ad-assurance - Re: [AD-Assurance] Friday's call
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: Ann West <>
- To: "" <>
- Subject: Re: [AD-Assurance] Friday's call
- Date: Thu, 18 Apr 2013 12:53:32 +0000
- Accept-language: en-US
- Authentication-results: sfpop-ironport04.merit.edu; dkim=neutral (message not signed) header.i=none
I would hope that FICAM would be a very remote option. Negotiations could take months and given our discussion yesterday, affect 800-63 as much as the FICAM program. This option is extreme in my book and only happens if we have no place to turn.
Agree with David that the next step is finishing off our matrix, developing our questions for MS and engaging Dean to confirm our identified gaps and mitigation strategies, requesting that he take the remaining issues back to MS for discussion. Once we
hear back, we can proceed on deciding whether we can assemble a "good enough" set of solutions, maybe with short and long term time frames.
Ann
From: Eric Goodman <>
Reply-To: "" <> Date: Wednesday, April 17, 2013 8:56 PM To: "" <> Subject: RE: [AD-Assurance] Friday's call I think this is a good re-orienting suggestion. I lean towards proposing #4 directly with FICAM, perhaps in combination with the “monitor and mitigate” approach. I have a hard time believing that
FICAM would blanket refuse AD-based solutions for 800-63/Silver LoA2 certification, as that would be a major blow to adoption.
I’m not at all a fan of lowering security for ease of implementation, but I really have to wonder whether campuses that use AD would ever apply for
Silver certification if AD was ruled out based on what we’ve found. I would think that this would be a fairly drastic step, and/or would need to be done based on positive evidence of AD being a problem. Even if your first strategy (ask Microsoft for a solution) works, it sounds like there’s a very good chance the solution will include “upgrade all
of your workstations to Windows 8”, which would likely go over just as well at the campus level as forbidding AD outright. If we do get the okay on #2 + #4, can InCommon develop (or host) utilities that would assist in doing the required monitoring? I believe the suggestion of “higher entropy passwords” was two-fold: (a) it creates potentially greater challenges to brute force decrypting and
(b) older NTLM style hashes can only be created for 14 character or shorter passwords. Essentially, I think they were partially saying that selecting a 15 character password implicitly disables many of the lower security mechanisms, even if your AD domain
policy does not enforce stronger methods on a global level. --- Eric From:
[]
On Behalf Of David Walker Everyone,
|
- [AD-Assurance] Friday's call, David Walker, 04/17/2013
- RE: [AD-Assurance] Friday's call, Eric Goodman, 04/17/2013
- Re: [AD-Assurance] Friday's call, Ann West, 04/18/2013
- RE: [AD-Assurance] Friday's call, Curry, Warren, 04/18/2013
- Re: [AD-Assurance] Friday's call, David Walker, 04/18/2013
- RE: [AD-Assurance] Friday's call, Eric Goodman, 04/18/2013
- Re: [AD-Assurance] Friday's call, David Walker, 04/18/2013
- RE: [AD-Assurance] Friday's call, Curry, Warren, 04/18/2013
- Re: [AD-Assurance] Friday's call, Ann West, 04/18/2013
- RE: [AD-Assurance] Friday's call, Eric Goodman, 04/17/2013
Archive powered by MHonArc 2.6.16.