Active Directory Domain Services
Active Directory Domain Services
Introduction
Gaining associate understanding of the Active Directory™ directory service is that the
opening in understanding however the Windows® 2000 software functions and what it will do
to assist you meet your enterprise goals. This paper appearance at Active Directory from the
subsequent 3perspectives:
• Store. Active Directory, the Windows 2000 Server directory service, hierarchically stores
infoconcerning network objects and makes this info accessible to directors, users, and
applications. the primary section of this paper explains what a directory service is, the
combination of Active Directory service with the Internet's name System (DNS), and the way
Active Directory is actual after youdesignate a server as a website controller1.
• Structure. exploitation Active Directory, the network and its objects ar organized by
constructs likedomains, trees, forests, trust relationships, structure units (OUs), and sites.
subsequent sectionduring this paper describes the structure and performance of those Active
Directory parts, and the way this design lets directors manage the network so users will
accomplish business objectives.
• Inter-communicate. as a result of Active Directory relies on commonplace directory access
protocols, it will interoperate with different directory services and might be accessed by third-
party applications that follow these protocols. the ultimate section describes however Active
Directory
• can communicate with a good type of different technologies.
•
• for full information concerning ....ADDS
Active Directory edges
The introduction of Active Directory within the Windows 2000 software provides the
subsequentbenefits:
• Integration with DNS. Active Directory uses the name System (DNS). DNS is an
onlinecommonplace service that interprets human-readable pc names (such as
mycomputer.microsoft.com) to computer-readable numeric net Protocol (IP) addresses (four
numbers separated by periods). This lets processes running on computers in TCP/IP
networks establish andhook up with each other.
• Flexible querying. Users and directors will use the Search command on the beginning
menu, the My Network Places icon on the desktop, or the Active Directory Users associated
Computers snap-in to quickly notice an object on the network exploitation object properties.
as an example, you'll noticea user by name, last name, e-mail name, workplace location, or
different properties of that person's user account. Finding info is optimized by use of the
world catalog.
• Extensibility. Active Directory is protractile, which implies that directors will add new
categories of objects to the schema and might add new attributes to
existing categories of objects. The schema contains a definition of
every object category, and every object class's attributes, that may be hold on within
the directory. as an example, you may add a buying deal Authority attribute to the User
object then store every user's purchase authority limit as a part of the user's account.
• Policy-based administration. cluster Policies ar configuration settings applied to computers
or users as they're initialized. All cluster Policy settings ar contained in cluster Policy
Objects (GPOs) applied to Active Directory sites, domains,
or structure units. authority settings confirm access to directory objects and domain
resources, what domain resources (such as applications) ar accessible to users,and the
way these domain resources ar designed to be used.
• Scalability. Active Directory includes one or a lot of domains, every with one or a lot
of domain controllers, facultative you to scale the directory to fulfill any network needs.
Multiple domains iscombined into a website tree and multiple domain trees is combined into
a forest. within the simplest structure, one-domain network is at the same time one tree
and one forest.
• Information Replication. Active Directory uses multimaster replication, that enables you
to update the directory at any domain controller. Deploying multiple domain controllers in
one domain provides fault tolerance and cargo reconciliation. If one domain controller at
intervals a website slows, stops, or fails, different domain controllers at
intervals identical domain will give necessary directory access, since they
contain identical directory information.
• Information security. Management of user authentication and
access management, each totallyintegrated with Active Directory, ar key safety
features within the Windows 2000 software. Active Directory centralizes authentication.
Access management is outlined not solely on every objectwithin
the directory, however additionally on every property of every object. additionally, Active
Directory provides each the shop and also the scope of application for security policies.
(For a lot ofconcerning Active Directory logon authentication and access management, see
the "For a lot ofInformation" section at the top of this paper.)
• Interoperability. as a result of Active Directory relies on commonplace directory access
protocols,like light-weight Directory Access Protocol (LDAP), it will interoperate
with different directory services using these protocols. many application programming
interfaces (APIs) —such as Active Directory Service Interfaces (ADSI)—give developers
access to those protocols.
At the top of this document, "Appendix A: Tools" provides a quick summary of the software
packagetools you employ to perform the tasks related to Active Directory.
Top of page
Active Directory Directory Service
Before attending to the most sections of this paper—Active Directory design and
interoperability—this preliminary section takes a fast investigate Active Directory
from 2 terribly totally differentperspectives:
• The 1st is Active Directory at its most abstract, that is, Active Directory as a
namespace that'sintegrated with the Internet's name System (DNS).
• The second is Active Directory at its most mundane, that is, because the software
package that creates a server into a website controller.
In the context of a network, a directory (also referred to as {a data|a knowledge|an info}
store) may be a data structure that stores information concerning objects on the network.
Objects embraceshared resources like servers, shared volumes, and printers; network user
and pc accounts; still as domains, applications, services, security policies, and almost
about everything else in your network. One example of the {particular} types of info a
network directory may store a couple of particularkind of object is that a
directory usually stores a user's name, password, e-mail address, sign, and so on, for a
user account.
A directory service differs from a directory in this it's each the directory info supply and also
theservices creating the knowledge accessible and usable to directors, users, network
services, and applications. Ideally, a directory service makes the physical configuration and
protocols (formats fortransmission information between 2 devices) clear so a
user will access any resource while notknowing wherever or however it's physically
connected. To continue the user account example, it'sthe directory service that
lets different licensed users on identical network access hold on directoryinfo (such
as associate e-mail address) concerning the user account object.
Directory services will support a good type of capabilities. Some directory
services ar integrated withassociate software, et al ar applications like e-mail
directories. software directory services, likeActive Directory, give user, computers, and
shared resource management. Directory services that handle e-mail, like Microsoft
Exchange, alter users to seem up different users and send e-mail.
Active Directory, the new directory service central to the Windows 2000 Server software,
runs solelyon domain controllers. Active Directory, additionally to providing an area to
store information and services to form that information accessible, additionally protects
network objects from unauthorized access and replicates objects across a
network so information isn't lost if one domain controller fails.
Active Directory Incorporates DNS
Active Directory and DNS ar each namespaces. A namespace is any delimited space within
whicha forename is resolved. Name resolution is that the method of translating a
reputation into some object or info that the name represents. A directory forms a
namespace within which the names ofphonephone subscribers is resolved
to phonephone numbers. The Windows 2000 NTFS filing system forms a namespace within
which the name of a file is resolved to the file itself.
