Windows 2000 - Distributed OS Features Part II
Download
Report
Transcript Windows 2000 - Distributed OS Features Part II
Windows 2000 - Distributed OS Features
Part II
Angelo Cavone
CPSC550 Distributed Operating Systems
Spring 2001
Dr. Zhang
Introduction
Windows 2000 Distributed Operating Systems
Features
Focus on Features of Windows 2000 Advanced
Server and Datacenter Server
Discussion Areas
Active
Directory
Microsoft Management Console
Cluster Service
Security Overview
Windows 2000 Background
Represents the next step in Microsoft’s evolution
towards a portable operating system.
Mostly built upon technologies provided under
Windows NT
Goals of Windows 2000
Provide
flexibility, security object redundancy,
transparency and extensibility
Active Directory - Overview
Allows transparent access to remotely located
resources - exact location not required.
Designed to simplify management, strengthen
security and extend interoperability of resources in
distributed computing environments.
Provides a common storage location for:
Objects
- ex: client server applications
Files
Printers
People
- accounts
Active Directory - Overview
Incorporates a standard means for naming,
locating, accessing, managing and providing
security for AD objects
AD information provided to administrators, users
and applications thus yielding a tightly integrated
interface for accessing distributed resources
As the number of these objects increases the
importance of AD becomes magnified due to the
increase in management required
Active Directory - Implementation
Built upon Internet-standard technologies to
support Microsoft’s goal for a scalable, enterpriseclass operating system.
AD is a namespace incorporating features of
Domain Name System (DNS) and X.500 directory
service.
DNS
allows IP address resolution
X.500 - directory service analogous to white/yellow
pages - Basis for LDAP compatibility in Win 2000
Namespace - collection of objects and containers
organized in a hierarchical fashion.
Active Directory - Implementation
DNS is central to the functionality of AD - provides
scalability for Windows 2000
Multiple domains are organized into the Windows
2000 domain tree in a “bottom-up” manner
organizing a structure built as a tree of trees
DNS
and AD have same hierarchical domain
structure - each stores unique information and
manage different objects
Each use databases to resolve names
AD clients query DNS to resolve the AD server’s IP
address
DNS zones are stored in the AD
Active Directory - Architecture
Objects - represent named sets of attributes for
objects such as users, groups, machines,
applications
As Objects are created AD sets internal
management attributes such as a Globally Unique
Identifier (GUID), while user supplies own
attributes, i.e. user name, Logon ID, etc
Containers organize collections of related objects.
Tree structure organizes objects & containers Like popular file managers
Active Directory - Architecture
Schema describe various types of objects &
attributes associated with them
Schema
are objects also saved in AD tree
Active Directory Services Interfaces (ADSI) SDK
allows developers to define new or extend schema
MMC snap-in for schema management
Security information also stored in AD
Via AD
administrators set access privileges to
attributes individually
Single copy storage conserves resources
Active Directory - Naming Formats
Security Principal Names & Security Identifiers
Names
that uniquely identify objects in a domain
Created on object inception
Identifies access principals
LDAP-related names
Industry
Standard directory access protocol used for
modification of AD information
Provides for interoperability with LDAP compliant
applications in heterogeneous networks
Active Directory - Naming Formats
Object GUIDs
Assigned
at object creation
Each is unique
128-bit value assigned by Directory System Agent
Logon Names
Each AD
user account requires a User Principal
Name (UPN)
Format: <user>@<DNS-domain-name>
Active Directory Hierarchy
Object Publishing
Creates objects directory containing requested
information or a reference to it
AD Information published when interesting to a
many users thus requiring
Characteristics of published information:
Static
- infrequent modifications
Structured - ex: a user profile
Connection points for C/S apps are published
RPC
Winsock
COM
Active Directory Domains
AD built from one or more domains
Each domain requires domain controller & has a
DNS domain name
Domains satisfy network management goals:
Security
Bounding - each sets own security policy
Information Replication - each stores object info
Set Group Policy - each defines a scope for policy
Define Network Structure - organizations decide
division
Administration Authority Delegation - administrative
tasks assigned along domain divisions
Active Directory Domains
AD Domain Structure:
Trees
set
of one or more domains with contiguous names
> 1domain combined into hierarchical trees
1st domain of structure is root
domains containing root are contiguous
<child domain>.<parent domain>
Active Directory Domains
Forests
Distributed
database construct
Improves efficiency of network
Trust
Relationships
User
recognition across domains
Users in domain A access domain B resources
Organizational
Various
Units
objects placed in a single domain
Active Directory Domain Structure
AD Multi-Master Replication
Replicas of directories created & placed throughout
the network
Improves performance, availability & flexibility for
distributed systems
Duplication provides server overlap - alternative
server assumes task when original becomes
unavailable
Units of replication called Naming Contexts (NC)
Replication activities tuned to keep data up to date
Update Sequence Numbers USNs - used to keep
track of updates - 64-bits
Active Directory Benefits
Administrators, Developers, Users
Simplifies
Management
Single
point administration of groups, network
resources, distributed applications, desktop configs.
Strengthened
Network Security
Single
point user logon
Admin tools for security management for internal
desktop user, dial-up users or external customers
Extends
Std.
