CHAPTER 6
ACTIVE
DIRECTORY SERVICES
Lesson 1:
Overview of Active Directory Services
Active Directory services is the directory service included with Windows 2000 Server. It is secure,
distributed, partitioned and replicated. It can work well for a few hundred objects to thousands
of servers and millions of objects.
Active Directory services is completely integrated with Windows 2000 Server and offers the
hierarchical view, extensibility, scalability, and distributed security required by all business
customers. Active Directory services allows administrators, developers, and end users to
gain access to a directory service that is seamlessly integrated with both Internet and intranet
environments.
Active Directory services integrates the Internet concept of namespace with the operating
system’s directory service. A namespace is a structured collection of information in which
names can be used to symbolically represent another type of information, such as a host
name representing an IP address, and in which specific rules are established that determine
how names can be created and used.
Active Directory Services is not an X.500 directory. Instead, it used LDAP as the access
protocol and supports the X.500 information model without requiring systems to host the
entire X.500 overhead. The
result is a high level of interoperability that supports real-world
heterogeneous networks.
NOTE: For information on how LDAP uses X.500, see the Supplemental Course Materials
CD-ROM (\chapt01\articles\RFC 1777.txt) that accompanies this book.
Active Directory services allows a single point of administration for all published resources,
such as files, peripheral devices, host connections, databases, Web access, users, services,
and other objects. It uses the Internet Domain Name System (DNS) as its locater service,
organizes objects in domains into a hierarchy of organizations units (OUs), and allows multiple
domains to be connected to a tree structure.
Administration is further simplified because there is no primary domain controller (PDC)/backup
domain controller (BDC) structure, as was implemented in Windows NT Server.
=====================================================================
winser6.html PAGE 2 2001/01/17
Instead Active Directory services uses domain controllers only, and all domain controllers are
peers. An administrator can make changes to any domain controller, and the updates will be
replicated to all other domain controllers.
Understanding Active Directory Concepts
There are several new concepts introduced with Active Directory services. They are schema,
global catalog, namespace, and naming conventions.
Extensible Schema
The Active Directory schema contains a formal definition of the contents and structure of the
Active Directory store, including all attributes, classes, and class properties. For each object
class, the schema defines what attributes an instance of the class must have, what additional
attributes it can have and what object class can be a parent of the current object class.
Installing Active Directory services on the first domain controller in a network creates a default
schema. The default schema contains definitions of commonly used objects and properties,
such as users, computers, printers and groups. The default schema also contains definitions
of objects and properties that Active Directory services uses internally to function.
The Active Directory schema is extensible, which means that you can define new directory
object types and attributes and new attributes for existing objects.
The schema is implemented and stored within the Active Directory store itself (in the global
catalog) and can be updated dynamically.
Extending the Schema
Extending the Active Directory schema is an advanced operation intended to be performed
by experienced programmers and system administrators.
WARNING: Extending the schema is a highly sensitive operation, with implications potentially
throughout the network. Schema extension is best handled programmatically and only when
absolutely necessary. Improper schema modifications can impair or disable Windows 2000
Server and possibly your entire network.
=====================================================================
winser6.html PAGE 3 2001/01/17
Global Catalog
When you initially install Windows 2000, the first domain controller, by default is the Global
Catalog Server. The global catalog is the central repository of information about objects in a
domain tree (a collection of domains that form a domain hierarchy) or forest (a collection of
domain trees that are part of different hierarchies).
Active Directory services generates the contents of the global catalog from the domains that
are part of the directory via the normal replication process. The Active Directory replication
system automatically builds the
global catalog and generates the replication
topology.
The global catalog is a service as well as a physical storage location that contains a replica
of selected attributes of every object in the Active Directory store. The process of partial
replication allows many common queries to be resolved from the global catalog without
requiring a lookup in the source domain. By default, the attributes stored in the global
catalog are those most frequently used in search operations (such as a user’s first and
last names, logon name and so on) and those necessary to locate a full replica of the object.
NOTE: Be careful when changing the Schema, only experienced programmers and systems
administrators should be altering it.
When you are installing Active Directory services on the first domain controller, that domain
controller, is the default, a global catalog server. A global catalog server is a domain
controller that stores a copy of the global catalog.
Additional domain controllers can also be designated as global catalog servers by using the
Active Directory Sites and Services snap-in. When considering which domain controllers to
designate as global catalog servers, you should base the decision on the ability of the network
structure to handle replication and query traffic. More global catalog servers, the greater the
replication traffic. However, the availability of additional servers can provide quicker
responses to user inquiries. It is recommended that every major site in the enterprise have a
global catalog server.
Advantage of Multiple Global Catalogs:
Geographic locations do not have to travel over the wire to get information.
=====================================================================
winser6.html PAGE 4 2001/01/17
Namespace
Active Directory services, like all directory services, is primarily a namespace. A namespace
is any bounded area in which a name can be resolved. Name resolution is the process of
translating a name into some object or information that the name represents. See page 243,
or the diagram below:
microsoft.com
div1.microsoft.com div2.microsoft.com
dept1.div1.microsoft.com dep1.div2.microsoft.com
dept2.div1.microsoft.com dept2.div2.microsoft.com
Using a common namespace allows you to unify and manage multiple hardware and software
environments in your network. There are two types of namespaces:
Contiguous namespace. The name of the child object in an object hierarchy always contains
the name of the parent domain. A tree is a contiguous namespace.
Disjointed namespace. The names of a parent object and a child of the same parent object
are not directly related to each other. A forest is a disjointed namespace.
=====================================================================
winser6.html PAGE 5 2001/01/17
Naming Conventions
Every object in the Active Directory store is identified with a name. Active Directory services
uses a variety of naming conventions: distinguished names, relative distinguished names,
globally unique identifiers, and user principal names. Active Directory services is an LDAP-
compliant directory service, which means, that all access to directory objects occurs through LDAP.
Distinguished Name
Objects are located within Active Directory domains according to a hierarchical path, which
includes the labels of the Active Directory domain name and each level of container objects.
Every object in the Active Directory store has a distinguished name (DN). The DN uniquely
identifies an object and contains sufficient information for a client to retrieve the object from
the directory.
The following example is a DN that identifies the James Smith user object in the Microsoft.com
domain:
CN=JAMES^SMITH, CN=Users, DC=Microsoft, DC=COM
D:\Data\Report\xyz.doc (is a distinguished name, it is the exact path from the root)
The delimiters and values used in the DN for James Smith are identified in the following table:
======================================================================
LDAP Delimiter Value Represents
======================================================================
DC COM Domain component
DC Microsoft Domain component
CN User Common name
CN James Smith Common name
======================================================================
NOTE: that the Active Directory snap-in tools do not display the LDAP abbreviations
(O=, DC=, CN=). O= organizational Name C = Country Name.
Relative Distinguished Name
In Active Directory services, you can search for an object even if you don’t know the exact DN
or if the DN has changed. This can be accomplished by querying an object’s attribute. One of
an object’s attribute is its relative distinguished name (RDN), which is a part of the full DN name.
=====================================================================
winser6.html PAGE 6 2001/01/17
Active Directory services allows duplicate RDNs for objects, but no two objects with the same
RDN can exist within the same OU. For example is an OU contains a James Smith user account,
you could not add another James Smith to it. However, it the OU contains two smaller OUs,
such as Manager and Sales, the Managers OU can contain a James Smith user account and the
Sales OU can contain a James Smith user account because each of these users would have a
different DN.
For example, Patti@corp301.com. It would be grayed out, and you would not have to select.
Globally Unique Identifier
Every object in the Active Directory store has a unique identity. Objects might be moved or
renamed, but their identity never changes. The identity of an object is defined by a globally
unique identifier (GUID), a 128-bit number that is assigned by the Directory System Agent
(DSA) when the object is created.
Unlike a distinguished name or a relative distinguished
name, a GUID never changes, even if
you move or rename the object.
In Windows NT, domain resources were associated to a security identifier (SID), which was
generated within the domain. This meant that the SID was guaranteed to be unique only
within the domain.
The GUID is stored in an attribute, objectGUID, that is present on every object. The object
GUID attribute is protected so that it cannot be altered or removed.
User Principal Name
A user principal name (UPN) is a friendly name that is shorter than the DN and easier to
remember. The UPN format is the user name, the “@” character, plus a user principal
name suffix.
For example, user James Smith in the Microsoft.com tree might have a UPN of
Active Directory Architecture
The structure of Active directory services can be broken into several primary architectural
components: the data model, schema, security model, and administration model.
=====================================================================
winser6.html PAGE 7 2001/01/17
Data Model
The Active Directory data model is derived from the X.500 data model. The directory
holds objects that represent various components of the network, and each of the objects
is described by attributes.
Schema
The Active Directory schema is implemented as a set of object class instances stored in
the directory. The schema can be updated dynamically. Like every object in the Active
Directory store, schema objects are protected by access control lists (ACLs), so only
authorized users may alter the schema.
Security Model
The directory is part of the Windows 2000 Trusted Computing Base and is a full participant
in the Windows 2000 security infrastructure. The Trusted Computing Base is the set of
operating system components responsible for enforcing the security policies of the operating
system. The Windows 2000 access validation routines use the ACL to validate any attempt
to access an object or attribute in the Active Directory store.
