This repository has been archived by the owner on Apr 29, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 44
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
staging all draft updates for cleaning and additions
network config category pages are still in progress
- Loading branch information
lachellel
committed
Apr 3, 2016
1 parent
02585a5
commit 44de292
Showing
26 changed files
with
297 additions
and
244 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,68 +1,22 @@ | ||
<div style="float:right; padding:10px; margin-right:20px; border-radius:10px; width:180px; height:40px; box-shadow:3px 3px 5px 0px; text-align:center; background-color:#CCC; color:#666666"> | ||
<div style="color:#000000"> | ||
<em>Difficulty: Moderate</em> | ||
<em>Moderate</em> | ||
</div> | ||
</div> | ||
|
||
## Introduction to Network Authentication Guides | ||
## Introduction to Network Authentication Guide | ||
|
||
This section is for configuring your Windows based computer network to accept and potentially require PIV for authentication. | ||
The Network Authentication guides are for configuring your Windows _network domain_ for smartcard logon using PIV credentials. There are many useful pages and technical articles available online which include details on configurations and using generic smartcards. The information presented here is for common questions and configurations **specific** to the US Federal Government, **PIV** smartcards, and US Federal civilian agency certificate authorities. | ||
|
||
There are many useful articles available online for you to review and use. These articles outline in detail the point and click options for configurations and using generic smartcards. | ||
1. [Checking Ports and Protocols](../networkconfig/ports/) | ||
2. [Domain Controller certificates](../networkconfig/domaincontrollers/) | ||
3. [Addition of US Federal Certificate chains to the Trusted Root Certificate Authorities](../networkconfig/trustedroots/) | ||
4. [Associating PIV credentials to the network domain user accounts](../networkconfig/accounts/) | ||
5. [Configuring group policies for PIV (smartcard) logon](../networkconfig/grouppolicies/) | ||
|
||
The information presented in this section and pages is to address some of your common questions and configurations **specific** to the US Federal Government, **PIV** smartcards, and US Federal civilian agency certificate authorities. | ||
|
||
### Assumptions | ||
#### Assumptions | ||
* Users have PIV cards and PIV card readers | ||
* User workstations have the drivers to read the PIV cards | ||
* You're using Microsoft Active Directory to manage your Windows network | ||
* Domain Controllers are Microsoft 2008 R2 or more recent versions | ||
* User workstations joined to the network are Windows 7 or above | ||
* There are options for workstations that are Mac OS based and joined to a Windows network - to be covered in a separate guide | ||
|
||
|
||
### Before You Get Started | ||
One of the most common questions is "What are all the certificates and what do I do with them?" | ||
|
||
Explaining public key infrastructures and *the* Federal Public Key Infrastructure is an advanced topic and will be covered in additional guides. For your needs, there are two basic principles to understand: | ||
|
||
1. Trust | ||
2. Certificate *chains* | ||
|
||
In the Federal Agencies, certificates may be issued to People (YOU), or Devices (SSL, Domain Controllers, Mobile Devices, etc). | ||
|
||
Your PIV credential contain certificates and private key pairs - that are issued to YOU as a person, and to the CARD as a Device that you have in your possession. | ||
|
||
To Trust YOU and your certificates, the workstations and network need to be configured for this trust. Certificate chains are one of the necessary methods to configure this trust. | ||
|
||
Certificate chains can be complex to explain, so let's use a parable: | ||
|
||
Download the Federal Common Policy Certificate Authority (COMMON) trusted _root_ certificate | ||
|
||
* [COMMON can be downloaded here](http://http.fpki.gov/fcpca/fcpca.crt) | ||
* cn=Federal Common Policy CA, ou=FPKI, o=U.S. Government, c=US | ||
* 90 5f 94 2f d9 f2 8f 67 9b 37 81 80 fd 4f 84 63 47 f6 45 c1 | ||
|
||
Download the Intermediate Certificate Authority certificates | ||
|
||
* [Intermediate Certificate Authority certificates] (http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c) | ||
* The file type (p7c) can be | ||
* | ||
* | ||
|
||
Identify and download any additional Intermediate Certificate Authority certificates | ||
|
||
* You can generally ask your agency's information security team for help on the additional | ||
* You can also look at your PIV card and certificates | ||
|
||
Are you ready to get started? | ||
|
||
#### Outline of Steps | ||
1. [Checking the network for Ports and Protocols](#checking-the-network-for-ports-and-protocols) | ||
2. Configuration considerations for Domain Controller certificates | ||
2. [Addition of US Federal Certificate chains to the Trusted Root Certificate Authorities](#addition-of-us-federal-certificate-chains-to-the-trusted-root-certificate-authorities) | ||
3. Publishing the US Federal Certificate chains to the NT Auth Store | ||
4. [Associating PIV Credentials to the Active Directory User Accounts using altSecurityIdentities](#associating-piv-credentials-to-the-active-directory-user-accounts-using-altSecurityIdentities) | ||
5. Configuring group policies for PIV (smartcard) logon | ||
|
||
To help contribute to this effort, please follow 'Submit Issues Here' link at the top right to access the GitHub page for this site and provide any feedback. | ||
* Domain Controllers are Microsoft 2008 R2 or 2012 | ||
* User workstations joined to the network are Windows 7, Windows 8 or Windows 10 | ||
* There are options for workstations that are Mac OS based and joined to a Windows network - to be covered in updated to this guide |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.