Active Directory: Beyond The Basics

Slides:



Advertisements
Similar presentations
Active Directory and Group Policy Blackhat Amsterdam Raymond Forbes.
Advertisements

How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
70-297: MCSE Guide to Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure Chapter 2: Developing the Active Directory.
Chapter 6 Introducing Active Directory
Chapter 4 Chapter 4: Planning the Active Directory and Security.
Introduction to Active Directory
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
CS603 Active Directory February 1, 2001.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Chapter 4 Introduction to Active Directory and Account Management
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Module 1: Introduction to Active Directory
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008
Advanced Active Directory Deployments Rick Claus IT Pro Advisor Microsoft Canada
Vikram Thakur Introduction to Active Directory Structure.
1 Chapter Overview Creating Sites and Subnets Configuring Intersite Replication Troubleshooting Active Directory Replication.
Active Directory Implementation Class 4
Chapter 4: Active Directory Design and Security Concepts
ADVANCED MICROSOFT ACTIVE DIRECTORY CONCEPTS
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
11 REVIEWING MICROSOFT ACTIVE DIRECTORY CONCEPTS Chapter 1.
Chapter 4 Introduction to Active Directory and Account Management
Windows Server 2008 Chapter 4 Last Update
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Designing Active Directory for Security
Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 5: Active Directory Logical Design.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Configuring Active Directory Objects and Trusts
Module 7 Active Directory and Account Management.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Hosted by Getting Started With Active Directory Or How to Bring Logic to Your Company’s 437 Domains.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Working with Active Directory Sites BAI516. Logical Versus Physical Structure Logical Forest Trees Domains OUs Leaf objects Physical IP Subnets/Sites.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Windows Server 2003 站台設定與管理
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Active Directory Infrastructure Microsoft Windows 2003 Active Directory Infrastructure MCSE Exam
70-412: Configuring Advanced Windows Server 2012 services
OVERVIEW OF ACTIVE DIRECTORY
Introduction to Active Directory
Module 1: Introduction to Active Directory
Logical and Physical Network Design 1. Active Directory Objects Objects Represent Network Resources (Users,Groups,Computers,Printers) Attributes Store.
1 Configuring Sites Configuring Site Settings Configuring Inter-Site Replication Troubleshooting Replication Maintaining Server Settings.
11 WORKING WITH ACTIVE DIRECTORY SITES Chapter 3.
Unit 4 NT1330 Client-Server Networking II Date: 1/13/2016
Module 8: Planning for Windows Server 2008 Active Directory Services.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 6: Active Directory Physical Design.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Planning an Active Directory Deployment Lesson 1.
Overview of Active Directory Domain Services Lesson 1.
Working with Active Directory Sites Lesson 3. Logical Versus Physical Structure Logical Forest Trees Domains OUs Leaf objects Physical IP Subnets/Sites.
Global Catalog and Flexible Single Master Operations (FSMO) Roles
Overview of Active Directory Domain Services
Active Directory and Group Policy
Active Directory Administration
(ITI310) SESSIONS 6-7-8: Active Directory.
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Examining a Windows NT Infrastructure (2)
Chapter 4: Planning the Active Directory and Security
Presentation transcript:

Active Directory: Beyond The Basics Howard Marks Chief Scientist Networks are Our Lives, Inc!

Agenda Active Directory Security Issues Replication and Bandwidth Management New Features with Windows 2003 Server Multiple forests

Active Directory Security Issues Enterprise administrators can “elevate” themselves to administrate a domain Directory access can be controlled

Tree Security Just as folders and files have ACL's, so do objects in an ADS tree A user’s permissions determine what the user or group can do to an object This is used to create administrative boundaries within a tree An all powerful Administrator is no longer necessary, but advisable

Assigning Tree Permissions ACL information on an object flows down to the child objects of the container when a new object is formed Future ACL changes to a parent object must be propagated to child objects to affect changes down the tree This is exactly how the file system works

Using Permissions Inheritance Permissions Flow Down to Child Objects Preventing Inheritance Stops the Flow of Permissions Full Control OU Allow inheritable permissions from parent to propagate to this object. OK Cancel Apply

Directory Attributes An object’s DACL can contain ACEs that protect individual attributes Access permissions include Read attribute Write attribute Deny read Deny write Where appropriate, objects also have permissions that control actions, such as The creation/deletion of Child objects Adding or removing an object from a group

Controlling Object Visibility Most objects have a default explicit ACE defined that allows the Authenticated Users group to read the object If you wish to limit the visibility of objects, this ACE must be removed

