Website under construction



Download 13,37 Mb.
Pdf ko'rish
bet111/131
Sana27.03.2022
Hajmi13,37 Mb.
#512480
1   ...   107   108   109   110   111   112   113   114   ...   131
Bog'liq
9780735697744 Introducing Windows Server 2016 pdf

Figure 4-6:
The new bastion forest and PAM Trust in PAM 
PAM provides the ability to isolate the use of privileged accounts by storing them in this bastion 
forest and making it more difficult for attackers to gain privileged access. MIM is used to provide 
methods for users to be able to securely request and obtain administrative privileges when they need 
them. After being “approved” by MIM’s workflows, a shadow security principle is provisioned in the 
bastion forest. These shadow security principals are “linked” via a reference that is stored in an Active 
Directory attribute that essentially points to a SID of a privileged group in the original forest. 
Users can request the privileged access by the following methods: 

The MIM Services Web API 


124 
CHAPTER 4 | Security and identity 

A REST Endpoint 

Windows PowerShell (using the New-PAMRequest cmdlet) 
These simple methods can be integrated into other tools like automation runbooks and ticketing 
systems to provide further control on the overall process. 
Earlier in this chapter, we mentioned the concepts and technology of JIT and JEA, PAM is a way of 
implementing this for your environment. Like JIT and JEA, PAM provides time-bound privileges to the 
request account and, of course, link it to the privileged group that has the necessary permissions to 
perform the task. 
You also can adjust the Kerberos ticket lifetime to ensure it has the lowest possible Time-to-Live (TTL) 
value. This way, if you sign in and receive a Kerberos ticket, its lifetime will be bound to the time 
remaining from the total amount of time PAM has granted you access to the privileged group. 
PAM also comes with a variety of new monitoring features to provide greater insight with respect to 
who requested access, what type of access was actually granted, and, more important, what activities 
that person performed during the privileged-access assignment. 
You can view this information MIM or in the Event Viewer, or if you already have System Center 
Operations Manager 2012 provisioned and use the Audit Collection Services, you can create 
visualizations of the information. Other third-party tools and Operations Management Suite (OMS) 
will be able to visualize the information in the future, as well. 

Download 13,37 Mb.

Do'stlaringiz bilan baham:
1   ...   107   108   109   110   111   112   113   114   ...   131




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish