SlideShare une entreprise Scribd logo
1  sur  25
Metody i sposoby bezpiecznego
 uwierzytelnienia w Windows 7

           Krzysztof Bińkowski
             Trener MCT Security/Forensics

                                28.04.2011
Agenda

•   o mnie słów kilka
•   Authentication = Uwierzytelnienie
•   Authentication / Authorization
•   Metody uwierzytelnienia 1FA/2FA/3FA
•   SmartCard Authentication
•   SmartCard + Biometric Authentication
•   Biometric Authentication
•   Face Authentication
•   Online Identity Integration
o mnie słów kilka


Posiadam kilka certyfikatów:           Na co dzień:


• MCT,                         • Trener technologii       • Społeczny notariusz CA
  MCSA/MCSE+Security,            Microsoft / security /     Cert / StartSSL
  MCITP SA/EA                    forensic s w firmie
• ACE (Accessdata Certified      COMPENDIUM Centrum       • Członek organizacji:
  Examiner)                      Edukacyjne
                                                          • ISSA Polska,
• ACI (Accessdata Certified                               • SIIS (Stowarzyszenie
  Instructor)                  • Specjalizacja: systemy     Instytut Informatyki
• Novell CNA/CNE                 Windows /                  Śledczej )
                                 Bezpieczeostwo / PKI /
                                                          • SEClub
                                 Forensics

                                                          • Współlider grupy MSSUG
                               • Specjalizuje się w
                                 informatyce śledczej
Uwierzytelnienie

• Authentication = Uwierzytelnienie


  Nie ma słowa „autentykacja” w
    słowniku języka polskiego

• Authorization = Autoryzacja
Authentication / Authorization?
                         Are you on the list?
Who are you?
Authentication: Czy      Authorization: Czy masz nadane
jesteś tym za kogo się   uprawnienia do zasobów do których
podajesz ?               próbujesz się dostać np. ACL




       User                                   Resource
                         What does the list say you can do?

                         Access: Na jakie działania pozwalają Ci
                         nadane uprawnienia.
Authentication and
                      Authorization Process
               Windows authentication methods include:


      Windows
                                               Description
Authentication Method

Kerberos version 5      Used by Windows 7 clients and servers running Microsoft
protocol                Windows Server 2000 or later
                        Used for backward compatibility with computers running
NTLM                    pre-Windows 2000 operating systems and some
                        applications

Certificate mapping     Certificates are used as authentication credentials
SECURE AUTHENTICATION



    What
    You
                      Biometrics    Convenient
    Are                             Two-Factor
                       Smart       Authentication    Most Secure
                       cards            2FA          Three-Factor
  What You
   Have               & Tokens       Traditional    Authentication
                                    Two-Factor           3FA
                                   Authentication
                      Passwords     2FA
                        & PINs
What You Know
New Authentication Features in Windows 7



 New Authentication
                                             Description
     Features
                      Several new authentication features are available for
                      use with Smart cards, including:
                      •Kerberos support for Smart card logon
Smart cards
                      •Encrypt removable media using BitLocker and using
                      the Smart card option to unlock the drive
                      •Document and e-mail signing
                      Windows Biometric Framework (WBF) provides support
Biometrics            for fingerprint biometric devices through a new set of
                      components
Online Identity       A new group policy setting is available that controls the
Integration           ability of online IDs to authenticate to a computer
Smart Card w języku polskim




      Karta inteligentna ?
      Karta elektroniczna ?
      Karta chipowa ?
      Karta kryptograficzna ?
      Karta mikroprocesorowa ?
Budowa Smart Card
- Posiada wbudowany procesor
- Jest programowalna
- Dostarcza bezpieczny magazyn dla kluczy prywatnych
- Oddziela krytyczne dla bezpieczeństwa operacje od
komputera


        Karta przechowuje:
          Klucz prywatny
          Klucz publiczny
        Powiązany certyfikat
Rodzaje kart
Karta, nie karta ?

• Czasem SMART CARD nazywamy
  tokenami USB
Czytniki kart
Smart Cards

             Smart card-related Plug and Play


           Kerberos support for Smart card logon

    Encrypt removable media using BitLocker and using the
            Smart card option to unlock the drive

               Document and e-mail signing

       Used with line-of-business applications to enable

         certificate use with no additional middleware
Gemalto .NET Bio
4 Tryby– 4 sposoby uwierzytelnienia
                                                                                Fingerprint Authentication


                                                                                     Biometric Verification
                                                                                  Please swipe your finger on the biometric reader.



                                                                                                         Biometric Authentication
                                                                                                       SWIPE FINGER

                                                                                                   Select Finger       Click here for more information

                                                                                                                                OK           Cance
                                                                                                                                               l

PIN or Fingerprint Authentication                                           PIN and Fingerprint Authentication


        Biometric Verification                                                       Biometric Verification
        Please swipe your finger OR enter your PIN                               Please swipe your finger first, then enter your PIN



                             Biometric Authentication                                                    Biometric Authentication
                           SWIPE FINGER                                                                SWIPE FINGER

                          PIN Authentication                                                           PIN Authentication

                                    PIN                                                                          PIN


                     Select Finger        Click here for more information                        Select Finger         Click here for more information


                                                  OK            Cance                                                           OK           Cance
                                                                  l                                                                            l
BIOMETRIC
Biometric

       Windows Biometric Framework (WBF) provides
     support for fingerprint biometric devices through a
                     new set of components
    A common API facilitates development of applications

                     using biometrics
    Through a new Control Panel item, users can control
       the availability and use of biometric devices

      Device Manager support for managing drivers for
                  biometric devices

   Group Policy settings to enable, disable, or limit the
    use of biometric data for a local computer or domain
Face Authentication
Online Identity Integration

     A new group policy setting is available that controls
   the ability of online IDs to authenticate to a computer

    Online IDs can be used to identify individuals within a

                         network
     Users must link their Windows user account to an
          online ID to facilitate authentication

   Authentication occurs through the use of certificates

      Does not affect domain accounts or local user
        accounts from logging on to the computer
Online Identity Integration

•   What's the benefit of linking my online IDs with my Windows user account?

•   If you have an online account, such as an e-mail account, you can link that
    account with your Windows user account. Linking these accounts provides
    the following benefits:
•   People can share files with you on a homegroup using your online ID
    instead of having to create a Windows user account for you on their
    computer.
•   You can use your online ID to access your information on other computers
    on a network, such as accessing files on a home computer from your work
    computer.

•   Linking your account is a two-part process. First, you need to add your
    online ID provider, and then you need to link your online ID with your
    Windows user account.
Dziękuje za uwagę


http://securityforensics.wordpress.com/

Email:
Krzysztof.Binkowski@gmail.com

Contenu connexe

Tendances

Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gviL2MM
 
Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]Markus Sabadello
 
The Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs DeveloperThe Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs Developerbeires
 
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...OKsystem
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
Jips v07 no1_paper17
Jips v07 no1_paper17Jips v07 no1_paper17
Jips v07 no1_paper17Hai Nguyen
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer
 
Inspira Biomorf Profile
Inspira Biomorf ProfileInspira Biomorf Profile
Inspira Biomorf Profileuknadh
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web SecurityOliver Pfaff
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteitStichting ePortfolio Support
 
Brokerage 2007 presentation security
Brokerage 2007 presentation securityBrokerage 2007 presentation security
Brokerage 2007 presentation securityimec.archive
 
SMARTGUARD SYSTEMS
SMARTGUARD SYSTEMSSMARTGUARD SYSTEMS
SMARTGUARD SYSTEMSGPARWANI
 

Tendances (17)

Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gvi
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
Ow2 aspire - RFID - fossa2010
Ow2 aspire - RFID - fossa2010Ow2 aspire - RFID - fossa2010
Ow2 aspire - RFID - fossa2010
 
Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]
 
The Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs DeveloperThe Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs Developer
 
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
 
Ecommerce Chap 08
Ecommerce Chap 08Ecommerce Chap 08
Ecommerce Chap 08
 
Dekartlogon en
Dekartlogon enDekartlogon en
Dekartlogon en
 
12251690 pss7
12251690 pss712251690 pss7
12251690 pss7
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Jips v07 no1_paper17
Jips v07 no1_paper17Jips v07 no1_paper17
Jips v07 no1_paper17
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
Inspira Biomorf Profile
Inspira Biomorf ProfileInspira Biomorf Profile
Inspira Biomorf Profile
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web Security
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
 