DNS and also the net
Understanding however Windows 2000 handles Active Directory and DNS
namespaces needsunderstanding a couple of basics concerning DNS itself and its
relationship to the web and TCP/IP.the web may be a TCP/IP network. The TCP/IP
communications protocols connect computers andallow them to transmit information over
networks. each pc on the web or on the other TCP/IP network (such as several Windows
networks) has associate IP address. DNS locates TCP/IP hosts (computers)
by breakdown the pc names that finish users perceive to the IP addresses that
computers perceive. The IP addresses on the web ar managed by exploitation the globally
distributed DNS information, however DNS may also be enforced domestically to manage
addresses at intervals personal TCP/IP networks.
DNS, that is organized into a hierarchy of domains, makes the complete net into one
namespace. DNS has many superior domains that ar any divided into second-level
domains. the basis of the web domain namespace is managed by an online authority
(currently, the web Network info Center, or InterNIC) that's liable
for authorization body responsibility for the superior domains of the DNS namespace and
for registering second-level domain names.
The superior domains ar the acquainteddomain classes business (.com), academic (.edu),
governmental (.gov), and then forth. Outside theus, two-letter country-region codes ar used,
such as .uk for uk. Second-level domains represent namespaces that ar formally registered
to establishments (and to individuals) to supply them an online presence.
Figure one shows however a company's network connects into the web DNS namespace.
Figure 3: Parent and kid domains in a very domain tree. Double-headed arrows indicate two-
waytransitive trust relationships
The parent-child relationship between domains in a very domain tree may be a naming relationship and
a trust relationship solely. directors in a very parent domain don't seem to be mechanicallydirectors of a
toddler domain, and policies set in a very parent domain don't mechanically apply tokid domains.
Forests
An Active Directory forest may be a distributed information, that may be
a information created ofseveral partial databases unfold across multiple computers. Distributing
{the information|the info|the information}base will increase network potency by lease the data
be placed wherever it's most used. The forest's information partitions ar outlined by domains, that is, a
forest consists of 1 or a lot of domains.
All domain controllers in a very forest host a duplicate of the forest Configuration and Schema
containers additionally to a website information. a website information is one a part of a
forestinformation. every domain information contains directory objects, like security principal objects
(users, computers, and groups) to that you'll grant or deny access to network resources.
Often, a single forest, that is easy to form and maintain, will meet associate organization's desires.
With one forest, users don't ought to bear in mind of directory structure as a result of all users
seeone directory through the world catalog. once adding a replacement domain to the forest,
no extratrust configuration is needed as a result of all domains in a very forest ar connected by two-
way,transitive trust. in a very forest with multiple domains, configuration changes would like be
appliedjust one occasion to have an effect on all domains.
You should not produce extra forests unless you've got a transparent ought to do therefore, as a result
of every forest you produce ends up in extra management overhead12. One doable reason to
form over one forest is that if administration of your network is distributed among multiple autonomous
divisions that can't agree on the common management of the schema and configuration containers.one
more reason to form a separate forest is to confirm that specific users will ne'er be granted access
to bound resources (in one forest, every user is enclosed in any cluster or will seem on a discretionary
access management list, or DACL13, on any pc within the forest). With separate
forests, you'll outline express trust relationships to grant users in one forest access
to boundresources within the different forest. (For associate example of 2 forests, see
Figure seven within the section "Example: Mixed surroundings of 2 Forests and One Extranet.")
Multiple domain trees at intervals one forest don't type a contiguous namespace; that's, they
neednoncontiguous DNS domain names. though trees in a very forest don't share a namespace, a
forestwill have one root domain, referred to as the forest root domain. The forest root domain is, by
definition, the primary domain created within the forest. the 2 forest-wide predefined groups—
Enterprise directors and Schema administrators—reside during this domain.
For example, as shown in Figure four, though 3 domain trees (HQ-Root.com, EuropeRoot.com, and
AsiaRoot.com) every have a toddler domain for Accounting named "Acct", the DNS names for
thesekid domains ar Acct.HQ-Root.com, Acct.EuropeRoot.com, and
Acct.AsiaRoot.com, severally. there'sno shared namespace.
Figure 4: One forest with 3 domain trees. The 3 root domains don't seem to be contiguous with one
another, however EuropeRoot.com and AsiaRoot.com ar kid domains of HQ-Root.com.
The root domain of every domain tree within the forest establishes a transitive trust relationship
(explained in additional detail within the next section) with the forest root domain. In Figure four, HQ-
Root.com is that the forest root domain. the basis domains of the opposite domain trees,
EuropeRoot.com and AsiaRoot.com, have transitive trust relationships with HQ-Root.com. This
establishes trust across all the domain trees within the forest.
All Windows 2000 domains altogether of the domain trees in a very forest possess the subsequenttraits:
• Have transitive trust relationships among the domains at intervals every tree.
• Have transitive trust relationships among the domain trees in a very forest.
• Share common configuration info.
• Share a standard schema.
• Share a standard world catalog.
Important: Adding new domains to a forest is simple. However, you can not move existing Windows
2000 Active Directory domains between forests. you'll take away a website from the forest provided
that it's no kid domains. when a tree root domain has been established, you can not add a websitewith a
higher-level name to the forest. you can not produce a parent of associate existing
domain;you'll solely produce a toddler.
Implementing each domain trees and forests enables you to use each contiguous and noncontiguous
naming conventions. This flexibility is helpful, as an example, in firms with freelance divisions that
every needs to keep up its own DNS name, like Microsoft.com and MSNBC.com.
Trust Relationships
A trust relationship may be a relationship established between 2 domains that enables users in one
domain to be recognized by a website controller within the different domain. Trusts let users access
resources within the different domain and additionally let directors administer user rights for
userswithin the different domain. For computers running Windows 2000, account authentication
between domains is enabled by two-way, transitive trust relationships.
All domain trusts in a very Windows 2000-based forest ar two-way and transitive, outlined within
thefollowing way:
• Two-way. after you produce a replacement kid domain, the kid domain mechanically trusts the parent
domain, and contrariwise. At the sensible level, this suggests that authentication requests ispassed
between the 2 domains in each directions.
• Transitive. A transitive trust reaches on the far side the 2 domains within the initial trust relationship.
Here is however it works: If Domain A and Domain B (parent and child) trust one anotherand if Domain
B and Domain C (also parent and child) trust one another, then Domain A and Domain C trust one
another (implicitly), although no express trust relationship between them exists. At the extent of the
forest, a trust relationship is formed mechanically between the forest root domain and also the root
domain of every domain tree else to the forest, with the result that complete trust exists between all
domains in a vigorous Directory forest. At the sensible level, as a result of trust
relationships ar transitive, one logon method lets the system evidence a user (or computer) in any
domain within the forest. This single logon method probably lets the account access resources on any
domain within the forest.
Note, however, that the one logon enabled by trusts doesn't essentially imply that the echt user has
rights and permissions altogether domains within the forest.
In addition to the forest-wide two-way transitive trusts generated mechanically within the Windows
2000 software, you'll expressly produce the subsequent 2 extra styles of trust relationships:
• Shortcut Trusts. Before associate account is granted access to resources by a website controller in
another domain, Windows 2000 computes the trust path between the domain controllers for
the supplydomain (where the account is located) and also the target domain (where the
required resource is located). A trust path is that the series of domain trust relationships Windows 2000
security traversesso as to pass authentication requests between any 2 domains. Computing and
traversing a trust path between domain trees in a very complicated forest will take time. to
enhance performance, you'llexpressly (manually) produce a road trust between non-adjacent Windows
2000 domains within thesame forest. road trusts ar unidirectional transitive trusts that alter you to
shorten the trail, as shown in Figure five. you'll mix 2 unidirectional trusts to form a two-way trust
relationship. thoughyou can not revoke the default two-way transitive trusts mechanically established
among all domainsin a very Windows 2000 forest, you'll delete expressly created road trusts.
Figure 5: road trusts between Domains B and D, and between Domains D and a pair of
• External Trusts. External trusts produce trust relationships to domains in a very totally
differentWindows 2000 forest or to a non-Windows 2000 domain (either a Windows nongovernmental
organization domain or a Kerberos version five realm14). External trusts alter user authentication
toassociate external domain. All external trusts ar unidirectional non-transitive trusts, as shown in
Figure six. Again, you'll mix 2 unidirectional trusts to form a two-way trust relationship.
Figure 11: 2 web sites connected by a site link. every site's most well-liked bridgehead server is
employed preferentially for inter-site info exchange.
The bridgehead servers ar the popular servers for replication, however you'll additionally put
together the opposite domain controllers within the web site to copy directory changes between sites.
After updates ar replicated from one {site|website|web web site} to the bridgehead server within
thedifferent site, the updates ar then replicated to different domain controllers at intervals the
locationthrough intra-site replication. though one domain controller receives the initial inter-site
directory update, all domain controllers service shopper requests.
Replication Protocols
Directory info is changed exploitation the subsequent network protocols:
• IP replication. IP replication uses remote procedure calls (RPC) for replication at intervals a
{site|website|web web site} (intra-site) and over site links (inter-site). By default, inter-site IP replication
adheres to replication schedules. IP replication doesn't need a certification authority (CA).
• SMTP replication. If you've got a web site that has no physical affiliation to the remainder of you
network however that may be reached via easy Mail Transfer protocol (SMTP), that web site has mail-
based property solely. SMTP replication is employed just for replication between sites. you can not use
SMTP replication to copy between domain controllers within the same domain—only inter-domain
replication is supported over SMTP (that is, SMTP is used just for inter-site, inter-domain replication).
SMTP replication is used just for schema, configuration, and world catalog
partialreproduction replication. SMTP replication observes the mechanically generated replication
schedule.
If you select to use SMTP over web site links, you need to install associated put together an enterprise
certification authority (CA). The domain controllers acquire certificates from the CA, that the domain
controllers then use to sign and encipher the mail messages that contain directory
replicationinfo, making certain the genuineness of directory updates. SMTP replication uses 56-
bitcryptography.
Multimaster Replication
Active Directory domain controllers support multimaster replication,
synchronizing information onevery domain controller, and making certain consistency of
knowledge over time. Multimaster replication replicates Active Directory info among peer domain
controllers, every of that features aread-and-write copy of the directory. this can be a amendment from
the Windows nongovernmental organization Server software, within which solely the PDC had a read-
and-write copy of the directory (the BDCs received read-only copies from the PDC). Once designed,
replication is automatic and clear.
Update Propagation and Update Sequence Numbers
Some directory services use timestamps to sight and propagate changes. In these
systems, it'sessential to stay the clocks on all directory servers synchronous . Time synchronization in a
verynetwork is incredibly troublesome. Even with wonderful network time
synchronization, it's doablefor the time at a given directory server to be incorrectly set. this
could cause lost updates.
The Active Directory replication system doesn't rely upon time for update propagation. Instead, it uses
Update Sequence Numbers (USNs). A USN may be a 64-bit variety maintained by every Active Directory
domain controller to trace updates. once the server writes to any attribute, or property, on a
vigorous Directory object (including the originating write or a replicated write), the USN is advanced
and hold on with the updated property and with a property that's specific to the domain controller. This
operation is performed atomically—that is, the incrementing and storage of the USN and also the write
about the property price succeed or fail as one unit.
Each Active Directory-based server additionally maintains a table of USNs received from replication
partners. the best USN received from every partner is hold on during this table. once a given partner
notifies the directory server that replication is needed, that server requests all changes with
USNsbigger than the last price received. this easy approach doesn't rely upon the accuracy of
timestamps.
Because the USN hold on within the table is updated atomically for every update received,
recoverywhen a failure is additionally easy. To restart replication, a server merely asks its partners for all
changes with USNs bigger than the last valid entry within the table. as a result of the table is updated
atomically because the changes ar applied, associate interrupted replication cycle perpetually picks
up precisely wherever it left off, with no loss or duplication of updates.
Collision Detection and Property Version Numbers
In a multimaster replication system like Active Directory, it's doable for identical property to be updated
at 2 or a lot of totally different replicas. once a property changes in a very second (or third, or
fourth, and then on) reproduction before a amendment from the primary reproduction has
beentotally propagated, a replication collision happens. Collisions ar detected exploitation property
version numbers. in contrast to USNs, that ar server-specific values, a property version variety is
restricted to the property on a vigorous Directory object. once a property is 1st written to a
vigorousDirectory object, the property version variety is initialized.
