SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Module 1
 Introducing Active
Directory® Domain
           Services
Module Overview
• Overview of Active Directory, Identity, and Access

• Active Directory Components and Concepts

• Install Active Directory Domain Services
Lesson 1: Overview of Active Directory, Identity,
and Access
• Information Protection

• Identity and Access

• Authentication and Authorization

• Authentication

• Access Tokens

• Security Descriptors, ACLs, and ACEs

• Authorization

• Stand-Alone (Workgroup) Authentication

• Active Directory Domains: Trusted Identity Store

• Active Directory, Identity, and Access

• Active Directory IDA services
Information Protection




• It’s all about connecting users to the information they require
 securely
• IDA: Identity and Access

• AAA: Authentication, Authorization, Accounting

• CIA: Confidentiality, Integrity, Availability, and Authenticity
Identity and Access




• Identity: User account       • Resource: Shared Folder

• Saved in an identity store   • Secured with a security
 (directory database)           descriptor
• Security principal           • DACL or ―ACL‖

• Represented uniquely by      • ACEs or ―permissions‖
 the SID
Authentication and Authorization

    A user presents           The system creates a
    credentials that are      security token that
    authenticated by using    represents the user with
    the information stored    the user’s SID and all
    with the user’s           related group SIDs
    identity



    A resources is secured    The user’s security
    with an ACL:              token is compared with
    Permissions that pair a   the ACL of the resource
    SID with a level of       to authorize a requested
    access                    level of access
Authentication

Authentication is the process that verifies a user’s identity


Credentials: At least two components required
 • User name                         • Secret, for example, password


Two types of authentication
 • Local (interactive) Logon–        • Remote (network) Logon–
   authentication for logon to the     authentication for access to
   local computer                      resources on another
                                       computer
Access Tokens




                User’s Access Token

                      User SID


                      Member Group
                      SIDs

                      Privileges
                      (―user rights‖)

                      Other access
                      information
Security Descriptors, ACLs and ACEs




              Security Descriptor

                         SACL

                    DACL or ―ACL‖
                     ACE
                     Trustee (SID)
                     Access Mask

                     ACE
                     Trustee (SID)
                     Access Mask
Authorization

Authorization is the process that determines whether to grant
or deny a user a requested level of access to a resource


Three components required for authorization
 • Resource            • Access Request      • Security Token


                      System finds first
User’s Access Token   ACE in the ACL that      Security Descriptor
                      allows or denies the
   User SID           requested access                  SACL
                      level for any SID in
                      the user’s token           DACL or ―ACL‖
   Group SID

                                                   ACE
   List of user                                    Trustee (SID)
   rights                                          Access Mask

   Other access                                    ACE
                                                   Trustee (SID)
   information                                     Access Mask
Stand-Alone (Workgroup) Authentication
• The identity store is the SAM database on the Windows
 system
• No shared identity store

• Multiple user accounts

• Management of passwords is challenging
Active Directory Domains: Trusted Identity Store
• Centralized identity store
 trusted by all domain
 members
• Centralized authentication
 service
• Hosted by a server
 performing the role of an AD
 DS domain controller
Active Directory, Identity, and Access
An IDA infrastructure should:
     Store information about users, groups, computers and
      other identities
     Authenticate an identity
       •   Kerberos authentication used in Active Directory
           provides single sign-on. Users are authenticated only
           once.
     Control access
     Provide an audit trail
Active Directory IDA Services
Active Directory IDA services :
     Active Directory Lightweight Directory Services (AD
      LDS)
     Active Directory Certificate Services (AD CS)
     Active Directory Rights Management Services (AD RMS)
     Active Directory Federation Services (AD FS)
Lesson 2: Active Directory Components and Concepts
• Active Directory as a Database

• Active Directory Data Store

• Domain Controllers

• Demonstration: Active Directory Schema
• Organizational Units

• Domain

• Forest

• Tree
• Replication
• Sites

• Global Catalog
• Functional Levels

• DNS and Application Partitions

• Trust Relationships
Active Directory as a Database
• Active Directory is a database
     Each ―record‖ is an object
        •   Users, groups, computers, and so on
     Each ―field‖ is an attribute
        •   Logon name, SID, password, description, membership, and
            so on
     Identities (security principals or ―accounts‖)

