









Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Active Directory is a directory service. The term directory service refers to two things — a directory where information about users and resources is stored and a service or services that let you access and manipulate those resources.
Typology: Study notes
1 / 15
This page cannot be seen from the preview
Don't miss anything!
Active Directory is a directory service. The term directory service refers to two things — a directory where information about users and resources is stored and a service or services that let you access and manipulate those resources. Active Directory is a way to manage all elements of your network, including computers, groups, users, domains, security policies, and any type of user-defined objects. It melds several NT services and tools that have functioned separately so far — User Manager for Domains, Server Manager, Domain Name Server — and provides additional functions beyond these services and tools.
Active Directory is built around Domain Name System (DNS) and lightweight directory access protocol (LDAP) — DNS because it is the standard on the Internet and is familiar, LDAP because most vendors support it. Active Directory clients use DNS and LDAP to locate and access any type of resource on the network. Because these are platform-independent protocols, Unix, Macintosh, and other clients can access resources in the same fashion as Windows clients.
The Microsoft Management Console (MMC) is used to implement and manage Active Directory. The goals of Active Directory are the same as those we identified in the discussion of domain models (Chapter 4). The two most important are
Active Directory allows central control and decentralized administration of mixed NT 4.0 and 2000 Server domains. Clients can be 2000 Server workstations and servers, Windows 95, Windows 98, or any other system that has the Active Directory add-on installed.
Because Active Directory is a Microsoft product, most of this discussion focuses on 2000 Server’s implementation of Active Directory. Where applicable, we include information about how Unix can integrate with Active Directory.
In the world of Active Directory, clients and servers interact in the following manner:
Active Directory is one of the main features that distinguishes 2000 Server from NT 4.0 and previous versions. This newest implementation of the directory services is a response to the often-stated, and possibly warranted, criticism that NT is not designed to be an enterprise- wide solution. In an enterprise environment, Active Directory provides the following benefits:
may have administrators who have a great deal of authority over a particular directory or group of directories but few, if any, rights over other directories. Rights can be granted down to the attribute (object property) level.
Active Directory’s beauty is that it can scale up or down and functions equally well providing simple directory services or more complex levels of administration. Besides supporting LDAP, Active Directory supports HTTP.
The next section focuses on the structure of Active Directory and how it differs from NT 4. Directory Services.
Active Directory is best understood from bottom to top. As an organization becomes larger and more complex, bottom-level units can be joined to make higher-level units. For example, domains can be joined in a hierarchical way to make domain trees , and domain trees can be joined with trusts to make domain forests. We look at the hierarchy of units (from bottom to top) in the following sections.
Simple Objects Simple objects include computers, groups, users, security policies, and user-defined objects. Objects have attributes, some of which are mandatory and some of which are optional. To view objects in 2000 Server Active Directory, click Start and select Programs, Administrative Tools, Directory Management. Then select Advanced on the View menu to bring up a window similar to Figure 7.1.
In Figure 7.1, note that seven objects are under the domain object, acernt5dom, and eight objects are under the highlighted object Builtin. To find the properties and attributes of any object, simply highlight and right-click the object and select Properties. The properties of Builtin are shown in Figure 7.2.
As Figure 7.2 shows, the object pathname is acernt5dom.foretell.ca/Builtin, and the object class is builtinDomain. The creation date is 9/4/98 5:25:24 p.m. (the time and date that Active Directory for 2000 Server was configured), and the modification date is 9/14/98 4:35:37 P.M. (the last time that we looked at Builtin’s subdirectories). USN stands for Update Sequence Number; Active Directory uses it to keep track of the most recent copy of an object. (USNs are covered in more detail in “Replication” later in this chapter.)
Organizational Units Organizational units (OUs) are a new object type within 2000 Server’s Active Directory. They
The logical domain structure and the physical domain structure don’t have to be the same. Active Directory lets you create sites to mirror the physical domain structure. Computers linked with high-speed, reliable network links can be grouped in one site, while computers linked with lower speed lines can be partitioned into separate sites.
