Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Slides:



Advertisements
Similar presentations
What’s New in Windows Server 2008 AD?
Advertisements

Chapter 6 Introducing Active Directory
Chapter 4 Chapter 4: Planning the Active Directory and Security.
Introduction to Active Directory
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
By Rashid Khan Lesson 4-Preparing to Serve: Understanding Microsoft Networking.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Chapter 4 Introduction to Active Directory and Account Management
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008
Module 1: Installing Active Directory Domain Services
Module 1: Installing Active Directory Domain Services
Overview of Active Directory Domain Services Lesson 1.
Overview of Active Directory Domain Services Lesson 1.
Nassau Community College
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Chapter 12: Additional Active Directory Server Roles
Directory services Unit objectives
11 REVIEWING MICROSOFT ACTIVE DIRECTORY CONCEPTS Chapter 1.
Chapter 4 Introduction to Active Directory and Account Management
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
Windows Server 2008 Chapter 4 Last Update
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Module 6: Designing Active Directory Security in Windows Server 2008.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Designing Active Directory for Security
A detailed look at the Microsoft Windows Infrastructure at UWE including Active Directory (AD), MIIS, Exchange, SMS, IIS, SQL Server, Terminal Services.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Unit 4 IT278 Network Administration Course Name – IT278 Network Administration Instructor.
Designing Group Security Designing security groups Designing user rights.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 7 Active Directory and Account Management.
Session 7 Windows Platform Eng. Dina Alkhoudari. Learning Objectives Active Directory review Managing users and groups Single Master Operations Delegation.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Introduction to Active Directory Domain Services
Module 1: Implementing Active Directory ® Domain Services.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Active Directory Infrastructure Microsoft Windows 2003 Active Directory Infrastructure MCSE Exam
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
70-412: Configuring Advanced Windows Server 2012 services
Module 3 Planning for Active Directory®
Installing a Domain Controller
OVERVIEW OF ACTIVE DIRECTORY
Introduction to Active Directory
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Planning an Active Directory Deployment Lesson 1.
Overview of Active Directory Domain Services Lesson 1.
Basharat Institute of Higher Education
Implementing Active Directory Domain Services
Overview of Active Directory Domain Services
(ITI310) SESSIONS 6-7-8: Active Directory.
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Presentation transcript:

Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at PowerPoint Presentations at: carrieclasses.wikispaces.com Course Companion “CD” – Student.zip file

Course Outline Week #1: Introducing Active Directory Domain Services Week #2: Domain Controllers and Operations Masters Week #3: Active Directory Administration and Manage computers Week #4: Manage Users and Groups Week #5: Group Policies Week #6: More Group Policies Week #7: AD DS and DNS Integration Week #8: Configure Active Directory Sites and Replication Week #9: Directory Service Continuity Week #10: Manage multiple domains and trusts.

Week 1 Introduction and Install Active Directory Introducing Active Directory, Identity, and Access Active Directory Components and Concepts Extend IDA with Active Directory Services

Information Protection in a Nutshell It’s all about connecting users to the information they require … SECURELY! IDA: Identity and Access AAA: Authentication, Authorization, Accounting CIA: Confidentiality, Integrity, Availability ( & Authenticity)

Identity and Access (IDA) Identity: user account Saved in an identity store (directory database) Security principal Represented uniquely by the security identifier (SID) Resource: Shared Folder Secured with a security descriptor Discretionary access control list (DACL or “ACL”) Access control entries (ACEs or “permissions”)

Authentication and Authorization The system creates a security token that represents the user with the user’s SID and all related group SIDs A resources is secured with an access control list (ACL): permissions that pair a SID with a level of access The user’s security token is compared with the ACL of the resource to authorize a requested level of access A user presents credentials that are authenticated using the information stored with the user’s identity

Authentication Two types of authentication Local (interactive) Logon – authentication for logon to the local computer Remote (network) logon – authentication for access to resources on another computer Authentication is the process that verifies a user’s identity Credentials: at least two components required Username Secret, for example, password

Access Tokens User’s Access Token Other access information Privileges (“user rights”) Member Group SIDs User SID

