SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Module 1
 Introducing Active
Directory® Domain
           Services
Module Overview
• Overview of Active Directory, Identity, and Access

• Active Directory Components and Concepts

• Install Active Directory Domain Services
Lesson 1: Overview of Active Directory, Identity,
and Access
• Information Protection

• Identity and Access

• Authentication and Authorization

• Authentication

• Access Tokens

• Security Descriptors, ACLs, and ACEs

• Authorization

• Stand-Alone (Workgroup) Authentication

• Active Directory Domains: Trusted Identity Store

• Active Directory, Identity, and Access

• Active Directory IDA services
Information Protection




• It’s all about connecting users to the information they require
 securely
• IDA: Identity and Access

• AAA: Authentication, Authorization, Accounting

• CIA: Confidentiality, Integrity, Availability, and Authenticity
Identity and Access




• Identity: User account       • Resource: Shared Folder

• Saved in an identity store   • Secured with a security
 (directory database)           descriptor
• Security principal           • DACL or ―ACL‖

• Represented uniquely by      • ACEs or ―permissions‖
 the SID
Authentication and Authorization

    A user presents           The system creates a
    credentials that are      security token that
    authenticated by using    represents the user with
    the information stored    the user’s SID and all
    with the user’s           related group SIDs
    identity



    A resources is secured    The user’s security
    with an ACL:              token is compared with
    Permissions that pair a   the ACL of the resource
    SID with a level of       to authorize a requested
    access                    level of access
Authentication

Authentication is the process that verifies a user’s identity


Credentials: At least two components required
 • User name                         • Secret, for example, password


Two types of authentication
 • Local (interactive) Logon–        • Remote (network) Logon–
   authentication for logon to the     authentication for access to
   local computer                      resources on another
                                       computer
Access Tokens




                User’s Access Token

                      User SID


                      Member Group
                      SIDs

                      Privileges
                      (―user rights‖)

                      Other access
                      information
Security Descriptors, ACLs and ACEs




              Security Descriptor

                         SACL

                    DACL or ―ACL‖
                     ACE
                     Trustee (SID)
                     Access Mask

                     ACE
                     Trustee (SID)
                     Access Mask
Authorization

Authorization is the process that determines whether to grant
or deny a user a requested level of access to a resource


Three components required for authorization
 • Resource            • Access Request      • Security Token


                      System finds first
User’s Access Token   ACE in the ACL that      Security Descriptor
                      allows or denies the
   User SID           requested access                  SACL
                      level for any SID in
                      the user’s token           DACL or ―ACL‖
   Group SID

                                                   ACE
   List of user                                    Trustee (SID)
   rights                                          Access Mask

   Other access                                    ACE
                                                   Trustee (SID)
   information                                     Access Mask
Stand-Alone (Workgroup) Authentication
• The identity store is the SAM database on the Windows
 system
• No shared identity store

• Multiple user accounts

• Management of passwords is challenging
Active Directory Domains: Trusted Identity Store
• Centralized identity store
 trusted by all domain
 members
• Centralized authentication
 service
• Hosted by a server
 performing the role of an AD
 DS domain controller
Active Directory, Identity, and Access
An IDA infrastructure should:
     Store information about users, groups, computers and
      other identities
     Authenticate an identity
       •   Kerberos authentication used in Active Directory
           provides single sign-on. Users are authenticated only
           once.
     Control access
     Provide an audit trail
Active Directory IDA Services
Active Directory IDA services :
     Active Directory Lightweight Directory Services (AD
      LDS)
     Active Directory Certificate Services (AD CS)
     Active Directory Rights Management Services (AD RMS)
     Active Directory Federation Services (AD FS)
Lesson 2: Active Directory Components and Concepts
• Active Directory as a Database

• Active Directory Data Store

• Domain Controllers

• Demonstration: Active Directory Schema
• Organizational Units

• Domain

• Forest

• Tree
• Replication
• Sites

• Global Catalog
• Functional Levels

• DNS and Application Partitions

• Trust Relationships
Active Directory as a Database
• Active Directory is a database
     Each ―record‖ is an object
        •   Users, groups, computers, and so on
     Each ―field‖ is an attribute
        •   Logon name, SID, password, description, membership, and
            so on
     Identities (security principals or ―accounts‖)