Originating writes advance the property version variety. associate originating write may be a write to a
property at the system initiating the amendment. Property writes caused by replication don't seem to
be originating writes and don't advance the property version variety. as an example, once a user
updates his or her word, associate originating write happens and also the word property
versionvariety is advanced. Replication writes of the modified word at different servers don't advance
the property version variety.
A collision is detected once a amendment is received by replication within which the property
versionvariety received is up to the domestically hold on version variety, and also the received and hold
on values ar totally different. once this happens, the receiver applies the update that has the later
timestamp. this can be the sole scenario wherever time is employed in replication.
When the received property version variety is not up to the domestically hold on version variety, the
update is likely stale and discarded. once the received property
version variety is over thedomestically hold on version variety, the update is accepted.
Propagation moistening
The Active Directory replication system permits loops within the replication topology. this permits the
administrator to put together a replication topology with multiple methods among the servers for
performance and convenience. The Active Directory replication system performs
propagationmoistening to stop changes from propagating endlessly and to eliminate redundant
transmission of changes to replicas that ar already up-to-date.
The Active Directory replication system employs up-to-date vectors to dampen propagation. The up-to-
date vector may be a list of server–USN pairs control by every server. The up-to-date vector
at everyserver indicates the best USN of originating writes received from the server within the server–
USNcombine. associate up-to-date vector for a server in a very given web site lists all the
oppositeservers in this site15.
When a replication cycle begins, the requesting server sends its up-to-date vector to
the causationserver. The causation server uses the up-to-date vector to filter changes sent to the
requesting server. If the high USN for a given originating author is bigger than or up to the originating
write USN for a specific update, the causation server doesn't ought to send the change; the requesting
server is already up-to-date with relevance the originating author.
Use Delegation and cluster Policy with OUs, Domains, and Sites
You can delegate body permissions for, and associate cluster Policy with, the subsequent Active
Directory containers:
• Organizational units
• Domains
• Sites
An structure unit is that the smallest Windows 2000 instrumentality to that you'll delegate authority or
apply cluster Policy16. each delegation and cluster Policy ar safety features of the Windows
2000software. This paper concisely discusses them within the restricted context of design to
indicatethat Active Directory structure determines however you employ instrumentality delegation
andcluster Policy.
Assigning body authority over structure units, domains, or sites enables you to delegate administration
of users and resources. distribution cluster Policy Objects (GPOs) to any of those 3styles
of instrumentalitys enables you to set desktop configurations and security policy for the users and
computers within the container. subsequent 2 subsections discuss these topics in additionaldetail.
Container Delegation
In the Windows 2000 software, delegation permits a better body authority to grant specific bodyrights
for structure units, domains, or sites to teams (or individuals). This greatly reduces the
amountof directors required with sweeping authority over giant segments of the user
population.authorization management of a instrumentality enables you to specify World Health
Organization has permissions to access or modify that object or its kid objects. Delegation is one in every
of the foremost necessary safety features of Active Directory.
Domain and OU Delegation
In the Windows nongovernmental organization four.0 software, directors generally delegate
administration by making multiple domains so as to own distinct sets of domain directors. within
theWindows 2000 software, structure units ar easier to form, delete, move, and modify than
domains,and that they ar so higher suited to the delegation role.
To delegate body authority (other than authority over sites, lined next), you grant a bunch specific rights
over a website or structure unit by modifying the container's discretionary access managementlist
(DACL)17. By default, members of the domain directors (Domain Admin) security cluster have authority
over the complete domain, however you'll prohibit membership during this cluster to
arestricted variety of extremely trusty directors. to ascertain directors with lesser scope, you'lldelegate
authority right down to very cheap level of your organization by making a tree of structureunits at
intervals every domain and authorization authority for components of the structure unit subtree.
Domain directors have full management over each object in their domain. However, they are doingnot
have body rights over objects in different domains18.
You delegate administration of a website or structure unit by exploitation the Delegation
ofmanagement wizard accessible within the Active Directory Users and Computers snap-in. Right-click
the domain or structure unit, choose Delegate management, add the teams (or users) to whomyou
wish to delegate management, then either delegate the listed common tasks, or produce a custom task
to delegate. The common tasks you'll delegate ar listed within the following table.
Domain Common Tasks you'll Delegate Organizational Unit Common Tasks you'll Delegate
• be part of a pc to a website
• Manage cluster Policy links • produce, delete, and manage user accounts
• Reset passwords for user accounts
• scan all user info
• Create, delete, and manage teams
• Modify the membership of a bunch
• Manage printers
• produce and delete printers
• Manage cluster Policy links
Using a combination of structure units, groups, and permissions, you'll outline the
foremostacceptable body scope for a specific group: a whole domain, a subtree of structure units,
or onestructure unit. as an example, you'll need to form associate structure unit that enables you
togrant body management for all user and pc accounts altogether branches
of one department, likeassociate Accounting department. instead, you'll need to
grant body management solely to some resources at intervals the department, like pc accounts. a
3rd example is to grant body managementfor the Accounting structure unit, however to
not any structure units contained at intervals the Accounting structure unit.
Because structure units ar used for body delegation and don't seem to be security principals themselves,
the parent structure unit of a user object indicates World Health Organization manages the user object.
It doesn't indicate that resources that individual user will access.
Site Delegation
You use Active Directory Sites and Services to delegate management for sites, server containers, inter-
site transports (IP or SMTP), or subnets. authorization management of 1 of those entitiesoffers the
delegated administrator the power to control that entity, however it doesn't provide the
administrator the power to manage the users or computers placed in it.
For example, after you delegate management of a web site, you'll like better to delegatemanagement of
all objects, otherwise you will delegate management for one or a lot of objectsplaced in this web site.
The objects that you'll delegate management embrace User objects, pcobjects, cluster objects, Printer
objects, structure Unit objects, Shared Folder objects, web siteobjects, web site Link objects, web
site Link Bridge objects, and so on. Then, you're prompted to pickthe scope of the permissions you
wish to delegate (general, property-specific, or just the creation/deletion of specific kid objects). If you
specify general, {you ar|you're} then are prompted to grant one or a lot of of the
subsequent permissions: Full management, Read, Write, produce All kidobjects, Delete
All kid objects, scan All Properties, or Write All Properties.
Group Policy
In Windows nongovernmental organization four.0, you employ the System Policy Editor to outlineuser,
group, and pc configurations hold on within the Windows nongovernmental organizationwritten
record information. within the Windows 2000 software, cluster Policy defines a wider type
of parts within the user's surroundings that directors will manage. These parts embrace settings for
registry-based policies, security choices, software package preparation choices, scripts (for pcstartup
and ending and for user go online and log off), and redirection of special folders19.
The system applies cluster Policy configuration settings to computers at boot time or to users after
they go online. cluster Policy settings ar applied to the users or computers in sites, domains,
andstructure units by linking the authority to the Active Directory instrumentality holding the users or
computers.
By default, cluster Policy affects all users and computers within the coupled instrumentality. you
employ membership in security teams to filter that GPOs {affect|have associate effect on} the users and
computers in an structure unit, domain, or site. This enables you to apply policy at a a lot ofgranular
level; that's, exploitation security teams enables you to apply policy to specific sets of objects at
intervals a instrumentality. To filter cluster policy during this method, you employ the safety tab on
a authority's Properties page to regulate World Health Organization will scan the GPO. people
who don't have Apply cluster Policy and skim each set to permit as members of a
security cluster won't have that authority applied to them. However, as a result of standard users have
these permissions by default, cluster Policy affects all users and computers within
the coupledinstrumentality unless you expressly amendment these permissions.
The location of a security cluster in Active Directory is irrelevant to cluster Policy. For the
preciseinstrumentality to that the authority is applied, authority settings confirm the following:
• What domain resources (such as applications) ar accessible to users.
• How these domain resources ar designed to be used.
For example, a authority will confirm what applications users have accessible on their pc after theygo
online, what number users will hook up with Microsoft SQL Server once it starts on a server, or what
services users will access after they move to totally different departments
or teams. clusterPolicy enables you to manage alittle variety of GPOs instead of an outsized variety of
users and computers.
Sites, domains, and structure units, in contrast to security teams, don't confer membership. Instead,
they contain and organize directory objects. Use security teams to grant rights and permissions to
users, then use the 3 styles of Active Directory containers to contain the users and computers and to
assign cluster Policy settings.
Because resource access is granted exploitation security teams, you
may notice that exploitationsecurity teams to represent your business structure structure is a lot
of economical thanexploitation domains or structure units to mirror business structure.
By default, policy settings that ar domain-wide or that ar applied to associate structure unit
containingdifferent structure units ar familial by the kid containers, unless the
administrator expresslyspecifies that inheritance doesn't apply to at least one or a lot of kid containers.
Delegating management of cluster Policy
Network directors (members of the Enterprise directors or Domain directors group) will use the
safety tab on the authority Properties page to work out that different administrator teams willmodify
policy settings in GPOs. To do this, a network administrator 1st defines teams of directors (for
example, selling administrators), then provides them with Read/Write access to chose GPOs. Having
full management of a authority doesn't alter associate administrator to link it to a web site, domain,
or structure unit. However, network directors may also grant that ability exploitation the Delegation
of management wizard.
In the Windows 2000 software, you'll severally delegate the subsequent 3 cluster Policy tasks:
• Managing cluster Policy links for a web site, domain, or structure unit.
• Creating cluster Policy objects.
• Editing cluster Policy objects.
Group Policy, like most different Windows 2000 body tools, is hosted in MMC consoles. The rights to
form, configure, and use MMC consoles, therefore, have policy implications. you'll managementthese
rights through cluster Policy below
/User Configuration/Administrative
Templates/Windows Components/Microsoft Management Console/
and its subfolders.
Table four lists the safety permission settings for a bunch Policy object.
Table four Security Permission Settings for a authority
Groups (or Users) Security Permission
Authenticated User Read with Apply cluster Policy ACE
Domain directors
Enterprise directors
Creator Owner native System Full management while not Apply cluster Policy ACE
Note: By default, directors are echt users, which implies that they need the Apply cluster Policy attribute
set.
For careful info concerning cluster Policy, see the section "For a lot of Information" at the top of this
document.
Top of page
Interoperability
Many firms rely upon a various assortment of technologies that has to work along. Active Directory
supports variety of standards to confirm ability of the Windows
2000 surroundings with differentMicrosoft merchandise and with a good type
of merchandise from different vendors.
This section describes the subsequent styles of ability supported by Active Directory:
• LDAP protocol.
• Application Programming Interfaces.
• Synchronizing Active Directory with different directory services.
• Virtual and foreign containers' role in ability.
• Kerberos role in ability.
• Backward compatibility with the Windows nongovernmental organization software.
Lightweight Directory Access Protocol
The light-weight Directory Access Protocol (LDAP) is that the trade commonplace for directory access.
LDAP is on the web Engineering Task Force (IETF) track for turning into an onlinecommonplace.
Active Directory and LDAP
LDAP is that the primary directory access protocol wont to add, modify, and delete info hold on in Active
Directory, still on question and retrieve information from Active Directory. The
Windowstwo000 software supports LDAP versions 2 and 320. LDAP defines however a
directory shopperwill access a directory server and the way the shopper will perform directory
operations and share directory information. That is, Active Directory purchasers should use LDAP to
get info from Active Directory or to keep up info in Active Directory.
Active Directory uses LDAP to alter ability with different LDAP-compatible shopper applications.
Given the suitable permission, you'll use any LDAP-compatible shopper application to browse, query,
add, modify, or delete info in Active Directory.
Application Programming Interfaces
You can use the subsequent application programming interfaces (APIs) to access info in Active Directory:
• Active Directory Service Interface (ADSI).
• LDAP C API.
These arthropod genus ar delineate within the next 2 subsections.
Active Directory Service Interface
Active Directory Service Interface (ADSI) permits access to Active Directory by exposing objectshold
on within the directory as part Object Model (COM) objects. A directory object is
manipulatedexploitation the ways accessible on one or a lot of COM interfaces. ADSI features a supplier-
baseddesign that enables COM access to differing kinds of directories that a provider exists.
Currently, Microsoft provides ADSI suppliers for Novell NetWare Directory Services (NDS) and
NetWare three, Windows NT, LDAP, and also the net info Services (IIS) metabase. (The IIS metabase is
that the IIS configuration settings.) The LDAP supplier is used with any LDAP directory,as well as Active
Directory, Microsoft Exchange five.5, or browser.
