going passwordless @ stanford - internet2

58
Going Passwordless @ Stanford IAM Online Wednesday, November 13, 2019 Michael Duff, CISO, Stanford University Tom Barton (moderator), University of Chicago and Internet2

Upload: others

Post on 29-Apr-2022

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Going Passwordless @ Stanford - Internet2

Going Passwordless @ Stanford

IAM OnlineWednesday, November 13, 2019

Michael Duff, CISO, Stanford UniversityTom Barton (moderator), University of Chicago and Internet2

Page 2: Going Passwordless @ Stanford - Internet2

Make Authentication Strong

● Users are the weakest link in security○ But they were put in that position by the IT profession, which

built user access technologies around passwords

● Followed by application developers○ But they were put in that position by those who pay them, and

password credentials are easy to support (poorly)

So what’s changed?

Page 3: Going Passwordless @ Stanford - Internet2

Changing Paradigm for Logins

App

username password

Page 4: Going Passwordless @ Stanford - Internet2

Changing Paradigm for Logins

App

LDAP

Enterprise

username password

Page 5: Going Passwordless @ Stanford - Internet2

username password

Changing Paradigm for Logins

App

LDAP

Enterprisesecurity services

Page 6: Going Passwordless @ Stanford - Internet2

Changing Paradigm for Logins

App

LDAPEnterprise

security services

IdP

Federation

username password

Page 7: Going Passwordless @ Stanford - Internet2

biometric pin

Changing Paradigm for Logins

Appdevice registry

Enterprisesecurity services

Federation

crypto goodness

Appsecurity servicesWeb

IdP

webauthn

X.509

Page 8: Going Passwordless @ Stanford - Internet2

Going Passwordless@ Stanford

Page 9: Going Passwordless @ Stanford - Internet2

Vision

Page 10: Going Passwordless @ Stanford - Internet2

Incidents as Catalysts

Page 11: Going Passwordless @ Stanford - Internet2
Page 12: Going Passwordless @ Stanford - Internet2

Two Factor Authentication (Since Fall 2013)

Page 13: Going Passwordless @ Stanford - Internet2
Page 14: Going Passwordless @ Stanford - Internet2

encrypt.stanford.edu

Page 15: Going Passwordless @ Stanford - Internet2

Stanford Information Security Goals

No incidents attributable to a lack of best practices

Automated standards enforcement wherever possible

Uniform solutions across the University, Hospitals and SLAC

Balance security with usability and personal privacy

Stanford as a recognized leader in information security

Page 16: Going Passwordless @ Stanford - Internet2

MyDevices

ComplianceDatabase

ExceptionsBigFix VLRE NetDBMDM AuthLogs

Ad Hoc Reports:bi.stanford.edu

AutomatedNotifications

andEnforcement

EnrollmentApp LDAP

MyDevices Portal:mydevices.stanford.edu

High ROI

Page 17: Going Passwordless @ Stanford - Internet2

mydevices.stanford.edu

Page 18: Going Passwordless @ Stanford - Internet2

Imagine not needing to enter

your username and password

anymore, all while being

dramatically more secure…

Page 19: Going Passwordless @ Stanford - Internet2

cardinalkey.stanford.edu

Page 20: Going Passwordless @ Stanford - Internet2

Why are we doing this?

Stronger

authentication

Device

identificationUserexperience

Phishingprotection

Page 21: Going Passwordless @ Stanford - Internet2

Integration Points

• VPN

• Web SSO

• Secure Wireless

Page 22: Going Passwordless @ Stanford - Internet2

1

2 4

3

VPN Connections with Username + Password + Two-Step

Connected

Page 23: Going Passwordless @ Stanford - Internet2

VPN Connections with a Cardinal Key

1

Connected

Page 24: Going Passwordless @ Stanford - Internet2

Every 90 days

Logged In

Web Logins withUsername + Password +Two-Step

Page 25: Going Passwordless @ Stanford - Internet2

Web Logins with a Cardinal Key

Every 90 days

Logged In

Page 26: Going Passwordless @ Stanford - Internet2

Rollout

Page 27: Going Passwordless @ Stanford - Internet2

3 Years, 3 Phases

• Year 1: Infrastructure to support opt-in participation

• Year 2: UX improvements and broad adoption

• Year 3: Require for central services

Page 28: Going Passwordless @ Stanford - Internet2

Supported Platforms

Page 29: Going Passwordless @ Stanford - Internet2
Page 30: Going Passwordless @ Stanford - Internet2

Getting a Cardinal Keyin 60 Seconds

Client

cardinalkey.stanford.

edu

Install

Two-Step

WebLogin

12

34

Page 31: Going Passwordless @ Stanford - Internet2
Page 32: Going Passwordless @ Stanford - Internet2
Page 33: Going Passwordless @ Stanford - Internet2

Quid Pro Quo

Incentives• Simplified logins• Protection against credential phishing

Requirements• Must have endpoint agent• Must meet our cybersecurity standards

Page 34: Going Passwordless @ Stanford - Internet2

Adoption

Page 35: Going Passwordless @ Stanford - Internet2
Page 36: Going Passwordless @ Stanford - Internet2
Page 37: Going Passwordless @ Stanford - Internet2

Cardinal Key Stats: Past 30 Days

Page 38: Going Passwordless @ Stanford - Internet2

Opt-in Security Doesn’t Work

(even when the benefits areoverwhelmingly compelling)

