Brief Overview of Active Directory

[Previous] [Next]

Even though a full explanation of Active Directory is outside the scope of this book, a brief overview is warranted. Because Exchange 2000 Server is heavily dependent on the underlying network operating system, it is important to have a basic understanding of Windows 2000 Active Directory.

MORE INFO
For a more thorough discussion of Active Directory and the other concepts discussed in this chapter, see Microsoft Windows 2000 Administrator's Companion by Charlie Russel and Sharon Crawford (Microsoft Press, 2000).

Directory Structure in Active Directory

Before we discuss what Active Directory is, you should first understand what a directory is. As an analogy, think of a generic file system. Perhaps in this file system, you have a C: drive, and on that drive, you have a root folder named Memos. Under C:\Memos, you have a folder for each of the 12 months of the year, so you would find a folder in the structure named July. Under C:\Memos\July, you have a folder named Departments, which means the full pathname to Departments is C:\Memos\July\Departments.

What we have just described is a hierarchy of folders in a file system. A directory is no different, except that the hierarchy consists not of folders but of objects. An object is an entity that is described by a distinct, named set of attributes. And instead of using Windows Explorer to search through this hierarchy of objects, we'll be using a protocol designed to search a directory, called the Lightweight Directory Access Protocol (LDAP).

NOTE
The original protocol for accessing a directory was called Directory Access Protocol (DAP), but it had a high overhead and tended to be slow. Lightweight Directory Access Protocol (LDAP) is an improved version that is faster and requires less overhead. For more information about the LDAP protocol, see Chapter 17.

With Active Directory, Microsoft has taken the directory concept and made significant improvements to it, such as dynamic DNS. The "Active" in Active Directory describes the flexibility and extensibility that has been built into Microsoft's directory service.

Logical Structure of Active Directory

The components that form the logical structure of Active Directory include domains, organizational units, trees, and forests.

Domains

A domain is the core unit in Active Directory and is made up of a collection of computers that share a common directory database. The computers that share this common directory database are called domain controllers. A domain controller is a Windows 2000 server that has Active Directory installed. It is able to authenticate users for its own domain. Each domain controller holds a complete replica of the domain naming partition for the domain to which it belongs and a complete replica of the configuration and schema naming partitions for the forest. Dcpromo.exe is the utility used to promote a Windows 2000 server to a domain controller.

All Active Directory domain names are identified by a DNS name as well as by a NetBIOS name. The following is an example of the two types of names:

DNS-style domain name:   sample.microsoft.com
NetBIOS name:                 sample

Generally, the NetBIOS name is the same as the first naming component in the DNS name. However, a NetBIOS name can be only 15 characters in length, whereas each name in the DNS naming convention can have up to 64 characters. During installation, both names can be configured to meet your needs. In the initial release of Windows 2000, Active Directory names cannot be changed.

The domain is also a security boundary in Active Directory. Administrators in a domain have the permissions and rights to perform administrative functions in that domain. However, since each domain has its own security, administrators must be given explicit permissions to perform administrative tasks in other domains.

A Windows 2000 Active Directory domain can be in either mixed mode or native mode. The default installation is mixed mode. In mixed mode, a Windows 2000 domain controller acts like a Microsoft Windows NT 4 domain controller. Active Directory domains in mixed mode have the same limitations on the security accounts database as Windows NT 4 domain controllers. For example, in mixed mode, the size of the directory is limited to 40,000 objects, the same restriction imposed by Windows NT 4. These limitations allow Windows NT 4 domain controllers to exist on the network and connect to and synchronize with the Windows 2000 domain controllers.

To run Windows 2000 in native mode, you must not have any Windows NT 4 domain controllers on your network. The switch to native mode is a one-time, one-way switch and is irreversible. Native mode allows your Windows 2000 domain controllers to have millions of objects per domain. In addition, native mode allows the nesting of groups, something that is advantageous if you anticipate large distribution groups in Exchange 2000 Server.

A Windows 2000 network running in native mode can accommodate Windows NT 4 stand-alone and member servers. Windows NT 4 workstations must be upgraded to Windows 2000 Professional in order to participate in Active Directory. Microsoft Windows 95/98 clients can install a Windows 2000 Active Directory client that allows them to participate fully in the native mode domain.