Brokerage 2007 presentation security
Brokerage 2007 presentation securityBrokerage 2007 presentation security
Brokerage 2007 presentation security
 
SMARTGUARD SYSTEMS
SMARTGUARD SYSTEMSSMARTGUARD SYSTEMS
SMARTGUARD SYSTEMS
 

Similaire à K binkowski metody_uwierzytelnienia_windows_7

Biometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptxBiometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptxFTx Identity
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Jips v07 no1_paper17_2
Jips v07 no1_paper17_2Jips v07 no1_paper17_2
Jips v07 no1_paper17_2Hai Nguyen
 
Jips v07 no1_paper17_3
Jips v07 no1_paper17_3Jips v07 no1_paper17_3
Jips v07 no1_paper17_3Hai Nguyen
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...Keynectis
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Easy Solutions Inc
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 
Live ensure overview 1.4
Live ensure overview 1.4Live ensure overview 1.4
Live ensure overview 1.4Ross Macdonald
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
Digital trust - Building trust in this digital world
Digital trust - Building trust in this digital worldDigital trust - Building trust in this digital world
Digital trust - Building trust in this digital worldAET Europe
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlRamesh Nagappan
 
Trust elevation-share
Trust elevation-shareTrust elevation-share
Trust elevation-shareAbbie Barbir
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber SecurityArtanContracting
 

Similaire à K binkowski metody_uwierzytelnienia_windows_7 (20)

Biometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptxBiometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptx
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Jips v07 no1_paper17_2
Jips v07 no1_paper17_2Jips v07 no1_paper17_2
Jips v07 no1_paper17_2
 
Jips v07 no1_paper17_3
Jips v07 no1_paper17_3Jips v07 no1_paper17_3
Jips v07 no1_paper17_3
 
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍAAUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Biometrics
BiometricsBiometrics
Biometrics
 
E collaborationscottrea
E collaborationscottreaE collaborationscottrea
E collaborationscottrea
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Live ensure overview 1.4
Live ensure overview 1.4Live ensure overview 1.4
Live ensure overview 1.4
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Digital trust - Building trust in this digital world
Digital trust - Building trust in this digital worldDigital trust - Building trust in this digital world
Digital trust - Building trust in this digital world
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
Trust elevation-share
Trust elevation-shareTrust elevation-share
Trust elevation-share
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 

Plus de Krzysztof Binkowski

Sql z perspektywy hakera czy twoje dane są bezpieczne ? - Sqlday 2016 Wrocław
Sql z perspektywy hakera   czy twoje dane są bezpieczne ? - Sqlday 2016 WrocławSql z perspektywy hakera   czy twoje dane są bezpieczne ? - Sqlday 2016 Wrocław
Sql z perspektywy hakera czy twoje dane są bezpieczne ? - Sqlday 2016 WrocławKrzysztof Binkowski
 
I tech day_kbinkowski_bitlocker_lab_windows_to_go
I tech day_kbinkowski_bitlocker_lab_windows_to_goI tech day_kbinkowski_bitlocker_lab_windows_to_go
I tech day_kbinkowski_bitlocker_lab_windows_to_goKrzysztof Binkowski
 
I tech day_kbinkowski_bitlocker_windows_to_go
I tech day_kbinkowski_bitlocker_windows_to_goI tech day_kbinkowski_bitlocker_windows_to_go
I tech day_kbinkowski_bitlocker_windows_to_goKrzysztof Binkowski
 
eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski
eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski
eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski Krzysztof Binkowski
 
Mgr k.binkowski computer_forensics_raport
Mgr k.binkowski computer_forensics_raportMgr k.binkowski computer_forensics_raport
Mgr k.binkowski computer_forensics_raportKrzysztof Binkowski
 
Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...
Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...
Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...Krzysztof Binkowski
 
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011Krzysztof Binkowski
 
BitLocker TO GO - szybki start - WGUISW SNACK
BitLocker TO GO - szybki start - WGUISW SNACKBitLocker TO GO - szybki start - WGUISW SNACK
BitLocker TO GO - szybki start - WGUISW SNACKKrzysztof Binkowski
 
Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...
Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...
Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...Krzysztof Binkowski
 
Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010Krzysztof Binkowski
 
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...Krzysztof Binkowski
 
Podążając śladami użytkownika Windows – elementy informatyki śledczej
Podążając śladami użytkownika Windows –elementy informatyki śledczejPodążając śladami użytkownika Windows –elementy informatyki śledczej
Podążając śladami użytkownika Windows – elementy informatyki śledczejKrzysztof Binkowski
 
Mts2009 krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
Mts2009   krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...Mts2009   krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
Mts2009 krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...Krzysztof Binkowski
 
Mts2009 krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
Mts2009   krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...Mts2009   krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
Mts2009 krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...Krzysztof Binkowski
 

Plus de Krzysztof Binkowski (15)

Sql z perspektywy hakera czy twoje dane są bezpieczne ? - Sqlday 2016 Wrocław
Sql z perspektywy hakera   czy twoje dane są bezpieczne ? - Sqlday 2016 WrocławSql z perspektywy hakera   czy twoje dane są bezpieczne ? - Sqlday 2016 Wrocław
Sql z perspektywy hakera czy twoje dane są bezpieczne ? - Sqlday 2016 Wrocław
 
I tech day_kbinkowski_bitlocker_lab_windows_to_go
I tech day_kbinkowski_bitlocker_lab_windows_to_goI tech day_kbinkowski_bitlocker_lab_windows_to_go
I tech day_kbinkowski_bitlocker_lab_windows_to_go
 
I tech day_kbinkowski_bitlocker_windows_to_go
I tech day_kbinkowski_bitlocker_windows_to_goI tech day_kbinkowski_bitlocker_windows_to_go
I tech day_kbinkowski_bitlocker_windows_to_go
 
eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski
eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski
eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski
 
Mgr k.binkowski computer_forensics_raport
Mgr k.binkowski computer_forensics_raportMgr k.binkowski computer_forensics_raport
Mgr k.binkowski computer_forensics_raport
 
Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...
Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...
Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...
 
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
 
BitLocker TO GO - szybki start - WGUISW SNACK
BitLocker TO GO - szybki start - WGUISW SNACKBitLocker TO GO - szybki start - WGUISW SNACK
BitLocker TO GO - szybki start - WGUISW SNACK
 
Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...
Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...
Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...
 
Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010
 
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
 
Podążając śladami użytkownika Windows – elementy informatyki śledczej
Podążając śladami użytkownika Windows –elementy informatyki śledczejPodążając śladami użytkownika Windows –elementy informatyki śledczej
Podążając śladami użytkownika Windows – elementy informatyki śledczej
 
Podpis cyfrowy office2010
Podpis cyfrowy office2010Podpis cyfrowy office2010
Podpis cyfrowy office2010
 
Mts2009 krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
Mts2009   krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...Mts2009   krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
Mts2009 krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
 
Mts2009 krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
Mts2009   krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...Mts2009   krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
Mts2009 krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