• Services: Kerberos, DNS, and replication

• Accessing the database
     Windows tools, user interfaces, and components
     APIs (.NET, VBScript, Windows PowerShell)
     LDAP
Active Directory Data Store
• %systemroot%NTDSntds.dit

• Logical partitions
     Domain naming context
     Schema
     Configuration
                                                 Schema
     Global catalog (Partial Attribute Set)
     DNS (application partitions)             Configuration

• SYSVOL
                                                *Domain*
     %systemroot%SYSVOL
     Logon scripts         NTDS.DIT               DNS
     Policies
                                                   PAS
Domain Controllers
• Servers that perform the AD DS role
     Host the Active Directory database (NTDS.DIT) and SYSVOL
       •   Replicated between domain controllers
     Kerberos KDC service: Performs authentication
     Other Active Directory services

• Best practices
     Availability: At least two in a domain
     Security: Server Core and RODCs
Demonstration: Active Directory Schema
In this demonstration, you will see
• How the Schema acts as a blueprint for Active Directory
 by exploring the following Attributes and Object classes:
  Attributes
      •   objectSID
      •   sAMAccountName
      •   unicodePwd
      •   member
      •   Description
  Classes
      •   User
      •   Group
Organizational Units
• Objects
     Users
     Computers

• Organizational Units
     Containers that can be used
      to group objects within a
      domain
     Create OUs to:
       •   Delegate administrative
           permissions
       •   Apply Group Policy
Domain
• Requires one or more domain controllers

• All domain controllers replicate the Domain
 naming context (Domain NC)
     The domain is the context within which Users,
      Groups, Computers, and so on are created
     ―Replication boundary‖

• Trusted identity source: Any domain
 controller can authenticate any logon in the
 domain
• The domain is the maximum scope
 (boundary) for certain administrative
 policies
     Password
     Lockout
Forest
• A collection of one or more Active Directory domain trees

• First domain is the forest root domain

• Single configuration and schema
 replicated to all domain controllers in the forest
• A security and replication boundary
Tree
• One or more domains in a single instance of AD DS that
 share contiguous DNS namespace




                              treyresearch.net


         proseware.com




                        antarctica.treyresearch.net
Replication
• Multimaster replication
     Objects and attributes in the database
     Contents of SYSVOL are replicated

• Several components work to create an efficient and robust
 replication topology and to replicate granular changes to AD
• The Configuration partition of the database stores
 information about sites, network topology, and replication

                                    DC1                DC3




                                               DC2
Sites
• An Active Directory object that represents a well-
 connected portion of your network
     Associated with subnet objects representing IP subnets

• Intrasite vs. intersite replication
     Replication within a site occurs very quickly (15–45 seconds)
     Replication between sites can be managed

• Service localization
     Log on to a domain controller in your site
                                                           Site B




                      Site A
Global Catalog
• Partial Attribute Set or
 Global Catalog
                                     Domain A
• Contains every object in             PAS
 every domain in the
 forest
• Contains only selected
 attributes
• A type of index
                             Domain B
• Can be searched from
 any domain                    PAS

• Very important for
 many applications
Functional Levels
• Domain functional levels

• Forest functional levels

• New functionality requires that domain controllers are running a
 particular version of Windows
     Windows 2000
     Windows Server 2003
     Windows Server 2008
     Windows Server 2008 R2
• Cannot raise functional level
 while domain controllers are running
 previous Windows versions
• Cannot add domain controllers
 running previous Windows versions
 after raising functional level
DNS and Application Partitions
• Active Directory and DNS are closely
 integrated
• One-to-one relationship between the DNS
 domain name and the logical domain unit
 of Active Directory
• Complete reliance on DNS to locate
                                                  Schema
 computers and services in the domain
• A domain controller acting as a DNS           Configuration
 server can store the zone data in Active
 Directory itself—in an application partition
                                                  Domain


                                                    DNS


                                                    PAS
Trust Relationships
• Extends concept of trusted identity store to another domain

• Trusting domain (with the resource) trusts the identity store
 and authentication services of the trusted domain
• A trusted user can authenticate to, and be given access to
 resources in, the trusting domain
• Within a forest, each domain trusts all other domains

• Trust relationships can be established with external domains




            Trusted Domain     Trusting Domain
Lesson 3: Install Active Directory Domain Services
• Install and Configure a Domain Controller

• Prepare to Create a New Forest with Windows Server 2008 R2
Install and Configure a Domain Controller


1 Install the Active Directory Domain Services role
  by using the Server Manager

   Run the Active Directory Domain Services
2 Installation Wizard

3 Choose the deployment configuration

4 Select the additional domain controller features

   Select the location for the database, log files, and
5 SYSVOL folder

   Configure the Directory Services Restore
6 Mode Administrator Password
Prepare to Create a New Forest with
Windows Server 2008 R2
• Domain’s DNS name (contoso.com)

• Domain’s NetBIOS name (contoso)

• Whether the new forest will need to support domain controllers
 running previous versions of Windows (affects choice of
 functional level)
• Details about how DNS will be implemented to support AD DS
     Default: Creating domain controller adds DNS Server role as well

• IP configuration for the domain controller
     IPv4 and, optionally, IPv6

• User name and password of an account in the server’s
 Administrators group. Account must have a password.
• Location for data store (ntds.dit) and SYSVOL
     Default: %systemroot% (c:windows)
Lab: Install an AD DS Domain Controller to
Create a Single Domain Forest
• Exercise 1: Perform Post-Installation Configuration Tasks

• Exercise 2: Install a New Windows Server 2008 Forest with
 the Windows Interface
• Exercise 3: Raise Domain and Forest Functional Levels




Logon information

Virtual machine       6425C-NYC-SVR-D

Logon user name       Administrator

Password              Pa$$w0rd


Estimated time: 30 minutes
Lab Scenario
You have been hired to improve identity and access at
Contoso, Ltd. The company currently has one server in a
workgroup configuration. Employees connect to the server
from their personal client computers. In anticipation of
near-term growth, you need to improve the manageability
and security of the company’s resources. You decide to
implement an AD DS domain and forest by promoting the
server to a domain controller. You have just finished
installing Windows Server 2008 R2 from the installation
DVD.
Lab Review
• What can you do with the Initial Configuration Tasks
 console?
• What must you do before starting the dcpromo wizard?

• Which tool is used to raise the domain functional level?
Module Review and Takeaways
• Review Questions

• Common Issues Related to AD DS Installation

• Best Practices Related to AD DS Installation

• Tools

Contenu connexe

Tendances

Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
thebigredhemi
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
Harsh Sethi
 
Designing the active directory logical structure
Designing the active directory logical structureDesigning the active directory logical structure
Designing the active directory logical structure
John Carlo Catacutan
 
Active directory
Active directory Active directory
Active directory
deshvikas
 
Active directory ds ws2008 r2
Active directory ds ws2008 r2Active directory ds ws2008 r2
Active directory ds ws2008 r2
MICTT Palma
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directory
Muuluu
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
Activedirecotryfundamentals
Shekhar Singh
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
202066
 
Windows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory GuideWindows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory Guide
webhostingguy
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
Varun Arora
 

Tendances (20)

Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
 
Active Directory
Active Directory Active Directory
Active Directory
 
Designing the active directory logical structure
Designing the active directory logical structureDesigning the active directory logical structure
Designing the active directory logical structure
 
70 640 Lesson03 Ppt 041009
70 640 Lesson03 Ppt 04100970 640 Lesson03 Ppt 041009
70 640 Lesson03 Ppt 041009
 
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 04100970 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
Active directory
Active directory Active directory
Active directory
 
Active directory ds ws2008 r2
Active directory ds ws2008 r2Active directory ds ws2008 r2
Active directory ds ws2008 r2
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directory
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
Activedirecotryfundamentals
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
 
MCITP
MCITPMCITP
MCITP
 
Windows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory GuideWindows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory Guide
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
70 640 Lesson04 Ppt 041009
70 640 Lesson04 Ppt 04100970 640 Lesson04 Ppt 041009
70 640 Lesson04 Ppt 041009
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Active Directory component
Active Directory componentActive Directory component
Active Directory component
 

En vedette

Checking the health of your active directory enviornment
Checking the health of your active directory enviornmentChecking the health of your active directory enviornment
Checking the health of your active directory enviornment
Spiffy
 

En vedette (7)

