A Guide to Windows 2000 Server
Download
Report
Transcript A Guide to Windows 2000 Server
Chapter 4
Chapter 4:
Planning the Active Directory
and Security
1
Learning Objectives
Chapter 4
Explain the contents of the Active Directory
Plan how to set up Active Directory elements
such as organizational units, domains, trees,
forests, and sites
Plan which Windows 2000 security features to
use in an organization, including interactive
logon, object security, and services security
2
Learning Objectives (continued)
Chapter 4
Plan how to use groups, group policies,
and security templates
Plan IP security measures
3
Windows NT Domain Structure
Chapter 4
Security Accounts Manager (SAM) database
holds data on user accounts, groups, and
security privileges
One primary domain controller (PDC) has
master copy of the SAM
One or more backup domain controllers
(BDCs) have regularly backed up copies of
the SAM
If PDC Fails, BDC is promoted
4
Using a PDC, BDCs,
and the SAM database
Chapter 4
Domain
resources
Figure 4-1
Windows NT
SAM architecture
BDC
BDC
PDC
BDC
BDC
Backup
SAM
Backup
SAM
Primary
SAM
Backup
SAM
Backup
SAM
5
Windows 2000 Active Directory
Chapter 4
Domain objects including user accounts,
computers, servers, printers, groups,
security policies, domains, and other
objects compose the Active Directory
6
Windows 2000 Active Directory
Chapter 4
Made up of the following files
NTDIS.DIT single file of the database
EDB*.LOG Log files associated with
database transactions
EDB.CHK error tracking/correction info for
database
RES1.LOG and RES2.LOG reserve disk
space
7
Active Directory Objects
Chapter 4
Domain
objects
Figure 4-2
Domain objects in
the Active Directory
Active
Directory
8
Active Directory Objects
Chapter 4
Object Types
User Account
Computer Account
Domain Controller
Groups
Organizational Unit
Printers
9
Multimaster Replication
Chapter 4
Multimaster replication: In Windows
2000 there can be multiple servers,
called domain controllers (DCs), that
store the Active Directory and replicate it
to each other. Because each DC acts as
a master, replication does not stop when
one is down. Each DC is a master in its
own right.
10
Multimaster Replication
Chapter 4
• Can create account on any of the DCs
• Other DCs automatically updated
• Can be done for changed data only,
don’t have to replicate whole file
• If one DC fails, others are up-to-date and
system systems up
• Don’t have to stop to promote a BDC
11
Schema
Chapter 4
Schema: Elements used in the definition
of each object contained in the Active
Directory, including the object class and
its attributes
12
Example Schema Characteristics
of the User Account Class
Chapter 4
Unique object name
Globally unique identifier (GUID)
associated with each object name
Required attributes
Optional attributes
Syntax of how attributes are defined
Pointers to parent entities
13
Example User Account Attributes
Chapter 4
Username
User’s full name
Password
14
Schema Example
Chapter 4
Active Directory
Object
classes
User
account
Figure 4-4
Sample schema
information for
user accounts
Computer
Printer
Domain
Object name
GUID
Required attributes
Optional attributes
Syntax
Parent relationships
Username
User's full name
Password
Account description
Remote access OK
Schema
15
Default Object Classes
Chapter 4
Domain
User account
Group
Shared drive
Shared folder
Computer
Printer
16
Object Naming
Chapter 4
Common name (CN): The most basic name
of an object in the Active Directory, such as
the name of a printer
E.g. HPLaserMain
Distinguished name (DN): A name in the
Active Directory that contains all hierarchical
components of an object, such as that
object’s organizational unit and domain, in
addition to the object’s common name
CN=<object Name>, OU=<organizatoional unit,
O=<Organization>, C=<CountryCode>
17
Namespace
Chapter 4
Namespace: Can be set up as a DNS
server
18
Active Directory Elements
Chapter 4
Domains
Organizational units (OUs)
Trees
Forests
Sites
19
Active Directory Architecture
Chapter 4
Figure 4-5
Active Directory
hierarchical containers
Forest
Tree
Tree
Site A
Domain
Domain
Domain
Domain
Site C
OU
OU
OU
OU
OU
OU
OU
OU
OU
OU
OU
Site B
20
Functions of a Domain
Chapter 4
Provide a security boundary for objects
in a common relationship
Establish a set of data to be replicated
among DCs
Expedite management of a set of
objects
21
Using a Single domain
Chapter 4
Internet
