Best of Blogs. In meinen Blog veröffentliche alle Lösungen für Probleme mit denen ich selbst zu tun gehabt habe. Die meisten Beiträge sind von anderen Blogs oder Webseiten kopiert.
Samstag, 30. Juli 2011
Using TMG, one-time passwords and Kerberos Constrained Delegation
Access to corporate resources from external computers requires secure authentication methods. This article explains how to configure One-Time Password pre-authentication.
In the previous article of this Kerberos Delegation series, you learned how to configure Kerberos Constrained Delegation. Today, I will discuss pre-authentication methods that are not based on Active Directory. Users can pre-authenticate using Windows Active Directory authentication, RADIUS OTP authentication, Certificate authentication or LDAP authentication, and even with PKI certificates.
In the example here, we will use a one-time password solution that provides a simple, user friendly and very secure solution that is ideal for securing access to corporate resources when used with Microsoft (TMG) and Kerberos Constrained Delegation. I will describe how Protocol Transition works with TMG, i.e. how you can authenticate users with one method and then pass the credentials to the backend using Kerberos.
So how is the end-user experience when multiple pre-authentication methods are used without Credential Delegation? If you were to use RADIUS One-Time Password pre-authentication on the TMG Listener, a user would have to enter his OTP credentials first and then provide his Windows credentials for access to the web server.
Why is this not good? You expose critical security information (Domain username and password, which are static) when a user has to enter Domain credentials on a machine that doesn’t belong to your corporate network. This is especially problematic in a “hostile” environment such as internet cafes or the “mother-in-law” computer (I heard this term at a Microsoft presentation for UAG and I just had to use it). You can probably imagine the variety of threats in those environments. Such a machine could run key logging malware that collects static passwords and other information that could be used in a subsequent attack.
How can a security minded administrator make sure that users would enter only OTP credentials when accessing backend HTTP/HTTPS based services? It’s obvious that you can’t achieve this by using Basic Credential Delegation which means passing username and password from the TMG server to the backend server. For working with OTP credentials, Kerberos Constrained Delegation and Protocol Transition is required.
In my previous article, I already explained how to configure Kerberos Constrained Delegation in a Publishing rule. In this post, I will describe how to configure the Listener to use OTP and PKI pre-authentication. But first we have to configure TMG to query an authentication server. We will do this by defining a RADIUS server with TMG. First select “Tasks” in the TMG console.
TMG – Configure Authentication
Locate “Configure Authentication Server settings”
A new window will pop up, click “add” and enter the relevant information (IP, Shared Secret And Port). Also be aware, that if your RADIUS server uses a port other than 1812, you will have to allow it independently.
TMG – Authentication Servers
I continue by reconfiguring the Listener on the TMG from the previous article. Select “Toolbox” and then click on “Network Objects” in the TMG Console.
TMG – Web Listeners
Locate and open the “Web Listener” dialog at the bottom and right click the Listener that you created in the previous article.
Authentication Validation Method
Now select “RADIUS OTP” authentication in the Authentication settings tab. You can then use this Listener in a Publishing Rule. The Publishing Rule from the previous article can be used without reconfiguration. Click OK and Apply.
How would an end user experience this? When a user first accesses the URL of the published web application, he will be asked to enter his OTP credentials. The TMG would then authenticate him to the backend application using a Kerberos Token by delegating the credentials. The user has successfully logged in using only his OTP credentials without being asked to enter his domain credentials. In the next article, I will explain how to use Smart Cards and PKI credentials to access published resources.
Exchange 2010 Update Rollup4 re-released
Hallo zusammen,
Heute war auf dem Exchange Team Blog zu lesen, dass das Update Rollup 4 für Exchange 2010 SP1 in der V2 wiederveröffentlicht worden ist. Was genau das Problem war kann in diesem Blog Post nachgelesen werden.
Download: http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=26910
Falls man Forefront Protection for Exchange installiert hat muss dieser zuerst deaktiviert werden.
cd C:\Program Files (x86)\Microsoft Forefront Protection for Exchange Server
fscutility /disable
Das Update sollte immer aus einem "elevated Command Promt" - sprich als Administrator ausgeführt werden.
