Active Directory
Active Directory
Agenda
• Group Policy Management
• User and Group Management
• Organizational Units and Delegation
• Security Best Practices
• AD Design for NLDC system
• Failover Scenarios
Introduction to Active Directory
Core Components:
Active Directory Domain Services (AD DS): Core function of AD.
Lightweight Directory Services (AD LDS): Directory service for specific applications.
Active Directory Federation Services (AD FS): Single sign-on (SSO) for web-based applications.
Active Directory Certificate Services (AD CS): Manages digital certificates.
Active Directory Components and Architecture
AD Components Overview:
Domains: Logical grouping of objects such as users and computers.
Trees and Forests: Domains are organized into trees, and multiple trees form a forest.
Organizational Units (OUs): Used to group users and computers for easy management.
Domain Controllers (DCs): Servers that hold the AD database and provide authentication services.
Logical vs. Physical Structure:
Logical Structure: Domains, trees, forests, and OUs.
Physical Structure: Sites and domain controllers.
AD Schema and Global Catalog:
Schema: Defines the types of objects and attributes in the directory.
Global Catalog (GC): Contains a partial replica of every object in the forest, speeding up search queries.
Active Directory Domain Services (AD DS)
What is AD DS?
AD DS provides the core directory service functionality, handling authentication,
authorization, and identity management.
Key Functions of AD DS:
Authentication and Authorization: Managing login requests and access to resources.
Directory Management: Centralized storage and management of objects (users,
computers, etc.).
AD DS Role in the Enterprise:
Provides the backbone for identity management and network security.
Active Directory Trust Relationships:
Types of Trusts: Parent-child, tree-root, external, and forest trusts.
Transitive vs. Non-transitive Trusts: Inheritance of trust relationships between domains.
Installation and Configuration
User Properties: Managing attributes such as logon hours, home folders, and group memberships.
Password Policies: Enforcing complexity requirements, expiration periods, and account lockout policies.
Managing Groups:
Security vs. Distribution Groups: Security groups manage access to resources, while distribution groups are
used for email distribution lists.
Group Scopes: Domain Local, Global, and Universal groups, and when to use them.
Organize users into appropriate groups for easy policy and access management.
Organizational Units (OUs) and Delegation
Delegation Wizard: Allows granular control over which permissions are delegated (e.g., password resets, account
creation).
AD Replication Overview:
How data is replicated between domain controllers to ensure consistency.
Intra-Site Replication: Replication within a site (fast, frequent) using high-speed LAN.
Inter-Site Replication: Replication between sites (slower, scheduled) using WAN links.
Understanding AD Sites and Subnets:
Site: Represents a physical location where domain controllers reside.
Subnet: Associates a range of IP addresses with a site for optimal traffic routing.
Replication Topology:
Knowledge Consistency Checker (KCC): Automatically generates the replication topology.
Bridgehead Servers: Designated domain controllers that handle inter-site replication.
Replication Protocols:
RPC over IP: Default protocol for intra-site replication.
SMTP: Used for inter-site replication in specific scenarios.
Backup, Recovery, and Maintenance in AD
Maintenance Tasks:
Defragmenting the AD Database: Ensuring optimal performance by periodically defragmenting the NTDS.DIT database.
Monitoring AD Health: Using tools like dcdiag, repadmin, and Event Viewer to monitor the health of AD and resolve
replication issues.
Active Directory Design for NLDC system
At the five ALDC sites, the authentication and authorization requests will be carried out by the primary domain controller at the main NLDC.
In case, the primary domain controller is not working, the failover scenarios will be explained in the later sections.
Flexible Single Master Operations (FSMO)
Roles:
FSMO roles are logical roles that carry out tasks related to the integrity of the AD Database. Main
AD server BDNAD01 hold the 5 roles.
Schema Master: This role is responsible for maintaining and modifying the Active Directory schema, which
defines the types of objects, attributes, and relationships that can be created within the directory.
Domain Naming Master: This role is responsible for controlling the addition or removal of domains in the
forest. It ensures that each domain name is unique.
Infrastructure Master: This role is responsible for updating references from objects in its domain to objects in
other domains. It’s crucial for cross-domain object referencing.
Relative ID (RID) Master: This role is responsible for processing RID pool requests from all domain controllers
in a particular domain. It’s essential for creating unique identifiers for each object.
PDC Emulator: This role is the authoritative time server for a domain and handles password changes. It’s
also responsible for creating group policy objects.
The second server will be designated to take over the roles in case of failure of the primary
domain controller.
Failover Scenarios
1. Normal Scenarios:
Under normal scenario, there will be two operational physical servers in both
the main and backup NLDC.
Users will establish a connection to the domain through the primary domain
controller of the main NLDC.
The primary domain controller in the main NLDC will manage the devices in
the main and backup NLDC.
Below mentioned figure illustrates the normal scenario of the Active Directory.
2. Failover scenario of primary domain controller in main
NLDC:
In case the primary domain controller in the main NLDC fails, the
additional domain controller will detect this failure and it will contain
all the information that was on primary domain controller by the Active
Directory replication process explained in previous sections.
Entire main NLDC failover scenario Entire backup NLDC failover scenario
THANK YOU