SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Spencer Harbar Kerberos Part One:No ticket touting here, does SharePoint add another head?
About the speakers... Spencer Harbar - www.harbar.net | spence@harbar.net Microsoft Certified Master | SharePoint 2007 Microsoft Certified Master | SharePoint Instructor & Author Most Valuable Professional | SharePoint Server 15 years in Enterprise IT ISPA Board Member Bob Fox - www.spfoxhole.com/Blog/ | bfox11b@verizon.net Most Valuable Professional | SharePoint Services Specializing in SharePoint architecture and deployment B&R Business Solutions, LLC IT Professional with over 15 years experience ISPA Board Member
About the speaker... Spencer Harbar - www.harbar.net | spence@harbar.net Microsoft Certified Master | SharePoint 2007 Microsoft Certified Master | SharePoint Instructor & Author Most Valuable Professional | SharePoint Server SharePoint Patterns & Practices Advisory Board Member 15 years in Enterprise IT ISPA Board Member Enterprise Architect working with Microsoft’s largestcustomers deploying Office SharePoint Server 2007.
Agenda Two-part session Part One (this session!) Authentication Methodologies Kerberos Overview Why Kerberos with SharePoint? Implementing Kerberos with SharePoint Common Problems Best Practices Part Two (16.15) Troubleshooting Shared Service Providers Search “Advanced” Scenarios Kerberos Only? More Tools Q&A/Discussion
Authentication Mechanisms Trusted Subsystem Impersonation/Delegation Core concepts that underpin every web application, ever! Essential Reading:Designing Secure Web Based Application for Windows 2000 Michael Howard www.microsoft.com/mspress/books/4293.aspx
Trusted Subsystem Resources are accessed by a “service account” Caching & SQL Connection Pooling Application Pools enable: with Windows Credentials zero credential storage SharePoint is predominately a Trusted Subsystem
Impersonation/Delegation Resources are accessed using client credentials Allows end to end auditing etc Caching / Pooling not possible
What is Kerberos?
Kerberos Benefits
ComparingNtlm and Kerberos
Windows Authentication (NTLM) 3 & 4 HTTP GET HTTP: 401 WWW-Authenticate: NTLM Header Acquire Credentials Construct AuthN Token HTTP GET with Username HTTP 401: NTLM Challenge NTLM Challenge Response Username Token * NTLM Challenge * NTLM Challenge Response * Authentication Success HTTP 200: OK 10. 5. 9. 1. 7. 6. 12. 2. 8. 11. * Max NTLM Auths (2 by default) can be tweaked, but can tank your DCs
Windows Authentication (Kerberos) HTTP GET HTTP: 401 WWW-Authenticate: Negotiate orKerberos Request Service Ticket from KDC Service Ticket returned HTTP GET with authenticator HTTP 200 OK 3. 1. 5. 2. 6. 4.
Comparing NTLM & Kerberos
WHY Kerberos with sharepoint?
Security Inter-server communications End user authentication Applications that require Delegation
Performance & Scalability More RPS *can* be possible due to dramatically less AuthN round trips Primarily for long user sessions Reduction in impact on Domain Controllers Helps address multi-domain scenarios Performance myths: “Kerberos makes SharePoint faster” “One DC for every three WFEs”
Performance Comparison RPS = Requests Per Second (Higher is better) PRT = Page Response Time (Lower is better)
Functionality Delegation  RSS Viewer Excel Services to SQL Analysis Services SQL Server Reporting Services Other applications (e.g. SAP via BDC) Custom code
ImplementingKerberos with Sharepoint
SharePoint Comedy You’ve all seen the lamer dialog: SharePoint books say:“we recommend Kerberos but we’re not gonna tell you how to set it up, here’s a link to a non SharePoint KB“ Detailed terribly on the “interweb” Focus on single server scenarios Dozens of erroneous blog posts, articles etc Fixed with technet.microsoft.com/en-us/library/cc263449.aspx
Requirements
Where?
How?
How?
