IT tutorials
 
Technology
 

System Center Configuration Manager 2007 : PKI Management References (part 1) - Cryptography Basics

10/14/2013 9:01:08 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

You can implement ConfigMgr in either mixed mode or native mode. Native mode, the more secure of the two, requires several certificates from the PKI (Public Key Infrastructure) for it to handle operations such as IBCM. A PKI is an implementation of certificate technology that allows binding a public key with some identity via a Certificate Authority (CA). ConfigMgr leverages the PKI to encrypt the transmission of data between the management point (MP) and the client itself, and authentication of the client to the MP. For ConfigMgr, these identities are machine accounts. The certificate is bound via a registration process and then carried out by Active Directory group policy objects (GPOs) and the CA auto-enrollment process. You can also implement the certificates manually, depending on your environment and deployment processes. ConfigMgr does not perform any of the certificate deployment or management for the PKI or itself; the PKI’s Registration Authority ensures the certificates are correctly bound. Each account, identity, public key, binding, and validity condition allow the CA to generate and issue certificates that cannot be duplicated.

Note: ConfigMgr PKI Requirements

ConfigMgr 2007 can only leverage template-based certificates issued by an enterprise Certificate Authority running on the Enterprise edition or Datacenter edition of Windows Server 2003 or Windows Server 2008. Running a PKI on the Standard edition of Windows Server 2003 or 2008 does not give administrators the ability to modify the templates per ConfigMgr’s requirements.


1. Cryptography Basics

Cryptography is the practice of hiding information, commonly used in security scenarios such as ATM cards and passwords. Two cryptographic functions are supported:

  • Symmetrical encryption

  • Asymmetrical encryption

Encryption is the process of transforming information (referred to as plain text) using an algorithm (a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (referred to as cipher text in cryptography). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (such that “encryption software” will also perform decryption), that is, to make the encrypted information readable again by making it unencrypted.

Symmetrical encryption uses a single key for encryption, which both the sender and receiver will leverage to decrypt the transmissions. When data is encrypted with a symmetric algorithm, the sender generates a random symmetric key. The algorithm and the application determine the bit-length of the key. Figure 1 illustrates the symmetrical encryption process.

Figure 1. The symmetrical encryption process


Asymmetric encryption uses a key pair. The keys that make up the key pair are mathematically related and referred to as the public and private keys. Public keys are distributed freely. You can publish them to Active Directory (AD) and install them via auto-enrollment. The use of this key pair ensures that only the recipient has access to the necessary private key to decrypt the data. Figure 2 illustrates the asymmetrical encryption process.

Figure 2. The asymmetrical encryption process


The following points define the process illustrated in Figure 2:

1.
The sender obtains the recipient’s public key.

2.
Data is passed an asymmetrical encryption algorithm. It is encrypted with the recipient’s public key, producing encrypted cipher text.

3.
Cipher text is sent to the recipient, who already has the private key.

4.
The recipient decrypts the cipher text with his or her private key back into the original format.

Note: Using Symmetric and Asymmetric Encryption

Applications will generally use both encryption algorithms to encrypt data by first encrypting the data with a symmetric algorithm and then encrypting the symmetric encryption key using an asymmetric algorithm.


Two inputs are required when encrypting data:

  • The algorithm

  • The key

The algorithm defines how to convert the data to the cipher text, and the key is used to input the data into the algorithm. Figure 3 illustrates the asymmetrical signing process.

Figure 3. The asymmetrical signing process


The following steps demonstrate how in Figure 3 you can validate the sender’s identity and that the data was not altered:

1.
The data passes though an asymmetrical encryption algorithm, using the private key as the encryption key.

2.
Cipher text is sent to the recipient.

3.
The recipient obtains the sender’s public key.

4.
The recipient decrypts cipher text with the sender’s public key back to original format.

This encryption process protects the data, or payload, from being intercepted and read, viewed, or altered. If it were intercepted, the decryption process would fail, thus letting the recipient know there was a breach.

Digital signing is used to prove the source and integrity of the data. Using a hash algorithm, digitally signed data can be trusted to be the original content. Hash algorithms such as MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm 1) apply a mathematical formula to an object, resulting in output known as a hash value, message digest, or just digest. Hashes cannot be reversed, making them very useful in verifying data integrity.

 
Others
 
- Administering an Exchange Server 2007 Environment : Using the Exchange Server 2007 Toolbox
- Administering an Exchange Server 2007 Environment : Journaling and Archiving
- Administering an Exchange Server 2007 Environment : Server Administration
- Sharepoint 2010 : Making Business Intelligence Work - Excel Services
- Sharepoint 2010 : Making Business Intelligence Work - Excel Services
- Sharepoint 2010 : Getting Started with Business Intelligence
- Windows Small Business Server 2011 : Advanced Email Configuration (part 3) - Adding an Additional Email Domain Name, Changing the Maximum Message Size
- Windows Small Business Server 2011 : Advanced Email Configuration (part 2) - Using Contacts - Adding a New Mail-Enabled Contact
- Windows Small Business Server 2011 : Advanced Email Configuration (part 1) - Using Contacts - Mail-Enabling Existing Contacts
- Windows Small Business Server 2011 : Configuring and Managing Email - POP3 Email
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us