Security Descriptors, ACLs and ACEs Security Descriptor Discretionary ACL (DACL or “ACL”) ACE Trustee (SID) Access Mask System ACL (SACL)

Authorization Authorization is the process that determines whether to grant or deny a user a requested level of access to a resource Three components required for authorization Resource Security TokenAccess Request Security Descriptor Discretionary ACL (DACL or “ACL”) ACE Trustee (SID) Access Mask System ACL (SACL) User’s Access Token Other access information List of user rights Group SID User SID System finds first ACE in the ACL that allows or denies the requested access level for any SID in the user’s token

Stand-alone (Workgroup) Authentication The identity store is the security accounts manager (SAM) database on the Windows system No shared identity store Multiple user accounts Management of passwords is challenging

Active Directory Domains: Trusted Identity Store Centralized identity store trusted by all domain members Centralized authentication service Hosted by a server performing the role of an Active Directory Domain Services (AD DS) domain controller

Active Directory, Identity, and Access An IDA infrastructure should  Store information about users, groups, computers and other identities  Authenticate an identity Kerberos authentication used in Active Directory provides single sign-on. Users are authenticated only once.  Control access  Provide an audit trail Active Directory services  Active Directory Domain Services (AD DS)  Active Directory Lightweight Directory Services (AD LDS)  Active Directory Certificate Services (AD CS)  Active Directory Rights Management Services (AD RMS)  Active Directory Federation Services (AD FS)

Active Directory As a Database Active Directory is a database  Each “record” is an object Users, groups, computers, …  Each “field” is an attribute Logon name, SID, password, description, membership, …  Identities (security principals or “accounts”) Services: Kerberos, DNS, replication, etc. Accessing the database  Windows tools, user interfaces, and components  APIs (.NET, VBScript, Windows PowerShell)  Lightweight Directory Access Protocol (LDAP) AD DS is, in the end, a database and the services that support or use that database Schema Demo

Organizational Units Containers  Users  Computers Organizational Units  Containers that also support the management and configuration of objects using Group Policy  Create OUs to Delegate administrative permissions Apply Group Policy

Policy-Based Management Active Directory provides a single point of management for security and configuration through policies  Group Policy Domain password and lockout policy Audit policy Configuration Applied to users or computers by scoping a GPO containing configuration settings  Fine-grained password and lockout policies

The Active Directory Data Store %systemroot%\NTDS\ntds.dit Logical partitions  Domain naming context  Schema  Configuration  Global catalog (aka Partial Attribute Set)  DNS (application partitions) SYSVOL  %systemroot%\SYSVOL  Logon scripts  Policies PAS DNS *Domain* Configuration Schema NTDS.DIT

Domain Controllers Servers that perform the AD DS role  Host the Active Directory database (NTDS.DIT) and SYSVOL Replicated between domain controllers  Kerberos Key Distribution Center (KDC) service: authentication  Other Active Directory services Best practices  Available: at least two in a domain  Secure: Server Core, Read-only domain controllers (RODCs)

Domain Made up of one or more DCs All DCs replicate the Domain naming context (Domain NC)  The domain is the context within which Users, Groups, Computers, and so on are created  “Replication boundary” Trusted identity source: Any DC can authenticate any logon in the domain The domain is the maximum scope (boundary) for certain administrative policies  Password  Lockout

Replication Multimaster replication  Objects and attributes in the database  Contents of SYSVOL are replicated Several components work to create an efficient and robust replication topology and to replicate granular changes to AD The Configuration partition of the database stores information about sites, network topology, and replication DC2 DC1 DC3

Sites An Active Directory object that represents a well- connected portion of your network  Associated with subnet objects representing IP subnets Intrasite vs. intersite replication  Replication within a site occurs very quickly (15-45 seconds)  Replication between sites can be managed Service localization  Log on to a DC in your site Site A Site B

Tree One or more domains in a single instance of AD DS that share contiguous DNS namespace proseware.com treyresearch.net antarctica.treyresearch.net

Forest A collection of one or more Active Directory domain trees First domain is the forest root domain Single configuration and schema replicated to all DCs in the forest A security and replication boundary

