active Directory Resource Property Definitions Content owner Applications Windows 8 File Server
  • 39. Claim Windows 8 Definitions Active Directory Resource Property Definitions Access policy Allow End User / Deny Windows 8 File Server
  • 40. Demo
  • 41. Claim Windows 8 Definitions Active Directory Resource Property Definitions Audit Policy Audit End User / No Audit Windows 8 File Server
  • 42.