So, nun muss nur noch Forefront Protection for Exchange wieder gestartet werden.
cd C:\Program Files (x86)\Microsoft Forefront Protection for Exchange Server
fscutility /enable
Alte Management Tools müssen ebenfalls upgedatet werden, andernfalls erscheint die folgende Fehlermeldung.
How to configure TMG for SSL Client Certificate Authentication
SSL Client Certificate Authentication allows users authenticate to TMG using smart cards. This post explains how to configure TMG and Active Directory for certificate authentication.
In my previous article I explained the use of one-time passwords with Forefront Threat Management Gateway (TMG). Today, I will discuss an alternative to this method that leverages smart cards and Public Key Infrastructure (PKI). I will describe how to use certificates that are published on the TMG.
For this to work, you don’t’ have to deploy an Enterprise Certification Authority. You can use any certificate issued by a public or private CA. Two things are required for this:
- The CA that issued the user certificate has to be added to the Certificate trust list (CTL) on the TMG Listener
- The user certificate has to be mapped to the user’s Active Directory credentials
TMG Web Listener
Next, click the Toolbox tab, and then Network Objects.
Now, right click on the listener that you created before and select the “Authentication” tab.
SSL Client Certificate Authentication
Select “SSL Client Certificate Authentication” from the dropdown menu. You can only choose “Windows Active Directory” to validate the credentials.
Click on “Advanced”, and then select the Client Certificate Trust list. You have two options here:
SSL Client Certificate Authentication – Advanced Authentication Options
You can either allow certificates from all issuers that are trusted on the TMG, or select only specific trusted certificates. I suggest accepting certificates only from those CAs that your users will actually use. If you want to accept certificates from a public CA that is not in the Trust List, you must also add the CA Root certificate to the TMG.
You can map a certificate to a user account using Active Directory, but first you need the user’s exported public key. Open Active Directory Users and Computers, select “View” and click on “Advanced Features”.
SSL Client Certificate Authentication – Active Directory Advanced Features
Now, navigate to the user account, right click the user name and select “Name Mappings”,
SSL Client Certificate Authentication – Name Mappings
Click “Add” and point to the CER file that contains the user’s public key. This user can now be authenticated on the TMG Listener.
SSL Client Certificate Authentication – Security Identity Mapping
Do not confuse this method with smart card authentication on workstations; you will still require specific certificates for smart card logins. I strongly recommend that you allow only user certificates that are stored on smart cards. As far as I know, this can’t be enforced on the TMG.
When a user accesses Outlook Web Access (OWA), he will be asked to provide a certificate and a smart card PIN. Once he authenticated successfully to the TMG, he will be automatically logged on to OWA.
Freitag, 29. Juli 2011
WSUS Daten verschieben
ch hatte gerade das Problem, das mein Laufwerk auf dem die WSUS Daten abgespeichert werden, schon ziemlich voll war, somit musste ich den WSUS Pfad verändern. Natürlich wollte ich dabei die bereits vorhanden Updates nicht verlieren, also musste ich diese irgendwie mitnehmen. Es gibt hier aber einen Unterschied ob es sich um einen WSUS handelt der nachträglich auf einem Windows Server installiert wurde oder ob der WSUS Teil eines Small Business Servers ist. Ich zeige euch beide Methoden.
WSUS Daten verschieben am SBS
Wie man das vom SBS kennt, wird alles per Wizard gesteuert, so auch das verschieben der WSUS Daten. Also öffnet die Windows SBS Console und wechselt auf den Reiter “Datensicherung und Serverspeicher” und dann unter die Registerkarte “Serverspeicher”. Hier gibt es in der Actionbar den Punkt “Windows Update-Repository-Daten verschieben”
Der Wizard führt euch mit ein paar Klicks durch den Verschiebungsprozess. Ihr müsst hier nur das gewünschte Ziellaufwerk angeben, auf diesem wird dann ein Ordner “WSUS” angelegt, in welchen die benötigten Daten verschoben werden. Der Kopiervorgang dauert je nach Umfang bis zu 10 Minuten.
WSUS Daten verschieben mittels wsusutil.exe
Diese Methode funktioniert übrigens auch am SBS, jedoch nur per Kommandozeile. Wir suchen uns die Dateiwsusutil.exe, sollte normalerweise unter C:\Programme\Update Services\Tools zu finden sein.
Öffnen jetzt eine Kommandozeile und wechseln in das oben beschriebene Verzeichnis. Wir möchten unsere WSUS Daten auf das Laufwerk D: in den Ordner WSUS verschieben. Anders als beim SBS Wizard, müssen wir zuvor noch den Ordner D:\WSUS anlegen. Danach können wir mit folgendem Kommando das verschieben starten.
wsusutil.exe movecontent D:\WSUS\ D:\move.log
15 Minuten späte sollte folgendes Bild erscheinen und das move.log sollte voller Erfolgsmeldung sein.
Move.log2011-07-05T06:42:47 Successfully stopped WsusService.2011-07-05T06:42:47 Beginning content file location change to D:\WSUS\2011-07-05T06:59:11 Successfully copied content files.2011-07-05T06:59:11 Successfully copied application files.2011-07-05T06:59:12 Successfully changed WUS configuration.2011-07-05T06:59:15 Successfully changed IIS virtual directory path.2011-07-05T06:59:15 Successfully removed existing local content network shares.2011-07-05T06:59:16 Successfully created local content network shares.2011-07-05T06:59:16 Successfully changed registry value for content store directory.2011-07-05T06:59:16 Successfully changed content file location.2011-07-05T06:59:18 Successfully started WsusService.2011-07-05T06:59:18 Content integrity check and repair…2011-07-05T06:59:18 Initiated content integrity check and repair.
Wer noch etwas Platz sparen möchte kann zum Schluss noch die Bereinigung im WSUS selbst starten.
Microsoft NAS OOBE has stopped working
I installed the OOBE (Windows6.1-KB976836-x64-OOBE.msu) but I get the message "Microsoft NAS OOBE has stopped working" when I log on. What's wrong?
You have to install .NET Framework 3.51 to use the Windows Storage Server 2008 R2 OOBE.
Method 1: Using Server Manager Interface
You have to install .NET Framework 3.51 to use the Windows Storage Server 2008 R2 OOBE.
How to verify if .NET Framework 3.5 SP1 is installed:
Here are the steps to verify that .NET Framework 3.5.1 is installed on Windows Server 2008 R2.- Click the Start button in the lower left hand corner of the display.
- Highlight Administrative Tools and select Server Manager.
- In the Server Manager interface, click Features to display all the installed Features in the right hand pane. Verify that .NET Framework 3.5.1 is listed.
Method 1: Using Server Manager Interface
- In the Server Manager interface, select Add Features to displays a list of possible features.
- In the Select Features interface, expand .NET Framework 3.5.1 Features.
- Once you expand .NET Framework 3.5.1 Features, you will see two check boxes. One for .NET Framework 3.5.1 and other for WCF Activation. Check the box next to .NET Framework 3.5.1and click Next.
- Note: If you do not expand .NET Framework 3.5.1 Features and check it, you will get a pop-up titled Add Features Wizard as shown below.
- Click Cancel and expand .NET Framework 3.5.1 Features and then check .NET Framework 3.5.1 check box below it.
- You cannot install .NET Framework 3.5.1 Features unless the required role services and features are also installed.
- In the Confirm Installation Selections interface, review the selections and then click Install.
- Allow the installation process to complete and then click Close.
- Click the Start button in the lower left hand corner of the display.
- Highlight All Programs and select Accessories
- Expand Windows PowerShell and right click Windows PowerShell and select Run as administrator. Click Yes on the User Account Control box.
- At the PowerShell command prompt, type the following commands, and then press ENTER after each command:
- Import-Module ServerManager
- Add-WindowsFeature as-net-framework
Note: A screenshot is shown below:
Mittwoch, 27. Juli 2011
Linux Integration Services 3.1 for Hyper-V
I had a mad busy day with meetings at customer sites today and that’s when this great news breaks out. Microsoft has released version 3.1 of the Linux Integration Components (or Services) for Hyper-V.
