AWS re:Inforce 2024 -Secure and increase mobile workforce productivity with AWS for MDM (DAP201-NEW)

AWS Events
14 Jun 202455:56

Summary

TLDRこのビデオスクリプトでは、AWSのプライベートCA(Certificate Authority)サービスとその新しい機能、モバイルデバイス管理(MDM)ソリューションとの連携について紹介しています。デモンストレーションを通じて、AWSプライベートCAの設定方法や、新しいコネクタを使用してMDMと連携し、モバイルデバイスに証明書を発行するプロセスがわかりやすく説明されています。また、AWSプライベートCAの利点、セキュリティー対策、およびさまざまなエンタープライズ利用事例も紹介されています。

Takeaways

  • 🌟 AWSプライベートCA(Certificate Authority)は、クラウドベースのマネージドサービスで、エンタープライズのセキュリティと生産性を向上させるために設計されています。
  • 🛡️ AWSプライベートCAは、HSM(Hardware Security Module)でバックアップされた秘密キーを提供し、エンタープライズのセキュリティ基準を満たします。
  • 🔧 MDM(Mobile Device Management)ソリューションとAWSプライベートCAを組み合わせることで、モバイルデバイスのセキュリティと管理を強化できます。
  • 📲 SCEP(Simple Certificate Enrollment Protocol)コネクタを使用することで、MDMと連携してモバイルデバイスに証明書を登録することが可能です。
  • 🔑 AWSは複数の証明書サービスを提供しており、ACM(Amazon Certificate Manager)を使用することで、AWSプライベートCAから発行されたプライベート証明書を簡単にプロビジョニング、管理、デプロイできます。
  • 🤖 AWSプライベートCAは、自動化されたAPIとSDKを提供しており、開発者の迅速な証明書の発行と管理を可能にしています。
  • 🏢 エンタープライズでは、AWSプライベートCAを利用して、AWS内外のリソース、ユーザー、デバイス、サービスメッシュ、コンテナ、IoTデバイスなどへの安全なアクセスを提供できます。
  • 📈 AWSプライベートCAは、証明書の発行、失効、有効性の監査ログを提供し、コンプライアンスとセキュリティ監査のニーズに対応しています。
  • 🌐 世界中のAWSリージョンで利用可能で、エンタープライズは地理的な分散を考慮した証明書の発行と管理を行うことができます。
  • 💰 AWSプライベートCAは、従量課金制であるため、証明書の発行に応じてのみ費用が発生し、コスト管理が容易です。
  • 🔄 AWSプライベートCAは、エンタープライズのニーズに応じて柔軟にスケールすることができ、高可用性を維持しながら証明書のニーズに対応しています。

Q & A

  • AWSプライベートCAとはどのようなサービスですか?

    -AWSプライベートCAは、クラウドベースの秘密キーがHSM(ハードウェアセキュリティモジュール)でバックアップされるマネージドCAソリューションです。これにより、企業はAWSの管理されたサービスを利用して、プライベートキーの運用コストと複雑さを削減できます。

  • MDMソリューションとは何で、どのような利点がありますか?

    -MDM(モバイルデバイス管理)ソリューションは、企業の管理者がモバイルデバイスにポリシーを適用し、管理するためのツールです。MDMを利用することで、従業員の生産性が向上し、企業はデバイスの発行にかかるコストを削減できます。

  • AWSプライベートCAのコネクタとは何ですか?

    -AWSプライベートCAのコネクタは、AWSプライベートCAを他の環境で使用するためのブリッジ機能です。例えば、Active DirectoryやKubernetesなどの環境で証明書を自動的に発行するために使用されます。

  • セキュアエンドポイントとは何を意味していますか?

    -セキュアエンドポイントとは、AWSプライベートCAが提供するエンドポイントで、これによりエンドポイントに対するリクエストが認証され、証明書が発行されることを意味しています。

  • AWSプライベートCAの証明書サービスにはどのような種類がありますか?

    -AWSには、ACM(Amazon Certificate Manager)、AWSプライベートCA、およびAWS Certificate Manager Private CAという証明書サービスがあります。それぞれ異なる機能と用途を持っています。

  • 証明書の有効期間や使用目的をカスタマイズすることはできますか?

    -はい、AWSプライベートCAでは証明書の有効期間や使用目的をカスタマイズすることができ、またAPIやSDKを介して自動化することも可能です。

  • AWSプライベートCAで発行された証明書はどこで利用できますか?

    -AWSプライベートCAで発行された証明書は、AWSの様々なサービスやオンプレミスのアプリケーション、IoTデバイス、サービスメッシュ、コンテナなど、多岐にわたる環境で利用できます。

  • AWSプライベートCAのセキュリティー対策には何がありますか?

    -AWSプライベートCAはHSMでの秘密キーの生成と署名、IAMポリシーによるアクセス制御、監査ログの提供など、包括的なセキュリティー対策を提供しています。

  • 証明書の失効や更新はどのように管理されますか?

    -AWSプライベートCAでは、証明書の失効や更新は自動化されたプロセスによって管理され、またOCS PやCRLを使用して証明書の状態を確認することができます。

  • AWSプライベートCAの料金モデルはどのようなものですか?

    -AWSプライベートCAは、証明書の発行に応じた料金モデルに基づいて課金されます。そのため、証明書を発行しない月では証明書に関する料金は発生しません。

Outlines

00:00

😀 ウェルカムとAWSプライベートCAの紹介

Daniel ChoiとDave GuptaがAWSプライベートCAとモバイルデバイス管理について話す。新しいAWSプライベートCAのパブリックプレビューが発表された。これはモバイルデバイスの登録に使用されるHSMバックアップのプライベートキーを備えたクラウドCAソリューションを提供する。このサービスはPKIの操作コストと複雑さを削減し、エンドポイントやチャレンジパスワードなどの管理を不要としている。また、AWSプライベートCAはエンタープライズ全体のプライベートCAソリューションとして機能する。

05:01

🔒 AWSプライベートCAの利点と管理の難しさ

AWSプライベートCAは自己管理された証明書と比べて、PKIの複雑さを解消し、セキュリティを向上させる。自己管理されたPKIシステムを持つ場合、証明書の管理と運用が非常に困難であることが示されている。AWSプライベートCAは、APIとSDKを通じて自動化を促進し、コストも削減している。

10:01

📱 モバイルデバイス管理とAWSプライベートCAコネクタの機能

AWSプライベートCAコネクタは、モバイルデバイス管理ソリューションと連携し、エンタープライズのモバイルデバイスをセキュリティーに保護する。コネクタはシンプルな証明書登録プロトコル(SCEP)を使用して、MDMソリューションと連携し、エンドポイントやクライアントに証明書を発行する。MDMは企業のモバイルデバイスに対するポリシーの適用と制御を可能にする。

15:01

🛠️ コネクタの種類とMicrosoft Intuneとの連携

コネクタには一般用途とMicrosoft Intune専用のタイプがある。一般用途のコネクタはSCEPに対応したエンドポイントやアプリケーションと連携し、IntuneタイプのコネクタはMicrosoft Intuneと連携する。Intuneで管理されるチャレンジパスワードを使用する。このセクションでは、コネクタの作成方法とIntuneへのアクセス権の設定について説明している。

20:01

🔄 プライベートCAの作成とアクティベーション

AWSプライベートCAの作成プロセスとアクティベーションについて説明している。CAを作成し、アクティベーションのためにCA証明書をインストールする。アクティベーション後にCAを使用して証明書を発行できるようになる。このセクションでは、CAの作成方法とその利便性について強調している。

25:02

🔗 コネクタの作成とSCEPの設定

コネクタの作成方法とSCEPの設定について説明している。コネクタを作成することで、エンドポイントが作成され、SCEPリクエストが可能になる。また、チャレンジパスワードの管理方法やローテーションの方法についても触れている。

30:03

🌐 Microsoft Intuneへのアクセス設定

Microsoft Intuneとコネクタの連携方法について説明している。Azure Portalでアプリの登録を行い、コネクタに必要なアクセス許可を設定する。このセクションでは、Intuneへのアクセス権の設定手順が詳細に説明されている。

35:03

📜 Intuneでの構成プロファイルの作成

Microsoft Intuneで構成プロファイルを作成し、デバイスに証明書を展開する方法について説明している。信頼されたルートCA証明書とSCEP証明書プロファイルを作成する手順が紹介されている。

40:06

🖥️ WindowsマシンのIntune登録と証明書の展開

WindowsマシンをMicrosoft Intuneに登録し、そこに証明書を展開するプロセスについて説明している。デバイスがIntuneに登録されると、自動的にCA証明書とSCEP証明書が展開される。

45:07

🔄 コネクタの種類とプライベートCAの機能

AWSプライベートCAの他のコネクタタイプとその機能について説明している。Active DirectoryやKubernetesと連携する方法が紹介されており、プライベートCAの一般的な使用例とその利便性が強調されている。

50:08

🛡️ AWSプライベートCAのセキュリティと管理

AWSプライベートCAのセキュリティ機能と管理の方法について説明している。HSMの使用、IAMポリシー、OCS Pの管理、監査ログの提供など、プライベートCAのセキュリティー対策が詳細に紹介されている。

55:10

🎯 AWSプライベートCAの概要と利便性

AWSプライベートCAの全体像と利便性について要約している。カスタマイズ性、セキュリティー、管理の容易さ、開発者のアジリティ、そしてエンタープライズでの幅広い使用例が強調されている。