Delegate Access Control at the OU Delegate permissions to create and delete all objects of a specific type Users OU Object Type = User Permissions = Create Child Delete Child OU OU

Delegating Permissions and Rights at the Object Property Levels Delegate permissions to administer a specific property for all objects of a certain type Inherit Object Type = Group Object Type = Group Membership Permissions = Read Property Write Property Inheritance = Inherit Only Groups OU OU OU

Active Directory Sites Replication Controlled Domain Controller Site User Logs On Domain Controller A site is one or more TCP/IP subnets with good network connectivity Sites are used to isolate replication traffic Site

Types of Replication Site 1 Site 2 Domain B Controller Domain A Intra-Site Replication Inter-Site Replication Site 1 Domain C Controller Domain B Controller Domain B Controller Domain A Controller Domain A Controller Site 2 Domain C Controller Domain C Controller

Types of Replication Intrasite replication Intersite replication Frequent Uses IP and RPCs Intersite replication Scheduled Frequency Allowable hours Route controlled via assigned costs Can use RPCs or SMTP

Examining Site Locations If there is no domain controller No replication traffic No logon traffic to and from the business location The business location does not need to be a separate site If there is a domain controller There is replication traffic to and from the business location There may not be any logon traffic Determine whether the location should be a site

Determining Connectivity and Available Bandwidth Only subnets that are considered fast, inexpensive, and reliable should be combined into a site Consider controlling replication traffic and logon requests An important consideration is available bandwidth

Planning Sites to Control Workstation Logon Traffic Defining Sites Workstations always look to the local site for a Domain Controller Disadvantages of Multiple Sites in a Single Location If a local site Domain Controller is not available, the workstation may log onto a DC anywhere on the WAN

Planning Sites to Control Replication Traffic Multiple Sites in Replication Replication time and the transport (RPC or SMTP) can always be specified Replication traffic is always compressed reducing traffic 10% to 12% Network Replication Traffic Only changed attributes on changed objects are replicated

Planning Sites to Control Both Logon and Replication Traffic A balancing act between: The organization’s need to access directory information quickly Speed and reliability of network links Decide if Domains are a better solution Refer to prior section

Windows 2003 Server AD Improvements Domain Rename Schema Redefine (Schema change undo) Application mode Improved Group Policy Management Cross-Forest Trust Improved Group Membership replication Better branch office support

Domain Rename You can now: You still can’t: Change DNS and/or NETBIOS name of domain Move domain position in forest Create new tree You still can’t: Change which domain is the forest root Split off domain or Add domain to forest Reuse names OK you can in 2 steps Rename domains with Exchange 2000 servers in them

Domain Rename Limitations All DCs must be on line DCs that can’t participate are ejected from domain All DCs reboot in process All stations must reboot Twice NT 4 stations must be rejoined manually Forest must be in

Ownership Concept In Windows NT Domains a single “person” owned the whole pie AD allows us to separate to 2 roles: Service owner Responsible for service availability Data owner Responsible for data maintenance Day to day administration ‘

The Forest Owner Role Service owner Gatekeeper for new domains Ultimately responsible for the delivery of directory services in the forest Set policy, process for changes to shared configuration, schema Gatekeeper for new domains Domain owners are service owners Must be carefully managed

Forest Model #1: Strong Central Control Division 1 Division 2 Division 3 All business units share centralized DS infrastructure

Model #2: Hybrid/Subscription Division 1 Division 2 Division 3 Business units opt-in/opt-out of centralized infrastructure

Model #3: Distributed Infrastructure Division 1 Division 2 Division 3 Each business unit maintains separate DS infrastructure

Assign Forests Multiple forests Multiple with MMS forests Administrative Autonomy distributed centralized Multiple forests Multiple forests with MMS Long term trend Subscription forest Single forest low high Collaboration

Identify Candidate Forest Owners What IT groups are chartered to deliver NOS directory services? Common to find multiple groups Owners of Master User Domains (MUDs) Previously-deployed forests The Anti-Social Legal reasons Create list of candidate forest owners

Forest Participation Criteria Satisfied with terms of service Schema, config change control policies Disaster recovery Security considerations Trust forest owner and all domain owners DCs placed in secure locations Have clear forest ownership Attempting to share forest management may present organizational challenges Do not extend forest management across multiple outsourcers

Inter-forest Implications No automatic trust Explicit trust is one-way, non-transitive Fixable in 2003 Kerberos not available between forests No mutual authentication Global catalog has forest scope Aggregate view across forests requires synchronization technology Microsoft Metadirectory Services (MMS) Simple Sync