Administration Model
A user is authorized by a higher authority to perform a specified set of actions on a specified
set of object instances and object classes in some identified subtree of the directory. This is
called delegated administration. Delegated administration allows granular control over who
can do what and enables delegation of authority without granting elevated privileges.
The DSA is the process that manages the directory’s physical storage. Clients use one of the
supported interfaces to connect to the DSA and then search for read and write directory objects
and their attributes.
Access to Active Directory Services
Access to Active Directory services is via wire protocols. Wire protocols define the formats of
messages and interactions of client and server. Various APIs or application programming interfaces
give developers access to these protocols.
=====================================================================
winser6.html PAGE 8 2001/01/17
Protocol Support
Active Directory services supports the following protocols:
because of their dependence on the OSI network protocol:
· Directory Access Protocol (DAP)
· Directory System Protocol (DSP)
· Directory Information Shadowing Protocol (DISP)
· Directory Operational Binding Management Protocol (DOP)
Application Programming Interfaces
Active Directory services provides powerful, flexible, and easy-to-use APIs.
Active Directory Service Interfaces
To make it easier to write directory-enabled applications that access Active Directory services
and other LDAP-enabled directories, Microsoft developed Active Directory Service Interfaces
(ADSI). ADSI is a set of extensible, easy-to-use programming interfaces that can be used to
write applications to access and manage the following:
Services (NDS)
ADSI is part of Open Directory Services Interfaces (ODSI) and Windows Open Services
Architecture (WOSA).
=====================================================================
winser6.html PAGE 9 2001/01/17
ADSI extracts the capabilities of directory services from different network providers to present
a single set of directory service interfaces for managing network resources.
ADSI makes it easier to perform common administrative tasks, such as adding new users,
managing printers, and locating resources throughout the distributed computing environment.
ADSI makes it easier to perform common administrative tasks, such as adding new users,
managing printers, and locating resources throughout the distributed computing environment
ADSI objects are designed to meet the needs of three main audiences:
Developers. Typically the audience will use ADSI with a compiled language such as
C++, and write an application to manage multiple directories, network printing, backup
databases, and so on.
System Administrators. This audience will access ADSI through a scripting language,
such as Microsoft Visual Basic, although C/C++ can also be used to enhance performance.
Users. Like the system administrators, this audience will access ADSI through a scripting
language. For example, a user might write a script to locate all print jobs in a group of print
queues and display the status of each.
LDAP C API
The LDAP C API provides a lowest common denominator solution for developers who
need their applications to work on many different client types.
Windows Messaging API
Active Directory services provides support for MAPI so that legacy MAPI applications
will continue to work with Active Directory Services.
Virtual Containers
Active Directory services supports virtual containers, which allow any LDAP-compliant
directory to be accessed transparently via Active Directory services.
Directory Service Architecture
Active Directory functionality can be illustrated as a layered architecture in which the layers
represent the server processes that provide directory services to client applications. The
three service layers (DSA, Data-base Layer, and Extensible Storage Engine) accommodate
the different types of information that are required to locate records in the directory database.
=====================================================================
winser6.html PAGE 10 2001/01/17
Active Directory services architecture includes the following key service components:
Directory System Agent (DSA). Builds a hierarchy from the parent-child relationship
stored in the directory.
Database Layer. Provides an abstraction layer between applications an the database.
Extensible Storage Engine (ESE). Communicates directly with individual records
in the directory data store on the basis of the object’s RDN attributes.
Data store (the database file Ntds.dit). This file is manipulated only by the
Extensible Storage Engine (ESE) database engine. You can administer the file by using
the Ntdsutil tool.
NOTE: Ntdsutil.exe is installed in %systemroot%\system32 when Windows 2000 Server is installed.
The Interfaces
Clients gain access to Active Directory by using mechanisms that are supported by the DSA.
=====================================================================
Interface Description
=====================================================================
LDAP Provides API for LDAP clients and exposes the ADSI so that
Additional applications can be written that can talk to the
Active Directory Services.
REPL Used by the replication service to facilitate Active Directory
Replication via RPC over IP or SMTP, simple mail transport
Protocol.
SAM Provides down-level compatibility to facilitate
Communication between Windows 2000 and NT 4.0
Domains.
MAPI MAPI clients, such as Microsoft Outlook messaging and
Collaboration client, connect to the DSA by using the
=====================================================================
winser6.html PAGE 11 2001/01/17
Directory System Agent
Collaboration client, connect to the DSA by using the
The DSA is the Active Directory process that runs on each domain controller and manages all the
directory service functions. This process manages the directory’s physical storage.
The DSA provides access to the store, which is the database file containing directory information
located on a hard disk. DSA is an X.500 term that describes the server-side process that creates
an instance of a directory service, that is applications binding to a DSA.
Object Identification
Every object in the Active Directory store has a permanent GUID associated with a string form of
the object name. The object name is not permanent; it can be changed. All permanent references to
the object are kept in terms of the GUID.
Transaction Processing
Transactions are processed automatically. A write request either commits, and all of its effects are
durable, or it fails before completion and has no effect. Transactions are written synchronously to
the transaction log file and then to the database.
Schema Enforcement of Updates
The duplication and synchronization of directory information is known as multimaster replication.
In a multimaster system, a change to a schema object in one replica might conflict with existing
objects in that replica and also with objects in other replicas. The schema is a formal definition
of every object class that can be created in the directory, the attributes of each object class, and
the possible parents for every object class. In Windows 2000, schema change is a single-master
operation, which means that any change you make on the master is updated on all other replicas.
Access Control Enforcement
The DSA enforces security limitations in the directory. The DSA layer reads SIDs on the
access token.
=====================================================================
winser6.html PAGE 12 2001/01/17
Support for Replication
The DSA contains the hooks for replication notifications. All object updates ultimately must go
through the appropriate function for the directory service to work properly.
Referrals
DSA manages the directory hierarchy information (referred to as knowledge), that it receives
from the database layer. DSA is responsible for cross-references of Active Directory domain
object up and down the hierarchy and also out to other domain hierarchies.
Database Layer
The database layer provides an object view of database information by applying schema semantics
to database records, thereby isolating the upper layers of the directory services from the underlying
database system.
Active Directory services provides a hierarchical namespace. Each object is uniquely identified
in the database by its individual naming attribute, called the RDN. The RDN and the chain of
successive parent object names make up the object’s DN.
A major function of the database layer is to translate each DN into an integer structure called
the DN tag, which is used for all internal accesses.
The database layer is responsible for the creation, retrieval, and deletion of individual records,
attributes within records, and values within attributes.
Extensible Storage Engine
Active Directory services is implemented on top of an Indexed Sequential Access Method
(ISAM) table manager. An earlier version of this table manager, called the JET database, is
used by Microsoft Exchange Server version 5.5 client-server messaging and groupware, the
File Replication Service, the security configuration editor, the certificate server, Windows
Internet Name Service (WINS), and various other Windows components. Windows 2000
has a new and improved version of the JET database, the ESE.
The ESE (Esent.dll) implements a transacted database system that uses log files to ensure that
committed transactions are indeed
safe. By default, Esent.dll and Ntds.dit are stored in the
%systemroot%\system32
folder.
=====================================================================
winser6.html PAGE 13 2001/01/17
The ESE stores all Active Directory objects. The ESE can support a database of up to 16
TB in size, which can theoretically hold many millions of objects per domain.
The ESE is well suited to the storage needs of Active Directory services:
failures.
do not have values.
Active Directory services comes with a predefined schema that defines all the attributes
required and allowed for a given object. For example if a user object already has 50
attributes defined in the schema and you create a user with only four attributes; storage
space is allocated for those four attributes. If more attributes are added later, more
storage is allocated for them.
Also, the EXE is able to store attributes that can have multiple values. For example, the
database can store multiple phone numbers for a single user without requiring a different
phone number attribute for each phone number.
Lesson Summary:
distributed security required by all business customers. Active Directory services
integrates the Internet concept of namespace with the operating system’s directory service.
integrating multiple namespaces.
the Active Directory store, including all attributes, classes and class properties.
a forest, is a service and a physical storage location that contains a replica of selected
attributes of every object in the Active Directory store.
Lesson 2:
Planning Active Directory Implementation
Before you implement a Windows 2000 network environment, you should first consider
how to implement Active Directory services. First you must plan the DNS namespace.
The namespace includes a domain hierarchy, the global catalog, trust relationships, and
replication.
=====================================================================
winser6.html PAGE 14 2001/01/17
In a single domain, users and resources can be organized by using a hierarchy of OUs to
reflect the structure of the company. Finally, the planning process for the Active Directory
implementation must include a plan to establish sites that can effectively facilitate the
management of replication and logon traffic over links in your enterprise.
Planning a Namespace
Similar to DNS, the Active Directory namespace is the top-level fully qualified domain
name for a company consisting of Windows 2000 domain, domain controllers, OUs,
trust relationships, and domain trees.
One of the decisions you need to make when implementing Active Directory services is
whether the internal namespace (inside the firewall) or the external namespace (outside
the firewall) will be the same or separate. Simply put, will the Active Directory namespace
match the DNS namespace (typically the Internet domain name) that might already be
defined for your organization?