Mindmap

Keywords

💡AWS Private CA

AWS Private CAは、Amazon Web Servicesが提供するマネージドな証明書発行機関(CA)サービスです。主に企業のセキュリティと運用の効率を向上させるために使用され、HSM(ハードウェアセキュリティモジュール)でバックアップされたプライベートキーを使用して証明書を発行します。ビデオでは、モバイルデバイス管理(MDM)ソリューションと組み合わせて使用する方法が説明されています。

💡MDM(モバイルデバイス管理)

MDMは、企業がモバイルデバイス(スマートフォン、タブレット、ラップトップなど)を管理し、セキュリティポリシーを適用するためのソリューションです。ビデオでは、AWS Private CAとMDMソリューションを統合することで、モバイルワーカーの生産性とセキュリティを向上させる方法が説明されています。

💡HSM(ハードウェアセキュリティモジュール)

HSMは、暗号鍵を安全に生成、管理、保存するための専用ハードウェアです。AWS Private CAでは、HSMを使用してプライベートキーを管理し、そのセキュリティを確保しています。ビデオでは、HSMの重要性とそのコストが議論されています。

💡証明書

証明書は、デジタル通信においてデータの暗号化とエンドポイントの認証を行うために使用されるデジタル文書です。ビデオでは、AWS Private CAを使用して証明書を発行し、MDMソリューションでモバイルデバイスに配布する方法が説明されています。

💡証明書の発行

証明書の発行は、証明書発行機関(CA)がデジタル証明書を生成し、依頼者に提供するプロセスです。AWS Private CAは、APIを通じて自動化された証明書発行をサポートし、MDMソリューションとの統合が可能です。

💡API

API(Application Programming Interface)は、ソフトウェア間の通信を可能にする一連の定義とプロトコルです。AWS Private CAは、証明書の発行や管理を自動化するためのAPIを提供しています。ビデオでは、APIを使用して証明書を発行する手順が紹介されています。

💡セキュリティ

セキュリティは、データやシステムの保護を指し、特に不正アクセスやデータ漏洩から守ることを意味します。AWS Private CAは、HSMを使用することで高度なセキュリティを提供し、ビデオではその利点が強調されています。

💡スケーラビリティ

スケーラビリティは、システムが負荷や規模の増加に応じて効率的に拡張できる能力を指します。AWS Private CAは高いスケーラビリティを持ち、毎日150万件以上の証明書を発行できるとビデオで説明されています。

💡コスト効率

コスト効率は、特定の成果を達成するための費用対効果を指します。ビデオでは、AWS Private CAを使用することでPKI運用のコストと複雑性を削減できることが説明されています。

💡カスタマイズ

カスタマイズは、特定の要件やニーズに合わせてシステムやサービスを調整することを指します。AWS Private CAは、証明書の内容や設定をカスタマイズする機能を提供しており、ビデオではその柔軟性が紹介されています。

Highlights

AWS宣布推出AWS Private CA(Certificate Authority)的公共预览版,允许用户使用AWS管理的云CA解决方案,每个私钥都由HSM支持。

使用AWS Private CA可以减少PKI操作成本和复杂性,同时提供完整的管理服务。

AWS Private CA提供了一系列连接器,包括对SCE的支持,允许用户在企业范围内使用单一私有CA解决方案。

介绍了证书的两个主要用例:数据传输加密和端点身份验证。

AWS提供了多种证书服务,包括ACM(Amazon Certificate Manager)、AWS Private CA和AWS Certificate Manager的私有CA。

如果不使用AWS Private CA,自我管理CA可能面临复杂性、手动流程、缺乏自动化和成本问题。

AWS Private CA是一个高度可用的CA服务,可以设置PKI层次结构,无需持续成本和维护。

AWS Private CA与许多AWS解决方案和服务集成,简化了使用IAM证书等操作。

介绍了OS Private CA Connector for SCEP,允许使用AWS Private CA与支持SCEP的应用程序、客户端和端点一起使用。

MDM(Mobile Device Management)解决方案允许企业管理移动设备,提高生产率并降低成本。

创建Connector for SCEP的过程简单,可以快速设置与MDM解决方案的集成。

介绍了Connector for Microsoft Intune,专门设计用于与Microsoft Intune一起工作。

展示了如何创建和配置Connector for SCEP,以及如何在Microsoft Intune中设置访问权限。

演示了如何使用MDM解决方案和Connector for SCEP来注册设备并获得证书。

讨论了Connector for Active Directory和Connector for Kubernetes,它们允许AWS Private CA用于不同企业用例。

AWS Private CA支持从物联网设备到TLS、身份验证等不同场景的证书发行。

AWS Private CA提供集中管理CA的能力,简化了CA的查找和管理。

AWS Private CA提供按使用付费的定价模式,只有在发行证书时才产生费用。

AWS Private CA支持数据隐私和保护的合规性,适用于高度监管的行业。

总结了AWS Private CA的主要优势,包括安全性、可扩展性、自动化和易用性。

Transcripts

play00:01

All right, good morning everyone.

play00:03

Thank you for joining. Hope

play00:06

you've had a good conference so far.

play00:08

Uh We're here. Uh My name is Daniel

play00:10

Choi. I'm a product manager

play00:12

for Aws Private C A

play00:14

and with me is, hi, I'm Dave

play00:16

Gupta. I'm a senior software engineer on the private

play00:18

C A team. And today we're gonna be talking

play00:21

about securing and increasing the

play00:23

productivity of your mobile workforce

play00:25

by using Aws

play00:26

with mobile device management or MD

play00:28

M solutions.

play00:31

So

play00:32

let me get started here.

play00:35

So yesterday, we happily announced

play00:38

the launch of public preview of

play00:40

Aws private C A or certificate

play00:43

authority connector for

play00:45

basically what this allows you to do is

play00:47

use Aws private CAA managed

play00:50

cloud C A solution where

play00:52

every private key is HSM backed

play00:54

and use it with your mobile

play00:57

device management solution to enroll

play00:59

mobile devices, whether it is phones,

play01:02

tablets or laptops,

play01:05

you know, by using Aws Private C A,

play01:07

you get to reduce your PK I operational

play01:10

cost and complexity is a managed

play01:12

solution.

play01:13

Um And not only that the ske

play01:15

service that we launch is also managed

play01:17

giving you everything you need.

play01:19

You know, the end point, the challenge pass was

play01:21

all of that without you having to do

play01:23

anything to build out the

play01:26

underlying infrastructure

play01:28

and our maintenance of it.

play01:30

And lastly, the connector for S CE

play01:32

is part of a portfolio of connectors that

play01:34

AWS private C A offers. This

play01:36

means it allows you to have

play01:38

a single private C A solution for your

play01:40

enterprise, whether it is for

play01:43

securing your Aws resources,

play01:45

users and machines and active directory

play01:47

workloads and

play01:49

Kernes and now mobile devices.

play01:52

So before we jump into that, just to give you a high

play01:54

level of what we're talking about today,

play01:56

just to ground everyone on this topic,

play01:59

we're gonna talk about certificates, certificate,

play02:02

authorities. Then we'll jump right into

play02:04

connector first step. Why use mobile

play02:06

device management solutions?

play02:08

Um And how does the connector actually

play02:10

work as well as providing a quick

play02:12

demo?

play02:14

Then we'll wrap up overview

play02:16

of the other connectors within the private

play02:18

C connector family and a quick

play02:20

couple slides on AWS private

play02:22

C A itself just so you get a better understanding

play02:25

of what it is.

play02:28

So just to ground, like I said, just to ground

play02:30

folks, why do, why do you need certificates?

play02:32

Really? Two main use cases, right.

play02:34

Encrypting data and transit

play02:36

and identifying authenticating end points.

play02:39

When you talk about encrypting data and transit,

play02:41

you know, we're very familiar with public certificates,

play02:44

right? This is what websites like amazon.com

play02:48

gets so that your browser can trust

play02:50

that when you visit it, it's, it's a legitimate

play02:53

trusted website,

play02:54

right? If you've ever gone to a website where the certificate

play02:56

expired, you'll see that big

play02:58

error in your browser that says, hey, are you sure you want

play03:00

to proceed?

play03:02

Right. And uh similar to

play03:04

public certificates that are used

play03:06

to secure

play03:07

communication with websites and web

play03:10

applications, private certificates,

play03:12

secure and identify things

play03:14

within your enterprise, like

play03:17

devices, users, machines,

play03:20

uh containers, uh and so forth.

play03:25

So, Debbie, can you tell us a little bit about

play03:27

the certificate services at Aws?

play03:29

Definitely. So Aws has

play03:32

uh a number of certificate services that are offered that can

play03:34

fit your organization's needs.

play03:36

The first one is AC M

play03:38

so AC M is Amazon certificate manager.

play03:40

Amazon certificate manager will let you easily provision,

play03:43

manage and deploy public and private

play03:45

certificates. What that means is you can hook

play03:47

up uh AC M with your Aws

play03:49

private C A which we'll talk about next

play03:51

and it'll let you issue private certificates as well.

play03:54

And once you've issued a certificate through AC

play03:56

M, you can actually use it to

play03:59

uh deploy certificates out to

play04:01

other A TS integrating partners such

play04:03

as uh

play04:05

API gateway and A lb. Amazon

play04:07

load bouncer

play04:09

next. You have IDI was private C A.