Page 39: Going Passwordless @ Stanford - Internet2

Enforcement Mechanisms

• Require by user in Shibboleth

• Require by service in Shibboleth

Page 40: Going Passwordless @ Stanford - Internet2

How It Works

Page 41: Going Passwordless @ Stanford - Internet2

5 Year Lifetime

Identifies user and device

Page 42: Going Passwordless @ Stanford - Internet2

MyDevices

Mapping Cardinal Keys to Devices

Device x

Device x

Agent

Cardinal Key kis on Device x

Page 43: Going Passwordless @ Stanford - Internet2
Page 44: Going Passwordless @ Stanford - Internet2

Cardinal Key-Based Logins

Client w/Cardinal

Key

O365

ShibIdP

MyDevices

6) Require two-steponce every 90 days.

8) Device x isfully compliant.

1) Client authenticates to IdPvia HTTPS handshake.

2) Is key valid? Verify and check validity period.Check against CRL.

3) Extract key components of Cardinal Keyuser ID and device ID

4) Confirm user account isvalid and active.

LDAP5) User account isvalid and active.

9) Authentication successful.Redirect to O365 with loginassertion.

10) O365 loginassertion.

Duo

7) What is compliancestatus of device x?

CRL

Page 45: Going Passwordless @ Stanford - Internet2

Client w/Cardinal

Key

O365

ShibIdP

MyDevices

4) Require two-stepevery 90 days.

1) Client authenticates to IdPvia HTTPS handshake.

LDAP

3) User accountstatus check.

5) Auth successful. Redirect toO365 with SAML login assertion.

6) O365 SAML login assertion.

Duo

CloudPathCert Cache

2) Device posture check +Cardinal Key status check.

Device postureupdates.

Cardinal KeyStatus updates.

AWSSQS

SU AWS

On-Prem

3rd Party

Page 46: Going Passwordless @ Stanford - Internet2

CA Key Ceremony• Undisclosed location• Recording (via Zoom)• Raspberry Pi (instead of HSM) – no networking• Standard keyboard & monitor• Keys generated with OpenSSL à RAM disk• No other computing devices permitted• 10 pages of rehearsed step-by-step instructions• 7 people x 10 hours

Page 47: Going Passwordless @ Stanford - Internet2

Key Ceremony

Private Key

Wrapped key

8 chars 8 chars 8 chars 8 chars 8 chars 8 chars

A, C B, D B, CA, DC, DA, B

A, C B, D B, CA, DC, DA, B

Key Wrapping Password

Key Masters: A, B, C, D

Use Shamir Secret Sharing instead

Page 48: Going Passwordless @ Stanford - Internet2

Cert Cache

• Transactional, HA MySQL database• Feature of Shibboleth IdP• Maps cert CN à device and cert status

• REST API written in node.js• Invoked by Shibboleth IdP, MyDevices, and CloudPath

Page 49: Going Passwordless @ Stanford - Internet2

Certificate Hierarchy

• Root CA (20 yrs): cn=Stanford University MyDevices Root CA, o=Stanford University, c=US

• Intermediate CA (10 yrs): cn=Stanford University MyDevices Intermediate CA, o=Stanford University, c=US

• User/device (5 yrs): cn=userID/deviceID, title=Device Name, ou=MyDevices, o=Stanford University, c=US

– Subject Alternative Name: rfc822Name = emailAddress

Page 50: Going Passwordless @ Stanford - Internet2
Page 51: Going Passwordless @ Stanford - Internet2
Page 52: Going Passwordless @ Stanford - Internet2

SaaS Certificate Issuing Service

CloudPathIntermediate private key:Stored in CloudPath andused to generate certs

privpriv

Root CA private key:Never online and requires3 people to reassemble

User/devicecerts

Page 53: Going Passwordless @ Stanford - Internet2

Key Design Decision Summary• Campus-wide 2FA• Building MyDevices• Device-specific user certs• Certs do not convey device posture status à ID only• 5-year user/device cert lifetimes• Cert hierarchy, fields, and 4K key sizes• CA key ceremony• Requiring 2FA for cert fetch and web SSO (periodically)• SaaS cert issuing service• Cert cache infrastructure• Mapping certs to devices in MyDevices

Page 54: Going Passwordless @ Stanford - Internet2

Lessons Learned• Most calendar time consumed by design

decisions• MyDevices wildly successful, yet resource-

intensive to build• Open source platforms now available: Netflix

Stethoscope• Similar: Google’s BeyondCorp, Duo Beyond

• UX improvements have a powerful impact• Importance of branding• Opt-in security doesn’t work

Page 55: Going Passwordless @ Stanford - Internet2

Resources

• cardinalkey.stanford.edu

• uit.stanford.edu/service/mydevices

• twostep.stanford.edu

• encrypt.stanford.edu

• riskclass.stanford.edu

• minsec.stanford.edu

Page 57: Going Passwordless @ Stanford - Internet2

Please evaluate today’s session

https://www.surveymonkey.com/r/IAMOnline-Nov2019

Page 58: Going Passwordless @ Stanford - Internet2

2019 Technology Exchangehttps://meetings.internet2.edu/2019-technology-exchange/

December 9-13, 2019New Orleans, Louisiana

2020 BaseCAMPJune 23-25, 2020Milwaukee, Wisconsin