Security and
management
boundary
Intranet 1
Figure 4-6
Single domain
Intranet 2
DC
DC
Active
Directory
Active
Directory
Domain
22
Using Multiple Domains
Chapter 4
DC
DC
AD
AD
DC
AD
DC
AD
DC
DC
AD
AD
DC
AD
DC
AD
Satellite dish
Domain for
South Carolina site
Satellite
Satellite dish
Figure 4-7
Using multiple
domains
DC
DC
AD
AD
DC
AD
DC
AD
DC
DC
AD
AD
Domain for
site in Japan
DC
AD
DC
AD
23
Domain Creation Dos and Don’ts
Chapter 4
Do’s
Create a domain in circumstances that
require special security measures between
organizational groupings, such as
departments, units, or divisions
Create a domain for specialized
management of particular resources (often
also related to the security and network
architecture)
Don’ts
Create domains that represent the organizational
structure, because frequent reorganizations result in
major restructuring of domains and the Active
Directory
Create domains along business process divisions,
which are often political divisions within an
organization, because new management may
redefine business process activities, resulting in a
major restructuring of domains and the Active
Directory
24
Domain Creation Dos and
Don’ts (continued)
Chapter 4
Do’s
Don’ts
Create a domain to migrate Windows NT
servers to Windows 2000
Create a domain when geography or WAN
links make it difficult to replicate DCs
between organizational groupings, such as
departments, units, or divisions
25
Functions of an OU
Chapter 4
Group related objects, such as user
accounts and printers, for easier
management
Reflect the structure of an organization
Group objects to be administered using
the same group policies
26
Using OUs to Reflect
Organizational Structure
Chapter 4
DC
DC
Active
Directory
Active
Directory
Manufacturing
Division OU
grocery.com
(domain)
DC
Active
Directory
Distribution
Division OU
Figure 4-8
OUs used to reflect
the divisional
structure of a company
DC
DC
Active
Directory
Active
Directory
DC
Active
Directory
DC
Active
Directory
Retail Division OU
27
Design Tips for Using OUs
Chapter 4
Limit OUs to 10 levels or fewer
OUs use less CPU resources when they
are set up horizontally instead of
vertically
Each request through an OU level
requires CPU time in a search
28
OU Creation Dos and Don’ts
Chapter 4
Do’s
Create OUs, as needed, to represent the
organizational structure of departments,
units, and divisions for different policies and
to delegate administration
Create OUs, as needed, to represent objects
in the Active Directory that have similar
policies, security, or other characteristics,
such as shared printers or shared disk drives
Don’ts
Create OUs more than 10 layers deep
Create more OUs than absolutely
necessary
29
OU Creation Dos and
Don’ts (continued)
Chapter 4
Do’s
Create OUs, as needed, to represent specific
project areas, such as for employees who are
temporarily helping with the installation of a
new client/server system
Create OUs, as needed, to represent the
business process or political functions in an
organization, such as an OU for the
president’s office, one for the business
office, and one for each research group in a
health research organization
Don’ts
Create OUs for major security
boundaries when this can be handled by
a domain or by sites (discussed later),
such as for IP traffic control
Create OUs for DC replication
30
Characteristics of a Tree
Chapter 4
Member domains are in a contiguous
namespace
chi.devry.edu tp.devry.edu under devry tree
Member domains can compose a hierarchy
Member domains use the same schema for
common objects
Member domains use the same global catalog
(encyclopedia of info about object)
31
Global Catalog
Chapter 4
Global catalog: A grand repository for all
objects and the most frequently used
attributes for each object in all domains.
Each tree has one global catalog.
32
Global Catalog Functions
Chapter 4
Authenticating users
Providing lookup and access to
resources in all domains
Providing replication of key Active
Directory elements
Keeping a copy of the most attributes
for all objects
33
Hierarchical Domains
in a Tree
Chapter 4
Two-way
trusts
tracksport.com
Tree
east.tracksport.com
west.tracksport.com
north.tracksport.com
south.tracksport.com
Figure 4-9 Tree with hierarchical domains
34
Kerberos Transitive Trust
Chapter 4
Kerberos Transitive Trust Relationship:
A set of two-way trusts between two or
more domains in which Kerberos
security is used.
35
Trusted and Trusting Domains
Chapter 4
Trusted domain: A domain that has
been granted security access to
resources in another domain
Trusting domain: A domain that allows
another domain security access to its
resources and objects, such as servers
36
Tree Creation Dos and Don’ts
Chapter 4
Do’s
Define main domains before defining a tree
Plan the hierarchy of domains and use of OUs before
creating a tree
Define a tree when you have domains in different
countries so that you can set up each domain to use a
language native to the country where it resides
Don’ts
Define a tree prior to creating the first
domain
Define a tree if you can use a single
domain structure (a better alternative
than using trees, if possible)
Define a tree if you must use a
disjointed namespace
37
Tree Creation Dos
and Don’ts (continued)
Chapter 4
Do’s
Don’ts
Define a tree if you are planning multiple domains that will
be administered at different sites by different people
Create a tree and multiple domains when WAN connectivity
is slow between distant sites, because global catalog
replication transfers less information and requires less
bandwidth than DC replication
38
Planning Tip
Chapter 4
Make sure each tree has at least one DC that
is also configured as a global catalog
Locate global catalog servers in a network
design architecture that enables fast user
authentication (so that authentication does
not have to be performed over a WAN link, for
example)
39
Characteristics of a Forest
Chapter 4
Member trees use a disjointed
namespace (but contiguous
namespaces within trees)
Member trees use the same schema
Member trees use the same global
catalog
40
Single Forest
Chapter 4
Single forest: An Active Directory
model in which there is only one forest
with interconnected trees and domains
that use the same schema and global
catalog
41
Single Forest Architecture
Chapter 4
partsplus.com
toronoto.partsplus.com
montreal.partsplus.com
detroit.partsplus.com
2m.com
greenville.2m.com
florence.2m.com
chelos.com
atlanta.2m.com
mexicocity.chelos.
com
oaxaca.chelos.
com
monterrey.chelos.
com
puebla.chelos.com
valencia.chelos.com
Forest
partsplus.com
Figure 4-10 A forest
42
Separate Forest
Chapter 4
Separate forest: An Active Directory
model that links two or more forests in a
partnership, but the forests cannot have
Kerberos transitive trusts or use the
same schema
43
Separate Forest Architecture
Chapter 4
health.books.com
Forest
books.com
cook.books.com
Figure 4-11
Separate forest
model
hardback.printers.com
Forest
printers.com
textbook.printers.com
paperback.printers.com
44
Forest Creation Dos and Don’ts
Chapter 4
Do’s
Create a forest to join trees/domains
that can share schemas and global
catalogs
Create a single forest when there is
no need to separate internal and
external DNS resources between trees
Don’ts
Create forests when the member trees
have little in common or cannot share
the same schema
Create a single or separate forest until
you understand the security needs of
all domains, trees, and potential
forests
45
Forest Creation Dos
and Don’ts (continued)
Chapter 4
Do’s
Create separate forests when the
internal and external DNS resources
must be keep separate between two or
more forests
Establish a forest’s name by using the
name of the root domain or first
domain in the first tree
Don’ts
Create a separate forest when there is
a possibility that the forests may
merge into a single forest in the
future
Create a separate forest when the
member forests must have a Kerberos
transitive trust between them
46
Design Tip
Chapter 4
When you create a separate forest
structure remember that:
Replication cannot take place between
forests
The forests use different schema and
global catalogs
The forests cannot be easily blended into a
single forest in the future
47
Site
Chapter 4
Site: An option in the Active Directory to
interconnect IP subnets so that it can
determine the fastest route to connect
clients for authentication and to connect
DCs for replication of the Active
Directory. Site information also enables
the Active Directory to create redundant
routes for DC replication.
48
Characteristics of a Site
Chapter 4
Reflects one or more interconnected subnets
(512 Kbps or faster)
Reflects the same boundaries as the LAN
Used for DC replication
Enables clients to access the closest DC
Composed of servers and configuration
objects
49
Site Links
Chapter 4
Site link object: An object created in the Active
Directory to indicate one or more physical
links between two different sites
Site link bridge: An Active Directory object
(usually a router) that combines individual site
link objects to create faster routes when there
are three or more site links
50
Site Link Architecture
Chapter 4
Site A
Site B
Link 1
Link 1
Link 2
Link 2
Bridge link
Router
Site C
Figure 4-12 Site link bridge
51
Site Creation Dos and Don’ts
Chapter 4
Do’s
Create sites to reflect interconnected
high-speed IP subnets
Create sites on medium and large
sized networks to enable fast
connectivity for users and for DCs
Don’ts
Create sites for small networks that
have no IP subnets
Create sites for IP links that have less
than 128 Kbps of available
bandwidth
52
Site Creation Dos
and Don’ts (continued)
Chapter 4
Do’s
Create additional sites on medium
and large sized networks when user
connectivity and DC replication is
experiencing slow response
Create sites to enable ring-based DC
fault tolerance
Create one or more sites for a domain
that encompasses two more farreaching geographic locations
Don’ts
Create extra sites to improve network
performance without first
determining what network congestion
factors are causing poor performance
53
Design Tip
Chapter 4
Define sites in the Active Directory on
networks that have multiple global
catalog servers that reside in different
subnets
Use sites to enhance network
performance by optimizing
authentication and replication
54
Active Directory Guidelines
Chapter 4
Keep the Active Directory implementation as
simple as possible
Implement the least number of domains
possible
Implement only one domain on most small
networks
Use OUs to reflect the organizational
structure (instead of using domains for this
purpose)
55
Active Directory
Guidelines (continued)
Chapter 4
Create only the number of OUs that are
necessary
Do not create OUs more than 10 levels
deep
Use domains for natural security
boundaries
Implement trees and forests only as
necessary
56
Active Directory
Guidelines (continued)
Chapter 4
Use trees for domains that have a
contiguous namespace
Use forests for multiple trees that have
disjointed namespaces between them
Use sites in situations where there are
multiple IP subnets and geographic
locations to improve performance
57
Basic Types of
Active Directory Security
Chapter 4
Account or interactive logon security
Object security
Services security
58
Interactive Logon Security
Chapter 4
DC checks that the user account is in
the Active Directory
DC verifies the exact user account
name and password
59
Object Security
Chapter 4
Security descriptor: An individual security
property associated with a Windows 2000
Server object, such as enabling the account
MGardner (the security descriptor) to access
the folder, Databases
Access control list (ACL): A list of all security
descriptors that have been set up for a
particular object, such as for a shared folder
or a shared printer
60
Typical ACL Types
of Information
Chapter 4
User account(s) that can access an
object
Permissions that determine the type of
access
Ownership of the object
61
Typical Object Permissions
Chapter 4
Deny: No access to the object
Read: Access to view or read the object’s
contents
Write: Permission to change the object’s
contents or properties
Delete: Permission to remove an object
Create: Permission to add an object
Full Control: Permission for nearly any activity
62
Example Special Permissions
Chapter 4
Figure 4-13 Special permissions for a folder
63
Troubleshooting Tip
Chapter 4
Deny permission supercedes other
permissions, thus if there is a
permissions conflict for one of your
users, check the deny permissions
associated with that user’s account
64
Services Security
Chapter 4
Windows 2000 enables you to set up
security on individual services, such as
DHCP
65
Setting Services Security
Chapter 4
Figure 4-14 DHCP security
66
Using Groups
Chapter 4
Set up security groups of user accounts
as a way to more easily manage
security
67
Setting Up Members of a Group
Chapter 4
68
Figure 4-15 DHCP Administrators group
Group Policies
Chapter 4
Use group policies to manage security
for local servers, OUs, and domains
Employ security templates when you
need to manage several different group
policies
69
Example Areas Covered by
Group Policies
Chapter 4
Account polices
Local server and domain policies
Event log tracking policies
Group restrictions
Service access security
Registry security
File system security
70
Setting Up Security Templates
Chapter 4
71
Figure 4-16 Security Templates snap-in
IP Security
Chapter 4
IP security (IPSec): A set of IP-based
secure communications and encryption
standards created through the Internet
Engineering Task Force (IETF)
72
IP Security Policies
Chapter 4
IP security (IPSec) can function in three roles
relative to a client:
Client (Respond Only) in which the server uses
IPSec, if the client is using it first
Server (Request Security) in which the server
uses IPSec by default, but will discontinue using
IPSec if it is not supported by the client
Secure Server (Require Security) in which the
server only communicates via IPSec
73
Configuring IPSec
Chapter 4
Figure 4-17 IP Security Policy Wizard
74
Troubleshooting Tip
Chapter 4
On a network that uses IPSec, if you are
having trouble gathering network
performance information from some
older devices that do not support IPSec,
omit the SNMP communications
protocol from IPSec
75
Chapter Summary
Chapter 4
Active Directory and security
implementation are interrelated
The Active Directory is a set of services
for managing Windows 2000 servers
Use Active Directory elements such as
OUs, domains, trees, and forests to help
manage server objects and resources
76
Chapter Summary
Chapter 4
Use sites to configure network
communications for better performance
through taking advantage of existing
subnets
Groups and group policies enable you
to manage security
77