K binkowski metody_uwierzytelnienia_windows_7

  • 1. Metody i sposoby bezpiecznego uwierzytelnienia w Windows 7 Krzysztof Bińkowski Trener MCT Security/Forensics 28.04.2011
  • 2. Agenda • o mnie słów kilka • Authentication = Uwierzytelnienie • Authentication / Authorization • Metody uwierzytelnienia 1FA/2FA/3FA • SmartCard Authentication • SmartCard + Biometric Authentication • Biometric Authentication • Face Authentication • Online Identity Integration
  • 3. o mnie słów kilka Posiadam kilka certyfikatów: Na co dzień: • MCT, • Trener technologii • Społeczny notariusz CA MCSA/MCSE+Security, Microsoft / security / Cert / StartSSL MCITP SA/EA forensic s w firmie • ACE (Accessdata Certified COMPENDIUM Centrum • Członek organizacji: Examiner) Edukacyjne • ISSA Polska, • ACI (Accessdata Certified • SIIS (Stowarzyszenie Instructor) • Specjalizacja: systemy Instytut Informatyki • Novell CNA/CNE Windows / Śledczej ) Bezpieczeostwo / PKI / • SEClub Forensics • Współlider grupy MSSUG • Specjalizuje się w informatyce śledczej
  • 4. Uwierzytelnienie • Authentication = Uwierzytelnienie Nie ma słowa „autentykacja” w słowniku języka polskiego • Authorization = Autoryzacja
  • 5. Authentication / Authorization? Are you on the list? Who are you? Authentication: Czy Authorization: Czy masz nadane jesteś tym za kogo się uprawnienia do zasobów do których podajesz ? próbujesz się dostać np. ACL User Resource What does the list say you can do? Access: Na jakie działania pozwalają Ci nadane uprawnienia.
  • 6. Authentication and Authorization Process Windows authentication methods include: Windows Description Authentication Method Kerberos version 5 Used by Windows 7 clients and servers running Microsoft protocol Windows Server 2000 or later Used for backward compatibility with computers running NTLM pre-Windows 2000 operating systems and some applications Certificate mapping Certificates are used as authentication credentials
  • 7. SECURE AUTHENTICATION What You Biometrics Convenient Are Two-Factor Smart Authentication Most Secure cards 2FA Three-Factor What You Have & Tokens Traditional Authentication Two-Factor 3FA Authentication Passwords 2FA & PINs What You Know
  • 8. New Authentication Features in Windows 7 New Authentication Description Features Several new authentication features are available for use with Smart cards, including: •Kerberos support for Smart card logon Smart cards •Encrypt removable media using BitLocker and using the Smart card option to unlock the drive •Document and e-mail signing Windows Biometric Framework (WBF) provides support Biometrics for fingerprint biometric devices through a new set of components Online Identity A new group policy setting is available that controls the Integration ability of online IDs to authenticate to a computer
  • 9. Smart Card w języku polskim  Karta inteligentna ?  Karta elektroniczna ?  Karta chipowa ?  Karta kryptograficzna ?  Karta mikroprocesorowa ?
  • 10. Budowa Smart Card - Posiada wbudowany procesor - Jest programowalna - Dostarcza bezpieczny magazyn dla kluczy prywatnych - Oddziela krytyczne dla bezpieczeństwa operacje od komputera Karta przechowuje: Klucz prywatny Klucz publiczny Powiązany certyfikat
  • 12. Karta, nie karta ? • Czasem SMART CARD nazywamy tokenami USB
  • 14. Smart Cards  Smart card-related Plug and Play  Kerberos support for Smart card logon Encrypt removable media using BitLocker and using the  Smart card option to unlock the drive  Document and e-mail signing Used with line-of-business applications to enable  certificate use with no additional middleware
  • 15.
  • 17. 4 Tryby– 4 sposoby uwierzytelnienia Fingerprint Authentication Biometric Verification Please swipe your finger on the biometric reader. Biometric Authentication SWIPE FINGER Select Finger Click here for more information OK Cance l PIN or Fingerprint Authentication PIN and Fingerprint Authentication Biometric Verification Biometric Verification Please swipe your finger OR enter your PIN Please swipe your finger first, then enter your PIN Biometric Authentication Biometric Authentication SWIPE FINGER SWIPE FINGER PIN Authentication PIN Authentication PIN PIN Select Finger Click here for more information Select Finger Click here for more information OK Cance OK Cance l l
  • 19. Biometric Windows Biometric Framework (WBF) provides  support for fingerprint biometric devices through a new set of components A common API facilitates development of applications  using biometrics Through a new Control Panel item, users can control  the availability and use of biometric devices Device Manager support for managing drivers for  biometric devices  Group Policy settings to enable, disable, or limit the use of biometric data for a local computer or domain
  • 20.
  • 22.
  • 23. Online Identity Integration A new group policy setting is available that controls  the ability of online IDs to authenticate to a computer Online IDs can be used to identify individuals within a  network Users must link their Windows user account to an  online ID to facilitate authentication  Authentication occurs through the use of certificates  Does not affect domain accounts or local user accounts from logging on to the computer
  • 24. Online Identity Integration • What's the benefit of linking my online IDs with my Windows user account? • If you have an online account, such as an e-mail account, you can link that account with your Windows user account. Linking these accounts provides the following benefits: • People can share files with you on a homegroup using your online ID instead of having to create a Windows user account for you on their computer. • You can use your online ID to access your information on other computers on a network, such as accessing files on a home computer from your work computer. • Linking your account is a two-part process. First, you need to add your online ID provider, and then you need to link your online ID with your Windows user account.