play04:11

So it was private C A is what

play04:13

this talk is going to be all about. It's a highly available

play04:16

uh C A service. It lets you set

play04:18

up A PPK I hierarchy without

play04:20

the ongoing cost maintenance, specialized

play04:23

staff that's usually required to have your

play04:25

own PK I system.

play04:27

And then finally, with a of a signer, this is, this

play04:30

is code signing. So uh this allows

play04:32

organizations to really check where does their

play04:34

code packages come from and make sure it's from a trusted

play04:36

uh verified source. A very common

play04:38

use case for this we see in our customers is

play04:41

uh with containers.

play04:43

So again, the talk today is really gonna be focused on

play04:45

Abu Private C A. So before

play04:48

we talk about Abu Private C A though, I want to talk a little

play04:50

bit about the challenges of not

play04:52

using Abu Private C A if you're self managing

play04:54

your certificate authorities.

play04:56

So first of all PK I is complex.

play04:58

Um a story I like to tell on this

play05:00

one is there's customers

play05:03

that we've talked to a customer anecdote we

play05:05

have is they came to us and

play05:07

said before we're using eight of us private C A, they

play05:09

were not sure where all their

play05:11

cas were.

play05:12

They talked to their PT I team and

play05:14

their PK I team also told them that

play05:16

there's CAS that are kind of scattered throughout the organization.

play05:19

And some of those uh cas were root cas that

play05:21

were actually issuing

play05:23

uh

play05:24

and entity certificates. So if you manage your

play05:26

own PT I, you might know that's, that's usually

play05:28

against best practice. Root root C

play05:30

A should be issuing subordinate uh C A certificates.

play05:33

And so they decided, hey, we're gonna

play05:35

stop this practice and they decided to self

play05:37

manage and figure out how to do that.

play05:39

They went on a 18 month campaign

play05:41

across the organization to figure out where all their CAS

play05:44

were kind of audit what they were issuing

play05:46

and they thought they had solved the problem 18 months later,

play05:48

six months after that. So we're 24 months in

play05:50

now. They found out actually

play05:53

the problem wasn't solved. They, uh the, the

play05:55

root cas, there were still CAS that they didn't know about

play05:57

and their root cas were, were still

play05:59

issuing an entity certificates. This is all

play06:01

just to illustrate that

play06:03

even with the best intentions, your PT

play06:05

I team inside your organization can have a hard time

play06:07

managing and operating a PT

play06:10

I of their own.

play06:12

Next one, there's a lot of manual processes. Everything I just

play06:14

described sounded very manual. There's also

play06:16

things like ceremonies that go into managing

play06:18

your own C A

play06:20

uh A ceremony is where

play06:22

you would have to reissue AC

play06:24

A certificate or maybe rotate your C A certificate

play06:27

and it's, it's a very difficult thing

play06:29

to do. You end up having a lot of PKI

play06:31

experts in your organization all

play06:33

get in a room, do a bunch of auditing,

play06:36

go through a bunch of manual steps, all this very

play06:38

difficult to automate and it ends up slowing

play06:40

down your organization.

play06:43

Next one, it doesn't really facilitate automation.

play06:45

So if you're managing your own,

play06:47

uh if you're managing your own C A, you

play06:49

don't have API S usually you don't have an SDK

play06:52

that you can just call. It, ends up slowing down your

play06:54

developers. And like I said, ceremonies are

play06:56

a great example of something that just cannot be automated.

play06:59

Finally, there's cost. So this is the big one that customers

play07:01

talk about uh managing your own C A can be very,

play07:03

very expensive.

play07:05

Um A example that I like to give

play07:07

on this one is that it is about

play07:09

H SS M. So if you have your own C A

play07:11

and HSM is a hardware security module

play07:13

that you need to store your private key securely.

play07:16

If you will go and buy your own HSM,

play07:18

you're looking at 2025 $30,000

play07:21

for a single HSM.

play07:23

Now, if your organization wants redundancy,

play07:25

double or triple that, now if you want high availability,

play07:27

maybe double, triple that. So you're looking at possibly

play07:30

tens of thousands of dollars in just

play07:32

infrastructure costs. Now, you have your

play07:34

staff, now you have your specialized team,

play07:37

all this stuff adds up very quickly.

play07:39

Uh We had a customer tell us that

play07:41

they were self managing their own HSM. They

play07:43

actually spent 25 $50,000

play07:46

on HS MS.

play07:47

Their organization tried to do a firmware

play07:49

update when they did the firmware update.

play07:51

They found out that they accidentally bricked their HSM

play07:53

because again, it's very difficult to self manage these things.

play07:56

They bricked their HSM. Next thing they know

play07:58

they were out, uh a bunch of money and they had to

play08:00

start all over, which goes to show you some of the challenges

play08:03

that come with traditional cas.

play08:05

But now we're gonna talk a little bit about private

play08:08

C A and how it's a little bit different. Dan will walk us through that.

play08:11

Yeah, thanks Debbie.

play08:12

So how is privacy different

play08:14

than what we just call traditional cas.

play08:17

Well, first it's a managed

play08:19

solution where we take the undifferentiated,

play08:21

heavy lifting of managing PK

play08:24

I operating PK I off of your hands,

play08:26

right? So we're talking all that underlying

play08:28

infrastructure, databases servers,

play08:31

you know the HS MS, all that gone.

play08:33

We do it for you, right? So,

play08:36

and then in addition to that,

play08:38

uh as Devi said, we help

play08:40

you be secure. We every private

play08:42

key is generated in HSM

play08:44

signing happens in HSM and they're not

play08:46

exportable. So no worries that

play08:48

the private key leaks and you have ac a compromise

play08:52

if you talked about

play08:53

traditional Cas typically

play08:56

don't have your API S. Well,

play08:58

we are API for service

play09:00

issuing certificates, revoking them,

play09:03

that's all doable through automation.

play09:07

And then we also have high scalability,

play09:09

right? So if you run into a place

play09:11

where your traditional C A starting to run out of

play09:14

capacity uh issuance rate,

play09:16

um you're gonna have to go in

play09:18

and invest in that hardware and

play09:20

infrastructure again here. You know,

play09:22

we support everything

play09:24

from IOT devices for like the matter

play09:26

smart home standard where we issue

play09:28

tens of millions of certificates

play09:30

uh, to enterprise use cases, right. Active

play09:33

directory, Kubernetes

play09:34

and,

play09:35

uh, Aws private C A issues on average

play09:38

about more than 1.5 million certificates

play09:40

a day, including internal certificates

play09:42

as well. That means over half

play09:44

a billion certificates a year,

play09:46

including internal certificates.

play09:50

And then lastly,

play09:51

yes, you can set up ac A, yes, you can

play09:53

set up your PP I, but I want to use it with these

play09:55

different use cases, whether it's service

play09:58

measures or whether it is with

play10:01

uh active directory or whether it's with

play10:03

my mobile device management solution.

play10:05

Uh Well, Aws privacy is

play10:07

integrated with a lot of solutions

play10:09

and services within Aws

play10:11

making it easier for you to do things like use.

play10:13

I am with certificates for even

play10:15

workloads that aren't even in Aws.

play10:21

So let's jump into the main topic

play10:23

of our talk today

play10:25

which is a OS privacy at connect to

play10:27

fork. So what does

play10:29

it really do at the end of the day?

play10:31

It allows you to use Aws private

play10:33

C A with SCP compatible

play10:35

applications, clients end points

play10:38

typically that means mobile device management

play10:40

solutions.

play10:41

Um I'm gonna take one step back

play10:43

and talk about the connectors overview, which

play10:45

is what our connectors, right? Aw. Private

play10:47

C A just told you is a manage solution

play10:50

scales great high availability

play10:52

but connectors allow you to use private C A in

play10:54

environments that have a natural

play10:57

uh native established certificate

play10:59

distribution solution.

play11:00

That's a mouthful. What does that mean?

play11:03

Basically you can think about things like

play11:05

active directory, right? It has auto enrollment.

play11:08

It just works. You put a user group

play11:10

and user machine into a group,

play11:12

they get a certificate every news

play11:14

by itself,

play11:16

uh Kubernetes. If you're using that, there's a cert

play11:18

manager a on, it's a free open source

play11:20

ad on certificate. Life cycle management

play11:22

does a fantastic job of making

play11:24

sure your certificates get to the right places

play11:27

and also stays valid.

play11:29

And so really by using connectors, you

play11:31

get, you can use Aws privacy

play11:34

as a single C A solution for

play11:36

a variety of your enterprise use cases.

play11:38

Now back to what I was saying a moment ago,

play11:41

what is connected for sep basically,

play11:43

you can use it with SEP compatible endpoints, clients

play11:45

applications.

play11:47

Usually this means mobile device management solutions.

play11:50

And uh

play11:52

S ce P stands for simple certificate enrollment protocol

play11:55

just in case you weren't aware of that.

play11:57

And that is what a lot of MD M solutions

play11:59

have adopted for enrolling certificates.

play12:02

So I'm gonna talk a little bit about MD MS, right?

play12:04

So we talked about uh improving

play12:07

productivity, being able to use it. What

play12:09

is an MD M? Why should you even consider

play12:11

it? We'll give you a high level,

play12:13

you know, rundown of it, but basically allows

play12:16

you your enterprise administrators

play12:18

to control and enforce

play12:20

policies on mobile devices.