The supported operating systems for 3.1 are:
- “Red Hat Enterprise Linux (RHEL) 6.0 and 6.1 x86 and x64 (Up to 4 vCPU)
- CentOS 6.0 x86 and x64 (Up to 4 vCPU)”
Supported Host OS’s include:
- “Windows Server 2008 Standard, Windows Server 2008 Enterprise, and Windows
- Server 2008 Datacenter (64-bit versions only)
- Microsoft Hyper-V Server 2008
- Windows Server 2008 R2 Standard, Windows Server 2008 R2 Enterprise, and Windows
- Server 2008 R2 Datacenter
- Microsoft Hyper-V Server 2008 R2”
The features of V3.1 of the Linux Integration Services are:
- “Driver support: Linux Integration Services supports the network controller and the IDE and
SCSI storage controllers that were developed specifically for Hyper-V. - Fastpath Boot Support for Hyper-V: Boot devices now take advantage of the block
Virtualization Service Client (VSC) to provide enhanced performance. - Timesync: The clock inside the virtual machine will remain synchronized with the clock on
the virtualization server with the help of the pluggable time source device. - Integrated Shutdown: Virtual machines running Linux can be shut down from either Hyper-V
Manager or System Center Virtual Machine Manager by using the “Shut Down” command. - Symmetric Multi-Processing (SMP) Support: Supported Linux distributions can use up to 4 virtual processors (VP) per virtual machine. SMP support is not available for 32-bit Linux guest operating systems running on Windows Server 2008 Hyper-V or Microsoft Hyper-V Server 2008.
- Heartbeat: Allows the virtualization server to detect whether the virtual machine is running
and responsive. - KVP (Key Value Pair) Exchange: Information about the running Linux virtual machine can
be obtained by using the Key Value Pair exchange functionality on the Windows Server 2008
virtualization server”.
You should really take a look at the KVP feature in the PDF (on the download page). There’s some interesting information and links on how to use it to get information, such as the Linux IC version from the VMs on your hosts using PowerShell.
Montag, 25. Juli 2011
Outlook Nikname Cache *.NK2
Der Nickname Cache von Outlook speichert Emailaddressen von gesendeten Emails. Diese werden vorgeschlagen wenn etwas im "An" Feld eingegeben werden.
Der Nickname Cache wird in einer [OutlookProfilename].nk2 Datei gespeichert.
Windows XP: C:\Documents and Settings\Username\Application Data\Microsoft\Outlook
Windows Vista / Win7: C:\Users\Username\AppData\Roaming\Microsoft\Outlook
Um einzelne Einträge zu löschen einfach die ersten paar Zeichen eingeben und dann "Delete" drücken. Unter Outlook 2010 kann einfach auf das "x" geklickt werden um den Eintrag zu entfernen. Mehr dazu gibts im folgenden KB Artikel: http://support.microsoft.com/kb/287623/en-us
Um den kompletten Nickname Cache zu löschen kann einfach die *.NK2 Datei gelöscht werden. Ab Outlook 2010 kann dies in den Optionen erledigt werden.
Um Einträge in der .NK2 Datei zu bearbeiten gibt es auch Freeware Tools wie beispielsweise NK2Edit von Nirsoft. http://www.nirsoft.net/utils/outlook_nk2_edit.html
Outlook 2010 hat keine NK2 Datei mehr, sondern speichert dies in einer Hidden Message in der Inbox (IPM.Configuration.Autocomplete).
Beim ersten start von Outlook 2010 wird die *.NK2 Datei importiert und das File in .nk2.old umbenennt. Mehr dazu im folgenden KB Artikel http://support.microsoft.com/kb/980542/en-us
Freitag, 22. Juli 2011
How to Make a Bootable Mac OS X Lion USB Install Key
Step One
Connect a 8GB or larger USB key to your computer then launch the Mac App Store from your dock.
Step Two
Click the Purchased tab at top of the window the hold down the Option key and click the Purchased tab again.
**If you have not yet installed Lion then you can follow these instructions to buy it and begin downloading.
Step Three
Press the Install button for OS X Lion and wait while the operating system downloads. If the LaunchPad appears press the Escape key.
