BUILDING A NEW ACTIVE DIRECTORY Smita Carneiro, GCWN Active Directory Systems engineer Purdue University.

Slides:



Advertisements
Similar presentations
ADManager Plus Simplify Your Active Directory Management.
Advertisements

Managing User, Computer and Group Accounts
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Auditing Active Directory Presented to the National State Auditors Association 2014 Information Technology Conference.
Active Directory: Final Solution to Enterprise System Integration
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Administering Active Directory
Windows Server WHAT IS ACTIVE DIRECTORY? FUNDAMENTALS OF THE ACTIVE DIRECTORY – Benefits of Using the Active Directory in an Enterprise Environment.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Streamlining Support and Management through the Implementation of Active Directory Educause 2003 Mid-Atlantic Regional Gale D. Fritsche –
Imperial College Web Review Imperial College.... An audience-focused realignment of our web strategy with our College strategy, our market, technology.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Chapter 7 WORKING WITH GROUPS.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Module 6: Designing Active Directory Security in Windows Server 2008.
Part I.  NOS  Directory Data Store(directory service, database)  Located on Domain Controllers (DCs), globally distributed, replicated (no longer PDCs/BDCs)
Designing Active Directory for Security
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Security Planning and Administrative Delegation Lesson 6.
Microsoft Exchange POC Evaluation Results and Recommendations.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 5: Active Directory Logical Design.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Windows 2000 Presented to CCC by Pat Schneider May 23, 2001.
11.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 11: Planning.
Scaling NT To The Campus Integrating NT into the MIT Computing Environment Danilo Almeida, MIT.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Secure Networking Windows 2000 Distributed Security Services Sandeep Joshi Group 4.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
FROM MIT KERBEROS TO MICROSOFT ACTIVE DIRECTORY The Pennsylvania State University’s move from a lower case MIT Kerberos realm to a Standard Microsoft Active.
Introduction to Active Directory
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Active Directory.
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
Chapter4 Part2. User Account Management Once Active Directory is installed and configured, you enable users to access network servers and resources through.
9.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 9: Planning.
Administering Windows Server 2012 Question Answer.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Windows Enterprise Services.  Introductions  UNM Directory Services  RSAT  Organizational Units (OU)  Active Directory Groups  Naming Convention.
Al Lilianstrom and Dr. Olga Terlyga NLIT 2016 May 4 th, 2016 Under the Hood of Fermilab’s Identity Management Service.
Secure Connected Infrastructure
New Developments in Central Directory Service and Account Provisioning Dan Menicucci Enterprise Architect - University of Pittsburgh.
(ITI310) SESSIONS 6-7-8: Active Directory.
Active Directory Administration
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
MCSA VCE
CIS 332 Course Experience Tradition / snaptutorial.com
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
CIS 332 Competitive Success-- snaptutorial.com
CIS 332 Education for Service-- snaptutorial.com
CIS 332 Teaching Effectively-- snaptutorial.com
CIS 332 Inspiring Innovation-- snaptutorial.com
Windows Server 2008 Administration
OUHSC Information Security Update
Network Administration
Dartmouth College Status Report
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Windows Active Directory Environment
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
Presentation transcript:

BUILDING A NEW ACTIVE DIRECTORY Smita Carneiro, GCWN Active Directory Systems engineer Purdue University

BACKGROUND STORY Current one built in 2004 Custom engineered IDM (ACMaint) system provisions AD Some colleges have their own AD to fit their own needs Support for AD: Exchange  Windows Server  IAMO 2008 R2 Server OS, Domain and Forest functional level domains with some resources in both.lcl name

CURRENT LOGICAL STRUCTURE –Departments »Department 1000 Users Computers Groups Printers Servers Non-University Employees »Department 1001 Users Computers Groups Printers Servers Non-University Employees

ABSOLUTE NECESSITIES Dedicated project manager Sponsorship and buy in from management Budget dollars

START WITH A HEALTHY DOSE OF DISCOVERY Met with different stakeholders across campus and heard their concerns. 3 main groups: Infrastructure groups Current customers Prospective customers

STAKEHOLDERS CONCERNS Users spread out in different OUs makes it difficult for distributed IT Staff Faculty with dual appointments cannot get support easily from both departments Some departments have split support No separate admin groups for student workers Infrastructure has servers within regular structure, so block inheritance used for GPOs DDNS and workstation certificates restricted to some computers only

IAMO CONCERNS Password policy not enforced for all users No control over membership of Advanced OU Admins group for each department Advanced OU Admins have total control over user objects Too many non-person accounts, no accountability No differentiation between non-ACMainted person and service account

IAMO CONCERNS - CONTINUED Users and computers spread out, cannot apply security GPO in times of emergency w/o applying to entire domain No central group to decide/advise on changes made to whole directory Test Domain not really used

STARTED THE PLANNING PROCESS Talked to vendors, starting with Microsoft Bought Active Roles Server (ARS) Bought Dell Migration Manager (DMM) Hired a consultant to do a discovery process Came up with a single domain design

BUILDING PROCESS Built a test domain, used ARS Simple structure Default location for computers and user changed Used ARS to arrange objects

MANAGED UNITS

VALIDATION OF PROTOTYPE Formed a working group with just a few stakeholders Tested and gave feedback Made changes based on testing results Then built production

ADMINISTRATIVE ACCOUNTS No old administrative accounts, users have to request one Initially created paper forms, now electronic Admin group created for each support group, membership controlled by IAMO

STAKEHOLDERS CONCERNS Users being spread out – addressed by using MUs Easier to apply GPOs with new OU for computers Granular support for users using virtual attribute DDNS and workstation certificates available for all computers

IAMO CONCERNS User sprawl controlled– IAMO alone can create user, service accounts IAMO controls membership of Admin groups Virtual attribute created to denote service accounts Password policy now enforced, with the help of Fine Grained Password Policies Separate OU for Infrastructure Default OU for computers and users now, not a container

IAMO CONCERNS Started up a central AD Influence group

CAN I HAVE FRIES WITH THAT ? Additional attributes now populated: Unix UID, GID populated by central provisioning system Phone number format change PUID provisioned and put into confidential attribute

ADDITIONAL FEATURES ADDED Kerberos armoring enabled Use of gMSAs encouraged Enterprise Admin accounts marked ‘Sensitive account, cannot delegate’

CHALLENGES WE FACED Resources stretched thin both at central group and distributed IT Other urgent projects like LCR, PKI replacement Had to use Blue Cat DNS ARS learning curve, had to create documentation and training IDM’s AD provisioning component had to be rewritten

END OF STORY?

NEXT CHAPTER IN THE STORY Migrations are to start soon Preparation work, migrating users, groups, dual-acling Isilon, migrating workstations, training distributed IT personnel Unsupported departments Maintaining 2 production environments until old is gone

WAS IT WORTH IT?