play12:23

So whether it's corporate issued or

play12:25

you bring your own device like I do for work

play12:27

now, they can set uh rules

play12:29

such as

play12:30

hey, you have to have a pass code, it has to be eight

play12:32

digits long. You can't have certain apps

play12:34

on it, things like that.

play12:37

It also provides some information

play12:39

back to you to say, hey, are any devices

play12:41

in a state that is less secure? Maybe it's

play12:44

in a weird IP location, things like

play12:46

that. So it provides that kind of information

play12:48

as well. And then lastly for that example,

play12:50

where I bring my own device to work, I

play12:52

want a clear separation between

play12:55

my work data and my personal data.

play12:57

And I don't need Amazon

play12:59

uh data mingling with the

play13:01

social media apps that I'm using, right?

play13:05

And bringing on a device is actually the most

play13:07

common use case that we've

play13:09

heard, right? And why would that be?

play13:11

So first thing uh

play13:13

we found out or learned is

play13:15

we, you know, it's up to 34%

play13:17

higher productivity when you allow your employees

play13:20

to use mobile devices,

play13:22

right? So that means hey, I get to be on

play13:24

block because I have a question or I need an approval

play13:26

that can happen on the go.

play13:28

Um

play13:30

In addition to that, you could save up to

play13:32

$350 per

play13:34

employee compared to issuing

play13:36

a corporate uh owned device, right?

play13:39

So going out and buying a mobile device and giving

play13:41

it to your employee compared to that can save

play13:43

a little bit of money.

play13:44

So higher productivity, lower

play13:47

cost,

play13:48

that's one of the biggest reasons why we see bring

play13:50

your own device as uh uh a major

play13:52

use case.

play13:53

So Debbie, do you wanna tell us a little

play13:55

bit about the connector itself? Yeah,

play13:57

definitely. So like Dan said, we're excited to be talking

play13:59

about the connector for skep today.

play14:01

Uh So when you're creating a connector for ke

play14:03

you really have two choices, you can create two

play14:05

types. The first one is gonna be a general purpose

play14:07

connector. So let's talk about that. First,

play14:10

a general purpose connector is designed

play14:12

to work

play14:13

with end points that support skip.

play14:15

Now there's a couple of use cases here. Uh The

play14:17

first one is mobile device management.

play14:20

So mobile device management means that you

play14:22

can use uh the general purpose connector

play14:24

with uh

play14:26

with MD M such as Jam Pro or

play14:28

Airwatch.

play14:29

Uh Another C compliant MD MS,

play14:32

you can use it with network gear routers, printers,

play14:34

whatever other gear that you have that is kept compliant.

play14:37

And the last thing you need to know is that the challenge passwords

play14:40

that you create are managed by AWS. What

play14:42

does that mean? So a challenge password in

play14:44

Aws. So a challenge password is a skep

play14:46

concept and it's kind

play14:48

of the security layer that exists within skep.

play14:51

So a skep server

play14:53

will create a challenge password. It

play14:55

will distribute and then you distribute that out to your

play14:57

clients and your trusted MDMS.

play14:59

And once that distribution happens, your step clients and

play15:01

MDMS will actually be able to make requests

play15:04

to your step end point that

play15:06

the connector forke

play15:07

will create for you and it will know that OK.

play15:09

This person knows the password so they're authorized to

play15:11

issue a certificate. So that's, that's how you do

play15:13

challenge password management.

play15:16

And then the other type is the type for connector

play15:18

uh the type for Microsoft intune. Now,

play15:20

this type is designed to work with as you probably

play15:23

guessed Microsoft intune.

play15:24

And uh that connector type is

play15:27

uh is gonna have challenge

play15:29

passwords managed in Microsoft intune.

play15:31

So what that means is you're not doing the management

play15:33

within AWS. Now, in this connector type,

play15:35

you're managing those challenge passwords within intune.

play15:38

So every single request that's made

play15:40

to issue a new certificate has its own unique

play15:42

challenge password that intune will create, send

play15:44

your client and the client will make a unique

play15:46

request with a unique challenge password. So that

play15:48

management is done for you in in Microsoft

play15:50

intune. So next,

play15:53

uh we'll talk a little bit about what the architecture

play15:55

looks like there like. What does it look like to actually use

play15:58

uh A MD M with

play16:00

the connective for cap. Now, one thing I want to call out is

play16:02

using the connective first cap does not require you to

play16:04

use that use an MD M. That's just a very popular

play16:06

use case that we see with customers.

play16:08

So

play16:09

here uh we have a MD

play16:11

M solution. This could be intune,

play16:14

it could be airwatch, it could be Jam Pro

play16:16

and you have your AWS private C that you set

play16:18

up within Aws

play16:20

and you have the connector for cap that you've also

play16:22

set up once you set

play16:24

those things up.

play16:25

Uh The next step is you have a mobile device

play16:28

that your organization is managing. This could

play16:30

be an I OS device, it could

play16:32

be an Android device, a laptop ipad,

play16:34

uh whatever your organization is using

play16:36

and uh the mobile device uh configuration

play16:39

that you create will actually get pushed to your

play16:41

uh mobile device from the MD M. Now,

play16:44

what is the configuration profile that I just mentioned? A configuration

play16:46

profile is uh something

play16:48

that you set up in your MD M.

play16:50

It's going to contain an endpoint, it's going to contain

play16:52

maybe a challenge password and what your certificate

play16:55

looks like. So I can say I want a specific

play16:57

extension in my certificate or I want a specific

play17:00

subject in my in my certificate.

play17:02

All those things are set up in my MD M and pushed

play17:04

to my mobile device. Once my mobile device

play17:06

has that, it will connect with the endpoint

play17:08

for connector for scout

play17:09

and it will request a certificate. Once

play17:12

it requests a certificate, the connector for scap

play17:14

will go to AWS private C.

play17:16

It'll grab a certificate, get it issued and

play17:18

send it back to your mobile device there. You have

play17:20

it, it's pretty simple. Now, you have a mobile device that

play17:22

is enrolled in your MD M and has a certificate issued

play17:24

through a private C A.

play17:27

Now,

play17:28

all of this sounds pretty simple and it is,

play17:31

and we're gonna show you uh in a, in a five step

play17:33

demo here.

play17:34

And so uh it's gonna be a series of

play17:36

videos. We're just gonna talk through it real

play17:38

quick. First, we have the step where we're

play17:40

gonna create AC A.

play17:41

After we create AC A, we'll show you how easy it

play17:43

is to create a general purpose connector.

play17:46

Um And after that, we'll talk about Microsoft Intune

play17:48

a little bit. We'll show you how to make a connector for that.

play17:50

And then we'll also talk about how to create configuration

play17:53

profiles within Microsoft Intune.

play17:55

And then finally, we'll talk about enrolling a device.

play17:58

So let's get started with the demos.

play18:04

We'll be creating a connector for skip. The

play18:06

first step in creating a connector for step is

play18:08

to create a private ca So let's go ahead and do that

play18:11

here. You have the private T A console.

play18:14

I will, I will go ahead and click the create your privacy

play18:16

button here.

play18:18

You have a wizard that pops up with

play18:21

um some options that we're going to go through.

play18:23

You have mode options. So

play18:26

this is asking you to pick between general purpose and

play18:28

short lived certificate for your two

play18:30

C modes

play18:31

for the purposes of a connective step we recommend

play18:34

using general purpose. So I'm gonna go ahead and click that

play18:38

now under C A type options,

play18:40

we have a root and a subordinate option.

play18:43

I'm gonna go ahead and uh stick with root for the purposes

play18:45

of this demo

play18:47

and someone click that.

play18:49

And now uh under subject,

play18:52

we have uh

play18:54

many fields. A lot of these are optional.

play18:57

But for the common name of your C

play18:59

A, I'm gonna go ahead and say

play19:00

uh let's call it recording

play19:03

demo.

play19:06

Great. So we now we have a common name for our C A

play19:09

and now we have some options for key algorithm.

play19:11

Uh The key algorithm of your C A

play19:13

uh can be RS A 2048

play19:15

2048 RS A 4096

play19:18

ECP 256 and ECP

play19:20

384.

play19:22

So I'm going to go ahead and click

play19:24

RS A 2048.

play19:25

Uh This is the most widely adopted

play19:28

uh algorithm. So we're going to use that for the second

play19:30

demo. But if you have other compliance needs

play19:32

or other uh key algorithm uh needs,

play19:34

you can go ahead and click into the other ones as well.

play19:36

They will all work with the connection for skip.

play19:40

Great. So now we have certificate revocation options

play19:42

here. Um You can select CRL

play19:45

and if you suck to the CRL option,

play19:47

you'll provide it with a S3 bucket name.

play19:49

Uh And the console will actually create

play19:51

that S3 bucket for you.

play19:53

And uh CRLS will then be generated

play19:55

and delivered to that S3 bucket.

play19:58

And so clients can pull it down from there

play20:01

and then uh if you need O CS P,

play20:03

we can also, there's also an option for O CS B

play20:05

for now. I'm going to go ahead and uncheck both of these

play20:07

because I will go forward with that replication

play20:10

for the demo.

play20:12

Here. You have tags. You can go ahead and uh tag

play20:15

your C A. Uh

play20:16

So I guess we can do that. We'll say,

play20:18

uh for

play20:19

the key, we can say recording

play20:22

and the value can be a demo

play20:26

here. This is C A permissions. This

play20:29

basically says that I'm giving AC

play20:31

M access to new certificates that are requested

play20:33

by this account.

