Chap 04

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Chap 04 as PDF for free.

More details

  • Words: 2,009
  • Pages: 49
Hands-On Microsoft Windows Server 2003

Chapter 4 Introduction to Active Directory and Account Management

Objectives • Explain the purpose of Active Directory and its key features • Describe containers in Active Directory • Understand user account management • Explain security group management and implement security groups • Implement user profiles 2

Introduction to Active Directory • Directory service that houses information about all network resources • Centralized management allows for quick searches and access to resources • Hierarchical organization of elements provides the ability to control user access • Used in Windows 2000 Server and Server 2003 – Windows NT Servers use the SAM database – Active Directory improves on SAM by: • Providing complete management of all resources • Allowing writeable copies on all domain controllers 3

4

Active Directory Terminology • Object – Network resource defined in a domain – Has distinct attributes and properties

• Container – An object that holds other objects

• Domain – A fundamental container that holds a group of resource objects

• Domain controller (DC) – A Windows 2003 server that contains a full copy of the Active Directory information 5

6

Replication in Active Directory • Multimaster replication – Any change on one DC is replicated to all other DCs – If one DC fails, there is no visible network interruption

• Replication can be set to occur at preset intervals instead of as soon as update occurs • Network traffic due to replications is reduced by: – Replicating individual properties instead of entire accounts – Replicating based on the speed of the network link • Replicate more frequently over a LAN than a WAN 7

Installing Active Directory • •

Make a Windows 2003 server a DC by installing Active Directory A DNS server must be available to complete installation

8

Schema • Defines the object classes and their attributes that can be contained in Active Directory • Each object class contains a globally unique identifier (GUID) – Unique number associated with an object name

• An object class may have required and optional attributes • Each attribute is given a version number and date when created or modified – Allows updates on only that value in all DCs

• Windows Server 2003 has several default object classes 9

10

Global Catalog • Stores information about every object within a forest – Full replicas of objects in its own domain and partial replicas of objects in other domains

• Authenticates users when they log on • Provides lookup and access to all resources in all domains • Provides replication of key Active Directory elements • Keeps a copy of the most used object attributes for quick access 11

Namespace • A logical area on a network that contains directory services and named objects • Performs name resolution through a DNS server in its designated DNS namespace • Active Directory must be able to access a DNS server on the network • DNS and Active Directory namespaces can be on a single computer or be distributed across several servers • Two types of namespaces: – In contiguous namespace, the child object contains the name of the parent object – In a disjointed namespace, the child name does not resemble the parent name 12

Containers in Active Directory • Hierarchical elements arranged in a treelike structure • Containers in Active Directory include: – Forests – Trees – Domains – Organizational units – Sites 13

14

Forests • Highest level container that consists of one or more trees in a common relationship • The trees can use a disjointed namespace • All trees use the same schema • All trees use the same global catalog • Domains enable administration of commonly associated objects • Two-way transitive trusts between domains 15

16

Trust relationships • Two-way trust – Members of each domain can have access to the resources of the other

• Transitive trust – If A and B have a trust and B and C have a trust, A and C automatically have a trust

• Kerberos transitive trust relationship – A two-way transitive trust using Kerberos security techniques

• Forest trust – A Kerberos transitive trust between root domains of forests in Windows Server 2003 forests 17

Trees • Contain one or more domains that are in a common relationship • Domains are in a contiguous namespace and can be in a hierarchy – All domains share a portion of their namespace

• Parent and child domains are in a Kerberos transitive trust relationship • All domains use the same schema for all types of common objects • All domains use the same global catalog 18

19

Domain • Primary container of a group of objects • Provides a partition in which to house objects that have a common relationship – Partitions reflect management and security relationships

• Establishes a set of information to be replicated from one DC to another • Expedites management of a set of objects 20

21

Organizational Unit • Grouping of objects within a domain • Enables the delegation of server administration roles – Groups objects according to management tasks

• Provides the ability to administer objects with Group Policies – Groups objects with similar security access

• Can be nested within other OUs 22

23

Site • Groups objects by physical location to identify the fastest route between clients and servers and between DCs • Reflects one or more interconnected subnets • Is used for DC replication – Sets up redundant paths between DCs – Coordinates replication between sites with a bridgehead server

• Enables a client to access the DC that is physically closest • Is composed of only two types of objects: – Servers – Configuration objects 24

25

Container Guidelines • Keep Active Directory as simple as possible and plan its structure before you implement it • Implement the least number of domains possible • Implement only one domain on most small networks • When an organization is planning to reorganize, use OUs to reflect the organization’s structure • Create only the number of OUs that are absolutely necessary 26