Service Principal Names Notation is keyPROTOCOL/HOST:PORT 	e.g. http/intranet.sharepoint.comMSSQLSvc/sql.sharepoint.com:1433 Port is not required when using default port for HTTP. Best Practice:SPN for both hostname and “fully qualified” name:http/intranet	http/intranet.sharepoint.com
PAC Validation Privilege Attribute Certificate validation takes place by default (on Windows 2003) Still making use of Secure Channel causes delays perceived poor performance Windows 2003 SP2 introduces ability to disable (KB 906736) DWORD:HKLMystemurrentControlSetontrolsaerberosarametersalidateKdcPacSignature = 0 On Windows 2008 default is off (0)
Kernel Mode Authentication Introduced with IIS7  Significantly Improves Performance Eases configuration (except when using SharePoint!) HTTP.sys handles authentication under LocalSystem regardless of the application pool identity Means no SPN is required No good in a farm (even a single SharePoint server) It’s not SharePoint’s fault (this time!) Disable (via IIS7 UI) not good! Best Practice: Configure via applicationHost.config BSOD Alert!!!  Hotfix at KB962943
Configuring Kernel Mode AuthN useAppPoolCredentialsattribute in system.webServer/security/authentication/Windows-Authentication configuration section to true. <windowsAuthentication enabled="true" useKernelMode="true" useAppPoolCredentials="true" />  There is no ability to edit this value using the IIS Manager. Best Practice: on a per Web Site basis appcmd set config "SharePoint - 80“  	/section:windowsauthentication 	/useAppPoolCredentials:true 	/commit:MACHINE/WEBROOT/APPHOST
Demonstration Implementing Kerberos for SharePoint
Testing and Validation Don’t test from DC or Web Server! Windows Security Auditing Kerberos Auditing (more in Part Two) Kerbtray and Klist Netmon and Fiddler (etc) IIS Log Files, IIS7 Failed Request Tracing Above all, be patient! Use IISRESET
Common Issues Issue Mis-configured SPNs Duplicate SPNs	 Clock Skew PAC Validation Host name issues Load Balancing Myths IE6 Clients use NTLM Resolution/Best Practice Use correct notation! Use new SETSPN –X switch Ensure Time Sync Disable PAC Validation Never use CNames! Setup Web App Correctly Don’t use CNames! or MSKB 911149 DON’T USE ALIASES (CNames)for Web Applications!
General Best Practices Windows Server 2008 if at all possible Install Infrastructure Updates (or later) Patience! NTLM first, then enable Kerberos Script configuration only after extensive testing Document your configuration! (no really!)
Essential Tools CLI: Setspn.exe Windows Server 2008: installed by default Windows Server 2003: part of Resource Kit or separate downloadhttp://www.microsoft.com/downloads/details.aspx?familyid=9d467a69-57ff-4ae7-96ee-b18c4790cffd GUI: Adsiedit.msc Windows Server 2008: installed by default Windows Server 2003: part of support tools (on Windows CD) Kerbtray.exehttp://www.microsoft.com/downloads/details.aspx?familyid=4E3A58BE-29F6-49F6-85BE-E866AF8E7A88 Klist.exehttp://www.microsoft.com/DownLoads/details.aspx?familyid=1581E6E7-7E64-4A2D-8ABA-73E909D2A7DC Both part of the Windows 2003 Resource Kit Toolshttp://www.microsoft.com/downloads/details.aspx?familyid=9d467a69-57ff-4ae7-96ee-b18c4790cffd Network Monitor 3.3http://www.microsoft.com/downloads/details.aspx?FamilyID=983b941d-06cb-4658-b7f6-3088333d062f Fiddlerhttp://www.fiddlertool.com/ More in Part Two
Takeaways	 It’s easy! Don’t believe the hype! However, tons of misinformation and myths on the ‘net DCOM Configuration – Delegation - Dodgy Blog Posts! The best links: Configure Kerberos authentication (Office SharePoint Server) http://technet.microsoft.com/en-us/library/cc263449.aspx Ken Schaefer’s IIS & Kerberos FAQ Article Serieshttp://www.adopenstatic.com/faq/ Kerberos Authentication Tools and Settingshttp://technet.microsoft.com/en-us/library/cc738673.aspx Troubleshooting Kerberos Errorshttp://www.microsoft.com/downloads/details.aspx?FamilyID=7DFEB015-6043-47DB-8238-DC7AF89C93F1
In Part Two (at 16.15) Troubleshooting Shared Service Providers Search “Advanced” Scenarios Kerberos Only? More Tools Q&A/Discussion

Weitere ähnliche Inhalte

Was ist angesagt?

Externally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - ArcticconExternally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - ArcticconKarl Fosaaen
 
Testing microservices
Testing microservicesTesting microservices
Testing microservicesUri Goldstein
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecturerahmed_sct
 
TurboCharge Your Continuous Delivery Pipeline with Containers - Pop-up Loft
TurboCharge Your Continuous Delivery Pipeline with Containers - Pop-up LoftTurboCharge Your Continuous Delivery Pipeline with Containers - Pop-up Loft
TurboCharge Your Continuous Delivery Pipeline with Containers - Pop-up LoftAmazon Web Services
 
Introduction to Windows Azure AppFabric Applications
Introduction to Windows Azure AppFabric ApplicationsIntroduction to Windows Azure AppFabric Applications
Introduction to Windows Azure AppFabric ApplicationsNeil Mackenzie
 
Real time Communication with Signalr (Android Client)
Real time Communication with Signalr (Android Client)Real time Communication with Signalr (Android Client)
Real time Communication with Signalr (Android Client)Deepak Gupta
 
Ldap2010
Ldap2010Ldap2010
Ldap2010CYJ
 
Encode x NEAR: Technical Overview of NEAR 1
Encode x NEAR: Technical Overview of NEAR 1Encode x NEAR: Technical Overview of NEAR 1
Encode x NEAR: Technical Overview of NEAR 1KlaraOrban
 
Microservices and Self-contained System to Scale Agile
Microservices and Self-contained System to Scale AgileMicroservices and Self-contained System to Scale Agile
Microservices and Self-contained System to Scale AgileEberhard Wolff
 
Web Servers: Architecture and Security
Web Servers: Architecture and SecurityWeb Servers: Architecture and Security
Web Servers: Architecture and Securitygeorge.james
 
Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016Karl Fosaaen
 
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIsAmazon Web Services
 
Signalr with ASP.Net part2
Signalr with ASP.Net part2Signalr with ASP.Net part2
Signalr with ASP.Net part2Esraa Ammar
 

Was ist angesagt? (19)

Kerberos
KerberosKerberos
Kerberos
 
Externally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - ArcticconExternally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - Arcticcon
 
Testing microservices
Testing microservicesTesting microservices
Testing microservices
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecture
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
TurboCharge Your Continuous Delivery Pipeline with Containers - Pop-up Loft
TurboCharge Your Continuous Delivery Pipeline with Containers - Pop-up LoftTurboCharge Your Continuous Delivery Pipeline with Containers - Pop-up Loft
TurboCharge Your Continuous Delivery Pipeline with Containers - Pop-up Loft
 
Introduction to Windows Azure AppFabric Applications
Introduction to Windows Azure AppFabric ApplicationsIntroduction to Windows Azure AppFabric Applications
Introduction to Windows Azure AppFabric Applications
 
Real time Communication with Signalr (Android Client)
Real time Communication with Signalr (Android Client)Real time Communication with Signalr (Android Client)
Real time Communication with Signalr (Android Client)
 
Ldap2010
Ldap2010Ldap2010
Ldap2010
 
Encode x NEAR: Technical Overview of NEAR 1
Encode x NEAR: Technical Overview of NEAR 1Encode x NEAR: Technical Overview of NEAR 1
Encode x NEAR: Technical Overview of NEAR 1
 