NOTE: This is not to say that DNS is an external namespace only. The point is that, if the
namespaces are separate, Active Directory services will be administered separately from the
external namespace.
Internal and External Namespaces
A namespace is the top-level Active Directory domain name for an organization.
Scenario 1: Same Internal and External Namespaces
In this scenario, the company uses the same name for the internal and external namespaces.
Microsoft.com is uses both inside and outside the company. To implement this scenario,
the following requirements must be met:
and external servers (both sides of the firewall).
company resources or resolve names.
=====================================================================
winser6.html PAGE 15 2001/01/17
For this scenario to work, you must have two different DNS zones. There will be one
working on the outside of the firewall, and on the inside of the firewall.
Advantages of using the same name inside and outside the firewall:
Internet.
to use the same logon name both internally and externally. For example,
username@microsoft.com would serve as both the logon and e-mail ID.
Disadvantages of using the same name:
different between internal and external resources.
external resources.
Scenario 2: Separate
Internal and External Namespaces
The two namespaces for the internal and external must be registered with the DNS.
Registering both names prevents duplication of the internal name by another public network.
Two zones will be established. One zone will resolve Microsoft.com and the other
zone will resolve expedia.com. The client can clearly distinguish between the internal and
external name.
Advantages of using separate names for internal and
external:
resources is clear.
easily managed environment.
lists need to contain only expedia.com when identifying external resources.
=====================================================================
winser6.html PAGE 16 2001/01/17
Disadvantages of separate names for internal and external:
Logon names are different from e-mail names. For example if someone logs on as
user@microsoft.com but his e-mail address is unername@expedia.com , he must
remember and maintain separate user names.
Multiple names must be registered with an Internet DNS.
TIP: In this scenario, logon names are different by default. An Administrator can use
the Microsoft Management Console (MMC) to change the UPN suffix properties of
users so that the user logon will match the e-mail address of the user.
Defining a Namespace Architecture
You should consider the impact of replication traffic over the WAN. Additionally,
organizations and their structure change constantly. The goal is to have a namespace
architecture that is scalable, can adapt to change, can distinguish between internal and
external resources, and can protect company data at the same time.
You should have the system designed in the following manner:
This structure provides a granular replication topology and the ability to limit the scope of
administrators as necessary.
Root Domain
A root domain is the first domain in the namespace, like expedia.com. The root domain in Active
Directory services maps to the company namespace. All internal domains are a part of this domain
tree. Also, servers containing the namespace root will not exist on the public side of the firewall
and therefore will not be visible to the Internet.
First-Layer Domains
In this layer you should create names that do not change, or
are static names.
=====================================================================
winser6.html PAGE 17 2001/01/17
The easiest way is to create a name based on geographical
location. For example,
Microsoft.com. However, global catalog servers still make it possible for a user in North
The trust relationship between the root and all first-layer domains make resources available
to all branches of the domain tree. Therefore, a user in noamer.expedia.com can access a
resource in Europe.Microsoft.com
Domain names at this layer should be at least three characters long so that they do not
conflict with the ISO 3166 standard.
*** See the naming
samples on page 262, they are only suggestions **
Second-Layer Domains
Ideally, domains at this layer should be countries only and branch off of their corresponding
first-layer domain. The benefit of this method is that child-level domains can be created
below the second-layer domains.
Planning Organizational Units
OUs should reflect the details of the organization’s business structure. Create OUs to
delegate administrative control over smaller groups of users, groups, and resources. Because
top-level OUs can hold additional levels of OUs, one can extend the level of details as far as
necessary.
OUs eliminate the need to provide users with administrative access at the domain level to
perform tasks such as creating computer accounts and setting passwords.
OUs inherit security policies from the parent domain and parent OU unless they are specified
disabled.
Creating the OU Structure
In the design phase, you should create an OU for the first domain in the namespace. Then,
use that domain and OU structure as a model for any domains added to the enterprise.
When you create an OU, you must give careful consideration on who should control the
objects. You should determine which administrator will have access and which ones
should not.
=====================================================================
winser6.html PAGE 18 2001/01/17
OU Design Guidelines
Use the following guidelines when creating OUs for your enterprise:
tasks efficiently.
As you begin to design the OU structure, remember to create OU and object names that are
hierarchical, uniform static, and general enough to use in any domain in the enterprise.
One method to creating the OU structure for the first domain is to name the top-level OUs,
which become headers that define the more detailed OUs and objects beneath them.
If there are multiple domains in the design, determine whether the OU structure can be used
across all domains. If not rethink the design.
Structure of OU Hierarchy
Many organizations base their domain structure on a model that mirrors their business. The
following categories provide different ways to classify your OU hierarchy:
Administration or Object-Based OUs
In Active Directory services, you can create OUs based on objects, such as users, computers,
applications, groups, printers, security policies and more. When administration-based OUs are
created in a logical and meaningful manner, it helps administrators do their jobs quickly and easily.
=====================================================================
winser6.html PAGE 19 2001/01/17
Geographical-Based OUs
If you expect your company to change geographically, you may not want to base your OU
naming structure on that.
Business Function-Based OUs
You can create OUs based on business functions, such as marketing, IT, and operations.
Department-Based OUs
Create OUs that mirror a department’s cost center association. This will become unstable if
the company does some restructuring.
Project-Based OUs
Use this type of OU model to align a cost center with a project rather than with a department.
Some organizations’ business is project-driven, for example,
software developers, the airline
industry, and more. This is not a recommended OU structure because it is not considered static.
Planning a Site
Up to this point it have revolved around the logical structure. It is important to consider the
physical layout also. The physical design of a Windows 2000 Server-based network is
demarcated by site. A site is a combination of one or more IP subnets connected by a
high-speed link. Often, a site has the same boundaries as a local area network (LAN) or
a very high-bandwidth WAN like an OC3 SONET (155 Mbps) or T3 (45MBps) WAN.
The Active Directory replication engine allows you to differentiate between replication that
takes place over a local network connection and replication that takes place over a
low-bandwidth WAN connection. Network traffic within a site will generally be greater
than traffic between sites. There are two ways to set up your sites:
Workstation logon. When a user logs on, Active Directory services enabled
clients will try to find a domain controller in the same site as the user’s computer
to service the user’s logon request and subsequent request for network information.
=====================================================================
winser6.html PAGE 20 2001/01/17
Directory replication. The schedule and path for replication of a domain’s directory can be
configured differently for intersite replication, as opposed to replication within a site.
Generally, set replication between sites tends to be less frequent than replication within a site.
In Active Directory, sites are not part of the namespace. When you browse the network
you will see users grouped into domains and OUs, not sites. Sites contain only computer
objects and connection objects used to configure intersite replication.
When planning how to group subnets into sites, consider the connection speed between
subnets. Use the following guidelines when planning to combine subnets into sites:
dedicated to replication traffic.
performance.
Domain structure and site structure are maintained separately in Active Directory services.
A single domain can span multiple sites, and a single site can include multiple domains or
parts of multiple domains.
******* See diagram page 267 *******
Optimizing Workstation Logon Traffic
When planning sites, consider which domain controllers that workstations on each subnet
should use. To have a particular workstation log on to a specific set of domain controllers,
define the sites so that only those domain controllers are in the same site as that workstation.
When planning sites, consider where the domain controllers will be located. Because each
domain controller must participate in directory replication with the other domain controllers
in its domain, you must configure sites so that replication occurs at times or intervals that
will not interfere with network performance.
.
=====================================================================
winser6.html PAGE 21 2001/01/17
=====================================================================
Create
Workstations a Site?
Notes
=====================================================================
One to five NO Users are authenticated across a slow link.
The slow link will not be subjected to domain
Replication traffic.
More than five YES Locate domain controllers locally to speed up
authentication of users in the local site.
replication traffic can be set to occur on
slow links at off peak times and at less
intervals.
====================================================================
Lesson Summary:
OUs and the sites.
firewall.
the top-level domain name outside the firewall.
and reliable network connections.
Lesson 3:
Implementing Active Directory Services
To launch the Active Directory Installation wizard, run Configure Your Server, which is located
on the Administrative Tools menu, of the Start menu, and then select the Active Directory link.
As you install Active Directory services, you can choose either to add the new domain controller
to an existing domain or create the first domain controller for the new domain.
=====================================================================
winser6.html PAGE 22 2001/01/17
Adding a Domain Controller to an Existing Domain
If you choose to add a domain controller to an existing domain, you create a peer domain
controller. Peer domain controllers are used for redundancy and to reduce the load on the
existing domain controllers.
Creating the First Domain Controller for a New Domain
If you choose to create the first domain controller for a new domain, not only will you be
creating a new domain controller, but also a new domain. You can select a new child
domain or a new domain tree.
When you create a new domain tree, the new domain is not part of an existing domain.
At this point, you can create a new forest or domain trees or join an existing forest.
*** See
the diagram page 271 ***
CAUTION: Running dcpromo.exe on a domain controller allows you to remove Active
Directory services from the domain controller and demote it to a stand-alone server. If you
remove Active Directory services from all domain controllers in a domain, you also delete
the directory database for the domain, and the domain no longer exists.
