(biz303) active directory in the aws cloud | aws re:invent 2014

27

Upload: amazon-web-services

Post on 12-Jul-2015

415 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 2: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 3: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 4: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 5: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 6: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 7: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014

AWS CloudOn Premise Datacenter

VPN Connection1

Authenticate User and Request

Kerberos Ticket

Active Directory Forest

2Get Kerberos

Tocket

4Use Information

in Ticket

EC2 Instances

User

3Submit Ticket

Page 8: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014

AWS CloudRemote Office

VPN Connection1

Authenticate User and Request

Kerberos Ticket

Active Directory Forest

2Get Kerberos

Tocket

4Use Information

in Ticket

EC2 InstancesUser

3Submit Ticket

Page 9: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 10: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 11: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014

AWS CloudOn-Premise Datacenter

User

ADFS 2.0 Server

EC2 Instance

Windows Identity Foundation

Active Directory Domain Services

Application

VPN Connection

1,2Login and

receive Kerberos Ticket

3,4Query For Token

Requirements

5Request Token, Send Kerberos

Ticket8

Return Token

9Forward Token to

Application

10,11, 12Resolve Token and Evaluate

Claim

13Get the Data

6,7Find and Return

Claim

Page 12: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 13: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014

AWS CloudOn-Premise Datacenter

User

8.User is

authenticated to app

ADFS 2.0 Server

EC2 Instance

Active Directory Domain Services

Application

Security Token Service

1: Log into AD/Get Kerberos TGT

2. Establish Session with

App

3. App needs token

redirect to STS

4. STS sends token

request to Identity Provider

5. ADFS gets authuser info from AD createsSAML Tioken

6. ADFS redirects user to STS with SAML token

7. Redirect user back to app with

token

Page 14: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 15: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 16: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 17: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 18: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 19: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 20: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 21: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 22: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014

Characteristic RODC Writeable DC

AD Database Access RODC is Read-Only.

Certain write operations

are forwarded and

referrals can be given

All operations supported

Data Replication Only replicated data

FROM a writable DC

Replicate all changes

Data Stored in DB Contains copy of all data

except for credentials and

like attributes

Complete copy of the

entire database

Administration Administration can be

delegated to non-Domain

Admins

Only a Domain Admin

can administer

Page 23: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
Page 25: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014

Microsoft Pages on AWS

Securing Windows Based Application on AWS

Windows Details Page

Microsoft License Mobility Program

Page 27: (BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014

Please give us your feedback on this session.

Complete session evaluations and earn re:Invent swag.

http://bit.ly/awsevals