Standard Effective Date 01/27/2014 Chapter Name Networking Chapter Number 6.5.S.2 Last Review 01/27/2014 Last Revision 12/17/2015 Next Review FY18 Title Active Directory Delegation Standards And Administration 1.0 Purpose This standard describes the general structure of AD in regards to management delegation, and the requirements imposed upon Eastern Michigan University (EMU) Organization Unit Administrators (OUAs). OUAs have the responsibility and authority to manage the computers, groups, and Group Policy Objects (GPOs) for the University entity to which they are assigned. Because this responsibility and authority can disrupt the normal computing operations of the University entity, a level of knowledge of Active Directory is required. This standard defines those requirements. 2.0 Governing Policy Number/Document Name 6.5 Active directory Delegation Policy Effective Date November 13, 2012 3.0 Standard OU Design & Delegation OUs will be created as needed by the Active Directory Administrators (ADA) group for each unit (college or division) of the university. Each University entity may have its own OU. OUAs will be delegated access to the appropriate OU(s) based on their job function within the University. OUA Recommendation(s) Upon approval of the ADA group, an OUA will be granted the authority to manage an OU. Because this authority can significantly affect the computing resources of a unit, staff members must be recommended by the college or divisional head to be delegated as an OUA for a unit. This recommendation must be submitted to the ADA group in writing by the appropriate college or divisional authority. The ADA group will typically review submissions within 10 business days of submission, and will respond in writing. The response will include either approval of the requested OUA, or with specific reason(s) why the request was denied. Any denied requests can be appealed to the Director of Network and Systems Services in writing. OUA Qualifications OUA candidates should be fluent in AD technology. They should have, at minimum, a conceptual understanding of the major components of AD including forests, domains, OUs, sites, Group Policy Objects (GPOs), and domain local, global, and universal security groups. They should also have an understanding and some basic experience with the standard troubleshooting steps and tools available for handling Group Policy issues, such as the use of the Resultant Set of Policies (RSOP) tool. IT Standard Form Version 3.0 Page 1 of 3 Certifications held by the candidate relevant to Active Directory can be used as reasonable indicators that a staff member is appropriately qualified to become an OUA. Further qualifications for approval of an OUA may be required by the ADA group based on the university function(s) of the requesting unit and its specific AD management requirements. Any necessary qualifications specific to the unit will be reviewed with the requestor upon submission of the OUA delegation request. OUA Rights OUAs have the ability to create (add), modify, and delete computers, groups, and GPOs in their delegated OU(s). User objects will be added to an OU upon request of the OU’s OUA to the ADA group, and must only consist of the type of users necessary for service accounts. I.T. support for OUAs I.T. staff in the ADA group provides support to OUAs in local units. OUA support shall be provided in response to e-mails sent to ad-admins@emich.edu. AD Administrators are generally available to handle support requests from OUAs during normal business hours.
The ADA group will be expected to: • • • • Communicate and coordinate with (OUAs) to minimize disruption to end users. Notify OUAs about all scheduled maintenance. Work with OUAs to restore deleted AD objects. Meet response and resolution times associated with service-related incidents. For more information, please refer to EMU’s IT Policy web site. OUA Responsibilities 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. IT Standard Agree to the policies, procedures, standards, and guidelines for OUA Administrators. Work closely with the Active Directory Administrators (ADA) group to ensure the smooth functioning of AD relevant to their University entity. Adhere to the EMU AD naming standards 6.5.S.1. Add, delete, and modify computer and group objects within their assigned OU(s). Add, delete, modify, and troubleshoot GPOs within their assigned OU(s). Maintain proper security groups and authorization policies within their assigned OU(s). Provide contact information for OUAs to the IT Help Desk in case of emergency. Maintain security of all objects within their OU(s). Report problems to the ADA group immediately via phone call or text message. Follow industry standard security best practices (e.g. least privilege). Immediately follow the incident response procedure and email it-security@list2.emich.edu if a security vulnerability or compromise is discovered. Provide I.T. with contact information for OU administrators and notify I.T. of changes. Subscribe to the AD list (ad-admins@emich.edu). This is the primary means that I.T. communicates changes to department administrative personnel. Test changes announced by the Campus Active Directory service administration and any local or OU specific changes. Complete all testing in the appropriate test environment. Provide critical information to I.T. in a timely manner when requested for purposes of resolving user issues. Respond to data validation and audit requests from the University Auditor or IT Security. Provide Tier 1 support for users in the supported departments. Page 2 of 3 Unless other arrangements are made with I.T., OUAs must also: 1. Manage and support local resources and services. Examples include servers, laptops, desktops, and printers, creation of file shares and groups, and access management. 2. Keep member server licensing current. 3. Maintain member server OS & hardware maintenance. 4. Keep workstations and member servers within their OU(s) secure. 5. Monitor member servers regularly. 6. Keep server and workstation operating systems within the boundaries of Microsoft’s Mainstream Lifecycle Support (http://support.microsoft.com/gp/lifeselect). 7. Provide feedback on the quality and timeliness of service that I.T. provides relative to Active Directory. ADAs reserve the right to remove any workstation or member server from the domain that has not been properly secured and poses a threat to the safety of the network. 4.0 Responsibility for Implementation The Director of Network and System Services is responsible for implementation of this standard. 5.0 Definitions Term Active Directory (AD) Organizational Unit Administrators (OUAs) AD Objects Group Policy Object (GPO) AD Administrators (ADAs) Organizational Unit (OU) 6.0 Revision History Description Policy Committee Approved by CIO IT Policy Committee 1st review IT Policy Committee 2nd review Approved by CIO IT Standard Definition A centralized directory service for networked computers that enables central management of authentication, user accounts, applications, and policy enforcement. Local / college technical staff members who have been delegated rights that enable them to manage AD objects for a unit. Computers, groups, users, and group policy objects. A GPO is a collection of Group Policy settings, stored at the domain level as a virtual object consisting of a Group Policy container (GPC) and a Group Policy template (GPT). The GPC, which contains information on the properties of a GPO, is stored in Active Directory on each domain controller in the comain. The GPT contains the data in a GPO and is stored in the Sysvol in the /Policies subdirectory. GPOs affect users and computers that are contained in sites, domains, and OUs. I.T. staff members who have responsibility for administering the AD forest, domain, and services. A container for holding computers, groups, and applying group policies. Approval Date January 23, 2014 January 27, 2014 August 6, 2015 December 10, 2015 December 17, 2015 Page 3 of 3