Real-time ASP.NET with SignalR
Real-time ASP.NET with SignalRReal-time ASP.NET with SignalR
Real-time ASP.NET with SignalR
 
[Note]x509
[Note]x509[Note]x509
[Note]x509
 
SignalR
SignalRSignalR
SignalR
 
Microservices and Self-contained System to Scale Agile
Microservices and Self-contained System to Scale AgileMicroservices and Self-contained System to Scale Agile
Microservices and Self-contained System to Scale Agile
 
Web Servers: Architecture and Security
Web Servers: Architecture and SecurityWeb Servers: Architecture and Security
Web Servers: Architecture and Security
 
Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016
 
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
 
Signalr with ASP.Net part2
Signalr with ASP.Net part2Signalr with ASP.Net part2
Signalr with ASP.Net part2
 
Web servers
Web serversWeb servers
Web servers
 

Andere mochten auch

All about Kerberos In Microsoft BI
All about Kerberos In Microsoft BIAll about Kerberos In Microsoft BI
All about Kerberos In Microsoft BIPARIKSHIT SAVJANI
 
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 editionHadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 editionSteve Loughran
 
Kerberos, Token and Hadoop
Kerberos, Token and HadoopKerberos, Token and Hadoop
Kerberos, Token and HadoopKai Zheng
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itBenjamin Delpy
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication ApplicationVidulatiwari
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication ProtocolBibek Subedi
 
Hadoop and Kerberos
Hadoop and KerberosHadoop and Kerberos
Hadoop and KerberosYuta Imai
 
Secured (Kerberos-based) Spark Notebook for Data Science: Spark Summit East t...
Secured (Kerberos-based) Spark Notebook for Data Science: Spark Summit East t...Secured (Kerberos-based) Spark Notebook for Data Science: Spark Summit East t...
Secured (Kerberos-based) Spark Notebook for Data Science: Spark Summit East t...Spark Summit
 

Andere mochten auch (9)

All about Kerberos In Microsoft BI
All about Kerberos In Microsoft BIAll about Kerberos In Microsoft BI
All about Kerberos In Microsoft BI
 
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 editionHadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
Hadoop and Kerberos: the Madness Beyond the Gate: January 2016 edition
 
Kerberos, Token and Hadoop
Kerberos, Token and HadoopKerberos, Token and Hadoop
Kerberos, Token and Hadoop
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get it
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
 
Hadoop and Kerberos
Hadoop and KerberosHadoop and Kerberos
Hadoop and Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Secured (Kerberos-based) Spark Notebook for Data Science: Spark Summit East t...
Secured (Kerberos-based) Spark Notebook for Data Science: Spark Summit East t...Secured (Kerberos-based) Spark Notebook for Data Science: Spark Summit East t...
Secured (Kerberos-based) Spark Notebook for Data Science: Spark Summit East t...
 

Ähnlich wie Kerberos part 1

Teched Middle East New World of SharePoint 2010 Administration with Joel Oles...
Teched Middle East New World of SharePoint 2010 Administration with Joel Oles...Teched Middle East New World of SharePoint 2010 Administration with Joel Oles...
Teched Middle East New World of SharePoint 2010 Administration with Joel Oles...Joel Oleson
 
SharePoint 2010 design and deploy
SharePoint  2010 design and deploySharePoint  2010 design and deploy
SharePoint 2010 design and deployChris Riley ☁
 
Windows Server AppFabric Caching - What it is & when you should use it?
Windows Server AppFabric Caching - What it is & when you should use it?Windows Server AppFabric Caching - What it is & when you should use it?
Windows Server AppFabric Caching - What it is & when you should use it?Robert MacLean
 
Windows Azure & How to Deploy Wordress
Windows Azure & How to Deploy WordressWindows Azure & How to Deploy Wordress
Windows Azure & How to Deploy WordressGeorge Kanellopoulos
 
Kerberos: The Four Letter Word
Kerberos: The Four Letter WordKerberos: The Four Letter Word
Kerberos: The Four Letter WordKenneth Maglio
 
Best Practice SharePoint Architecture
Best Practice SharePoint ArchitectureBest Practice SharePoint Architecture
Best Practice SharePoint ArchitectureMichael Noel
 
Decoupled cms sunshinephp 2014
Decoupled cms sunshinephp 2014Decoupled cms sunshinephp 2014
Decoupled cms sunshinephp 2014Lukas Smith
 
SharePoint 2016 Platform Adoption Lessons Learned and Advanced Troubleshooting
SharePoint 2016 Platform Adoption   Lessons Learned and Advanced TroubleshootingSharePoint 2016 Platform Adoption   Lessons Learned and Advanced Troubleshooting
SharePoint 2016 Platform Adoption Lessons Learned and Advanced TroubleshootingJohn Calvert
 
Magento's Imagine eCommerce Conference: Do You Queue?
Magento's Imagine eCommerce Conference: Do You Queue?Magento's Imagine eCommerce Conference: Do You Queue?
Magento's Imagine eCommerce Conference: Do You Queue?varien
 
Measure() or die()
Measure() or die() Measure() or die()
Measure() or die() LivePerson
 
SharePoint 2010 Virtualization
SharePoint 2010 VirtualizationSharePoint 2010 Virtualization
SharePoint 2010 VirtualizationMichael Noel
 
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenO365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenNCCOMMS
 
WinOps Conf 2016 - Michael Greene - Release Pipelines
WinOps Conf 2016 - Michael Greene - Release PipelinesWinOps Conf 2016 - Michael Greene - Release Pipelines
WinOps Conf 2016 - Michael Greene - Release PipelinesWinOps Conf
 
SharePoint 2010 Virtualization - SharePoint Saturday L.A.
SharePoint 2010 Virtualization - SharePoint Saturday L.A.SharePoint 2010 Virtualization - SharePoint Saturday L.A.
SharePoint 2010 Virtualization - SharePoint Saturday L.A.Michael Noel
 
SharePoint 2010 Virtualization - Norway SharePoint User Group
SharePoint 2010 Virtualization - Norway SharePoint User GroupSharePoint 2010 Virtualization - Norway SharePoint User Group
SharePoint 2010 Virtualization - Norway SharePoint User GroupMichael Noel
 
SharePoint 2010 Virtualisation - SharePoint Saturday UK
SharePoint 2010 Virtualisation - SharePoint Saturday UKSharePoint 2010 Virtualisation - SharePoint Saturday UK
SharePoint 2010 Virtualisation - SharePoint Saturday UKMichael Noel
 

Ähnlich wie Kerberos part 1 (20)

Kerberos part 2
Kerberos part 2Kerberos part 2
Kerberos part 2
 
Teched Middle East New World of SharePoint 2010 Administration with Joel Oles...
Teched Middle East New World of SharePoint 2010 Administration with Joel Oles...Teched Middle East New World of SharePoint 2010 Administration with Joel Oles...
Teched Middle East New World of SharePoint 2010 Administration with Joel Oles...
 
SharePoint 2010 design and deploy
SharePoint  2010 design and deploySharePoint  2010 design and deploy
SharePoint 2010 design and deploy
 
Windows Server AppFabric Caching - What it is & when you should use it?
Windows Server AppFabric Caching - What it is & when you should use it?Windows Server AppFabric Caching - What it is & when you should use it?
Windows Server AppFabric Caching - What it is & when you should use it?
 