You can use ADSI from several tools, starting from Microsoft workplace applications to C/C++. ADSI
supports extensibility so you'll add practicality to associate ADSI object to support new properties
and ways. For example, you'll add a way to the user object that makes associate Exchange mailbox for a
user once the strategy is invoked. ADSI features a terribly easy programming model. It abstracts the
information management overhead that's characteristic of non-COM interfaces, likeLDAP C arthropod
genus. as a result of ADSI is totally scriptable, it's simple to develop madeinternet applications. ADSI
supports ActiveX® information Objects (ADO) and object linking and embedding information (OLE DB)
for querying.
Developers and directors will add objects and attributes to Active Directory
by making scriptssupported ADSI (as well as scripts supported LDIFDE, lined later during this document).
LDAP C API
The LDAP C API, outlined in net commonplace RFC 1823, may be a set of low-level C-languagearthropod
genus to the LDAP protocol. Microsoft supports LDAP C arthropod genus on all Windows platforms.
Developers have the selection of writing Active Directory-enabled applications exploitation LDAP
Carthropod genus or ADSI. LDAP C arthropod genus ar most frequently wont to ease movabilityof
directory-enabled applications to the Windows platform. On the opposite hand, ADSI may be a a lot
of powerful language and is a lot of acceptable for developers writing directory-enabled code on the
Windows platform.
Synchronizing Active Directory with different Directory Services
Microsoft provides directory synchronization services that allow you synchronize Active
Directoryinfo with Microsoft Exchange five.5, Novell NDS and NetWare, Lotus Notes, and
GroupWise.additionally, command-line utilities allow you to import and export
directory info from differentdirectory services.
Active Directory and Microsoft Exchange
The Windows 2000 software contains a service referred to as the Active Directory instrumentationthat
gives bi-directional synchronization with Microsoft Exchange five.5. Active
Directoryinstrumentation provides a fashionable mapping of objects and attributes once it
synchronizes the information between the 2 directories. For a lot of concerning Active
Directory instrumentation, see the section "For a lot of Information" at the top of this paper.
Active Directory and Novell NDS and NetWare
As a part of Services for Netware five.0, Microsoft intends to ship a directory synchronization service
that performs bi-directional synchronization with Novell NDS and NetWare.
Active Directory and Lotus Notes
As a part of Microsoft Exchange 2000 Server, antecedently code-named "Platinum", Microsoft intends to
ship a directory synchronization service that performs bi-directional synchronization with Lotus Notes
for functions of synchronizing e-mail and different common attributes.
Active Directory and GroupWise
As a part of Microsoft Exchange 2000 Server, antecedently code-named "Platinum", Microsoft intends to
ship a directory synchronization service that performs bi-directional synchronization with GroupWise
for functions of synchronizing e-mail and different common attributes.
Active Directory and LDIFDE
The Windows 2000 software provides the command-line utility LDAP information Interchange Format
(LDIFDE) to support mercantilism and exportation of directory info. LDAP information Interchange
Format (LDIF) is an online Draft that's associate trade commonplace, that defines the file format used
for exchanging directory info. The Windows 2000-based utility that supports import/export to the
directory exploitation LDIF is termed LDIFDE. LDIFDE enables you to export Active Directory infoin LDIF
format so it will later be foreign into another directory. you'll additionally use LDIFDE to import
directory info from another directory.
You can use LDIFDE to perform batch operations, like add, delete, rename, or
modify. you'lladditionally populate Active Directory with info obtained
from different sources, like differentdirectory services. additionally, as a result of the schema in Active
Directory is hold on within the directory itself, you'll use LDIFDE to keep a copy or extend the schema.
For an inventory of LDIFDE parameters and what they are doing, see Windows 2000 facilitate.
For info concerning the way touse LDIFDE for batch operations with Active Directory, see the section
"For a lot of Information" at the top of this document.
Internal and External References
An administrator will produce a citation object (cross-ref) that points to a server in a very directory
external to the forest. once a user searches a subtree that contains this citation object, Active Directory
returns a referral to it server as a part of the result set, and also the LDAP shopper then chases the
referral to induce the information requested by the user.
Such references ar Active Directory instrumentality objects that reference a directory external to the
forest. The distinction is that an indoor reference references associate external directory
that willseem within the Active Directory namespace as a toddler of associate existing Active Directory
object, whereas associate external reference references associate external directory
that doesn'tseem within the Active Directory namespace as a toddler.
For each internal and external references, Active Directory contains the DNS name of a server holdinga
duplicate of the external directory and also the distinguished name of the basis of the external directory
at that to start search operations within the external directory.
Kerberos Role in ability
The Windows 2000 software supports multiple configurations for cross-platform interoperability:
• Clients. A Windows 2000 domain controller will give authentication for shopper systems running
implementations of RFC-1510 Kerberos, as well as purchasers running associate software aside
from Windows 2000. Windows 2000-based user and pc accounts is used as Kerberos principals for Unix-
based services.
• Unix purchasers and services. at intervals a Windows 2000 domain, UNIX purchasers and
serverswill have Active Directory accounts and might so acquire authentication from a
website controller.during this state of affairs, a Kerberos principal is mapped to a Windows 2000 user
or pc account.
• Applications and operational systems. shopper applications for Win32® and operational systemsaside
from Windows 2000 that ar supported the final MI computer programme Interface (GSS
API)will acquire session tickets for services at intervals a Windows 2000 domain.
In associate surroundings that already uses a Kerberos realm, the Windows
2000 software supportsability with Kerberos services:
• Kerberos Realm. Windows 2000 Professional-based systems will evidence to associate RFC-1510
Kerberos server at intervals a realm, with one sign-on to each the server and an area Windows
2000skilled account.
• Trust relationships with Kerberos realms. A trust relationship is established between a website and a
Kerberos realm. this suggests that a shopper in a very Kerberos realm will evidence to a
vigorousDirectory domain to access network resources in this domain.
Backward Compatibility with the Windows nongovernmental organization software
A special kind of ability is to keep up backward compatibility with earlier versions of the
presentsoftware. The Windows 2000 software installs, by default, in a very mixed-mode network
configuration. A mixed-mode domain may be a networked set of computers
running each Windowsnongovernmental organization and Windows 2000 domain controllers. as a result
of Active Directory supports mixed-mode, you'll upgrade domains and computers at no matter rate you
select,supported your organization's desires.
