Active Directory
Active Directory
Active Directory
Centralized management
Single point of administration
Internet-Standard Technologies
LDAP TCP/IP
X.509 Kerberos
LDIF
Domain
Domain
Domain
OU
Domain
Domain
Objects
OU OU
Tree
Tree
Forest
Tree Forest
Domains
Logical partition in Active Directory database Collections of users, computers, groups, etc. Units of replication Domain controllers in a domain replicate with each other and contain a full copy of the domain partition for their domain Domain controllers do not replicate domain partition information for other domains
Replication
Organizational Units
Container objects within a domain
Organizational structure
Paris Sales Repair
Trust Relationships
Secure communication paths that allow security principals in one domain to be authenticated and accepted in other domains Some trusts are automatically created Parent-child domains trust each other
Tree
Tree
Forest
Tree Forest
Shortcut Trust
Forest Two-Way Transitive Trusts
Shortcut Trust
Tree Forest
Directory Partitions
Contains definitions and rules for creating and manipulating all objects and attributes
Schema
Configuration
contoso.msft Application
B1
A3
A4
B3
Domain A Topology Domain A Topology Domain B Topology Schema and Configuration Schema and Configuration Topology Topology
Schema
Object Class Examples
Dynamically available, updateable, and protected by DACLs
Computers
Attribute Examples
List of attributes
accountExpires badPasswordTime mail Name
Users
Servers
Global Catalog
Resources in Active Directory can be shared across domains and forest.
The global catalog feature in Active Directory makes searching for resources across domain and forest transparent to the user
A global catalog server is a domain controller that efficiently processes intraforest queries to the catalog.
LDAP
LDAP Allows Access to Directory Service Information Active Directory Support LDAP v.2 and v.3 LDAP Names Represent Information About Objects in Active Directory.
Security Principals
Security Principals are users, qroups ans computers Users Computers
Microsoft Windows NT 4.0, Windows 2000, Windows XP or Windows Server 2003
Groups
Service accounts Group memberships Security policy profiles and Security identifiers,define security principals
Security Descriptors-I
Security Descriptors-II
Owner SID- The owner of an object is responsible for granding access permissions and granding rights for the objects. An owner is a security principal and is also difened by a SID Group SID Non-Windows OS
Security Descriptors-III
Access Control Lists
- Discretionary access control list (DACL) - System access control list (SACL)
Ownership
Every object in active directory has an owner.The person who creates the object automatically becomes the owner and, by default, has full control over the object. Members of the domain admins group always have ability to take ownership of any object in the domain, and then change the permissions.
Inheritance of Permissions
Objects inherit existing permissions Inheritance can be bloced
Type of Groups
Security Groups Distribution Groups
Security Groups
Domain
Searc h
OU1
OU2
Active Directory: Enables a single administrator to centrally manage resources Enables administrators to easily locate information Enables administrators to group objects into organizational units Uses Group Policy to specify policy-based settings
Printers Printer1
3
Windows .NET Server Enforces Continually
1 2 3
Use Group Policy to: Control and lock down what users can do
When settings from GPOs linked to the same container conflict, the settings for the GPO highest in the GPO list apply
A Computer Setting Applies When It Conflicts with a User Setting
GPO1 ensures that Favorites appears on the Start menu GPO2 and GPO3 require a password of 11 characters and remove the Windows Update icon GPO4 removes Favorites from the Start menu and adds the Windows Update icon
Site
What are the resultant Group Policy settings for the OU?
OU
GPO4
What are the resultant Group Policy settings for the OU?
Site
A password must be at least 11 characters long The Windows Update icon appears on the Start menu
Domain
GPO2 GPO3
OU
GPO4
Stops inheritance of all GPOs from all parent containers Cannot selectively choose which GPOs are blocked
Cannot stop No Override
GPOs
Domain Production
Sales
Enabling No Override
No Override: Overrides Block Inheritance and GPO conflicts Should be set high in the Active Directory tree Is applicable to links and not to GPOs Enforces corporate-wide rules
Sales
Domain Sales
Explicitly denying the Apply Group Policy permission Omitting an explicit Apply Group Policy permission
Allow Read and Apply Group Policy Deny Apply Group Policy
Mengph
Kimyo
Group
Contoso.com Sales
An anti-virus application must be installed on all computers in the domain The Office suite must be installed on all computers in the domain, except for those in the Payroll department An accounting application must be installed on all client computers in the Payroll department, except for the computers used by the Payroll OU administrators
Payroll
Training
Nwtraders.com Sales
A GPO linked to the domain with the antivirus application settings configured and the link configured with No Override A GPO linked to the domain that installs the Office suite Enable Block Inheritance for the Payroll OU A GPO linked to the Payroll OU to install the accounting application Modify the DACL of the GPO linked to the Payroll OU to deny the Apply Group Policy permission for the computer accounts used by the Payroll OU administrators
Payroll
Training
Grant permissions: OU3 For specific organizational units to other administrators To modify specific attributes of an object in a single organizational unit To perform the same task in all organizational units Customize administrative tools to: Map to delegated administrative tasks Simplify interface design
Admin2
Admin3
WAN Link
Sites
A site is a combination of one or more Internet Protocol (IP) subnets that are connected by high-speed link. You create sites for two primary reasons: - To optimize replication trafic - To enable users to connect to a domain controller by using a reliable,high-speed connection Single site may contain many domains
Domain
Site
IP Subnet
Site
IP Subnet
B1
B2
Site Link
IP Subnet
B3
Cost
IP Subnet
Site
IP Subnet
B3
IP Subnet
Site Link AB
Site B
Site Link BC
Site A
IP Subnet IP Subnet
Site C
IP Subnet IP Subnet
Replication Components
The Konwledge Consistency checker Server Object NTDS Setting Object Connection Objects
Replication Protocols
Replication within a site uses RPC over IP Replication between sites can use: - RPC over IP - SMTP (if the replication occurs between domain)
Replication within a site - Change notification - Uncompressed traffic - Urgent replication Replication Between Sites - Replication scheduling - Compressed traffic
Replication Within Sites: Assumes fast and highly reliable network links Does not compress replication traffic Uses a change notification mechanism
A1
IP Subnet
IP Subnet
Replication
IP Subnet
Replication
A2
B1
IP Subnet
Replication
IP Subnet
Replication
B2
Replication Between Sites: Assumes limited available bandwidth and unreliable network links Compresses all replication traffic between sites Occurs on a manual schedule
Summary
Active Directory Centralized Administration Organize, Manage, and Control Resources Logical Structure Separate form Physical Structure Multiple Functional Levels Schema Modification Delegation of Administrative Control