Enterprise Deployments & SOA
Enterprise Deployments & SOAEnterprise Deployments & SOA
Enterprise Deployments & SOA
 
Windows Azure & How to Deploy Wordress
Windows Azure & How to Deploy WordressWindows Azure & How to Deploy Wordress
Windows Azure & How to Deploy Wordress
 
Kerberos: The Four Letter Word
Kerberos: The Four Letter WordKerberos: The Four Letter Word
Kerberos: The Four Letter Word
 
Best Practice SharePoint Architecture
Best Practice SharePoint ArchitectureBest Practice SharePoint Architecture
Best Practice SharePoint Architecture
 
Decoupled cms sunshinephp 2014
Decoupled cms sunshinephp 2014Decoupled cms sunshinephp 2014
Decoupled cms sunshinephp 2014
 
SharePoint 2016 Platform Adoption Lessons Learned and Advanced Troubleshooting
SharePoint 2016 Platform Adoption   Lessons Learned and Advanced TroubleshootingSharePoint 2016 Platform Adoption   Lessons Learned and Advanced Troubleshooting
SharePoint 2016 Platform Adoption Lessons Learned and Advanced Troubleshooting
 
Magento's Imagine eCommerce Conference: Do You Queue?
Magento's Imagine eCommerce Conference: Do You Queue?Magento's Imagine eCommerce Conference: Do You Queue?
Magento's Imagine eCommerce Conference: Do You Queue?
 
Measure() or die()
Measure() or die()Measure() or die()
Measure() or die()
 
Measure() or die()
Measure() or die() Measure() or die()
Measure() or die()
 
SharePoint 2010 Virtualization
SharePoint 2010 VirtualizationSharePoint 2010 Virtualization
SharePoint 2010 Virtualization
 
ASP
ASPASP
ASP
 
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenO365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
 
WinOps Conf 2016 - Michael Greene - Release Pipelines
WinOps Conf 2016 - Michael Greene - Release PipelinesWinOps Conf 2016 - Michael Greene - Release Pipelines
WinOps Conf 2016 - Michael Greene - Release Pipelines
 
SharePoint 2010 Virtualization - SharePoint Saturday L.A.
SharePoint 2010 Virtualization - SharePoint Saturday L.A.SharePoint 2010 Virtualization - SharePoint Saturday L.A.
SharePoint 2010 Virtualization - SharePoint Saturday L.A.
 
SharePoint 2010 Virtualization - Norway SharePoint User Group
SharePoint 2010 Virtualization - Norway SharePoint User GroupSharePoint 2010 Virtualization - Norway SharePoint User Group
SharePoint 2010 Virtualization - Norway SharePoint User Group
 
SharePoint 2010 Virtualisation - SharePoint Saturday UK
SharePoint 2010 Virtualisation - SharePoint Saturday UKSharePoint 2010 Virtualisation - SharePoint Saturday UK
SharePoint 2010 Virtualisation - SharePoint Saturday UK
 

