Friday, May 8, 2015
Windows 10 Microsoft Passport (aka Microsoft Next Generation Credential) In Detail » Active Directory Security
At the Microsoft Ignite conference this week, there are several
sessions covering Windows 10 features. One of biggest changes in Windows
10 is the new credential management method and the related “Next
Generation Credential”, now named Microsoft Passport.
There hasn’t been much information on how the new credential system
works, so I challenged myself to gather as much information and
understand it as best as possible before the Microsoft Ignite conference
ends this week. This post covers my understanding of this (still beta)
technology.
Note that the information in this post is subject to change
(& my misunderstanding). As I gain clarification, I will update this
post.
Traditional Windows Credential Management
Up until Windows 10, when a user logs on, the user’s credentials are verified, hashed, and loaded into LSASS (Local Security Authority Subsystem Service),
a process in protected memory. The user credential data is stored in
LSASS for authenticating the user to network resources without having to
prompt the user for their password. The issue is that up until Windows
8.1, the user’s clear-text password (reversible encryption) is no longer
placed in LSASS, though the user’s NTLM password hash, among others,
are still stored in LSASS. When using Kerberos, the user’s Kerberos
tickets are stored in LSASS. More....
Windows 10 Microsoft Passport (aka Microsoft Next Generation Credential) In Detail » Active Directory Security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment