Index


A

Access control

policy, 423

role-based (RBAC), 417–28

Access control entries (ACEs), 332

inherited, 340

object type-based, 345–54

property-based, 349–50

Access control lists (ACLs)

in canonical order, 356–57

content, 332

discretionary, 333

elements, 332

inheritance, 337

in noncanonical order, 357

system, 333

types of, 333

version 4, 335

See also ACL editor; ACL evaluation

Access tokens

checking, 330

content, viewing, 331

Accinfo.dll, 65

Account lockouts, 60–67

defined, 60–61

disabling accounts and, 61

management tools, 64–67

policy, 63–64

policy settings, 63

process, 61–63

suggested policy settings, 64

ACL editor, 336–37

AD authorization information display, 348

GUI, 337

inheritance in, 339, 340

object independency, 336

object type-based ACEs in, 347

permissions display, 337

property-based ACEs in, 350, 351

setting inheritance in, 344

warning message, 343

See also Access control lists (ACLs)

ACL evaluation, 354–58

basic process, 354–55

canonical order, 355–56

example 1, 356

example 2, 357

missing DACLs and, 358

rules, 354

rules and order, 355–58

See also Access control lists (ACLs)

Active Directory (AD), 452–59

creation of PKI-related information in, 455

default, security descriptor changes, 361–63

domains, 33

functions, 34

link value replication, 363–64

LSA subprocess, 30–31

NTAUTH store, 520

object quotas, 364–67

permissions, 345

PKI integration, 453

PKI-related entries, 453–57

property sets, 350

querying, for PKI-related information, 458–59

security-specific replication mechanisms, 67–68

Windows Server 2003 PKI information, 453–55

AD4Unix AD schema, 272

AD-base mapping, 230–31

AD Domains and Trusts MMC snap-in, 72, 83

AD/LDAP repositories, 286–96

Administrative delegation, 381–90

defined, 381

examples, 387–90

guidelines, 386

help-desk scenario, 387

necessity, 382

networking service management delegation scenario, 388–90

organizational units (OUs), 382–83

setting up, 383–86

third-party AD delegation tools, 390

user self-management scenario, 387–88

Administrative templates, 692

Administrator groups, 374–77

Administrators, 377

Domain Admins, 375–76

on domain controllers, 375

Enterprise Admins, 376

list of, 375

on member servers, 375

See also Groups

Administrator pyramid, 374

Administrators group, 377

AdminSDHolder, 377–78

ADSIEdit tool, 458

Alockout.dll, 65

Aloinfo.exe, 65–66

Anonymous access, 123–24

enabling auditing for, 124

security options, 123

Application policies, 508–11

defined, 508

in end-entity/CA certificates, 510

example, 511

predefined, 509–10

Application programming interfaces (APIs), 317

authentication, 318

cloneprincipal, 358

CryptoAPI, 459–63

DPAPI, 487–89

Auditing, 712–20

enabling, for anonymous access, 124

enabling, for event categories, 126

Event Logs, 712–16

Event Viewer, 712–16

object-level, 718

setting up, 716–19

systems, 5

Audit policies

categories, 717

recommended for domain controllers, 718

Authenticating domain controller, 115

Authentication

APIs, 318

authorities, 102

basic, 214–18

certificate-based, 223–39

common protocols, 104

database, 108

delegation, 135–36, 164–74

digest, 218–21

event logging, 126–30

HTTP, 211–21

IIS, 207–40

integrated Windows, 221–23

interactive, 107–8

Kerberos, 113

methods overview, 105

multifactor, 103–4

mutual, 135

noninteractive, 108–11

NTLM-based, 116–20

packages, 107, 108

Passport-based, 223

process, 102

qualifying, 103–6

selective, 88–90

servers, 7, 158

strong, 105

troubleshooting, 125–32

Windows, 101–32

Windows and UNIX comparison, 261–62

Authentication architecture, 106–11

for interactive authentication, 107–8

for noninteractive authentication, 108–11

terminology, 106–7

Authentication infrastructures, 5, 7–9

authentication servers, 7

defined, 7, 102

software products, 7–8

terminology, 101–3

Web, 7

See also Trusted security infrastructures (TSIs)

Authenticators

content, 184

ticket relationship, 179

See also Kerberos

Authority Information Access (AIA)

configuring, from CA properties, 625

method, 584–85

settings, 618, 624–25

storage location, 625

Authorization, 329–91

basics, 329–30

decentralization to centralization shift, 12

decision making, 11

enforcement, 11

generic model, 329

intermediaries, 367–79

policy authorities, 13

policy management, 11

restrictive, settings, 359–60

scripts, 424

setting, based on object type, 346

setting, based on property, 346–50

setting, with extended rights, 350–54

tools, 390–91

Windows 2000 changes, 335–59

Windows 2003 changes, 359–67

Windows model, 330–34

Authorization infrastructures, 5

authorization policy authorities, 13

scope, 11

See also Trusted security infrastructures (TSIs)

Authorization Manager, 417

administration interface to, 423

architecture overview, 422

Authorization Policy Store, 424

authorization script support, 424

centralized access policy database, 422

concept illustration, 425

concepts, 424–26

deployment scenarios, 426–28

dynamic group support, 424

features, 424

hierarchical role model, 426

integrating, into trusted application model, 427

querying, 422

role-based access model, 417

Automatic Certificate Request Setup Wizard, 548, 549

Automatic key archival/recovery, 570–73

configuring, 573–74

process, 570–72

Automatic updates, 707

configuring, with GPO, 708

dialog box, 709

registry keys, 708




Windows Server 2003 Security Infrastructures. Core Security Features of Windows. NET
Windows Server 2003 Security Infrastructures: Core Security Features (HP Technologies)
ISBN: 1555582834
EAN: 2147483647
Year: 2003
Pages: 137
Authors: Jan De Clercq

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net