Ad ds ws2008 r2
Ad ds ws2008 r2Ad ds ws2008 r2
Ad ds ws2008 r2
 
unit 2
unit 2unit 2
unit 2
 
Checking the health of your active directory enviornment
Checking the health of your active directory enviornmentChecking the health of your active directory enviornment
Checking the health of your active directory enviornment
 
Tutorial on dhcp
Tutorial on dhcp Tutorial on dhcp
Tutorial on dhcp
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
DHCP Server & Client Presentation
DHCP Server & Client PresentationDHCP Server & Client Presentation
DHCP Server & Client Presentation
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 

Similaire à 6425 c 01

02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
AdiWidyanto2
 
Windows Server 2008 - Active Directory Components
Windows Server 2008 - Active Directory ComponentsWindows Server 2008 - Active Directory Components
Windows Server 2008 - Active Directory Components
André Braga
 

Similaire à 6425 c 01 (20)

Cram Class - Lesson 1
Cram Class - Lesson 1Cram Class - Lesson 1
Cram Class - Lesson 1
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
 
ADDS (Active directory Domain Service) in side server
ADDS (Active directory Domain Service) in side serverADDS (Active directory Domain Service) in side server
ADDS (Active directory Domain Service) in side server
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
Introduction to System and network administrations
Introduction to System and network administrationsIntroduction to System and network administrations
Introduction to System and network administrations
 
ukoug2008-oracle-activedirectory-wi-131847.ppt
ukoug2008-oracle-activedirectory-wi-131847.pptukoug2008-oracle-activedirectory-wi-131847.ppt
ukoug2008-oracle-activedirectory-wi-131847.ppt
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptx
 
IBM Spectrum Scale Authentication for File Access - Deep Dive
IBM Spectrum Scale Authentication for File Access - Deep DiveIBM Spectrum Scale Authentication for File Access - Deep Dive
IBM Spectrum Scale Authentication for File Access - Deep Dive
 
Final domain control policy
Final domain control policy  Final domain control policy
Final domain control policy
 
Active directoryfinal
Active directoryfinalActive directoryfinal
Active directoryfinal
 
Where should I be encrypting my data?
Where should I be encrypting my data? Where should I be encrypting my data?
Where should I be encrypting my data?
 
Win2KServer Active Directory
Win2KServer Active DirectoryWin2KServer Active Directory
Win2KServer Active Directory
 
MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03
 
Azure SQL Database
Azure SQL Database Azure SQL Database
Azure SQL Database
 
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
 
AD Basic and Azure AD.pptx
AD Basic and Azure AD.pptxAD Basic and Azure AD.pptx
AD Basic and Azure AD.pptx
 
Null talk
Null talkNull talk
Null talk
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Windows Server 2008 - Active Directory Components
Windows Server 2008 - Active Directory ComponentsWindows Server 2008 - Active Directory Components
Windows Server 2008 - Active Directory Components
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Dernier (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

6425 c 01

  • 1. Module 1 Introducing Active Directory® Domain Services
  • 2. Module Overview • Overview of Active Directory, Identity, and Access • Active Directory Components and Concepts • Install Active Directory Domain Services
  • 3. Lesson 1: Overview of Active Directory, Identity, and Access • Information Protection • Identity and Access • Authentication and Authorization • Authentication • Access Tokens • Security Descriptors, ACLs, and ACEs • Authorization • Stand-Alone (Workgroup) Authentication • Active Directory Domains: Trusted Identity Store • Active Directory, Identity, and Access • Active Directory IDA services
  • 4. Information Protection • It’s all about connecting users to the information they require securely • IDA: Identity and Access • AAA: Authentication, Authorization, Accounting • CIA: Confidentiality, Integrity, Availability, and Authenticity
  • 5. Identity and Access • Identity: User account • Resource: Shared Folder • Saved in an identity store • Secured with a security (directory database) descriptor • Security principal • DACL or ―ACL‖ • Represented uniquely by • ACEs or ―permissions‖ the SID
  • 6. Authentication and Authorization A user presents The system creates a credentials that are security token that authenticated by using represents the user with the information stored the user’s SID and all with the user’s related group SIDs identity A resources is secured The user’s security with an ACL: token is compared with Permissions that pair a the ACL of the resource SID with a level of to authorize a requested access level of access
  • 7. Authentication Authentication is the process that verifies a user’s identity Credentials: At least two components required • User name • Secret, for example, password Two types of authentication • Local (interactive) Logon– • Remote (network) Logon– authentication for logon to the authentication for access to local computer resources on another computer
  • 8. Access Tokens User’s Access Token User SID Member Group SIDs Privileges (―user rights‖) Other access information
  • 9. Security Descriptors, ACLs and ACEs Security Descriptor SACL DACL or ―ACL‖ ACE Trustee (SID) Access Mask ACE Trustee (SID) Access Mask
  • 10. Authorization Authorization is the process that determines whether to grant or deny a user a requested level of access to a resource Three components required for authorization • Resource • Access Request • Security Token System finds first User’s Access Token ACE in the ACL that Security Descriptor allows or denies the User SID requested access SACL level for any SID in the user’s token DACL or ―ACL‖ Group SID ACE List of user Trustee (SID) rights Access Mask Other access ACE Trustee (SID) information Access Mask
  • 11. Stand-Alone (Workgroup) Authentication • The identity store is the SAM database on the Windows system • No shared identity store • Multiple user accounts • Management of passwords is challenging
  • 12. Active Directory Domains: Trusted Identity Store • Centralized identity store trusted by all domain members • Centralized authentication service • Hosted by a server performing the role of an AD DS domain controller
  • 13. Active Directory, Identity, and Access An IDA infrastructure should:  Store information about users, groups, computers and other identities  Authenticate an identity • Kerberos authentication used in Active Directory provides single sign-on. Users are authenticated only once.  Control access  Provide an audit trail
  • 14. Active Directory IDA Services Active Directory IDA services :  Active Directory Lightweight Directory Services (AD LDS)  Active Directory Certificate Services (AD CS)  Active Directory Rights Management Services (AD RMS)  Active Directory Federation Services (AD FS)
  • 15. Lesson 2: Active Directory Components and Concepts • Active Directory as a Database • Active Directory Data Store • Domain Controllers • Demonstration: Active Directory Schema • Organizational Units • Domain • Forest • Tree • Replication • Sites • Global Catalog • Functional Levels • DNS and Application Partitions • Trust Relationships
  • 16. Active Directory as a Database • Active Directory is a database  Each ―record‖ is an object • Users, groups, computers, and so on  Each ―field‖ is an attribute • Logon name, SID, password, description, membership, and so on  Identities (security principals or ―accounts‖) • Services: Kerberos, DNS, and replication • Accessing the database  Windows tools, user interfaces, and components  APIs (.NET, VBScript, Windows PowerShell)  LDAP
  • 17. Active Directory Data Store • %systemroot%NTDSntds.dit • Logical partitions  Domain naming context  Schema  Configuration Schema  Global catalog (Partial Attribute Set)  DNS (application partitions) Configuration • SYSVOL *Domain*  %systemroot%SYSVOL  Logon scripts NTDS.DIT DNS  Policies PAS
  • 18. Domain Controllers • Servers that perform the AD DS role  Host the Active Directory database (NTDS.DIT) and SYSVOL • Replicated between domain controllers  Kerberos KDC service: Performs authentication  Other Active Directory services • Best practices  Availability: At least two in a domain  Security: Server Core and RODCs
  • 19. Demonstration: Active Directory Schema In this demonstration, you will see • How the Schema acts as a blueprint for Active Directory by exploring the following Attributes and Object classes: Attributes • objectSID • sAMAccountName • unicodePwd • member • Description Classes • User • Group
  • 20. Organizational Units • Objects  Users  Computers • Organizational Units  Containers that can be used to group objects within a domain  Create OUs to: • Delegate administrative permissions • Apply Group Policy
