ch02 - Seneca - School of Information & Communications

advertisement
Implementing Active Directory
Lesson 2
Skills Matrix
Technology Skill
Objective Domain
Objective #
Installing a New Active
Directory Forest
Configure a forest or a
domain
2.1
Establishing and
Maintaining Trust
Relationships
Configure trusts
2.2
Configuring Active
Directory Lightweight
Directory Services
Configure Active
Directory Lightweight
Directory Services (AD
LDS)
3.1
Configuring a Read-Only
Domain Controller
Configure the Read-Only
Domain Controller
(RODC)
3.3
Server Manager
• Located in Administrative Tools.
– Can also be accessed by right-clicking My
Computer and selecting Manage.
• Allows you to:
– Add roles such as DNS server or Active
Directory Domain Services role.
– Perform system diagnostics.
– Configure system services.
– Drill down into specific administrative tools.
Server Manager
Requirements for Active Directory
• A server running Windows Server 2008 Standard
Edition, Windows Server 2008 Enterprise Edition,
or Windows Server 2008 Datacenter Edition (Full
version or Server Core).
• An administrator account and password on the
local machine.
Requirements for Active Directory
• An NT file system (NTFS) partition for the SYSVOL
folder structure.
– 200 MB minimum free space on the previously
mentioned NTFS partition for Active Directory
database files.
– 50 MB minimum free space for the transaction log
files.
– Transmission Control Protocol/Internet Protocol
(TCP/IP) must be installed and configured
• An authoritative DNS server for the DNS domain
that supports service resource (SRV) records.
– Recommends to support incremental zone transfers
and dynamic updates.
Installing Active Directory
• To install
Active
Directory,
you will need
to first add
the Active
Directory
Domain
Services role
using Server
Manager.
Installing Active Directory
Installing Active Directory
• The Active Directory Installation Wizard, dcpromo,
will guide you through any of the following
installation scenarios:
– Adding a domain controller to an existing
environment.
– Creating an entirely new forest structure.
– Adding a child domain to an existing domain.
– Adding a new domain tree to an existing forest.
– Demoting domain controllers and eventually
removing a domain or forest.
Choosing the Deployment Configuration
Post-Installation Tasks
• Upon completion of the Active Directory
installation, you should verify a number of
items:
– Application directory partition creation.
– Aging and scavenging for zones.
– Forward lookup zones and SRV records.
– Reverse lookup zones.
Application Partitions
Aging and Scavenging of DNS Records
• Aging and scavenging are processes that
can be used by Windows Server 2008 DNS
to clean up the DNS database after DNS
records become “stale” or out of date.
• Without this process, the DNS database
would require manual maintenance to
prevent server performance degradation and
potential disk-space issues.
Aging and Scavenging of DNS Records
DNS Records
• Make sure Forward Lookup zone is created.
• Make sure Host (A) record is created for your
server.
• Make sure DNS domain nodes are created:
– _msdcs
– _sites
– _tcp
– _udp
DNS Records
Domain Name System (DNS)
• Provides name resolution for a TPC/IP
network.
• Active Directory requires DNS as the default
name resolution method.
• Example Resource Records (RR):
– Host (A) – Host name to IP.
– Pointer (PTR) – IP to Host name.
– Service (SRV) – Locator service for
LDAP/Domain controllers services.
FUNCTIONS OF DNS
YOU MUST REMEMBER THESE
• DNS PROVIDES NAME RESOLUTION (BOTH
FORWARD AND REVERSE NAME RESOLUTION)
• DNS FUNCTIONS AS A SERVICE LOCATOR
FOR SERVICES OFFERED BY ACTIVE
DIRECTORY DOMAIN CONTROLLERS.
• DNS PROVIDES A NAMING CONTEXT FOR
ACTIVE DIRECTORY.
Raising the Domain Functional Level
• Open Active
Directory Domains
and Trusts from
the Administrative
Tools folder.
• Right-click the
domain you wish
to raise and select
Raise Domain
Functional Level.
Raising the Forest Functional Level
• Open Active Directory Domains and Trusts
from the Administrative Tools folder.
• Right-click the Active Directory Domains and
Trusts icon in the console tree and select
Raise Forest Functional Level.
Raising the Forest Functional Level
• If your domains have not all been raised to
at least Windows Server 2003, you will
receive an error indicating that raising the
forest functional level cannot take place yet.
If all domains have met the domain
functionality criteria of Windows Server
2008, you can click Raise to proceed.
Removing Active Directory
• Click the Start menu, key dcpromo and then
press Enter.
• Use dcpromo /forceremoval to remove AD
without having the DC try to synchronize any
changes with replica dc’s in the domain.
Schema Management Console
• Some commercial applications such as Microsoft
Exchange will modify the schema as a part of their
installation process.
• You can also extend the schema manually using
the Active Directory Schema snap-in.
• To modify the schema manually, you must be a
member of the Schema Admins group.
• The Active Directory Schema snap-in should be
installed on the domain controller holding the
Schema Master Operations role.
Installing the Schema Management Snap-in
• From a command prompt, key regsvr32
schmmgmt.dll.