Active Directory supports the Windows nongovernmental organization local area network Manager
(NTLM) authentication protocol employed by the Windows nongovernmental
organization software,which implies that licensed Windows nongovernmental organization users and
computers will go online to and access resources in a very Windows 2000 domain. To
Windows nongovernmental organization purchasers and Windows ninety five or ninety
eight purchasers that don't seem to be running Active Directory shopper software package, a Windows
2000 domain seems to be a Windows nongovernmental organization Server four.0 domain.
Top of page
Summary
Of the numerous enhancements to the Windows 2000 Server software, the introduction of the Active
Directory directory service is one in every of the foremost important. Active Directory
helps alterand modify network flexibility and so improves the network's ability to support enterprise
objectives.
Active Directory stores info concerning network objects and makes this info accessible to directors,
users, and applications. it's a namespace that's integrated with the Internet's name System (DNS), and,
at identical time, it's the software package that defines a server as a website controller.
You use domains, trees, forests, trust relationships, structure units, and sites to structure the Active
Directory network and its objects. you'll delegate body responsibility for structure units, domains, or
sites to acceptable people or teams, and you'll assign configuration settings to those self same 3Active
Directory containers. This design lets directors manage the network so users will consideraccomplishing
business goals.
Today, it's the norm instead of the exception that firms rely upon various technologies that requireto
figure along. Active Directory is constructed on commonplace directory access protocols, which,in
conjunction with many arthropod genus, alter Active Directory to interoperate with differentdirectory
services and a good type of third-party applications. additionally, Active
Directory willsynchronize information with Microsoft Exchange and provides command-line utilities
formercantilism and exportation information to and from different directory services.
For a lot of info
For the most recent info on the Windows 2000 software, look at the Microsoft Windows 2000
Servercomputer . additionally, you'll investigate the subsequent links for a lot of information:
• Windows 2000 Product Help—How to get a schema object ID (OID).
• Windows 2000 Platform software package Development Kit—How to use ADSI to increase the schema
programmatically.
• net Engineering Task Force (IETF) internet site—For IETF RFCs and Internet Drafts.
The Microsoft Windows 2000 Server preparation designing Guide, that discusses the way toarrange the
structure and preparation of Windows 2000 domains and sites, are going to beaccessible in bookstores
in early 2000. it's additionally placed on the Windows 2000 Server, and Windows 2000 Advanced Server
CDs as a part of the Support Tools. And it's accessible on the Windows
2000 computer http://www.microsoft.com/windows2000/techinfo/planning/default.asp
Top of page
Appendix A: Tools
This appendix provides a quick summary of the software package tools you employ to perform the
tasks related to Active Directory.
Microsoft Management Console
In the Windows 2000 Server software, Microsoft Management Console (MMC) provides consistent
interfaces that allow directors read network functions and
use body tools. directors use identicalconsole whether or not they ar liable for one digital computer or a
whole network of computers. The MMC hosts programs referred to as snap-ins, every of that handles
specific network administration tasks. Four of those snap-ins ar Active Directory tools.
Active Directory Snap-ins
The Active Directory body tools that ar enclosed with the Windows 2000
Server software modifydirectory service administration. you'll use the quality tools or use MMC to
form custom tools thatspecialize in single management tasks. you'll mix many tools into one
console. you'll additionallyassign custom tools to individual directors with specific body responsibilities.
The following Active Directory snap-ins ar accessible on the Windows 2000 Server body Tools menu of
all Windows 2000 domain controllers:
• Active Directory Users and Computers
• Active Directory Domains and Trusts
• Active Directory Sites and Services
The fourth Active Directory snap-in is:
• Active Directory Schema
The counseled thanks to extend the Active Directory schema is programmatically, through the Active
Directory Service Interfaces (ADSI) or the LDAP information Interchange Format (LDIFDE) utility.
However, for development and testing functions, you'll additionally read and modify the Active
Directory schema with the Active Directory Schema snap-in.
Active Directory Schema isn't accessible on the Windows 2000 Server body Tools menu. you need
to install the Windows 2000 Administration Tools from the Windows 2000 Server CD associated add it to
an MMC console.
A fifth snap-in, that is expounded to Active Directory tasks, is:
• Group Policy snap-in
Setting cluster policies may be a task associated with Active Directory management of users, computers,
and groups. cluster Policy objects (GPOs), that contain policy settings, managementsettings for users
and computers in sites, domains, and structure units. to form or edit GPOs, use thecluster Policy snap-
in, that is accessed either through Active Directory Users and Computers or through Active Directory
Sites and Services (depending on that task you wish to perform).
To use the Active Directory body tools remotely, from a pc that's not a website controller
(suchjointly running Windows 2000 Professional), you need to install Windows 2000 body Tools.
New ways that to try to to acquainted Tasks
Table five lists common tasks you'll perform exploitation Active Directory snap-ins
and connectedbody tools. For users of the Windows nongovernmental organization Server software, the
tableadditionally shows wherever these tasks ar performed once exploitation the management
toolsgiven Windows nongovernmental organization Server four.0.
Table five Tasks performed exploitation Active Directory and cluster Policy tools
If you wish to: In Windows nongovernmental organization four.0, use: In Windows 2000, use:
Install a website controller Windows setup Active Directory Installation wizard (accessed from put
together Your Server).
Manage user accounts User Manager Active Directory Users and Computers
Manage groups User Manager Active Directory Users and Computers
Manage pc accounts Server Manager Active Directory Users and Computers
Add a pc to a domain Server Manager Active Directory Users and Computers
Create or manage trust relationships User Manager Active Directory Domains and Trusts.
Manage account policy User Manager Active Directory Users and Computers
Manage user rights User Manager Active Directory Users and Computers:
Edit the cluster Policy object for the domain or structure unit containing the computers to that the user
rights apply.
Manage audit policy User Manager Active Directory Users and Computers:
Edit the cluster Policy object assigned to the Domain Controllers structure unit.
Set policies on users and computers in a very site System Policy Editor Group Policy, accessed through
Active Directory Sites and Services
Set policies on users and computes in a very domain System Policy Editor Group Policy, accessed
through Active Directory Users and Computers
Set policies on users associated computers in an structure unit Not applicable Group Policy, accessed
through Active Directory Users and Computers
Use Security teams to filter the scope of policy Not applicable Edit the permission entry for
Applycluster Policy on the safety tab of the cluster Policy Object's properties sheet.