Suppose that you have a department that contains several local subdepartments and several remote subdepartments connected with a slow link. A good logical partitioning would have the department as a domain and each subdepartment represented by an OU. The physical partitioning, however, would group the local domain and local OUs into one site and leave each remote subdepartment as its own separate site.
The physical domain structure is managed with the Active Directory Sites and Services Manager, which you access by clicking Programs, Administrative Tools. Figure 7.5 shows a site that has been automatically configured on a 2000 Server domain controller.
The site has the default name Default-First-Site-Name. To create a new site, highlight Sites and select Action, New Site. Type the new site name (the name must not include spaces), as shown in Figure 7.6.
Highlight a site link name — in this case, there’s only one choice, DEFAULTIPSITELINK — then click OK. You’ve created a new site.
Active Directory renders obsolete the notion of primary and backup domain controllers. With Active Directory, each controller has a copy of the directory and any controller can initiate and replicate changes. To avoid conflicts, each controller maintains a table of update sequence numbers (USNs) in its database. The tables identify the latest copy of the directory received from every other controller.
Replication can occur at several levels:
Replication within a domain is automatic and transparent to the administrator. USNs determine the most recent copy of the directory database, and timestamps are used only to break a tie.
You can configure intrasite replication by selecting the NTDS settings of a server (domain controller) as shown in Figure 7.7.
Special Note: Replication doesn’t automatically take place between domains that are not part of the same site, even if they belong to the same domain tree or domain forest. Replication between sites takes place automatically only under the following two conditions:
Replications are tracked by the up-to-date vector , a number that represents the number of originating writes received from each controller within the domain. (An originating write is a change that has not been replicated, but has originated at the controller itself.) Each controller keeps a copy of the up-to-date vector within its database, along with the USN.
To provide fault tolerance, interdomain replication (within a site) is configured in a ring topology, ensuring there are two possible paths by which a domain controller can receive its directory database. A mechanism known as propagation dampening is used to cut down on the amount of network traffic this topology could generate. To understand this mechanism, let’s consider an example.
Let’s say you have three controllers — Server A, Server B, and Server C. On Server A, you make three password changes; the USN for this property change is 3 and because these property changes originated from the server itself, it is considered an originating write. The up-to-date vector count is therefore 3.
Let’s say, that Server A now replicates to Server C. Server C’s USN for the property change (password change on Server A) is incremented by 1. (Let’s say that originally this USN was 0, so now it is 1.) However, because the up-to-date vector for this property change is 3 on Server A, the up-to-date vector for the same property change becomes 3 on Server C. The following table summarizes this first replication:
Property change
Server A
Server B
Server C
USN Password change Server A 3 0 0 —>
Up-to-date vector Password change Server A 3 0 0 —>
Let’s say we now have two more password changes on Server A — the USN becomes 5 while the up-to-date vector becomes 5 as well. A replication now occurs between Server A and Server B. Server B’s USN for this property change (password change on server A) becomes 1 (assuming again that the USN was 0 before). The up-to-date vector, however, becomes 5 for this property change because it is 5 on Server A. The following table summarizes this second replication:
Property change
Server A
Server B
Server C
USN Password change Server A 5 0 —>1 1
Up-to-date vector Password change Server A 5 0 —>5 3
Now another replication occurs between Server A and Server C. Server C’s USN becomes 2, while the up-to-date vector for the property change becomes 5. The following table summarizes this third replication:
Property change
Server A
Server B
Server C
called security groups. These groups are automatically added when Active Directory is configured.
Active Directory Tree Manager The Active Directory Tree Manager snap-in becomes important when your network has multiple domains arranged in a domain tree. To view this snap-in, select Administrative Tools, Domain Tree Management. A window similar to Figure 7.11 appears.