The Database and Shared System Volume
When you install Active Directory services, the database, the database log files, and the
shared system volume are automatically created.
The Active Directory Database
The database is the directory for the new domain. The
default location for the database and
database log file is %systemroot%\Ntds. But, you can change the path if you want.
For best results place the database and the log file on separate hard disks. Consider placing
the database on a hardware-level redundant array of independent disks (RAID) implementation
such as RAID5 or RAID-10 (mirrored and striped disks) for fault tolerance and performance.
=====================================================================
winser6.html PAGE 23 2001/01/17
The directory database is actually stored in a file named Ntds.dit.
The Shared System
Volume
The shared system volume is a folder structure that exists on all Windows 2000 domain controllers
and stores scripts and some of the group policy objects. The default location for the shared
system volume is %systemroot%\Sysvol, and it must be on and NTFS partition.
Replication occurs every 10 minutes.
Domain Modes
There are two domain modes:
Mixed Mode and Native mode.
Mixed Mode
When you upgrade a domain controller it will run in Mixed mode, and it can interact with any
domain controller running Windows NT 3.51 or 4.0.
Also, a Windows 2000 Server computer always wins an election to become the master browser.
Native Mode
When all domain controllers in a domain run Windows 2000 Server, and you do not plan to
add any domain controllers below, you can switch the domain from Mixed to Native mode.
longer have any domain controllers in your domain that are not running Windows 2000 Server.
controllers are now peers.
NOTE: The change from Mixed mode to Native mode is one way only; you cannot change from
Native mode to Mixed mode.
=====================================================================
winser6.html PAGE 24 2001/01/17
Lesson Summary:
Windows 2000 Server computer.
new domain tree.
controller runs in Mixed mode.
can switch to Native mode.
Lesson 4:
Administering Active Directory Services:
Once you have installed Active Directory Services, you are ready to create objects. You can
manage the objects, such as create, modify or delete objects when needed.
Creating Organizational Units and Their Objects
Active Directory objects are what represent resources. Each object is a distinct named set of
attributes that represent a specific network resource. Resources are printers, accounts, groups
etc., an object is created for each.
Before you create objects, you should create the OU that the object will go into.
Creating Organization Units
You can create an OU under a domain, under the Domain Controller object, or within another
OU. Once you create an OU you can add the objects to the OU.
Naturally you need the required permissions to create the OUs. By default, members of the
Administrators group have the permissions to create OUs.
OUs are created to organize the network, and simplify administration. Think of it as Tupperware
containers used to organize toys in a closet!!!!.
You should create OUs for any of the following reasons:
=====================================================================
winser6.html PAGE 25 2001/01/17
objects to which you have given them access. Permissions can easily be changed for an OU
to restrict access to confidential network information.
You can create an OU in the Active Directory Users and Computers snap-in by selecting the
domain or existing OU where you want to create the new OU.
To Refresh type this command at the
Command Prompt:
Secedit^refreshpolicy^machine_policy (you can make a batch file refresh.bat)
Adding Objects to Organizational Units ***IMPORTANT***
The objects you add to the OUs is determined by the rules of the schema, wizard, or
snap-in you use.
NOTE: Object attributes (also referred to as properties) in the schema are categories of
information that defines the characteristics for all instances of a defined object type. All
instances of a certain object type have the same attributes. The attribute values of any
object instance make it unique. For example, all instances of a user object have a First
Name attribute: however, the value for the First Name attribute can be any name, such
as Linda or Max.
You can create object instances in the Active Directory Users and Computers snap-in.
Select the OU that you want to add the object to, click the Action menu, point to New,
and then click the name of the object type that you want to add.
=====================================================================
winser6.html PAGE 26 2001/01/17
Active Directory Objects
Active Directory Objects use Icons to represent the objects.
=====================================================================
Object
Description
=====================================================================
Computer A computer on the network
Contact Contacts are typically used to represent
External users for the purpose of e-mail.
Group A group object can contain users, computers,
and other groups.
Printer A Printer object is a network printer that has
been published in the directory. The object is
actually a pointer to the printer.
User A user object is a security principal in the
Directory. The information in this object
allows a user to log on to Windows 2000.
Shared Folder A shared folder object is a network share that
has been published in the directory.
======================================================================
Managing Active Directory Objects
The process of managing Active Directory objects involves several different tasks, such as locating
objects, modifying and deleting objects, and moving objects. You must have the proper permissions
to add, delete or modify objects.
Locating Objects
The global catalog is similar to the yellow pages, or a type of index. It only has the most important
parts of Active Directory and it can be used to locate a user by keying in on the name, address or
phone number.