Interoperability
Interface for application integration &
synchronization allows Windows 2000 to operate with
different applications and devices
Microsoft Management Console
(MMC)
Common presentation service for management
applications under Windows 2000
Simplifies administration of Win2K systems thru
integration, delegation, task orientation, and
interface simplification
Integrated Internet Technologies allow network
wide administration
Available under Win95/98, Win NT
MMC Model
Microsoft Management Console Model
MMC Snap-Ins
MMC provides a common interface for snap-ins
which do the actual work
Snap-Ins are small management applications
which reside in the MMC
SA’s/Users can build custom apps from snap-ins
Types:
Stand-Alone
- all required functionality
Extension - adds functionality to a parent
Combination - can be both
MMC API encourages development of snap-ins
MMC Benefits
Task Orientation - MMC tools perform specific tasks
Integration - multiple tools available on single console
Customization - specific management tasks created as
needed
Delegation - customized tools provide more or less
functionality
Simplified Interface - same appearance regardless of
functionality - minimizes retraining
Extensibility - snap-in base functionality extended using
extension snap-ins
MMC User Interface
Cluster Service
Allows collection of independent computers on a
network to run a set of common applications
Presents single system image to both users and
applications
Improves system reliability via multiple servers
“Failover” feature circumvents server failure
Also provides load balancing
Primarily designed to provide failover for database
apps., messaging services & print/file servers
Extended version of cluster service under Win NT
Cluster Service Models
Two models employed in clustering technology
Common
Resource Model - all resources within the
cluster are accessible
- ex: disk sharing
provide scalability to applications
Independent
Resource Model - one system at a
time owns a resource
Cluster Service Benefits
Cluster Service:
Reduces
Unplanned Downtime
via
overlapping servers applications or transactions
proceed to completion w/ minimal interruption
Upgrade
Deployment
application upgrades performed transparently w/o
client interrupt
transparent process movement
Cluster Aware Applications
Applications
exist to take advantage of clustering
• Microsoft SQL & Exchange Server, IBM DB2, DoubleTake
Windows 2000 Security
Windows 2000 security model provides:
Single user logon to access all system resources.
Strong user authentication and authorization.
Secure communication between internal and
external resources.
Configuration and management of security policies.
Automated security inspection.
Interoperability with other operating systems and
security policies.
Windows 2000 security API for application
development.
Windows 2000 Security Model
Based on authentication & authorization model
Authentication
Identify
user at logon
Authorization
Establishes
resource access rules
Access Control Lists in AD set object permissions
Trust Relationships
Logical
relationships that allow
authentication between domains
passthrough
Windows 2000 Security Protocols
Diffie-Hellman Technique - public key
cryptography - two entities agree on shared key
Digital Signatures - Hash Message
Authentication Coding (HMAC)
MDS
(128-bit), SHA(160-bit), CBC (secret key)
Secure Socket Layer (SSL) - de facto std
Private-key encryption - DES 64-bit, NIST std.
Kerberos - primary authentication method
Windows 2000 & Kerberos
Provides for mutual authentication between
server & client
Features:
Based
on tickets - used to validate connections to
resources - shared secret authentication
Mature industry standard authentication protocol
Faster server performance at initial connection
time
Delegate authentication for multi-tier c/s apps
Transitive Trust for inter-domain authentication
simplifies domain management in large networks
Windows 2000 Security Configuration
Security management provided via MMC snap-ins
Administrators can tailor security settings as
required via Security Templates
Security Template Features:
Security
Policies for account & local policies
Account
Policies - Passwords, acct lockouts, Kerberos
Local Policies - User rights, security event logging
Restricted
Group Administration
Registry Security
Local File System Security
Local Services & Startup Security
Windows 2000 Smart Cards
Windows 2000 provides smart card security
capability
Credit card size w/ built-in micro-chip
Stores:
User’s
private key
Logon information
Public key certificate for digital signing & encryption
Windows 2000 Encrypting File System
EFS allows desktop & laptop data to be encrypted
User selects files or folders to be encrypted locks out unauthorized individuals
Especially important for laptops - easily stolen or
lost
Windows 2000 IPSec
Security methods for data traversing networks
Conforms to Internets Engineering Task Force’s
IP Security Protocol - assures interoperability with
IPSec operating on other networks
IPSec features:
Configurable
Data
packets authenticated using Kerberos, Digital
Certificates or Passwords
Guaranteed IP packet security across network
Encrypts data transmitted network confidently
Hides IP address of host generating packet
Conclusion
Overview of Win 2000 Internetworking Features
Win 2000 is a Significant Step towards networking
computing
Internet based applications & commerce will
continue to motivate incorporation of network
based technology by MS
APIs are available to encourage development of
apps using Win 2000 internetworking features
References
Galli, D.L. Distributed Operating Systems – Concepts & Practice.
Prentice Hall, Upper Saddle River, NJ, 2000.
Microsoft Corporation. Windows 2000 Server White Paper Series –
Active Directory Architecture. www.microsoft.com/windows2000/library
Microsoft Corporation. Windows 2000 Server White Paper Series –
Active Directory: Overview. www.microsoft.com/windows2000/library
Microsoft Corporation. Windows 2000 Server White Paper Series –
Microsoft Management Console: Overview.
www.microsoft.com/windows2000/library
Microsoft Corporation. Windows 2000 Server White Paper Series –
Microsoft 2000 Security Technical Overview.
www.microsoft.com/windows2000/library
Microsoft Corporation. Windows 2000 Server White Paper Series IP
Security for Microsoft Windows 2000 Server.
www.microsoft.com/windows2000/library