Figure 7.11 shows only one domain — acernt5dom.foretell.ca — of object type domainDNS. Active Directory uses DNS as its locator service; therefore, DNS must be present in the domain.
If you right-click the domainDNS object and select Properties, you will see a dialog box similar to Figure 7.12.
In this dialog box, you perform the final transformation from mixed mode to native 2000 Server/Active Directory mode (if and when your system is entirely upgraded to 2000 Server).
Caution: As the warning in the lower portion of Figure 7.12 indicates, you can’t reverse the transformation from mixed mode to native mode. Once you have changed to a 2000 Server network, you can’t go back and install NT 4.0 computers or clients that aren’t enabled for Active Directory.
To manage individual domains in the domain tree, follow these steps:
Active Directory Sites and Services Manager Using the Active Directory Sites and Services Manager snap-in, it’s possible to create new sites and move domain controllers from one site to another. The Active Directory Sites and Services Manager also contains a Services subdirectory, with sub-subdirectories such as RAS, Windows NT, and Eap Entries. You can alter the security properties on these services. After selecting the desired service, you have two options. You can select Delegate Control from the Action menu and select the objects within the container for which certain user groups have permissions. Or you can select Properties, Security and assign permissions to objects or the properties of objects within the container.
A discussion of Active Directory isn’t complete without a discussion of DNS because Active Directory uses DNS as its locator service and can’t function without it. Accordingly, one of the most worthwhile things you can do before migrating to Active Directory is to standardize your network on DNS and rename your NT domains to correspond to DNS names.
To solve name resolution queries, Active Directory uses dynamic DNS, a new form of DNS that maintains and updates zone files dynamically. (Dynamic DNS is a powerful new service
featured in 2000 Server. See Chapter 6 for more information.)
Depending on your requirements, there are many different ways of configuring the Active Directory domains and domain trees to use DNS. For example, a domain namespace can be contained in one DNS zone or or in many zones. Generally speaking, a decentralized organization will have more zones, while a centralized organization will have fewer zones. More zones in a decentralized organization reduces the amount of traffic because DNS queries for a particular domain will be accessing a smaller zone file, which would ideally be located geographically close.
Special Note: Because Active Directory won’t work without DNS, when you configure your 2000 Server machine as a domain controller, you are asked whether you want to install the DNS service if a DNS server can’t be located. The release notes for 2000 Server suggest that it’s preferable to install the DNS service before upgrading your machine to a domain controller rather than selecting Y when prompted to install DNS. We chose to install DNS while configuring the machine as a domain controller — so far with no ill effect!
To add an Active Directory-integrated DNS zone to a domain, perform the following steps:
The same zone, acernt5do1.foretell.ca, is shown within the Active Directory Manager in Figure 7.14.
Active Directory queries are resolved in two ways:
The method used depends on the object attribute for which the user is searching. To avoid becoming too large and unwieldy, the global catalog retains only some of the attributes of objects, even though all objects themselves are indexed.
If the attribute upon which the query is based is present in the global catalog, the entire domain forest may be searched. If the attribute is not present, only the domain tree from which the search has been initiated may be searched. Therefore, it is prudent to limit your network to one domain tree if at all possible.
Performing searches within Active Directory is simple. First, access the Active Directory Manager, then select a subdirectory (for our example, Users). Right-click Users, then select Find from the drop-down menu. A dialog box similar to Figure 7.15 appears.
As you can see, you can perform two types of searches — “Users, Contacts and Groups” and Advanced. Figure 7.16 shows the results of a search for the user named Administrator within the domain acernt5dom.
More complex, SQL-type searches are possible using the Advanced tab. For example, Figure 7.17 shows the search for a group that begins with the letter A but isn’t Administrators.
The Find screen is very versatile — whichever kind of search you choose, you can browse for the container in which you want to perform the search and select whether you wish to search the domain or the entire directory. Interestingly, it isn’t possible to locate ordinary files using
Local logon takes place using the older mechanism, MSV1_0, also known as NTLM.