  • 21. Domain • Requires one or more domain controllers • All domain controllers replicate the Domain naming context (Domain NC)  The domain is the context within which Users, Groups, Computers, and so on are created  ―Replication boundary‖ • Trusted identity source: Any domain controller can authenticate any logon in the domain • The domain is the maximum scope (boundary) for certain administrative policies  Password  Lockout
  • 22. Forest • A collection of one or more Active Directory domain trees • First domain is the forest root domain • Single configuration and schema replicated to all domain controllers in the forest • A security and replication boundary
  • 23. Tree • One or more domains in a single instance of AD DS that share contiguous DNS namespace treyresearch.net proseware.com antarctica.treyresearch.net
  • 24. Replication • Multimaster replication  Objects and attributes in the database  Contents of SYSVOL are replicated • Several components work to create an efficient and robust replication topology and to replicate granular changes to AD • The Configuration partition of the database stores information about sites, network topology, and replication DC1 DC3 DC2
  • 25. Sites • An Active Directory object that represents a well- connected portion of your network  Associated with subnet objects representing IP subnets • Intrasite vs. intersite replication  Replication within a site occurs very quickly (15–45 seconds)  Replication between sites can be managed • Service localization  Log on to a domain controller in your site Site B Site A
  • 26. Global Catalog • Partial Attribute Set or Global Catalog Domain A • Contains every object in PAS every domain in the forest • Contains only selected attributes • A type of index Domain B • Can be searched from any domain PAS • Very important for many applications
  • 27. Functional Levels • Domain functional levels • Forest functional levels • New functionality requires that domain controllers are running a particular version of Windows  Windows 2000  Windows Server 2003  Windows Server 2008  Windows Server 2008 R2 • Cannot raise functional level while domain controllers are running previous Windows versions • Cannot add domain controllers running previous Windows versions after raising functional level
  • 28. DNS and Application Partitions • Active Directory and DNS are closely integrated • One-to-one relationship between the DNS domain name and the logical domain unit of Active Directory • Complete reliance on DNS to locate Schema computers and services in the domain • A domain controller acting as a DNS Configuration server can store the zone data in Active Directory itself—in an application partition Domain DNS PAS
  • 29. Trust Relationships • Extends concept of trusted identity store to another domain • Trusting domain (with the resource) trusts the identity store and authentication services of the trusted domain • A trusted user can authenticate to, and be given access to resources in, the trusting domain • Within a forest, each domain trusts all other domains • Trust relationships can be established with external domains Trusted Domain Trusting Domain
  • 30. Lesson 3: Install Active Directory Domain Services • Install and Configure a Domain Controller • Prepare to Create a New Forest with Windows Server 2008 R2
  • 31. Install and Configure a Domain Controller 1 Install the Active Directory Domain Services role by using the Server Manager Run the Active Directory Domain Services 2 Installation Wizard 3 Choose the deployment configuration 4 Select the additional domain controller features Select the location for the database, log files, and 5 SYSVOL folder Configure the Directory Services Restore 6 Mode Administrator Password
  • 32. Prepare to Create a New Forest with Windows Server 2008 R2 • Domain’s DNS name (contoso.com) • Domain’s NetBIOS name (contoso) • Whether the new forest will need to support domain controllers running previous versions of Windows (affects choice of functional level) • Details about how DNS will be implemented to support AD DS  Default: Creating domain controller adds DNS Server role as well • IP configuration for the domain controller  IPv4 and, optionally, IPv6 • User name and password of an account in the server’s Administrators group. Account must have a password. • Location for data store (ntds.dit) and SYSVOL  Default: %systemroot% (c:windows)
  • 33. Lab: Install an AD DS Domain Controller to Create a Single Domain Forest • Exercise 1: Perform Post-Installation Configuration Tasks • Exercise 2: Install a New Windows Server 2008 Forest with the Windows Interface • Exercise 3: Raise Domain and Forest Functional Levels Logon information Virtual machine 6425C-NYC-SVR-D Logon user name Administrator Password Pa$$w0rd Estimated time: 30 minutes
  • 34. Lab Scenario You have been hired to improve identity and access at Contoso, Ltd. The company currently has one server in a workgroup configuration. Employees connect to the server from their personal client computers. In anticipation of near-term growth, you need to improve the manageability and security of the company’s resources. You decide to implement an AD DS domain and forest by promoting the server to a domain controller. You have just finished installing Windows Server 2008 R2 from the installation DVD.
  • 35. Lab Review • What can you do with the Initial Configuration Tasks console? • What must you do before starting the dcpromo wizard? • Which tool is used to raise the domain functional level?
  • 36. Module Review and Takeaways • Review Questions • Common Issues Related to AD DS Installation • Best Practices Related to AD DS Installation • Tools