Windows 2000 implements Active Directory in a multimaster model because objects in Active Directory can be modified on any domain controller, which accounts for the emphasis on directory replication between domain controllers. However, some roles are either too sensitive to security issues or too impractical to perform in a multimaster model because of potential conflicts that could arise from the replication traffic. An understanding of these roles is important; if a domain controller that is performing a particular role becomes unavailable, the function it performed will not be available in Active Directory. These roles are schema master, domain naming master, relative identifier master, PDC emulator, and infrastructure master.

Schema Master The schema is the set of object classes (such as users and groups) and their attributes (such as full name and phone number) that form Active Directory. The schema master controls all aspects of updates and modifications to the schema. To update the schema, you must have access to the schema master. There can be only one schema master in the forest at any given time.

Domain Naming Master The domain naming master controls the addition and removal of domains in the forest. This is the only domain controller from which you can create or delete a domain. There can only be one domain naming master in the forest at any given time.

Relative Identifier Master The relative identifier (RID) master allocates sequences of RIDs to each of the domain controllers in its domain. Whereas the schema master and domain naming master perform forestwide functions, one RID master is assigned per domain. Since each domain controller can create objects in Active Directory, the RID master allocates to each domain controller a pool of 500 RIDs from which to draw when creating the object. When a domain controller has used more than 400 RIDs, the RID master gives it another batch of 500 RIDs.

Whenever a new user, group, or computer object is created, the object inherits the security identifier (SID) of the domain. Appended to the end of the domain SID is the RID, which makes up the unique SID for the object. In addition, when an object is moved from one domain to another, its SID changes, because it receives a new SID (made up of both the domain SID and the RID) in the destination domain. By allowing only the RID master to move objects between domains, Windows 2000 ensures SID uniqueness, even across domains. Objects maintain a SID history for security access to resources.

PDC Emulator Each domain in the forest must have one domain controller that acts as the PDC emulator. If Active Directory is running in mixed mode with Windows NT 4 domain controllers on the same network, the PDC emulator is responsible for synchronizing password changes and security account updates between the Windows NT 4 servers and the Windows 2000 servers. Moreover, the PDC emulator appears to downlevel clients, such as Windows 95, Windows 98, and Windows NT 4, as the PDC of the domain. It functions as the domain master browser, is responsible for replication services to the BDCs, and performs directory writes to the Windows NT 4 domain security database.

In native mode, the PDC emulator receives the urgent updates to the Active Directory security accounts database, such as password changes and account lockout modifications. These urgent changes to user accounts are immediately replicated to the PDC emulator, no matter where they are changed in the domain. If a logon authentication fails at a domain controller, the credentials are first passed to the PDC emulator for authentication before the logon request is rejected.

Infrastructure Master The infrastructure master is responsible for tracking group-to-user references whenever the user and the group are not members of the same domain.. The object that resides in the remote domain is referenced by its GUID and its SID. If an object is moved from one domain to another, it receives a new SID and the infrastructure master replicates these changes to other infrastructure masters in other domains.

Organizational Units

An organizational unit (OU) is a container object that is used to organize other objects within a domain. An OU can contain user accounts, printers, groups, computers, and other OUs.

OUs are strictly for administrative purposes and convenience. They are transparent to the end user and have no bearing on the user's ability to access network resources. OUs can be used to create departmental or geographical boundaries. They can also be used to delegate administrative authority to users for particular tasks. For instance, you can create an OU for all of your printers and then assign full control over the printers to your printer administrator.

OUs can also be used to limit administrative control. For instance, you can give your help desk support personnel the permission to change the password on all user objects in an OU without giving them permissions to modify any other attributes of the user object, such as group membership or names.

Because an Active Directory domain can hold millions of objects, upgrading to Windows 2000 allows companies to convert from a multiple-domain model to a single-domain model and then use organizational units to delegate administrative control over resources.

Trees and Forests

The first Windows 2000 domain that you create is the root domain, which contains the configuration and schema for the forest. You add additional domains to the root domain to form the tree. As Figure 4-1 illustrates, a tree is a hierarchical grouping of Windows 2000 domains that share a contiguous namespace. A contiguous namespace is one that uses the same root name when naming additional domains in the tree.

click to view at full size.

Figure 4-1. Fictitious tree of Microsoft.com.

A collection of trees that do not share a contiguous namespace can be placed in the same forest. They then share a common configuration, schema, and Global Catalog. By default, the name of the root domain becomes the name of the forest, even though other trees will not share the same name as the root domain.

Even though they don't share the same name, transitive trust relationships are automatically established between the root domain servers in each tree, as long as they are members of the same forest. Figure 4-2 shows two trees, Microsoft.com and oaktree.com, in the same forest.

click to view at full size.