Active Directory Command-line Tools
Advanced directors and network support specialists may also use a range of command-line tools toput
together, manage, and troubleshoot Active Directory. These tools ar referred to as the Support Tools
and ar accessible on the Windows 2000 Server CD within the \SUPPORT\RESKIT
folder.they're delineate in Table six.
Table six Active Directory-related command-line tools
Tool Description
MoveTree Move objects from one domain to a different.
SIDWalker Set the access management lists on objects antecedently owned by accounts that
werestirred, orphaned, or deleted.
LDP Allows LDAP operations to be performed against Active Directory. This tool features
a graphicalcomputer programme.
DNSCMD Check dynamic registration of DNS resource records, as well as Secure DNS update, stillas
deregistration of resource records.
DSACLS View or modify the access management lists of directory objects.
NETDOM Batch management of trusts, connection computers to domains, verificatory trusts and secure
channels.
NETDIAG Check end-to-end network and distributed services functions.
NLTest Check that the surveyor and secure channel ar functioning.
REPAdmin Check replication consistency between replication partners, monitor
replication standing,show replication information, force replication events and information consistency
checker (KCC)computation.
REPLMon Display replication topology, monitor replication standing (including cluster policies), force
replication events and information consistency checker computation. This tool features
a graphicalcomputer programme.
DSAStat Compare directory info on domain controllers and sight variations.
ADSIEdit A Microsoft Management Console (MMC) snap-in wont to read all objects within thedirectory
(including schema and configuration information), modify objects and set accessmanagement lists on
objects.
SDCheck Check access management list propagation and replication for mere objects within
thedirectory. This tool permits associate administrator to work out if
access management lists ar beingfamilial properly and if access management list changes ar being
replicated from one domain controller to a different.
ACLDiag Determine whether or not a user has been granted or denied access to a directory object. Itmay
also be wont to reset access management lists to their default state.
DFSCheck Command-line utility for managing all aspects of Distributed filing system (Dfs), checking the
configuration concurrency of Dfs servers, and displaying the Dfs topology.
Windows 2000 Command Reference Page
You can notice an entire list of Windows 2000 commands, with info concerning the way to useeach, in
Windows 2000 facilitate. simply sort "command reference" at either theIndex tab or the Search tab.
Active Directory Service Interface
You can use Active Directory Service Interfaces (ADSI) to form scripts for a good type of functions. The
Windows 2000 Server CD contains many sample ADSI scripts. For a lot of concerning ADSI, see the
sections "Active Directory Service Interface" and "For a lot of info."
Top of page
1 In a Windows 2000 Server domain, a website controller may be a pc running the Windows 2000
Server software that manages user access to a network, which has work on, authentication, and access
to the directory and shared resources.
2 A DNS zone may be a contiguous partition of the DNS namespace that contains the resource records
for that zone's DNS domains
3 LDAP may be a protocol wont to access a directory service; see the sections "LDAP-related Names"
and "Lightweight Directory Access Protocol."
4 Described within the net Engineering Task Force (IETF) net Draft referred to as draft-ietf-dnsind-
rfc2052bis-02.txt, "A DNS RR for specifying the placement of services (DNS SRV)". (Internet-
Draftsar operating documents of the web Engineering Task Force (IETF), its areas, and
its operatingteams.)
5 Described in RFC 2136, Observations on the employment of parts of the category A Addresshouse at
intervals the web.
6 Windows 2000 teams ar outlined somewhat otherwise than in Windows nongovernmental
organization. Windows 2000 includes 2 cluster types: one. Security teams (to manage user and pcaccess
to shared resources and to filter cluster policy settings); and a pair of. Distribution teams (toproduce e-
mail distribution lists). Windows 2000 additionally includes 3 cluster scopes: one. teamswith
domain native scope (to outline and manage access to resources at
intervals one domain); two.teams with world scope (to manage directory objects that need daily
maintenance, like user and pcaccounts; you employ world scope to cluster accounts at intervals a
domain); and three. teamswith universal scope (to consolidate teams that span domains; you'll add user
accounts to teams withworld scope then nest these teams at intervals teams having universal scope).
(For a lot ofconcerning Windows 2000 teams, as well as the new universal cluster sort, see the "For a lot
ofInformation" section at the top of this paper.)
7 To qualify for the Certified for Windows brand, your application should be tested by VeriTest for
compliance with the appliance Specification for Windows 2000. you'll opt for any combination of
platforms, given that a minimum of one in every of the Windows 2000 operational systems isenclosed.
Applications could carry the "Certified for Microsoft Windows" brand once they needpassed compliance
testing and have dead a brand license agreement with Microsoft. the emblem you receive can indicate
the version(s) of Windows that your product is certified. See the
8 Active Directory supports LDAP v2 and LDAP v3, that acknowledge the RFC 1779 and RFC 2247 naming
conventions.
9 If no UPN was else, users will go online by expressly providing their user name and also the DNS name
of the basis domain.
10 The cluster policies that management printer defaults with relevance commercial
enterpriseprinters ar mechanically publish new printers in Active Directory and permit printers to
be printed(this latter cluster policy controls whether or not or not
printers thereon machine is published).
11 Compare this to earlier versions of Windows nongovernmental
organization Server, whereverthe guided missile information had a limit of concerning forty,000 objects
per domain.
12 For an outline of this extra overhead, see the "Microsoft Windows 2000
Server preparationdesigning Guide," that discusses the way to arrange the structure and preparation of
Windows 2000 domains and sites, within the section "For a lot of Information" at the top of this
document.
13 A DACL permits or denies permissions on associate object to specific users or teams.
14 For a lot of concerning ability with Kerberos realms, see the section "Kerberos Role in ability."
15 Up-to-date vectors don't seem to be site-specific. associate up-to-date vector
holds associateentry for each server on that the directory partition (Naming Context) is writeable.
16 In addition to authorization authority over containers, you'll additionally grant permissions (such as
read/write) right down to the attribute level of associate object.
17 The access management entries (ACEs) in associate object's DACL confirm World Health
Organization will access that object and what reasonably access they need. once associate objectis
formed within the directory, a default DACL (defined within the schema) is applied to that.
18 By default, the Enterprise Admins cluster is granted Full management over all objects in a veryforest.
19 You use the Folder Redirection extension to direct associatey of the subsequent special folders in a
very user profile to an alternate location (such as a network share): Application information, Desktop,
My Documents (and/or My Pictures), Start Menu.
20 LDAP version two is delineate in RFC 1777; LDAP version three is delineate in RFC 2251