Kerberos is not, by itself, a public key authenticator. Instead, it is a three-sided shared-secret authenticator. The three sides are the client (C1), the KDC, and the server (S1). Microsoft plans to expand Kerberos to allow public/private key encryption. Under this model, the client (user) may obtain a ticket only if it has an X.509 version 3 certificate stored in its own User Object within the Active Directory. The user requests a ticket by querying the Active Directory for a public key certificate (by using his or her private key). If Kerberos locates the public key certificate, the Kerberos service issues one ticket for the user, and that ticket is used to issue the initial ticket granting ticket (TGT) described above.
When the client wishes to access another server on the same domain, the server can verify the client ticket without accessing Kerberos. Kerberos gives the server encryption key to the new server, which the server can use to decrypt the ticket. When the client wishes to access another server outside the domain, the authenticating servers contact the Kerberos service on that domain on behalf of the client using the following steps:
For Internet connection and smart cards, the SSL/TLS protocol is used. Based on public key authentication, X.509 version 3 certificates are either given by a Certificate authority such as Verisign or issued by the network’s own certificate server.
Special Note: A certificate consists of a key pair — a public key and a private key. Each key can decrypt messages encrypted by the other. Normally, the mechanism is as follows:
For machines running NT 4.0 or earlier, Windows NT LAN Manager was the authentication protocol. It will continue to provide authentication to or from computers running these earlier releases as long as they are present in the network.
Access Rights — Delegation and Distribution Under 2000 Server, Active Directory stores not only system policy information but also all
security information related to the objects contained within Active Directory. The security information, which is contained within a property known as the security descriptor , includes
Special Note: All objects, including attribute objects themselves, must have a security descriptor. The security descriptor is an object represented by the OID (object identifier) 2.5.5.15. OIDs are discussed further in “Object Identifier” later in this chapter.
Within the ACL are Access Control Entries, each containing the security principal (which is a user, group, or computer), and the type of access allowed. The ACL can contain both ACEs that refer to the whole object and ACEs that refer only to the properties of the object. In this way, permissions and rights can be assigned on a more refined (even property-by-property) basis.
Under 2000 Server, child objects within the domain inherit access permissions from their parent objects unless otherwise configured. This inheritance can be both a blessing and a curse. Alistair G. Lowe-Norris makes a very important point regarding inheritance in his article “Managing Permissions for NT 5.0’s Active Directory” ( Windows NT Magazine , July 1998). In the article, he explains that if you deny read access to a container object (let’s say an OU) for a particular group of users and accidentally leave the “Apply these permissions down the tree” box checked (the default), all objects in this OU aren’t visible to this group. To undo the damage, each OU must be examined to reinstate this permission — a daunting task if the OU contains many objects.
Special Note: Users and groups are the only non-container objects for which it is possible to assign permissions.
To see the rights and permissions for a particular object, open the Active Directory Service Manager within 2000 Server, select the object (let’s say a domain) from the tree in the left pane, then select Properties from the drop-down menu. In the Properties dialog box, switch to the Security tab, as shown in Figure 7.18.
Highlight the group or user for which you wish to see permissions. Several permissions show up on this page; you can see the rest by clicking Advanced. Figure 7.19 shows the permissions you can set using the Advanced button.
To see further information, highlight the group or user on this page — let’s use ForeTell\Authenticated Users — then click View/Edit. The permission property dialog box shown in Figure 7.20 appears, showing two tabs, Object and Properties.
The Object tab displays permissions for the group or user on the object itself. The Properties tab displays permissions for the group or user on the properties of the object (and any child objects). If these permissions are changed, the changes are, by default, propagated down the tree (but within the domain).
Like NTFS permissions and user rights under NT 4.0, permissions under Active Directory are cumulative, except for the Deny permission (like No access under NT 4.0), which overrides other permissions. If a user belongs to a group that has permission on a resource and the user is nested within a group that doesn’t have permission on the same resource, the user is denied access to that resource.
In the following sections, we look first at the tasks you should complete before you migrate
company. This division could then append any number from 0 through 228 -1^ to 1.2.3.4.5 (such as 1.2.3.4.5.1) to create a root OID for objects that it creates. Any objects created by this division would then have an OID 1.2.3.4.5.1. x , where x is from 0 through 228 -1.
It’s quite possible that your company has no desire whatsoever to create new objects. Even so, it’s a good idea to get an OID just in case.
PC Upgrades Migrating to 2000 Server and Active Directory has a downside — more memory. To install 2000 Server on a server, Microsoft recommends a Pentium Pro with at least 128 MB of RAM and a 2 GB hard drive. The upside is that all workstations and servers don’t have to migrate immediately, but some features won’t be present until all computers are enabled for the Active Directory. (These missing features are discussed further in “Mixed Environments” later in this chapter.)
Clean up SID Duplication Under normal circumstances, all security identifiers used to identify objects in an NT 4. domain are unique. However, in “10 Steps to Prepare for NT 5.0 Now,” Sean Daily mentions that some disk duplication utilities that clone NT systems can cause duplicate SIDs.
The best medicine is prevention. Don’t practice cloning if you’re planning to migrate to 2000 Server and Active Directory. However, if you’ve cloned in the past, it’s possible to use a product like SIDchanger from PowerQuest (www.powerquest.com), GHOSTWalker from Ghost Software (www.ghostsoft.com), or NTSID freeware by Mark Russinovich and Bryce Cogswell (www.ntinternals.com/ntutil.htm) to reassign unique SID numbers to each object (computer, group, or user) in an NT network.
Each domain model has its own migration issues. Below we look at the most important ones for each model.
Single Domain For many organizations, the single domain model is more than sufficient. If your network is currently configured as one NT domain, your job is basically complete. Once you receive 2000 Server, you may wish to subdivide your organization into OUs to provide more detailed control of your rights and permissions.
You can perform a single domain migration to 2000 Server and Active Directory (according to the Microsoft white paper Planning and Migrating to Active Directory ) in the two ways:
Master and Multiple-Master/Resource Domain As we mentioned earlier, OUs can replace many of the functions of domains. Where possible, you should group the OUs into one domain for the following reasons:
Microsoft’s white paper entitled Planning and Migrating to Active Directory contains a step-by- step approach to migrating from a master/resource model to a single domain with OUs. The following procedure is based on the section “Merging Second-Tier Domains into Master Domains.”
Complete Trust The complete trust model, in which a two-way trust is set up among all domains, is the most flexible but also the most difficult to administer. Everyone potentially has access to everything, and this access has advantages and disadvantages. It is up to you as the administrator to set the individual file and directory permissions so that highly confidential information (directors’ salaries, for example) can’t be accessed by all. Of course this is true with any network, but having the one-way trust can sometimes add an extra layer of protection above and beyond user rights and permissions.
Migrating a complete trust domain doesn’t differ greatly from migrating a master/resource domain. If possible, everything should be compiled into one domain or at the very least a domain tree. By pretending that one of the domains is the master domain and the rest are resource domains, the resource domains can be collapsed into the master domain in the same manner as outlined in the previous section.
If geography, network size, or company organization requires forming several domains, some of the domains could be labeled masters and the resource domains collapsed into the masters in the same fashion. Be aware that this procedure requires performing the migration many times. Two-way trusts are the default, but it’s possible to change those to one-way trusts. Of course, if company policy dictates that the domain structure remain as is, the same method could be used as is used for a single domain model — just many times.
It’s generally the case that the average enterprise networking environment consists of more than one operating system. It’s even more likely, as 2000 Server becomes available, that companies will choose to retain their NT 4.0 servers and workstations and integrate them gradually with the 2000 Server environment.
In the next sections, we focus on the how NT 4.0 and 2000 Server can coexist in a network