play20:34

I'm gonna go ahead and keep this checked.

play20:37

And then here we have pricing.

play20:39

This is just acknowledging that the privacy of service

play20:41

has pricing associated with it.

play20:43

So I'm going to click that and acknowledge that

play20:46

I hit create C A

play20:48

and awesome. Now I have AC A that is in the

play20:50

pending certificate state and it was created successfully.

play20:54

Now, this C A cannot be used to actually

play20:56

issue certificates quite yet.

play20:58

Uh That can only be done

play21:00

when uh the C A is

play21:02

in the active state.

play21:03

So right now the C A is in the pending certificate state.

play21:06

So what we're going to do is activate it by

play21:08

clicking actions here,

play21:10

going to install C A certificate.

play21:13

And what this will do is it will actually issue

play21:16

ac A certificate off of your C

play21:18

A and then import it back into

play21:20

your C A

play21:21

to activate your C A. So then your C A certificate

play21:23

uh will be part of your C A and you'll have

play21:25

an active C A that you can then use to issue

play21:27

more certificates.

play21:29

So here your C A certificate uh has

play21:31

a validity period

play21:33

and so you can select that here, but we'll leave

play21:35

it as a default.

play21:37

And then there's a signature algorithm that you can pick from.

play21:40

I'm going to go ahead and leave it as sha 256

play21:42

RS A.

play21:44

I'm going to hit confirm and install

play21:47

and there you have it. Now you have ac

play21:49

a certificate

play21:50

that you can view right here

play21:52

that was issued for you and imported back

play21:54

into your C A

play21:56

and you have uh the C A in the

play21:58

active state. So you can actually issue

play22:00

certificates off of the C A

play22:02

that uh you can then go and use.

play22:05

So awesome. What I'm going to

play22:07

do next is I will go

play22:09

ahead and export this C A certificate

play22:12

certificate dot pen and I will save that

play22:14

for later because we'll need that. And then some

play22:16

of the next steps when we're setting up our

play22:18

uh our, our connector for step.

play22:21

So as you can see,

play22:23

we only took a few minutes to

play22:25

set up a, a whole new brand new C

play22:28

A that is highly secure,

play22:30

available and managed.

play22:32

It's awesome.

play22:38

So as you can see,

play22:41

uh setting up AC A was very quick

play22:43

and easy. It only took a few minutes. And

play22:45

uh one thing I want to call out about the C A and not

play22:48

only is it highly, not only is it highly

play22:50

scalable and completely managed for you,

play22:52

this C A is also has its private

play22:54

key backed in HSM. What

play22:56

that means is that we just created a private, we created

play22:59

a private key when we created the C A

play23:00

and that private keys is created

play23:03

in HSM. And any signing operations that occur

play23:05

will happen in the HSM. So if you remember that

play23:07

customer anecdote from before where it's really

play23:09

hard to manage expensive HSM S, all of that

play23:11

is done for you here. And on

play23:13

top of that, that private key cannot be exported

play23:16

from the private C service. So that means your private

play23:18

key is always secure. No one can get to it.

play23:21

All right. So we just talked about creating AC

play23:24

A. Next, we'll talk about what we're launching today,

play23:26

which is the, the connect to first step

play23:27

and how easy it is to create one.

play23:30

So let's take a look at that demo.

play23:36

In the previous step, we created AC

play23:38

A. In this step, we're going to create

play23:41

a connector for SC.

play23:42

So we are now in the connector for skip console.

play23:46

On the left, we have some uh links

play23:48

to other connectors and to the private C

play23:51

A console as well.

play23:53

One thing to note is the connective step is currently

play23:55

in preview

play23:56

that means changes might be made to the service.

play23:58

And we don't recommend using the uh the preview for

play24:01

production workloads.

play24:03

So here I'm going to click the create connector

play24:06

button and

play24:09

we have some options here. Uh I'm gonna go ahead

play24:11

and tag or name my connector here.

play24:14

Um I will call it

play24:16

uh

play24:17

recording

play24:20

the M and

play24:23

then here we have connector types.

play24:26

Now there's two types of connectors that you can

play24:28

create when you create a connector for

play24:31

uh if you pick

play24:33

the general purpose connector type,

play24:36

this type is designed to work with endpoints and applications

play24:38

that support ke

play24:40

ke is widely adopted for mobile device enrollment

play24:42

and networking equipment. So this will work for many

play24:44

different types of MD MS.

play24:48

If you're using Microsoft intune,

play24:50

you'll use the Microsoft intune type

play24:53

of the private CIA connector for cap.

play24:56

So to start off with, let's use the general purpose

play24:58

type. So I went ahead

play25:00

and selected that

play25:01

and here I can go pick my C A.

play25:05

So I'm going to go ahead and find the ca that

play25:07

we created earlier, call the recording demo

play25:09

ca select that.

play25:12

And then here it's gonna uh it's

play25:14

gonna ask me, do I want

play25:16

the console to create a challenge password for me.

play25:18

So when I hit create connector here,

play25:21

a couple of things are going to happen.

play25:22

First, it will share my PC

play25:25

A with the connector for skip service.

play25:27

This allows the connector to issue certificates

play25:29

from your private ca to skip endpoints

play25:32

and applications.

play25:33

When you create connectors outside of the console

play25:36

such as through the C

play25:37

or API,

play25:38

you'll need to create the A

play25:39

rams share prior to creating a connector.

play25:42

But when you do it through the console, this is done for

play25:44

you. So when I click the create connector button,

play25:46

the console will take care of that step.

play25:50

Uh Next, it's gonna create the connector.

play25:53

Uh creating the connector involves creating an endpoint

play25:56

that you can later use uh

play25:58

to actually make ke requests and

play26:00

your clients can use to make ski requests.

play26:03

And uh another thing the console

play26:05

will do for you is it will create a challenge password

play26:07

for you as a managed service.

play26:10

All this happens on your behalf to simplify setting

play26:12

up Skype for your PC.

play26:14

So a challenge password here is one of those

play26:16

steps,

play26:17

challenge passwords are used to authenticate a

play26:19

request before issuing a certificate from

play26:21

your C A,

play26:23

a challenge. Password is a static password

play26:26

and needs to be distributed out to your clients in

play26:28

MD MS for them to be able to issue

play26:30

certificates against your C A

play26:33

great. So I'm gonna go ahead and hit create connector.

play26:35

And all the steps that I just mentioned before are happening

play26:38

this year is being shared with the skep for connect

play26:40

the connector for ke service.

play26:42

And uh the endpoint is being

play26:44

created

play26:45

and you'll see here. Now we have a active

play26:49

general purpose type connector

play26:52

with an end point

play26:54

any challenge password.

play26:57

So let's take a look at this challenge password here,

play26:59

I can click it

play27:00

and click view password.

play27:03

One thing to note

play27:04

is that you can actually use IM

play27:06

policies to lock down who can view that challenge

play27:08

password. So here I have IM permissions

play27:12

and so I can view the password right here.

play27:15

Let me go ahead and close this.

play27:17

Uh Another thing you can do from the console

play27:19

is you can create a new password,

play27:22

just created a new one and I can

play27:24

delete an old one

play27:26

by selecting the delete button and

play27:28

typing, delete and

play27:30

delete.

play27:33

So here I've just rotated my challenge

play27:35

password and I can do that without a hard

play27:37

cut over.

play27:38

All I have to do is create a new password update.

play27:41

All my step applications and clients

play27:43

to use that new password and delete the old

play27:45

one. That way you can avoid downtime during

play27:47

challenge password rotation.

play27:50

Great. So here we've created a

play27:52

general purpose connector

play27:55

for S CE P

play27:59

mhm. So

play28:03

as you can see, it's pretty easy to create a connector for scout

play28:05

that took maybe that was about a three minute video. And

play28:08

so in the three minutes before this, we created

play28:10

AC A

play28:10

and in the next three minutes, we set up a connector

play28:13

for scout. So altogether 5

play28:15

to 6 minutes to set up a highly secure,

play28:17

highly managed scalable C A service

play28:19

that you can use with connector for scout.

play28:21

And at this point, if you're using the general purpose connector

play28:23

type, you're pretty much ready to go.

play28:25

You can use the general purpose connector type to

play28:28

uh actually work

play28:30

with uh your MD MS like Airwatch and Jam

play28:32

Pro. So next,

play28:34

we'll talk about uh the next connector type,

play28:36

which is if you're using Microsoft intune, we'll

play28:38

show you how to make that and we'll show you how to set that up.

play28:44

In the previous step. We created a general

play28:46

purpose connector.

play28:47

The connector for step also has a Microsoft

play28:50

intune type.

play28:51

So let's go ahead and get started and create a Microsoft

play28:53

intune type.

play28:56

I'm going to hit a great connector

play28:59

here. I'll call this

play29:02

Microsoft

play29:04

inter connector

play29:10

for the connector type. I'll select Microsoft

play29:12

intune.

play29:14

Now with this type of connector, we'll have to

play29:16

go to Microsoft intune

play29:18

and actually do a few steps to allow

play29:21

the connector first step to be able to access

play29:23

Microsoft intune.

play29:25

So that's good and good.

play29:27

Uh In tune here. So I'm in the Azure

play29:29

portal and

play29:32

in Microsoft Azure, I just searched for app

play29:34

registrations and ended up at this page.