• Close the Command Prompt window, click
Start, and then select Run.
• Key mmc /a in the dialog box and click OK.
• Click the File menu and select Add/Remove
Snap-in.
Trust Relationship
• Trust relationships exist to make resource
accessibility easier between domains and
forests.
• Many trust relationships are established by
default during the creation of the Active
Directory forest structure.
• Trust relationships can be created using the
Active Directory Domains and Trusts from
the Administrative Tools folder.
Trust Relationships
• Four trust types can be manually established in
Windows Server 2008:
– Shortcut trusts - Used to shorten the “tree-walking”
process for users who require frequent access to
resources elsewhere in the forest.
– Cross-forest trusts - Allows you to create two-way
transitive trusts between separate forests.
– External trusts - Used to configure a one-way nontransitive trust.
– Realm trusts - Allows you to configure trust
relationships between Windows Server 2008 Active
Directory and a UNIX MIT Kerberos realm.
Revoking a Trust Using Netdom
• Open a command prompt and type the
following text:
Netdom trust TrustingDomainName
/d:TrustedDomainName /remove
• Press Enter.
• Repeat these steps for the other end of the
trust relationship.
User Principal Name (UPN)
• The name of a system user in an e-mail
address format.
username@domainname
• Based on Internet RFC 822.
• UPN’s are stored in and resolved from the
Global Catalog
Changing the Default Suffix for User Principal
Names
• Open Active Directory Domains and Trusts
from the Administrative Tools folder.
• Right-click Active Directory Domains and
Trusts and choose Properties.
• Click the UPN Suffix tab, key the new suffix,
and click Add.
• Key more than one suffix if your forest has
more than one tree and then click OK.
SID vs GUID – are they the same? - NO
• SIDs (Security IDentifiers) are used for access control.
GUIDs (Globally Unique IDentifiers) are used for replication- objects
are identified by their GUIDs when DCs are determining what to
replicate.
SIDs identify security principals, while GUIDs identify objects in
the directory- whether or not they're security principals.
SIDs are variable-length; GUIDs are 128 bits in length. A portion of
the SID for every security principal in a given domain is the same
(because it identifies the domain), whereas GUIDs are generated based
on things such as the replica of the AD database in which the object
was created, the time at which it was created, and so forth. SIDs, on
the other hand are simply sequentially generated within a domain and
are comprised of the domain's SID and a RID (relative IDentifier
within the domain).
All of the above refers to GUIDs in the context of AD, not hardware.
GUID DEFINITION AND USES
•
•
•
•
•
•
•
A globally unique identifier or GUID (pronounced /ˈɡuːɪd/ or /ˈɡwɪd/) is a unique reference number
used as an identifier in computer software. The term GUID also is used for Microsoft's implementation
of the Universally Unique Identifier (UUID) standard.
The value of a GUID is represented as a 32-character hexadecimal string, such as {21EC2020-3AEA1069-A2DD-08002B30309D}, and is usually stored as a 128-bit integer. The total number of unique
keys is 2128 or 3.4×1038 — roughly 2 trillion per cubic millimeter of the entire volume of the Earth.
This number is so large that the probability of the same number being generated randomly twice is
extremely small.
Database servers can use GUIDs to create unique row identifiers, solving the chicken and
egg problem inherent with sequential row IDs.
Microsoft Windows uses GUIDs internally to identify the classes and interfaces of COM
objects. A script can activate a specific class or object without having to know the name
or location of the dynamic linked library that contains it.
Intel's GUID Partition Table, a system for partitioning hard drives. (GPT)
ActiveX, a system for downloading and installing controls in a web browser, uses GUIDs to
uniquely identify each control.
SecondLife uses GUIDs for identification of all assets in its world.
Summary
• Active Directory requires DNS to be installed.
DNS does not have to be installed on a
Windows Server 2003 machine, but the
version of DNS used does need to support
SRV records for Active Directory to function.
• Planning the forest and domain structure
should include a checklist that can be
referenced for dialog information required by
the Active Directory Installation Wizard.
Summary
• Verification of a solid Active Directory installation
includes verifying DNS zones and the creation of
SRV records.
– Additional items, such as reverse lookups, aging,
and scavenging, also should be configured.
• Application directory partitions are automatically
created when Active Directory integrated zones are
configured in DNS.
– These partitions allow replica placement within the
forest structure.
Summary
• System classes of the schema cannot be
modified, but additional classes can be
added. Classes and attributes cannot be
deleted, but they can be deactivated.
• Planning forest and domain functionality is
dependent on the need for down-level
operating system compatibility.
– Raising a forest or domain functional level is
a procedure that cannot be reversed.
Summary
• Four types of manual trusts can be created:
shortcut, external, cross-forest, and realm
trusts.
• Manual trusts can be created by using Active
Directory Domains and Trusts or netdom at a
command line.
Summary
• UPNs provide a mechanism to make access
to resources in multiple domains userfriendly.
• UPNs follow a naming format similar to
email addresses.
• You must be a member of the Enterprise
Admins group to add additional suffixes that
can be assigned at user object creation.
Download