The contents of the global catalog are automatically generated by Active Directory services from
the domains that make up the
directory. In essence the global catalog is an abbreviated version of
Active
Directory.
=====================================================================
winser6.html PAGE 27 2001/01/17
To locate Active Directory objects, open the Active Directory Users and Computers snap-in located
in the Administrative Tools folder. Then right click a domain or OU in the console tree, and click Find.
The Find option searches the global catalog for the user account or name you are searching for.
The Main Windows
The main windows contains two tabs: the object tab and Advanced tab. The Find Drop-down
Menu (type of objects to include in the search) and the In Drop-down menu (location that you
want to search, which can be the entire Active Directory store, a specific domain, or an OU.)
By default, the domain you are in is selected.
Users, Contacts, and Groups Tab
The tab contains Name and Description text box. You can search in one or both. The search
is based on the combination of the two. You can also use wild cards in either text box to
conduct a search.
Advanced Tab
The Advanced tab provides you with advanced search features that you can use in conjunction
with the object tab or use by themselves.
====================================================================
Field Description
====================================================================
Field List of attributes for which the search is performed.
Condition The methods that are available to further define the search for
an attribute.
Value The value for the condition of the field (attribute) value that
You are using to search the directory.
====================================================================
Search Criteria The definition of the search criteria.
=====================================================================
winser6.html PAGE 28 2001/01/17
Results Windows
The results window opens at the bottom of the main window and displays the results of your
search after you click Find Now, which is located on the main windows.
Modifying Attribute Values and Deleting Objects
You can add and modify objects. The value of the attribute associated with the object changes.
NOTE: Do not confuse modifying an object’s attribute values with adding, deleting, or
modifying objects or attributes in the schema. Schema modifications are permanent and are
replicated to all domain controllers in the forest.
You can modify the attributes by opening the Active Directory Users and Computers snap-in.
For the Action menu, access the properties to make the changes. You can also delete objects
from this menu.
Moving Objects
You can move objects in Active Directory to other locations, such as other OUs. This option
is also in the Active Directory Users and Computers snap-in.
Controlling Access to Active Directory Objects
Windows 2000 uses an object-based security model to implement access control for all Active
Directory objects. This security model is similar to the one that Windows 2000 uses to
implement NTFS security.
Managing Active Directory Permissions
Use Active Directory Security permissions to gain access to the object and what type of access
is allowed. Don’t forget the Owner of the object or the Administrator must be the one assigning
the permissions to the object. There is a ACL for every object in Active Directory.
=====================================================================
winser6.html PAGE 29 2001/01/17
Object Permissions
The object type determines which permissions you can select. A user can be a member of multiple
groups and have different
permissions for each group, only unique to that group. The users effective
permissions are the combination of the users permissions and the group permissions.
You can allow or deny permissions. Denied permissions take precedence over any allowed
permissions for user and groups. Deny always overrides, when you are combining permissions.
If you have a user permission deny, and a Full Control permission for a group, that the user is
part of, the users effective permissions Deny.
NOTE: Always ensure that all objects have at least one user with the Full Control permission.
Failure to do so might result in some objects being inaccessible to the person who is using the
Active Directory Users And Computers snap-in, even an administrator.
Assigning Active Directory Permissions
Standard permissions are sufficient for most administrative tasks. There are additional special
permissions on the Advanced Tab and the View/Edit.
Permissions Inheritance
When you are setting up permissions you can deselect the Inheritance box, and you can set up
the permissions up from scratch. The box is Allow Inheritable Permissions From Parent To
Propagate To This Object.
To prevent inheritance, Windows 2000 will allow you to do
the following:
of permissions, remember.
previously inherited permissions.
=====================================================================
winser6.html PAGE 30 2001/01/17
Delegating Administrative Control of Objects
You can delegate administrative controls of objects to individuals so that they can perform
administrative tasks on the objects. There are different ways to delegate control of objects, and
there are also guidelines for delegating control
You can assign permissions to a user who can act as an Administrator of certain objects. These
objects can be within a Container. This Administrator can delegate the following types of control:
object, such as assigning the permission to reset passwords on a user account object.
It is easier to track permissions at the OU level than the
Object level.
To help you delegate administrative control, follow these guidelines:
Delegation of Control Wizard
This option is in the Active Directory Users And Computers snap-in and select the OU for which
you want to delegate control.
Guidelines for Administering Active Directory Services:
Follow this list of best practices:
administrators.
are important to your organization.
any objects.
=====================================================================
winser6.html PAGE 31 2001/01/17
whom you delegate responsibility understand their responsibility and know how to
perform the administrative tasks.
Lesson Summary:
the directory.
they can be responsible for a certain set of
attributes. This can be done at Active
permissions at all.