play29:37

Now under app registrations,

play29:39

I'm going to go ahead and click new registration

play29:43

here. I'll call this testing

play29:46

and

play29:48

I can leave the other values as default.

play29:51

So what I've done here is I've actually created

play29:53

an application within

play29:55

Azure. So

play29:58

now I'm looking at this application

play30:01

and we'll see that the

play30:03

connector for step console is asking for an application

play30:05

ID and a directory, id.

play30:07

So let's copy, paste those values, application

play30:10

id, copy that

play30:14

and directory ID. I'm going to go ahead

play30:16

and copy that as well.

play30:19

Great.

play30:21

Now I can proceed as in

play30:23

the same fashion I did with the general purpose connector

play30:25

where here I will search for my

play30:27

C A. I'll select

play30:30

it. I noticed

play30:32

that the console is mentioning that the C A has been

play30:34

shared with the connection for Ske service already because

play30:36

I used the same C A in the previous step

play30:39

when I created the general purpose connector. But

play30:41

that's OK. It'll just get Reshad.

play30:43

So I selected my C A

play30:46

and I'm going to hit create connector

play30:48

and here it's going to go through very similar steps as the last

play30:50

time where it's going to go ahead and create an endpoint.

play30:54

And uh one big difference

play30:56

though is here, we will not

play30:58

be self managing

play31:01

these challenge passwords

play31:03

instead.

play31:05

Uh And as a console says, when using this connector

play31:07

type, you manage to challenge passwords

play31:09

using Microsoft intune.

play31:12

And so

play31:14

uh what we've done here is we've created a

play31:16

uh

play31:17

Microsoft into connector type

play31:20

and now we can go ahead

play31:22

and move on to the next step,

play31:25

which is setting up access in

play31:27

Azure. As you can see again,

play31:29

we created a uh another connector

play31:31

type. This was if you're using Microsoft Intune, you'll

play31:33

create this connector type.

play31:35

And this is another really easy step showed

play31:37

you how to set up uh that connector. The

play31:39

next step here will show you how to actually grant access.

play31:42

So your connector for G needs to be

play31:44

able to talk to your Microsoft into tenant and

play31:46

we'll show you how to do that in the next demo.

play31:48

Next, we're going to make sure that

play31:50

Microsoft Intune has access set up correctly.

play31:53

So the connector for SCAP can actually access Microsoft

play31:55

Intune. So let's go ahead

play31:57

over to, to Azure.

play31:59

OK. Here we will

play32:02

see the app registration that I just

play32:04

created

play32:05

called testing.

play32:07

I can head over to certificates and secrets,

play32:11

Federated essentials

play32:13

and click the add credential button.

play32:17

Here. I'm going to select other issuer

play32:21

and I can go ahead and copy the values that the

play32:24

uh that the connector gave us. So

play32:26

here we have a value for issuer,

play32:29

subject and audience. I'm going to click

play32:31

issuer

play32:32

and paste that into the issuer

play32:35

subject identifier.

play32:39

Please study and

play32:41

here I'm going to copy the audience and

play32:43

add it right here,

play32:46

the name this testing

play32:48

and hit

play32:49

at great.

play32:51

So now my connector for cab has

play32:53

access to Microsoft Intune.

play32:55

Now I'm going to go ahead and configure the permissions

play32:58

that the connector first step has on my interne

play33:00

configuration. So here I'll go to API

play33:02

permissions

play33:06

and I'll be able to add those specific permissions

play33:08

that the connector

play33:09

will, will use.

play33:11

So I'm going to click, add permission

play33:14

and go and click into

play33:22

and now I can go to application permissions

play33:25

and search for a skip

play33:28

and click, add permissions.

play33:31

I'll add a second permission here by clicking, add a

play33:33

permission again,

play33:34

Microsoft graph this time

play33:37

application permissions,

play33:39

searching for application and application,

play33:42

read, add

play33:45

permissions

play33:46

and then one last button here, I'm going to grant

play33:49

admin consent.

play33:54

Great.

play33:55

So I pretty easily just

play33:57

set up my

play33:58

uh connector for step to have access to my intune.

play34:02

Next, I need to create a configuration

play34:04

profile

play34:05

that can be used

play34:07

by June to actually

play34:09

push ske certificates and

play34:12

uh

play34:13

scap trusted user profiles to

play34:17

my devices. So I'm going to head

play34:19

over to Microsoft Intune

play34:22

and here I went to devices

play34:24

and configuration

play34:27

here. I'm actually going to create two

play34:29

configuration profiles.

play34:32

The first one is going to be

play34:34

for.

play34:35

Well, so I have a Windows machine that's set up

play34:37

that I'm going to use as my device that I'm

play34:39

enrolling to intune.

play34:42

So I'll go ahead and select that first.

play34:44

And then here I'll the profile type will

play34:46

be trusted certificate.

play34:49

So what this means is that

play34:51

a trusted certificate is a certificate that ends up

play34:53

in a devices trust store. So for

play34:55

us, we're going to use our root

play34:58

CASC A certificate that we created

play35:00

earlier

play35:01

as the trusted certificate.

play35:03

So I'll go ahead and click create,

play35:06

I'll call this trusted

play35:09

sir.

play35:12

Hit next

play35:14

and here I need to upload it.

play35:16

So I actually

play35:19

upload it by just taking

play35:21

the certificate that I downloaded earlier. The C A

play35:23

certificate from my C A

play35:25

and changing the dot P

play35:27

dot C open

play35:29

that up hit next.

play35:32

Say that all devices that are Windows

play35:34

machines that enroll to

play35:37

uh my intern will get this,

play35:40

get the certificate in the trust store. So I collected

play35:42

all devices

play35:43

hit next

play35:45

and I hit create

play35:47

refresh

play35:50

and we see it there.

play35:52

Great. So the moment my next one is gonna

play35:54

be same thing Windows

play35:56

eight and above.

play35:59

And this time it'll be a

play36:01

skep certificate profile and

play36:03

this is what's going to actually create is gonna

play36:05

actually cause intune to push a configuration

play36:07

profile to your device. And your device

play36:09

will then go and

play36:11

uh make a request against the connector

play36:13

for S ce to actually issue a certificate.

play36:17

We call this yeah

play36:20

certificate.

play36:24

We'll say it's a device type

play36:27

a certificate

play36:28

here. We can call it. Um This

play36:30

is the subject we'll say

play36:33

testing

play36:37

and

play36:39

we will look at the other options

play36:41

there. We have options for subject,

play36:43

alternative name. We'll leave this as default.

play36:45

Uh You can configure the validity period

play36:48

of your certificate. We'll leave that as one year

play36:51

for the key storage provider. We'll go ahead and say

play36:53

this option right here.

play36:55

For key usage, we can

play36:57

uh select both digital

play37:00

signature and key insight from it.

play37:02

Key size. We'll go with 2048.

play37:05

Again, these are all demo values. Uh You can

play37:07

configure this however you wish.

play37:09

And the hash algorithm will go with shot

play37:11

two root certificate

play37:14

will say this is the

play37:16

trusted certificate which represents our

play37:18

C A certificate.

play37:19

Is it OK

play37:21

for extended key usage or EKU

play37:24

I'll go ahead and say any purpose.

play37:28

And here this is the renewal threshold.

play37:30

What this means is that if your

play37:32

cert uh your certificate will be renewed

play37:34

when 20% of its lifetime

play37:37

remains. So we'll leave that as a default. And

play37:39

this right here, it's asking for the URL of

play37:41

your SK ES server

play37:43

in our case, that's the connector for Skeps URL.

play37:46

So go ahead and grab your

play37:48

unique URL right here

play37:51

and paste it in

play37:53

hit next.

play37:54

Next.

play37:56

Previous we got to add all devices.

play37:58

So this is saying

play38:00

um

play38:01

any Windows machine again that enrolls will

play38:04

get this sketch certificate issued,

play38:07

hit next and create.

play38:10

If we refresh, we should see here.

play38:14

Great. So we see se certificate and

play38:16

trusted certificate.

play38:19

So here you saw how you set up access

play38:21

for the connector. First step to be able to access

play38:23

your Microsoft Intune.

play38:25

Um Another set of just pretty easy steps that

play38:27

goes, this is all in our documentation as well.

play38:29

Um Next up, we'll show

play38:31

you the, the actual exciting step which is

play38:34

seeing a device enroll in Microsoft

play38:36

Intune and seeing those certificates being pushed

play38:38

to it. So let's let's watch that demo.

play38:42

In the previous step, we created a connection

play38:44

for ke and this step will actually

play38:46

enroll a device.

play38:47

So I have set up a Windows machine here

play38:50

and I downloaded a company portal.

play38:53

And after I downloaded company portal, I simply signed

play38:55

in using my uh Microsoft

play38:58

intune credentials that were unique to

play39:00

my tenant. And so once

play39:02

I had signed in using my credentials,

play39:05

that was just my user name, password.

play39:07

I uh

play39:09

I am going through this wizard now which will

play39:12

actually enroll this

play39:13

uh windows machine to Microsoft intune.

play39:16

So I'm going through this wizard

play39:19

hit next

play39:22

and it's saying I am now enrolled.

play39:25

So I hit done.

play39:27

I can see this device is enrolled.

play39:30

And if I go to settings

play39:33

and sync,

play39:34

what I'm hoping to do here is actually pull

play39:37

down the two configuration profiles

play39:39

that we created.

