Export (0) Print
Expand All
Expand Minimize

The Secure Access Using Smart Cards Planning Guide

Updated: June 30, 2005

 

Download this Solution Accelerator

Click here to download The Secure Access Using Smart Cards Planning Guide from the Microsoft Download Center.

About This Solution Accelerator

Smart cards and their associated personal identification numbers (PINs) are an increasingly popular, reliable, and cost-effective form of two-factor authentication. With the right controls in place, the user must have the smart card and know the PIN to gain access to network resources. The two-factor requirement significantly reduces the likelihood of unauthorized access to an organization’s network.

Smart cards provide particularly effective security control in two scenarios: to secure administrator accounts and to secure remote access. This guide concentrates on these two scenarios as the priority areas in which to implement smart cards.

The intended audience for this guide includes technical decision makers, enterprise architects and enterprise security administrators who plan, deploy, or operate remote access links and network security. Consultants who plan, deploy, or operate Windows-based networks should also find this information useful.

The information in this guide applies to organizations of all sizes that require strong identity protection and data access control.

Included in the Download

The Secure Access Using Smart Cards Planning Guide includes the following component:

  • Secure Access Using Smart Cards Planning Guide v1.1.doc

In More Detail

This guide includes four chapters that focus on the essential issues and concepts required to plan smart card authentication. These chapters are:

Chapter 1: Introduction

This chapter provides an executive summary and considers the business challenges faced as well as the benefits gained if you implement smart card authentication. The chapter suggests the recommended audience for the guide, lists the reader prerequisites, and provides an overview of the chapters and solution scenarios.

Chapter 2: Smart Card Technologies

This chapter outlines the approaches in the use of smart cards to secure critical accounts. It also discusses the essential elements for the two solution scenarios described in chapters 3 and 4. Finally, this chapter introduces Woodgrove Bank, which is the basis of the two solution scenarios.

Chapter 3: Using Smart Cards to Help Secure Administrator Accounts

This chapter describes the design considerations required to secure administrator accounts with smart cards. The chapter goes on to examine the issues and requirements for Woodgrove Bank. It discusses the solution concept, prerequisites, solution architecture, and solution operation for the scenario. Finally, the chapter reviews possible options to extend the solution to incorporate the change management process.

Chapter 4: Using Smart Cards to Help Secure Remote Access Accounts

This chapter describes the design considerations for remote access with smart cards. The chapter goes on to examine the issues and requirements for the implementation of secure remote access for Woodgrove Bank. It discusses the solution concept, prerequisites, solution architecture, and solution operation for the scenario. Finally, the chapter reviews how to extend the solution to incorporate physical access control.

Related Resources

See other Solution Accelerators that focus on security at the Security Solution Accelerator Site on Microsoft TechNet.

Community and Feedback

  • Want to know what’s coming up next? Check out our Security Guidance Blog.
  • E-mail your feedback to the following address: SecWish@microsoft.com
  • If you’ve used a Solution Accelerator within your organization, please share your experience with us by completing this short survey (less than ten minutes long).

About Solution Accelerators

 Solution Accelerators are authoritative resources that help IT professionals plan, deliver, operate, and manage IT systems that address real-world scenarios. Solution Accelerators provide free prescriptive guidance and automation to accelerate cross-product integration, core infrastructure development, and other enhancements.

Register to receive the Solution Accelerator Notifications newsletter so that you can stay informed about new Solution Accelerator releases and updates. The newsletter covers such areas of interest as

  • Communication & Collaboration
  • Security, Data Protection, & Recovery
  • Deployment
  • Operations & Management

Download This Accelerator

Click here to download the Secure Access Using Smart Cards Planning Guide from the Microsoft Download Center.

 

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft