UW Windows Authentication Group

Slides:



Advertisements
Similar presentations
Tom Sheridan IT Director Gas Technology Institute (GTI)
Advertisements

How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Active Directory: Final Solution to Enterprise System Integration
Active Directory Production Pilot Project Department of Administration Enterprise Technology Services (ETS) ETS is a customer based team that provides.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Administering Active Directory
An Introduction to the Hennepin County Hennepin County GIS Technical Advisory Group (eGTAG) 10/20/2009.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Brian Arkills Software Engineer, LDAP geek, AD bum, and Associate Troublemaking Officer UW Windows Infrastructure.
Streamlining Support and Management through the Implementation of Active Directory Educause 2003 Mid-Atlantic Regional Gale D. Fritsche –
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Brian Arkills Software Engineer, LDAP geek, AD bum, Senior Heckler, and Associate Troublemaking Officer State of Windows Services at the UW.
UW Windows Authentication Group Multiple forest scenario task force - Testing report and recommendations.
Chapter 11: Directory Services. Directory Services A directory service is a database that contains information about all objects on the network. Directory.
Module 1: Introduction to Administering Accounts and Resources
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Natick Public Schools Technology Presentation February 6, 2006 Dennis Roche, CISA Director of Technology.
Managing Active Directory Domain Services Objects
Windows 2003 Overview Lecture 1. Windows Networking Evolution Windows for Workgroups – peer-to-peer networking built into the OS Windows NT – separate.
Designing Active Directory for Security
Designing Group Security Designing security groups Designing user rights.
Security Planning and Administrative Delegation Lesson 6.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 5: Active Directory Logical Design.
Module 7 Active Directory and Account Management.
Company Confidential 1 A Course on Global Catalog And Flexible Single Master Operations (Fsmo) Roles Prepared for: *Stars* New Horizons Certified Professional.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Hands-On Microsoft Windows Server 2008 Chapter 4-Part 1 Introduction to Active Directory and Account Manager.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Module 1: Introduction to Administering Accounts and Resources.
Introduction to Active Directory
Module 3: Managing Groups. Overview Creating Groups Managing Group Membership Strategies for Using Groups Using Default Groups.
11 GLOBAL CATALOG AND FLEXIBLE SINGLE MASTER OPERATIONS (FSMO) ROLES Chapter 4.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
Stop Those Prying Eyes Getting to Your Data
City-wide Active Directory Project Town Hall II
The Marshall University Experience with Implementing Project Server 2003 August 9, 2005 Presented by: Chuck Elliott, M.S. Associate Director, Customer.
Global Catalog and Flexible Single Master Operations (FSMO) Roles
Module 1: Introduction to Administering Accounts and Resources
Using Microsoft Identity Manger with SharePoint 2016 to fill the User Profile Sync Gap Max Fritz Senior Systems Consultant Now Micro.
Active Directory Administration
Active Directory Administration
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
MCSA VCE
THE STEPS TO MANAGE THE GRID
State of Windows Services at the UW
Unit 3 NT1330 Client-Server Networking II Date: 1/6/2016
DHCP, DNS, Client Connection, Assignment 1 1.3
PSJA AUTOMATION WORKFLOW AND LESSONS LEARNED
Unit 7 NT1330 Client-Server Networking II Date: 7/26/2016
FIM User Group BHOLD Eihab Isaac (FIM MVP) 11/14/2018
Networks Software.
PSC Group, LLc Office 365/SharePoint Online Migration traps and tricks
Examining a Windows NT Infrastructure (2)
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
SharePoint Online Hybrid – Configure Outbound Search
Enterprise Program Management Office
Security through Group Policy
From The Outside Looking In To The Inside Looking Out
System & Network Administration (MCSA & RHCSA)
Unit 6 NT1330 Client-Server Networking II Date: 7/19/2016
Security Planning and Administrative Delegation
Microsoft 365 Business Technical Fundamentals Series
CNT 4603: System Administration Fall 2010
Implementing a Distributed Enterprise Architecture to Deliver BI
Microsoft Virtual Academy
Presentation transcript:

UW Windows Authentication Group Multiple forest scenario task force - Testing report and recommendations

Background Refresher “WINAUTH” group established to consider alternatives to the existing UW Windows Forest, initial meeting 6/2005 Primary drivers: Security – known issue where compromise of any single domain within the forest could lead to compromise of the entire forest. This lead to a recommendation that departments leave the forest. “Nebula” did so this past summer, others done or in process. But…some expressed concern that the functionality provided by the forest was vital and that we need to facilitate sharing of resources not establish silos. Some in the UW forest were concerned about the “LABS” domain moving outside the forest, and losing some functionality in the process. (The “LABS” domain is used by some to authenticate any arbitrary UW user into a Windows based service without having to create separate domain based accounts.)