play39:40

It said the sync was successful.

play39:42

What that means now is if I look in my

play39:45

uh

play39:47

trust store

play39:48

on this machine, I should see my C A certificate.

play39:51

So let's check for that.

play39:53

So I'll search for computer certificates

play39:55

here. Yes

play39:59

and go to trusted root certification

play40:05

and let's see,

play40:09

recording demo. This right here

play40:11

is my C A certificate

play40:12

that I had uploaded to

play40:15

uh Microsoft Intune

play40:17

and has now been pulled onto this machine.

play40:20

So that's pretty cool. I just created a Windows machine

play40:23

enrolled into intune.

play40:24

And now

play40:25

my C A certificate that I had issued

play40:28

with a private C A is now on

play40:30

this machine

play40:32

and every Windows machine that enrolls from now

play40:35

on now will have that automatic behavior

play40:37

as well. The next thing

play40:39

I should see is I should when

play40:41

I go to personal certificates

play40:43

here, I should see that the ske certificate

play40:45

that I had requested

play40:47

was actually issued

play40:48

and it looks like it was.

play40:50

So if I open this up,

play40:52

this right here is my certificate

play40:54

that I had set up with a configuration

play40:57

profile in Microsoft intune. So

play40:59

what happened here is this Windows machine enrolled

play41:02

to Microsoft intune

play41:03

and then it automatically knew to

play41:05

go and ask the connector for ke

play41:08

for a new certificate. So it hit that

play41:10

endpoint that the connector for step had

play41:12

set up

play41:13

and a certificate was issued

play41:15

by your A private C A.

play41:19

So this right here shows you how easy it is

play41:21

to set up your ad address, private C

play41:23

A with a connector for S CE

play41:25

that can then be used to enroll your

play41:27

machines and devices.

play41:34

So there you have it, you created a private

play41:37

C A, you created a connector for S CE

play41:39

and then you were able to enroll a device in

play41:42

Microsoft Intune.

play41:43

Uh It's a pretty simple process. And

play41:46

uh next, now that we've talked about this, we'll talk

play41:48

a little bit more about the concept of connectors

play41:50

and Dan's going to tell you a little bit about that.

play41:53

Yeah, thanks Debbie.

play41:55

That was a great set of demo videos.

play41:58

I hope that helps you all understand

play42:00

how quick and easy it is. At least for the PT I

play42:02

steps to get to

play42:04

uh you know, setting it up and

play42:06

being ready to then configure your

play42:09

MD M skip compatible applications

play42:11

clients. But

play42:12

as I mentioned before, connect to forke

play42:14

is just one of three connectors that we have.

play42:16

We're gonna wrap this session up just talking a little

play42:19

bit about those connectors and a little bit

play42:21

about uh private C A.

play42:23

So one of the other connectors we have is connected

play42:26

for active directory, very similar

play42:28

to uh connector for

play42:30

E is for identity certificates.

play42:32

Um If you think about what do we use private

play42:34

certificates within active directory. For

play42:37

one of the main ones we hear is securing

play42:39

your domain with LDPS or

play42:41

secure LDA or LDA over

play42:43

SSL, right? Without

play42:45

it, all your domain communications is happening over

play42:47

plaintext. Not great.

play42:50

The other thing is to enroll your

play42:52

users and machines, right? Providing them

play42:54

an identity by installing a private certificate

play42:57

onto them.

play42:58

You know, most common use case here is

play43:00

I want this laptop to enter the office and

play43:02

get on to the Wi Fi so that I don't have

play43:04

to have them constantly using

play43:06

the Wi Fi password or having to rotate

play43:09

it out and letting everyone know.

play43:11

And less of a less common of a use case

play43:13

is encrypting emails and files.

play43:15

Um If you use certificates, you can sign

play43:18

it to encrypt those uh objects,

play43:20

but like I said, not as, not as common.

play43:24

Uh And just to let you know uh the

play43:26

connective for active directory works with two

play43:28

types of active directory. If you will. One

play43:31

is the Aws Managed Microsoft Active

play43:33

Directory. This is an offering offered

play43:35

by Aws directory services. This

play43:37

is a managed active directory. They do the patching

play43:39

upgrading. They recently went through a campaign

play43:41

where they upgraded everyone to 2019.

play43:44

Um

play43:46

and then self managed, right? So whether

play43:48

you're hosting it on premises or if you're hosting

play43:51

it in the cloud, like on EC2, you

play43:53

can use the connect for active directory for both use

play43:55

cases.

play43:59

Uh And so just a quick

play44:01

diagram on how it works. On the right

play44:03

side, you'll see this is your on premises,

play44:05

set up. You have active directory, you have

play44:08

uh ad domain joined objects,

play44:10

right? And you're like, I have a private ca,

play44:13

I want to use it with

play44:14

my active directory to enroll my ad

play44:17

objects.

play44:18

Well, first thing you actually have to do is connect

play44:21

it to the aws cloud.

play44:22

Uh that happens by using the AWS directory

play44:24

service product. And now your on

play44:27

prem active directory is

play44:29

in the cloud in a way where

play44:31

um ad aware applications

play44:33

such as private C A workspaces, other

play44:35

things can actually communicate with your active directory.

play44:38

This is when you would say OK, connect

play44:41

me to it. That's when you use the connector for

play44:43

active directory.

play44:44

Now, private C A is

play44:46

a trusted C A within active

play44:48

directory. It can actually communicate

play44:50

and do LDA queries and all

play44:52

you have to really do at this point is configure

play44:55

your group policy object and go

play44:57

in and say, hey, domain computers going

play44:59

forward, go point to the end point

play45:02

that uh privacy connector provided.

play45:04

And once you update that GPO, it

play45:07

reaches out, we do a bunch of things

play45:09

at this point. You know, the connector reaches uh communications

play45:12

with their active directory to say, hey,

play45:14

is this uh requests

play45:17

are actually allowed to get certificates? Are they in

play45:19

your directory, whether it's a user or a machine?

play45:21

Um In addition to that, it's going to communicate

play45:24

back and forth with that object, what certificates

play45:26

do you have? What certificates do you need?

play45:29

And after that communication is over,

play45:31

it goes up to your Aws private C A grabs

play45:33

the certificates and shoots it back to

play45:36

uh the object and all this,

play45:38

you know, happens through your VPC, nothing

play45:40

goes over the public internet. So it stays

play45:43

within um your network.

play45:46

Uh Debbie, you want to talk a little bit about Kubernetes.

play45:49

I definitely do. So

play45:51

the connector for Kubernetes uh is another

play45:53

connector like Dan talked about.

play45:55

Uh So one thing I wanna just start off

play45:57

by saying is the connector for KS

play45:58

is a, it's, it's a big space for our customers. Uh

play46:00

Two out of three containers that are running

play46:02

in the cloud right now, run in Aws.

play46:05

What that means is if you're running on, on Prem

play46:07

or if you're running in Eks or you're, you're

play46:09

using um cert manage already. This

play46:11

is a tool that's very useful for you and we expect customers

play46:13

to continue growing in that space.

play46:16

So let's talk about what that looks like in terms of an

play46:18

architecture diagram. So let's say you have your own

play46:20

co cluster. Again, it could be EKS or it could be

play46:22

your own self managed one,

play46:24

you're maybe running a service mesh. Uh This could be

play46:26

sto we see that a lot in customers

play46:28

and you have your own micro services that are running

play46:30

within sto

play46:32

so you a lot of organizations already have this set

play46:34

up where they're using Cert manager. So,

play46:36

cert manager is commonly referred

play46:38

to as the de facto tool for certificate management

play46:40

within certis. Now, cert manager is an open

play46:43

source plug in

play46:43

uh a lot of teams, a lot of organizations

play46:46

are already using it.

play46:47

And uh so what we built with the connector

play46:49

for Certis is just a plug in for that.

play46:51

So whenever your microservices need

play46:53

certificates, it'll reach out to cert manager.

play46:56

And then uh the connector for Cooper Neti

play46:58

is right there working with Cert manager and

play47:01

uh cert manager will, will ask

play47:04

the connector for Cooper Neti for a certificate and

play47:06

the connector for Cooper Neti will take it from there. It'll

play47:08

the connector will reach out to a private C

play47:10

A. It'll issue a certificate for you,

play47:12

send it back to your connector, send

play47:15

it back to Cert manager and then your microservices

play47:17

in to will have the certificates it needs.

play47:19

This is a very, uh this is a very common

play47:21

infrastructure set up that we see a lot of organizations

play47:23

already a cert manager. This is just an add on now

play47:26

that works with it. So there's no need to replace anything that

play47:28

you already have.

play47:30

Um Next up, there's a lot of options

play47:32

you have for TLS termination and where to use

play47:35

TLS in a

play47:36

cluster.

play47:37

So let's say this is your

play47:38

C cluster. Um You may have

play47:41

an application load balancer in purple

play47:43

or you may have an ingress controller right on

play47:45

the edge of the EKS cluster.

play47:47

Or you may have pods that are running within that cluster

play47:49

that uh you can do TLS termination

play47:51

at. So some of the options there, you can terminate at that

play47:53

load balancer

play47:55

or you can terminate at the ingress controller

play47:57

and that's what we see commonly done.

play47:59

Uh And we have termination at the pod as well.

