Week 10 – Manage Multiple Domains and Forest • Configure Domain and Forest Functional Levels • Manage Multiple Domains and Trust Relationships • Active Directory Certificate Services 1 Understand Functional Levels • Domain functional levels • Forest functional levels • New functionality requires that domain controllers (DCs) are running a particular version of Windows® Windows 2000 Windows Server® 2003 Windows Server 2008 • Active Directory Domains and Trusts • Cannot raise functional level while DCs are running previous versions of Windows • Cannot add DCs running previous versions of Windows after raising functional level 2 Domain Functional Levels • Windows 2000 Native • Windows Server 2003 Domain controller rename Default user and computer container redirection lastLogonTimestamp attribute Selective authentication on external trust relationships • Windows Server 2008 Distributed File System Replication (DFS-R) of SYSVOL Fine-grained password policy Advanced Encryption Services (AES 128 and AES 256) for Kerberos 3 Forest Functional Levels • Windows 2000 • Windows Server 2003 Forest trusts Domain rename Linked-value replication Support for Read-Only domain controllers (RODCs) • Requires adprep /rodcprep and one writeable Windows Server 2008 DC Improved Knowledge Consistency Checker (KCC) algorithms and scalability Conversion of inetOrgPerson objects to user objects Support for dynamicObject auxilliary class Support for application basic groups and Lightweight Directory Access Protocol (LDAP) query groups Deactivation and redefinition of attributes and object classes • Windows Server 2008 No new features; sets minimum level for all new domains 4 Define Your Forest and Domain Structure • Dedicated forest root domain • Single-domain forest Single domain partition, replicated to all DCs Single Kerberos policy Single Domain Name System (DNS) namespace • Multiple-domain forest Increased hardware and administrative cost Increased security risk • Multiple trees • Multiple forests 5 Move Objects Between Domains and Forests • Inter-forest migration: Copy objects • Intra-forest migration: Move objects • Active Directory Migration Tool (ADMT) Console, command line, scriptable APIs “Simulation” mode: Test the migration settings and migrate later • Security identifiers, security descriptors, and migration sIDHistory Security Translation: NTFS, printers, SMB shares, registry, rights, profiles, group memberships • Group membership 6 Understand Trust Relationships • Extends concept of trusted identity store to another domain • Trusting domain (with the resource) trusts the identity store and authentication services of the trusted domain. • A trusted user can authenticate to, and be given access to resources in, the trusting domain • Within a forest, each domain trusts all other domains • Trust relationships can be established with external domains B A Trusting Domain Trusted Domain 7 Characteristics of Trust Relationships • Direction • Transitivity • Automatic or Manual Trusting domain C Trusted domain A B Trusted domain Trusting domain 8 How Trusts Work Within a Forest Forest Root Domain Tree Root Domain tailspintoys.com wingtiptoys.com europe.tailspintoys.com usa.wingtiptoys.com asia.wingtiptoys.com 9 Shortcut Trusts tailspintoys.com wingtiptoys.com europe.tailspintoys.com usa.wingtiptoys.com asia.wingtiptoys.com 10 External Trusts and Realm Trusts tailspintoys.com worldwideimporters.com asia.tailspintoys.com europe.tailspintoys.com sales.worldwideimporters.com 11 Forest Trusts tailspintoys.com worldwideimporters.com asia.tailspintoys.com europe.tailspintoys.com sales.worldwideimporters.com 12 Administer Trust Relationships • Validate a trust relationship Active Directory Domains and Trusts netdom trust TrustingDomainName /domain:TrustedDomainName /verify • Remove a manually created trust relationship Active Directory Domains and Trusts netdom trust TrustingDomainName /domain:TrustedDomainName /remove [/force] /UserD:User /PasswordD:* • UserD is a user in the Enterprise Admins or Domain Admins group of the trusted domain 13 Domain Quarantine • Filters out trusted user SIDs that come from a domain other than the trusted domain • If a user was migrated into the trusted domain User account may have SIDs from user’s previous domain in the sIDHistory attribute Those SIDs are included in the user’s privilege attribute certificate (PAC) that is part of the Kerberos ticket the user presents to the trusted domain These SIDs are discarded • Enabled by default on all new outgoing trusts to external domains/forests • Disable if necessary netdom trust TrustingDomainName /domain:TrustedDomainName /quarantine:[Yes|No] 14 Resource Access for Users from Trusted Domains • Giving trusted users access to resources Authenticated Users Add trusted identities to trusting domain’s domain local groups Add trusted identities to ACLs • Selective authentication Reduces the risk of exposure--for example, to Authenticated Users You specify which trusted users are allowed to authenticate on a server-by-server (computer-bycomputer) basis Enable selective authentication in the properties of the trust Give users Allowed To Authenticate permission on the computer object in Active Directory 15 Components of a PKI Solution PKI Provides: Confidentiality, Integrity, Authenticity, and Non-repudiation Is a standards approach to security-based tools, technologies , processes, and services used to enhance the security of communications, applications and business transactions Relies on the exchange of digital certificates between authenticated users and trusted resources CA Digital Certificates Public Key–Enabled Applications and Services Certificate Templates Certificates and CA Management Tools CRLs and Online Responders AIA and CDPs Validating Certificates by Using PKI Solutions PKI-enabled applications use CryptoAPI to validate certificates. Certificate Discovery Path Validation Revocation Checking How AD CS Supports PKI AD CS CA CA Web Enrollment Online Responder NDES Overview of CA CA Issues a Certificate for Itself Verifies the Identity of the Certificate Requestor Issues Certificates to Users, Computers, and Services Manages Certificate Revocation Types of CAs Root CA • Is the most trusted type of CA in a PKI • Is a self-signed certificate • Issues certificates to other subordinate CAs • Certificate issuance policy is typically more rigorous than subordinate CAs • Requires physical security policy Subordinate CA • Is issued by another CA • Addresses specific usage policies, organizational or geographical boundaries, load balancing, and fault tolerance • Issues certificates to other CAs to form a hierarchical PKI Stand-Alone Versus Enterprise CAs Stand-Alone CAs Enterprise CAs Requires the use of AD DS Stand-alone CA must be used if any CA (root or intermediate / policy) is offline, because a stand-alone CA is not joined to an AD DS domain Users provide identifying information and specify type of certificate Does not require certificate templates All certificate requests are kept pending until administrator approval Can use Group Policy to propagate certificate to trusted root CA certificate store Publishes user certificates and CRLs to AD DS Issues certificates based upon a certificate template Supports autoenrollment for issuing certificates Usage Scenarios in a CA Hierarchy Root Root Subordinate Subordinate S/MIME EFS RAS India Canada Location Certificate Use Root Root Subordinate Subordinate Manufacturing Engineering Departments USA Accounting Employee Contractor Partner Organizational Unit What Is a Cross-Certification Hierarchy? Cross-Certification at the Root CA Level Root CA Subordinate CA Organization 1 Root CA Subordinate CA Organization 2 Cross-Certification Subordinate CA to Root CA Root CA Subordinate CA Organization 1 Root CA Subordinate CA Organization 2 Considerations for Installing a Root CA Computer Name and Domain Membership Name and Configuration Certificate Database and Log Location Validity Period Planning a Root CA # CSP Default: 2048 Key Character Length Certificate Hash Algorithm Private Key Configuration Considerations for Installing a Subordinate CA Computer Name and Domain Membership Name and Configuration Certificate Database and Log Location Validity Period Planning a Root CA # CSP Default: 2048 Certificate Hash Algorithm Key Character Length Private Key Configuration Request Certificate for Subordinate CA How the CAPolicy.inf File Is Used for Installation The CAPolicy.inf file is stored in the %Windir% folder of the root or subordinate CA. This file defines the following: Certification Practice Statement (CPS) Object Identifier (OID) CRL Publication Intervals CA Renewal Settings Key Size Certificate Validity Period CDP and AIA Paths What Are CRLs? Base CRLs + All Revoked Certificates Lesser Publication Interval Large Size Client Computer Using Any Version of Windows Delta CRLs - Last Base CRL Certificate Greater Publication Interval Small Size Client Computer Using Windows® XP or Windows Server® 2003 How CRLs Are Published Delta CRL#3 Delta CRL#2 Cert5 Cert7 Cert5 Revoke Cert5 Revoke Cert7 Time Cert3 Cert3 Cert5 Cert7 Base CRL#1 Base CRL#2 Where to Publish AIAs and CDPs Publish the root certificate CA and URL to: • Active Directory • Web servers • FTP servers Offline Root CA • File servers External Web Server FTP Server Active Directory Internet Firewall Firewall Internal Web Server File Server