Kürzlich hochgeladen

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Kerberos part 1

  • 1. Spencer Harbar Kerberos Part One:No ticket touting here, does SharePoint add another head?
  • 2. About the speakers... Spencer Harbar - www.harbar.net | spence@harbar.net Microsoft Certified Master | SharePoint 2007 Microsoft Certified Master | SharePoint Instructor & Author Most Valuable Professional | SharePoint Server 15 years in Enterprise IT ISPA Board Member Bob Fox - www.spfoxhole.com/Blog/ | bfox11b@verizon.net Most Valuable Professional | SharePoint Services Specializing in SharePoint architecture and deployment B&R Business Solutions, LLC IT Professional with over 15 years experience ISPA Board Member
  • 3. About the speaker... Spencer Harbar - www.harbar.net | spence@harbar.net Microsoft Certified Master | SharePoint 2007 Microsoft Certified Master | SharePoint Instructor & Author Most Valuable Professional | SharePoint Server SharePoint Patterns & Practices Advisory Board Member 15 years in Enterprise IT ISPA Board Member Enterprise Architect working with Microsoft’s largestcustomers deploying Office SharePoint Server 2007.
  • 4. Agenda Two-part session Part One (this session!) Authentication Methodologies Kerberos Overview Why Kerberos with SharePoint? Implementing Kerberos with SharePoint Common Problems Best Practices Part Two (16.15) Troubleshooting Shared Service Providers Search “Advanced” Scenarios Kerberos Only? More Tools Q&A/Discussion
  • 5. Authentication Mechanisms Trusted Subsystem Impersonation/Delegation Core concepts that underpin every web application, ever! Essential Reading:Designing Secure Web Based Application for Windows 2000 Michael Howard www.microsoft.com/mspress/books/4293.aspx
  • 6. Trusted Subsystem Resources are accessed by a “service account” Caching & SQL Connection Pooling Application Pools enable: with Windows Credentials zero credential storage SharePoint is predominately a Trusted Subsystem
  • 7. Impersonation/Delegation Resources are accessed using client credentials Allows end to end auditing etc Caching / Pooling not possible
  • 11. Windows Authentication (NTLM) 3 & 4 HTTP GET HTTP: 401 WWW-Authenticate: NTLM Header Acquire Credentials Construct AuthN Token HTTP GET with Username HTTP 401: NTLM Challenge NTLM Challenge Response Username Token * NTLM Challenge * NTLM Challenge Response * Authentication Success HTTP 200: OK 10. 5. 9. 1. 7. 6. 12. 2. 8. 11. * Max NTLM Auths (2 by default) can be tweaked, but can tank your DCs
  • 12. Windows Authentication (Kerberos) HTTP GET HTTP: 401 WWW-Authenticate: Negotiate orKerberos Request Service Ticket from KDC Service Ticket returned HTTP GET with authenticator HTTP 200 OK 3. 1. 5. 2. 6. 4.
  • 13. Comparing NTLM & Kerberos
  • 14. WHY Kerberos with sharepoint?
  • 15. Security Inter-server communications End user authentication Applications that require Delegation
  • 16. Performance & Scalability More RPS *can* be possible due to dramatically less AuthN round trips Primarily for long user sessions Reduction in impact on Domain Controllers Helps address multi-domain scenarios Performance myths: “Kerberos makes SharePoint faster” “One DC for every three WFEs”
  • 17. Performance Comparison RPS = Requests Per Second (Higher is better) PRT = Page Response Time (Lower is better)
  • 18. Functionality Delegation RSS Viewer Excel Services to SQL Analysis Services SQL Server Reporting Services Other applications (e.g. SAP via BDC) Custom code
  • 20. SharePoint Comedy You’ve all seen the lamer dialog: SharePoint books say:“we recommend Kerberos but we’re not gonna tell you how to set it up, here’s a link to a non SharePoint KB“ Detailed terribly on the “interweb” Focus on single server scenarios Dozens of erroneous blog posts, articles etc Fixed with technet.microsoft.com/en-us/library/cc263449.aspx
  • 23. How?
  • 24. How?
  • 25. Service Principal Names Notation is keyPROTOCOL/HOST:PORT e.g. http/intranet.sharepoint.comMSSQLSvc/sql.sharepoint.com:1433 Port is not required when using default port for HTTP. Best Practice:SPN for both hostname and “fully qualified” name:http/intranet http/intranet.sharepoint.com