play48:02

And then finally, you can use the connector

play48:04

fork to uh or sorry, the connector for Kernes

play48:07

to do secure communication between pods as

play48:09

well. And

play48:12

so we talked a little bit about connectors.

play48:14

Now, Dan walked us through that. We talked about the connector

play48:16

for ad, we talked about the connector for scap, we

play48:18

talked about the connector for kubernetes. Next, let's talk

play48:20

a little bit about A US private C A.

play48:22

So A

play48:23

S private C A, you may be asking when do I use

play48:25

it? Like what are, what are the common use cases that

play48:27

we see.

play48:28

So let's let's walk through them a common

play48:30

use case that we see is

play48:32

uh using a S resources outside of

play48:34

a DBU and within Aws. So we

play48:36

talked a little bit about AC M earlier.

play48:38

So customers will often issue a certificate

play48:41

and use it with an A LB

play48:42

or they'll use it with uh API gateway.

play48:45

So private C A will work with all with AC

play48:47

M and AC M kind of opens the door to a bunch

play48:49

of other integrations.

play48:52

Next, you have IOT devices. Now

play48:54

this is something we see customers use all the time. There are

play48:56

millions of certificates being used right now through

play48:58

a private C A

play48:59

that are used on IOT devices.

play49:02

Now, this can be matter compliant. So if your organization

play49:04

is matter compliant, it's important to call out

play49:06

that a private C A is currently the

play49:08

only cloud provider with a private C A solution that

play49:11

is fully matter compliant.

play49:12

And so we have a lot of customers using private

play49:14

C A for those use cases. We also have them using

play49:16

it for stuff like um Aws IOT core.

play49:19

So if you're using any of those things, then uh

play49:21

private C A fits your use case.

play49:24

Next service meshes containers, we kind of went through this

play49:26

in detail in the last slide, but

play49:28

this is the connector for certes. This is if

play49:30

you're using a service mesh, uh again,

play49:33

two out of three containers in A W uh

play49:35

two out of three containers running on the cloud run

play49:37

in Aws. So we expect this space to keep growing

play49:39

if you're using service meshes and containers, Aws. Private

play49:41

C I can hook you up with that with certificates.

play49:44

Next identity.

play49:46

Uh What I really think of with identity is

play49:49

um I am anywhere. So let's say

play49:51

you're an organization that has

play49:54

uh a workload that's running outside of Aws

play49:56

and you have the hybrid infrastructure. So you have some

play49:58

resource resources within Aws.

play50:00

So you can use IM anywhere to

play50:03

uh establish identity. So your workloads will establish

play50:05

identity using certificates and private C

play50:07

A and then you can use Im anywhere

play50:10

to actually exchange that identity

play50:12

for

play50:13

Abu credentials. And that's how your

play50:15

um hybrid infrastructure works where your

play50:18

Abu uh your non abo workloads will be able

play50:20

to reach into Aws and use those adi

play50:22

bos resources.

play50:25

So we talked a little bit about use cases

play50:27

like when do you use private C A? But let's

play50:29

talk a little bit also about the benefits of using

play50:31

private C A.

play50:32

So first of all, we talked about the slot,

play50:34

it is a secure managed scalable service.

play50:37

So, you know, we talked a little bit about some customer anecdotes

play50:39

before where uh customers didn't know

play50:41

maybe where their C is where or we're

play50:43

having a hard time understanding

play50:46

where to issue certificates from, whether it's the root C A or

play50:48

the and energy C uh C A So

play50:50

with uh private C A, we make a lot of these things

play50:52

easy uh through the console through

play50:55

uh high availability, we a lot of these things

play50:57

are made easier for you.

play51:00

We also support developer agility. This

play51:02

is automation

play51:03

so customers can create privacy through cloud

play51:05

formation, through CD K. They can create

play51:07

it through um they can automate things through

play51:10

uh the console or API

play51:12

S or SDKS. They have a lot of different options

play51:14

to actually uh speed up the agility of

play51:16

their uh of their work.

play51:20

Next, you can create root cas and complete hierarchies

play51:22

within private C A. So you can, you don't

play51:24

have to manage anything outside of it. Your, your root C

play51:26

can be in private C A subordinates, your whole hierarchy

play51:29

can all be done within private C A

play51:32

and then also you have the ability to actually customize

play51:34

certificates.

play51:35

So in a certificate, you may want to customize what kind of

play51:37

extensions are around there, the subject, all the different things

play51:39

in there, you can do that via

play51:42

um A PF through.

play51:44

So API pass through is a mechanism in private

play51:46

C A where you can actually pass in parameters

play51:49

through

play51:50

the API and it will affect what your end

play51:52

certificate looks like. You can also do it through CS

play51:54

R pass through. So you can put extensions in your CS

play51:56

R that get copied over to

play51:58

your uh end entity certificate.

play52:00

Uh You can also do uh customization through

play52:03

preset templates that we give you. And

play52:05

this is really nice because you can control access

play52:07

to those templates through IM and you can just

play52:09

have predefined templates that customers

play52:11

can use to um to,

play52:14

to define what their end certificate looks like.

play52:17

Finally uh manage your C A centrally.

play52:19

So no running around trying to find

play52:21

where all the cas are in your organization. Like the customer

play52:24

story we told earlier.

play52:25

Uh You have one console in private C A, you

play52:27

go to one console, you can see all of your

play52:29

cas. Uh you can call one API

play52:31

the list certificate, authorities api see all

play52:33

of your cas. So there's no more losing your CAS.

play52:35

You can see it all in one easy pain glass

play52:39

and finally pay as you go pricing.

play52:41

So when you create ac A, you will pay for

play52:43

ongoing maintenance and costs. But

play52:45

uh if you don't issue any certificates that month, there

play52:47

will be no charge for certificates that month. So it's

play52:50

very much pay as you go pricing.

play52:52

So we talked a little bit about the benefits and the use cases for private

play52:54

C A. Now, Dan, do you want to tell us a little bit more about

play52:57

securing your private C A? Sure, I'll wrap up

play52:59

with security because we are at a security

play53:01

conference,

play53:02

right? We've

play53:03

kind of spoken a lot about this

play53:05

HS MS. They're a big part of, you

play53:07

know, private C A and the security that we offer

play53:11

im policies for access control, right? So

play53:13

you put all your cas into an account,

play53:15

you can share it when you share it, you

play53:17

can allow that other account to only issue

play53:20

certificates. Don't touch my C A. Don't

play53:22

create AC A, don't delete ac

play53:24

A, right? Not only that, what's

play53:26

kind of cool is you can also use

play53:28

it as a two party uh requirement,

play53:30

right? What I mean is, hey, I have

play53:32

someone in my company who can create C A si

play53:35

have someone who can actually issue certificates.

play53:37

Those two people are not the same.

play53:39

So if I want to issue a brand new C A

play53:41

certificate or C A deploy it, I actually

play53:44

need both of them

play53:46

together for us to actually get

play53:48

a new C A deployed. That way you're not creating

play53:50

CAS without

play53:52

really knowing,

play53:54

manage col and O CS P revocation

play53:57

is an important part of PK I

play53:59

and we provide you with both managed services.

play54:02

And then lastly, I want to know what's

play54:04

happening in my C A. You get the audit

play54:06

logs, you also get a free

play54:08

generated audit report, every certificate

play54:11

issued, whether it's revoked, expired

play54:13

or still valid. You get that all in a single

play54:16

report which makes it easy to do two things.

play54:18

One, provide it to your compliance

play54:21

auditor. Two, you have an incident, every

play54:23

single cert is there for you to look through.

play54:26

I'm not gonna read this slide off to you but

play54:28

private C A you know, supports

play54:31

compliance for data privacy and protection.

play54:33

You can learn more by going to the website

play54:36

at the bottom to see, you know,

play54:37

which ones we comply with. But basically

play54:39

we want to be able to support you and have

play54:42

you use us in highly regulated industries

play54:44

and uh fields, environments.

play54:47

And lastly, here's our takeaways, right? So you got

play54:49

this fully managed C A highly available

play54:52

real secure,

play54:53

you know, it's a cloud based API

play54:55

for uh C A solution.

play54:58

The portfolio of connectors allow you to use

play55:00

it for a variety of enterprise use cases.

play55:02

And think about agility, how quickly you can

play55:04

set up AC A for use for your DEV

play55:07

environments for your production, whatever

play55:09

your use cases and the ability to customize

play55:12

certificates. As DEVI mentioned, we can issue

play55:14

certificates from IOT to TLS

play55:16

to identity all the way down to mobile

play55:18

driver's licenses,

play55:20

right? And then lastly, we make

play55:22

it easy. Amazon, you know, if you're using

play55:24

containers, Amazon, Eks, Amazon

play55:26

ECs even provides its own

play55:28

service mesh. If you're using it between services,

play55:31

you flip a switch, you're using private C

play55:33

A, you have TLS,

play55:35

you know, we continue to integrate to make it easier

play55:37

for you wherever you are to use private certificates

play55:40

and just thank you. Thank

play55:42

you for joining us this morning.

play55:44

Uh My name is Dan,

play55:46

this is Dey and please complete

play55:48

a survey and we'll be right over here on the side if you wanna

play55:51

talk but I appreciate it.

Rate This

5.0 / 5 (0 votes)

Related Tags
AWSセキュリティMDMモバイル証明書エンタープライズカスタマイズスケーラブルAPIMDMソリューションクラウド
Do you need a summary in English?