Step Four
Once the download has completed the Mac OS X Lion Installer will launch. Select Quit from the Install Mac OS X Lion to exit the installer.
Step Five
Click to launch a new Finder window from your dock.
Step Six
Navigate to the Applications folder and right click the new "Install Mac OS X Lion" icon then select Show Package Contents from the contextual menu.
Step Seven
Double click the Contents folder.
Step Eight
Then double click the SharedSupport folder
Step Nine
Locate the InstallESD.dmg file then open a new Finder window by pressing Command + N on your keyboard.
Step Ten
Navigate to your Applications:Utilities folder then double click Disk Utility to launch the application
Step Eleven
Select your USB thumb drive from the list on the left and click the Partition tab.
Step Twelve
Set the Partition Layout to 1 Partition, set the Name to OS X Lion, and set the Format to Mac OS Extended (Journaled) and then click the Options button.
Step Thirteen
Choose GUID Partition Table from the popup window then click the OK button.
Step Fourteen
Next click the Apply button to save your changes.
When asked to confirm click the Partition button.
Step Fifteen
Once the USB drive has been partitioned correctly, select the new OS X Lion partition from the list on the left and click the Restore tab.
Step Sixteen
Drag the InstallESD.dmg file we located earlier from the Finder window into the Source field. Then drag theOS X Lion partition from the list on the left into the Destination field.
Step Seventeen
Click the Restore button then click the Erase button from the confirmation popup to begin building your install key.
Another popup will appear asking you to log in. Enter your administrative username and password then clickOK.
Step Eighteen
When the restore is complete the Mac OS X Lion USB Install Key will be mounted and it will be ready to use.
Connect a 8GB or larger USB key to your computer then launch the Mac App Store from your dock.
Step Two
Click the Purchased tab at top of the window the hold down the Option key and click the Purchased tab again.
**If you have not yet installed Lion then you can follow these instructions to buy it and begin downloading.
Step Three
Press the Install button for OS X Lion and wait while the operating system downloads. If the LaunchPad appears press the Escape key.
Step Four
Once the download has completed the Mac OS X Lion Installer will launch. Select Quit from the Install Mac OS X Lion to exit the installer.
Step Five
Click to launch a new Finder window from your dock.
Step Six
Navigate to the Applications folder and right click the new "Install Mac OS X Lion" icon then select Show Package Contents from the contextual menu.
Step Seven
Double click the Contents folder.
Step Eight
Then double click the SharedSupport folder
Step Nine
Locate the InstallESD.dmg file then open a new Finder window by pressing Command + N on your keyboard.
Step Ten
Navigate to your Applications:Utilities folder then double click Disk Utility to launch the application
Step Eleven
Select your USB thumb drive from the list on the left and click the Partition tab.
Step Twelve
Set the Partition Layout to 1 Partition, set the Name to OS X Lion, and set the Format to Mac OS Extended (Journaled) and then click the Options button.
Step Thirteen
Choose GUID Partition Table from the popup window then click the OK button.
Step Fourteen
Next click the Apply button to save your changes.
When asked to confirm click the Partition button.
Step Fifteen
Once the USB drive has been partitioned correctly, select the new OS X Lion partition from the list on the left and click the Restore tab.
Step Sixteen
Drag the InstallESD.dmg file we located earlier from the Finder window into the Source field. Then drag theOS X Lion partition from the list on the left into the Destination field.
Step Seventeen
Click the Restore button then click the Erase button from the confirmation popup to begin building your install key.
Another popup will appear asking you to log in. Enter your administrative username and password then clickOK.
Step Eighteen
When the restore is complete the Mac OS X Lion USB Install Key will be mounted and it will be ready to use.
Abonnieren
Posts (Atom)
Rename Onedrive Business root folder
Rename Onedrive Business root folder Here is what I remember: In the Office 365 web admin pages, change the organization name to a shorte...
-
Rename Onedrive Business root folder Here is what I remember: In the Office 365 web admin pages, change the organization name to a shorte...
-
Fehlermeldung: Funktion wurde vom Systemadministrator oder der Person gesperrt, von der der Drucker eingerichtet wurde. Wenn dein HP Office...