Active Directory Model Discussion If we want to facilitate sharing of resources, simply moving each department into their own forest is not the answer, instead it creates silos. We discussed three potential models that could be utilized instead: 1. Existing UW Forest – A single forest with multiple domains 2. Single Domain with Multiple Organizational Units 3. Multiple Forests with one-way trusts

Existing Model Single Forest Multiple Domains Allows easy sharing of resources But…existing security concern is unresolved Use of LABS domain was supported for EPLT only. Note: Central provisioning of accounts is provided by a custom developed application (“kiwi”) that currently has little to no staffing behind it. To date the code has run well however and it could be extended if given adequate resources.

Single Forest/Single Domain Multiple OU Model Widely used at other universities Facilitates sharing of resources Solves security issue related to domain administrator obtaining forest administrator credentials But…potentially difficult to do at UW given our highly decentralized environment. How OU’s are managed, in what OU objects are placed, and how management takes place could all be difficult questions that would have to be agreed upon

Multiple Forests with One-Way Trust Relationships Model All accounts are provisioned in a central accounts forest Departmental forests establish a one-way trust to that forest so they can utilized those centrally provisioned accounts if desired

Multiple forest testing To verify that a multi-forest scenario could potentially work for us, a task force was asked to do testing and report back Group consisted of: Brian Arkills, C&C Forest Administrator Scott Barker, Information School David Cox, EPLT Eugene Sherman, C&C Client Services Additional input received from: Andrew Benton, C&C Client Services Mark McNair, C&C Client Services

Testing Methodology Setup one “central account” forest Setup three “departmental” forests and established one-way trusts to the central forest Setup client PCs that were members of the various departmental forests All rolled out just as though they would be “for real” including creation of new DNS domains through the NOC All servers setup with Windows 2003 SP1, clients were XP SP2 Created a list of items that would be tested. This list was posted on a SharePoint site and various members took responsibility for testing each item and documenting their results.

Results Short answer – all scenarios worked but… Not always the same way as presently. Example: From a departmental forest, to assign rights to a user that has an account in the central forest (named uwlabs) we had to use the convention: userid@uwlabs.washington.edu rather than uwlabs\userid And you couldn’t “browse” to “pick” like you can in the existing forest.

Alternative proposal, a hybrid A single domain multiple OU model is the “standard” solution most commonly deployed by large universities While it takes coordination that doesn’t mean it isn’t worth doing FOR THOSE THAT WANT TO DO IT For those that don’t, we can still support the multiple forest with a one-way trust scenario. Departments that select this option can still leverage centrally provisioned accounts for some purposes, yet maintain complete freedom to do what they want at the same time

The delegation problem While we can make everything “work” from a technical perspective, to do so often raises management and delegation issues What OU’s do we create? Do all user objects go in a single OU, do we divide them by department? What rights are we willing to delegate? How are conflicts resolved (single user in multiple departments for example)? This is an implementation problem that will require careful planning, coordination and potentially supplemental funding

Recommendations We should adopt the hybrid model as our “vision” for the future We should share this vision with others (such as computing directors, existing forest members) and see if they agree and there is buy-in from the community Assuming the model is accepted, Nebula should become the “anchor” tenant of this new central forest and other forest member encouraged to participate We need to insure that automatic account provisioning and synchronization of important metadata to this central directory is done in a way that is reliable and can be fully supported This may require modification or support of the existing “kiwi” code, or evaluation of other synchronizations tools such as MIIS (Microsoft Identify Information Server) that are used by peer institutions Ideally this metadata should include both personal information (name, email address etc.) as well as group information (student, faculty, staff, course membership etc.)

Recommendations continued We as an institution must understand the value and importance of a campus Windows Active Directory infrastructure and support it just like any other enterprise service We should recognize that there may be many complimentary directories at UW over time, one may not solve everything The university should leverage this directory as needed to support other services. If there are commercial applications for instance that support active directory, we should not hesitate to deploy them using this infrastructure. Other applications (such as the various Catalyst Tools) also might be able to leverage this directory without having to build their own Work on other C&C initiatives such as the groups project should be reflected in this AD structure so even if we have multiple directories on campus, they are in sync If additional resources are needed within C&C to make this vision a reality, an ITAC proposal should be initiated – working group to be determined

Questions and Discussion: