IT tutorials

Windows Server 2012 : Managing Users and Data with Dynamic Access Control - The Building Blocks of DAC , Requirements and Predeployment Pointers

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
4/20/2014 9:34:18 PM

Without question, the one major new capability that you will have to get to know at some time or another—and no matter how big or small the infrastructure—is Dynamic Access Control (DAC).

DAC provides rich, centralized control over data and user permissions through various mechanisms, including expression-based access conditions (i.e., if x condition is met, then access is granted), centralized access policies, and centralized auditing.

The reason DAC is so significant is because it reduces many of the pain points that arise when you’re trying to deploy, manage, and keep the reins on permissions throughout a Windows forest or domain. Managing Windows permissions, as many of us know, can easily spiral out of control.

Permissions, in general, have been managed through NTFS, Active Directory, and the use of groups. In many cases, a user who is not a member of a particular group needs access to a file in a shared folder belonging to that group. What often ends up happening in such cases is that unnecessary groups are created. NTFS permissions get sloppy in parent and child folders, and keeping track of which users have access to what data becomes an auditing nightmare. Not only do you face group membership bloat when access permission management gets out of control, but you also encounter the issue of security token overload. As a company grows and more users (employees) are added, very often the number of groups increases. Group and user increases invariably lead to an increase in Kerberos security tokens. These tokens are created for users and contain all the groups to which a user belongs. With Kerberos bloat, users can experience a slow login process and myriad login errors. Inherent properties of DAC help to reduce both group complexity and token bloat.

Being able to audit user access and changes to data is a good practice in any infrastructure, but it becomes crucial in organizations that are mandated to follow compliance regulations such as Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA). These are federal regulations that dictate a set of requirements for digital data in the finance and healthcare industries, respectively. These requirements include robust auditing and accountability mandates for IT staff, executives, and privacy officers so they know who is accessing what data and are able to supply reports on such activity.

Access policies and auditing aren’t new features in Windows Server, but Dynamic Access Control is. DAC allows for complex, natural-language statements on which to base access and auditing policies.

In addition, DAC introduces enhanced data classification. Documents can be automatically classified based on their content. This means, as a server administrator, you can create a rule that will classify any file that contains parameters you specify—for instance, any file containing the words “company confidential” can be classified as “sensitive” and automatically encrypted using RMS (Rights Management Services).

Even with the new and improved permissions management DAC delivers, there are still times when users may need access to a file or folder share for which they do not have explicit permissions. There also may be issues when existing NTFS permissions do not align with the newly deployed DAC. For these scenarios, Microsoft has included a feature in DAC called Access Denied Remediation. Users can request access to data that they don’t have permissions for from the data content owner or IT department. While not truly automated remediation (because the user has to send a request via email, and then IT staff or the data content owner has to configure the data appropriately), Access Denied Remediation can help reduce calls to the IT helpdesk from users seeking access to restricted content.

The Building Blocks of DAC

There are two fundamental components of Dynamic Access Control: claims and resource properties.

If I state, “I live in New York,” I am making a claim. Claims have been integrated into Kerberos authentication in Server 2012. With claims, you can identify and configure permissions for users and devices based not only on the security groups to which they belong, but also on claims you configure, such as, “This user’s security clearance is High.”

A resource property is a customizable label that you can apply to data to classify it. You can create resource properties that identify a file or folder as Sensitive, Confidential, Human Resources Group Only, or any other properties you may need to keep data safe in your organization.

Claims and resource properties are the building blocks of DAC and the components upon which central access policies and auditing are built. You can get very complex and detailed with DAC, but keep in mind that successfully deploying it begins with proper setup of claims and resource properties. In the next sections, I’ll detail the step-by-step configuration of DAC to get you up and running with this major new capability in Server 2012.

Requirements and Predeployment Pointers

Before testing and deploying DAC, you need to keep a few pointers in mind. While Microsoft touts DAC as the saving grace for many IT woes, there are problems that can still crop up with deploying DAC.

The biggest caveat is that DAC works only on Server 2012, Windows 8, and Windows RT (the tablet OEM version of Windows 8) clients. Of course, most Windows shops already have servers, Active Directory, NTFS permissions, and their entire Windows ecosystem in place. So what to do?

The expectation is that most infrastructures will add in perhaps a Windows Server 2012 domain controller and some Server 2012 file servers. This will enable use of user claims and other components of DAC within a current Windows environment. These server boxes don’t even have to be physical servers; DAC can be deployed on virtual machines.

Microsoft is also offering the Data Classification Toolkit to help deploy DAC across multiple servers in an organization. The toolkit can implement some aspects of DAC to Server 2008 R2.

Your biggest concern as a server administrator might be potential conflicts between existing NTFS permissions and DAC. Even if you bring over data from, let’s say, a Server 2008 R2 file server onto a new Server 2012 box, that data is inheriting NTFS permissions already in place. So which takes precedence: NTFS or the DAC controls?

There is one good rule of thumb to remember when you’re deploying DAC into existing Windows networks: NTFS permissions won’t give more access than a claims-based rule allows, and a claims-based rule won’t give more permission than NTFS allows. That may look convoluted on paper, but when DAC is deployed and configured with NTFS permissions, it becomes easier to see that rule in action.

I would also recommend deploying DAC in a test environment with a replication of your file servers. Again, these can be virtualized machines. Allow time for testing how and if DAC impacts your current security settings. When the time comes to deploy DAC, start with less critical data. The idea of DAC is to incorporate it gradually into existing infrastructures.

Finally, DAC can be complicated to set up. There are lots of steps and new concepts for legacy Windows server administrators to get used to. The following setup instructions detail fairly simple DAC deployments, but the idea is to get you familiarized with terms and the deployment process. Keep in mind that DAC can be used for very complex and sophisticated access control expressions and configurations.

- Windows 7 : Using BitLocker Drive Encryption
- Windows 7 : Using System Protection (part 3) - Using previous versions
- Windows 7 : Using System Protection (part 2) - Creating a restore point, Returning to a Previous Restore Point, Undoing a System Restore
- Windows 7 : Using System Protection (part 1) - Turning System Protection on or off
- Windows 8 for Business : Disk Encryption - EFS, BitLocker and BitLocker To Go
- Windows 8 for Business : Domain Join and Group Policy
- Windows 8 : Customizing the Start Screen (part 5) - Adding Shutdown and Restart Tiles to the Start Screen, Customizing the Start Screen Background
- Windows 8 : Customizing the Start Screen (part 4) - Pinning a Website to the Start Screen,Displaying the Administrative Tools on the Start Screen
- Windows 8 : Customizing the Start Screen (part 3) - Turning Off a Live Tile, Pinning a Program to the Start Screen
- Windows 8 : Customizing the Start Screen (part 2) - Creating an App Group
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us