Container Guidelines (cont.) • Do not build an Active Directory with more than 10 levels of OUs (one or two levels is preferable) • Use domains as partitions in forests to demarcate commonly associated accounts and resources governed by group and security policies • Implement multiple trees and forests only as necessary • Use sites where there are multiple IP subnets and geographic locations to improve logon and replication performance 27

User Account Management • Environments to set up and manage accounts – Through a standalone server without Active Directory: • Use the Local Users and Group tool

– In a domain where Active Directory is installed: • Use the Active Directory Users and Computers tool

• Management tasks: – – – – –

Creating an account Disabling, enabling, and renaming accounts Moving an account Resetting a password Deleting an account 28

29

It is easier to disable an old account, rename it, and enable the account with a new name than to delete the account and create a new one 30

31

32

Deleting an Account • Delete accounts that are no longer in use – Provides for easier account management – Reduces the exposure to security risks

• When an account is deleted, the GUID is also deleted and is not reused

33

Security Group Management • Group management eliminates repetitive steps in managing user and resource access • The scope of a group determines its reach for gaining access to Active Directory objects • Group types according to scope: – – – –

Local Domain local Global Universal

• Group types according to use: – Security – Distribution 34

Implementing Local Groups • Used on standalone servers that are not part of a domain • Also used on member servers in a domain • Scope does not go beyond the local server • Divided on the basis of security access to the local server • Created using the Local Users and Groups tool 35

Implementing Domain Local Groups • Used on a single domain or to manage resources in a particular domain • Gives global and universal groups from the same or other domains access to resources • Usually placed in ACLs to give resource access to its members – Access control list (ACL) is a list of security privileges for a particular object

• Scope is the domain in which the group exists • Can be converted to a universal group if: – Other domain local groups are not contained within it – Domain is in Windows Server 2003 mode 36

37

Domain Functional Levels • Determined by the type of servers in a domain • Three functional-level modes: – Windows 2000 mixed mode • Combination of NT, 2000, and 2003 servers

– Windows 2000 native mode • Only 2000 and 2003 servers

– Windows 2003 mode • Only 2003 servers

• The default mode is either mixed or native – Change the mode through the Raise Functional Level dialog box 38

Implementing Global Groups • Intended to contain user accounts from a single domain • Used to manage group accounts in a domain so that the accounts can access resources in the same domain and in other domains • Can access resources in other domains through membership in other global, domain local, or universal groups • Can contain user accounts and other global groups from the domain in which it was created • Can be converted to a universal group with the same restrictions as domain local groups 39

40

41

Implementing Universal Groups • Used to provide easy access to resources in any domain within a forest • Membership can include user accounts, global groups, and universal groups from any domain • Provides ability to manage security for single accounts with minimal effort • Simplifies access when there are multiple domains • To create a universal group, it may be necessary to convert the domain to Windows Server 2003 mode

42

43

Guidelines for Security Groups • Use global groups to hold accounts as members • Keep nesting of global groups to a minimum • Give accounts access to resources by making their global group members of other groups • Use domain local groups to provide access to resources in a specific domain • Avoid placing accounts in domain local groups • Use universal groups to provide extensive access to resources by placing them in ACLs 44

Properties of Groups • General – Modify description, scope and type of group, and email addresses for a distribution group

• Members – Add or remove members from a group

• Member Of – Add or remove the group’s membership in another group

• Managed by – Establish an account or group that manages the group 45

Implementing User Profiles • Local user profile – Stored on the local computer – Multiple users can use the same computer and maintain customized settings

• Roaming profile – Downloaded to the client from the server – Same settings are available to users regardless of the computer they log on

• Mandatory profile – Stored on the server – A user can modify, but not save settings 46

47

Summary • Active Directory – Directory service that provides ways to manage resources in a network

• Object – Most basic component in Active Directory – Defined through an information set called a schema

• Global catalog – Stores information about every object – Replicates key elements – Authenticates user logons

• Namespace – Uses the DNS namespace for name resolution – Active Directory requires a DNS server 48

Summary • Active Directory hierarchy – Forest, trees, domains, organization units, and sites

• Active Directory design – Keep the structure as simple as possible

• User accounts – Customize account properties – Management tasks include disabling, enabling, renaming, moving, and deleting accounts

• Security group management – Local, domain local, global, and universal groups

• User profiles – Used to customize accounts 49

Related Documents

Chap 04
June 2020 11
Chap 04
November 2019 8
Chap 04
November 2019 8
Chap 04
November 2019 11
Chap 04 - Basic Probability
November 2019 11
Chap 04 Solutions
November 2019 8