Figure 4-2. Forest consisting of Microsoft.com and oaktree.com.

The schema and configuration partitions for Active Directory are replicated to all domain controllers in each domain. While a domain represents a boundary for security and the logical grouping of objects, a forest represents the boundary for Active Directory and the Exchange 2000 organization.

The first domain within an Active Directory forest plays a very important role. It can never be removed. This restriction means that when you install Active Directory on a Windows 2000 server (using Dcpromo.exe), the server can never be demoted back to a stand-alone server if it is the first domain controller in the first domain of the first tree in the forest.

In addition, other domain names cannot be represented above the first domain name. For instance, if your root domain name is hr.oaktree.com, you can never install a domain named oaktree.com in the same forest. You can join other domain names to the forest, such as microsoft.com, as long as they are in a different namespace.

TIP
The design strategy for most companies is to create the first domain as a placeholder for the rest of the company. Initially, this domain doesn't contain any user or group accounts, other than the defaults. However, as departments become ready to migrate to Windows 2000, they will have the option of either joining the current domain or creating a new domain in the tree structure.

Groups

Windows 2000 enhances the group structure of Windows NT 4. Groups are used to reduce administrative effort and to enable the management of many user accounts simultaneously. Windows 2000 uses groups to reduce the number of objects that require direct administration.

There are basically two kinds of groups in Windows 2000. Each has its own advantages and restrictions that you must take into account when using them. Exchange 2000 Server uses both kinds of groups from Windows 2000:

  • Security groups are security principles within Active Directory. They are used to group users or computers for the purpose of reducing the points of administration and providing permissions to network resources.
  • Distribution groups are the replacement for distribution lists in Exchange 5.5. You cannot use them to assign permissions to network resources. They exist solely for the purpose of creating distribution lists for e-mail.

Global Groups Global groups, in mixed mode, can contain users only from the domain in which they are hosted. In native mode, they can contain users and global groups from the local domain in which they were created. However, they can be used to assign permissions to resources in any domain. Global groups can contain users, computers, and global groups from the local domain. They can be members of any other type of group.

Typically, you'll use global groups for administering user membership that has permissions to a network resource. The group itself is replicated as part of the Global Catalog, but its membership is not. This restriction means that adding user accounts to or removing user accounts from a global group will not trigger a new replication of the Global Catalog. Global groups can be converted to universal groups (discussed shortly) as long as the global groups do not contain other global groups and the domain is in native mode.

Domain Local Groups Domain local groups in native mode can contain other domain local groups, users, global groups, and universal groups from any domain in the forest, but they can be granted permissions only in the domain in which they reside. In mixed mode, they can contain only user and global group accounts.

You'll grant permissions to domain local groups only for objects in the local domain. The existence of the domain local group is replicated to the Global Catalog server, but its membership is not replicated. Domain local groups are flexible in that you can use any other security principle inside the domain local group (when running in native mode) to reduce administrative effort. You can convert a domain local group to a universal group in native mode as long as it does not contain other domain local groups.

Universal Groups Universal groups can contain users, global groups, and other universal groups from any Windows 2000 domain in the forest. The domain must be operating in native mode to create security groups with universal scope. You can grant permissions to resources anywhere in the forest to a universal group.

Universal group membership must be determined at the time of logon. Because the scope of the universal group is universal, this group is propagated through the Global Catalog. Hence, not only is the group itself propagated in the Global Catalog, but its membership is propagated as well. A universal group with a large membership will generate additional replication overhead if the membership changes. Universal groups as security groups are available only in native mode. Table 4-1 summarizes group membership rules.

Table 4-1. Comparison of the various types of groups

Group Scope In Mixed Mode Can Contain In Native Mode Can Contain Can Be a Member Of Can Be Granted Permissions For
Domain local User accounts and global groups from any domain User accounts, global groups, and universal groups from any domain in the forest, and domain local groups from the same domain Domain local groups in the same domain The domain in which the domain local group exists
Global User accounts from the same domain User accounts and global groups from the same domain Universal and domain local groups in any domain and global groups in the same domain All domains in the forest
Universal Not applicable User accounts, global groups, and other universal groups from any domain in the forest Domain local and universal groups in any domain All domains in the forest



Microsoft Exchange 2000 Server Adminstrator's Companion
Microsoft Exchange 2000 Server Adminstrator's Companion
ISBN: N/A
EAN: N/A
Year: 1999
Pages: 193

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net