The Global Catalog Partial Attribute Set or Global Catalog Contains every object in every domain in the forest Contains only selected attributes A type of index Can be searched from any domain Very important for many applications PAS Domain A PAS Domain B

Functional Level Domain functional levels Forest functional levels New functionality requires that domain controllers are running a particular version of Windows  Windows 2000  Windows Server 2003  Windows Server 2008 Cannot raise functional level while DCs are running previous versions of Windows Cannot add DCs running previous versions of Windows after raising functional level

DNS and Application Partitions Active Directory and DNS are tightly integrated One-to-one relationship between the DNS domain name and the logical domain unit of Active Directory Complete reliance on DNS to locate computers and services in the domain A domain controller acting as a DNS server can store the zone data in Active Directory itself—in an application partition PAS DNS Domain Configuration Schema

Trust Relationships Extends concept of trusted identity store to another domain Trusting domain (with the resource) trusts the identity store and authentication services of the trusted domain A trusted user can authenticate to, and be given access to resources in, the trusting domain Within a forest, each domain trusts all other domains Trust relationships can be established with external domains Trusted domainTrusting domain

Active Directory Lightweight Directory Services (AD LDS) Standalone version of Active Directory  Used to support applications that require a directory store  Allow customization without impact to production Active Directory Characteristics  A subset of AD DS functionality, sharing the same code Schema, Configuration, and Application partitions Replication  Not dependent upon AD DS  Can use AD DS to authenticate Windows security principals  Can run multiple instances on a single server

Active Directory Certificate Services (AD CS) Extends the concept of trust  A certificate from a trusted certificate authority (CA) proves identity  Trust can be extended beyond the boundaries of your enterprise, as long as clients trust the CA of the certificates you present Creates a public key infrastructure (PKI)  Confidentiality, Integrity, Authenticity, Non-Repudiation Many uses  Internal-only or external  Secure Web sites (SSL)  VPN  Wireless authentication and encryption  Smart card authentication Integration with AD DS powerful, but not required

Active Directory Rights Management Services (AD RMS) Ensures the integrity of information  Traditional model: ACL defines access. No restriction on use.  AD RMS: Ensures access is limited and defines use. Examples  Limit access to specified individuals  View but do not forward or print  View and print document but cannot change or Requires  AD RMS IIS, Database (SQL Server or Windows Internal Database)  AD DS  RMS enabled applications including Microsoft Office applications, Internet Explorer

Active Directory Federation Services (AD FS) Extends the authority of AD DS to authenticate users Traditional “trust”  Two Windows domains  Numerous TCP ports open in firewalls  “Everyone” from trusted domain is trusted AD FS uses Web services technologies to implement trust  One AD DS/LDS directory; other side can be Active Directory or other platforms  Port 443: transactions are secure and encrypted  Rules specifying which users from trusted domain are trusted Uses  Business-to-business: partnership  Single sign-on

Install Windows Server 2008 Boot with installation media (DVD) Follow prompts and select the operating system to install

Server Manager and Role-Based Configuration of Windows Server 2008 Windows Server 2008 has minimal footprint Functionality is added as roles or features Server Manager: role and feature configuration along with the common administrative snap-ins for the server

Install and Configure a Domain Controller Install the Active Directory Domain Services role using the Server Manager 1 1 Choose the deployment configuration 3 3 Select the additional domain controller features 4 4 Run the Active Directory Domain Services Installation Wizard 2 2 Select the location for the database, log files, and SYSVOL folder 5 5 Configure the Directory Services Restore Mode Administrator Password 6 6

Prepare to Create a New Forest with Windows Server 2008 Domain’s DNS name (e.g. contoso.com) Domain’s NetBIOS name (e.g. contoso) Whether the new forest will need to support DCs running previous versions of Windows (affects choice of functional level) Details about how DNS will be implemented to support AD DS  Default: Creating domain controller adds DNS Server role as well IP configuration for the DC  IPv4 and, optionally, IPv6 Username and password of an account in the server’s Administrators group. Account must have a password. Location for data store (ntds.dit) and SYSVOL  Default: %systemroot% (c:\windows)