  • 26. PAC Validation Privilege Attribute Certificate validation takes place by default (on Windows 2003) Still making use of Secure Channel causes delays perceived poor performance Windows 2003 SP2 introduces ability to disable (KB 906736) DWORD:HKLMystemurrentControlSetontrolsaerberosarametersalidateKdcPacSignature = 0 On Windows 2008 default is off (0)
  • 27. Kernel Mode Authentication Introduced with IIS7 Significantly Improves Performance Eases configuration (except when using SharePoint!) HTTP.sys handles authentication under LocalSystem regardless of the application pool identity Means no SPN is required No good in a farm (even a single SharePoint server) It’s not SharePoint’s fault (this time!) Disable (via IIS7 UI) not good! Best Practice: Configure via applicationHost.config BSOD Alert!!! Hotfix at KB962943
  • 28. Configuring Kernel Mode AuthN useAppPoolCredentialsattribute in system.webServer/security/authentication/Windows-Authentication configuration section to true. <windowsAuthentication enabled="true" useKernelMode="true" useAppPoolCredentials="true" /> There is no ability to edit this value using the IIS Manager. Best Practice: on a per Web Site basis appcmd set config "SharePoint - 80“ /section:windowsauthentication /useAppPoolCredentials:true /commit:MACHINE/WEBROOT/APPHOST
  • 30. Testing and Validation Don’t test from DC or Web Server! Windows Security Auditing Kerberos Auditing (more in Part Two) Kerbtray and Klist Netmon and Fiddler (etc) IIS Log Files, IIS7 Failed Request Tracing Above all, be patient! Use IISRESET
  • 31. Common Issues Issue Mis-configured SPNs Duplicate SPNs Clock Skew PAC Validation Host name issues Load Balancing Myths IE6 Clients use NTLM Resolution/Best Practice Use correct notation! Use new SETSPN –X switch Ensure Time Sync Disable PAC Validation Never use CNames! Setup Web App Correctly Don’t use CNames! or MSKB 911149 DON’T USE ALIASES (CNames)for Web Applications!
  • 32. General Best Practices Windows Server 2008 if at all possible Install Infrastructure Updates (or later) Patience! NTLM first, then enable Kerberos Script configuration only after extensive testing Document your configuration! (no really!)
  • 33. Essential Tools CLI: Setspn.exe Windows Server 2008: installed by default Windows Server 2003: part of Resource Kit or separate downloadhttp://www.microsoft.com/downloads/details.aspx?familyid=9d467a69-57ff-4ae7-96ee-b18c4790cffd GUI: Adsiedit.msc Windows Server 2008: installed by default Windows Server 2003: part of support tools (on Windows CD) Kerbtray.exehttp://www.microsoft.com/downloads/details.aspx?familyid=4E3A58BE-29F6-49F6-85BE-E866AF8E7A88 Klist.exehttp://www.microsoft.com/DownLoads/details.aspx?familyid=1581E6E7-7E64-4A2D-8ABA-73E909D2A7DC Both part of the Windows 2003 Resource Kit Toolshttp://www.microsoft.com/downloads/details.aspx?familyid=9d467a69-57ff-4ae7-96ee-b18c4790cffd Network Monitor 3.3http://www.microsoft.com/downloads/details.aspx?FamilyID=983b941d-06cb-4658-b7f6-3088333d062f Fiddlerhttp://www.fiddlertool.com/ More in Part Two
  • 34. Takeaways It’s easy! Don’t believe the hype! However, tons of misinformation and myths on the ‘net DCOM Configuration – Delegation - Dodgy Blog Posts! The best links: Configure Kerberos authentication (Office SharePoint Server) http://technet.microsoft.com/en-us/library/cc263449.aspx Ken Schaefer’s IIS & Kerberos FAQ Article Serieshttp://www.adopenstatic.com/faq/ Kerberos Authentication Tools and Settingshttp://technet.microsoft.com/en-us/library/cc738673.aspx Troubleshooting Kerberos Errorshttp://www.microsoft.com/downloads/details.aspx?FamilyID=7DFEB015-6043-47DB-8238-DC7AF89C93F1
  • 35. In Part Two (at 16.15) Troubleshooting Shared Service Providers Search “Advanced” Scenarios Kerberos Only? More Tools Q&A/Discussion
  • 36. Thank You! Please complete your evaluations It makes us better next time!

Hinweis der Redaktion

  1. SPENCE WILL KICK OFF
  2. SPENCE & BOB
  3. Spence
  4. Spence
  5. Spence
  6. Bob
  7. Bob
  8. Bob
  9. Bob
  10. Bob
  11. Bob
  12. Spence
  13. Spence
  14. Spence
  15. Spence
  16. Spence
  17. Spence
  18. BobMention u have all of these in a sharepoint farm except SPNs anyway
  19. Bob
  20. Bob
  21. Bob
  22. BobDepending upon the protocol schema the port can be required. Eg. SQL server.
  23. Spence
  24. Spence
  25. Spence
  26. Spence Demo
  27. Bob
  28. Bob
  29. Spence
  30. Spence