• Services: Kerberos, DNS, and replication

• Accessing the database
     Windows tools, user interfaces, and components
     APIs (.NET, VBScript, Windows PowerShell)
     LDAP
Active Directory Data Store
• %systemroot%NTDSntds.dit

• Logical partitions
     Domain naming context
     Schema
     Configuration
                                                 Schema
     Global catalog (Partial Attribute Set)
     DNS (application partitions)             Configuration

• SYSVOL
                                                *Domain*
     %systemroot%SYSVOL
     Logon scripts         NTDS.DIT               DNS
     Policies
                                                   PAS
Domain Controllers
• Servers that perform the AD DS role
     Host the Active Directory database (NTDS.DIT) and SYSVOL
       •   Replicated between domain controllers
     Kerberos KDC service: Performs authentication
     Other Active Directory services

• Best practices
     Availability: At least two in a domain
     Security: Server Core and RODCs
Demonstration: Active Directory Schema
In this demonstration, you will see
• How the Schema acts as a blueprint for Active Directory
 by exploring the following Attributes and Object classes:
  Attributes
      •   objectSID
      •   sAMAccountName
      •   unicodePwd
      •   member
      •   Description
  Classes
      •   User
      •   Group
Organizational Units
• Objects
     Users
     Computers

• Organizational Units
     Containers that can be used
      to group objects within a
      domain
     Create OUs to:
       •   Delegate administrative
           permissions
       •   Apply Group Policy
Domain
• Requires one or more domain controllers

• All domain controllers replicate the Domain
 naming context (Domain NC)
     The domain is the context within which Users,
      Groups, Computers, and so on are created
     ―Replication boundary‖

• Trusted identity source: Any domain
 controller can authenticate any logon in the
 domain
• The domain is the maximum scope
 (boundary) for certain administrative
 policies
     Password
     Lockout
Forest
• A collection of one or more Active Directory domain trees

• First domain is the forest root domain

• Single configuration and schema
 replicated to all domain controllers in the forest
• A security and replication boundary
Tree
• One or more domains in a single instance of AD DS that
 share contiguous DNS namespace




                              treyresearch.net


         proseware.com




                        antarctica.treyresearch.net
Replication
• Multimaster replication
     Objects and attributes in the database
     Contents of SYSVOL are replicated

• Several components work to create an efficient and robust
 replication topology and to replicate granular changes to AD
• The Configuration partition of the database stores
 information about sites, network topology, and replication

                                    DC1                DC3




                                               DC2
Sites
• An Active Directory object that represents a well-
 connected portion of your network
     Associated with subnet objects representing IP subnets

• Intrasite vs. intersite replication
     Replication within a site occurs very quickly (15–45 seconds)
     Replication between sites can be managed

• Service localization
     Log on to a domain controller in your site
                                                           Site B




                      Site A
Global Catalog
• Partial Attribute Set or
 Global Catalog
                                     Domain A
• Contains every object in             PAS
 every domain in the
 forest
• Contains only selected
 attributes
• A type of index
                             Domain B
• Can be searched from
 any domain                    PAS

• Very important for
 many applications
Functional Levels
• Domain functional levels

• Forest functional levels

• New functionality requires that domain controllers are running a
 particular version of Windows
     Windows 2000
     Windows Server 2003
     Windows Server 2008
     Windows Server 2008 R2
• Cannot raise functional level
 while domain controllers are running
 previous Windows versions
• Cannot add domain controllers
 running previous Windows versions
 after raising functional level
DNS and Application Partitions
• Active Directory and DNS are closely
 integrated
• One-to-one relationship between the DNS
 domain name and the logical domain unit
 of Active Directory
• Complete reliance on DNS to locate
                                                  Schema
 computers and services in the domain
• A domain controller acting as a DNS           Configuration
 server can store the zone data in Active
 Directory itself—in an application partition
                                                  Domain


                                                    DNS


                                                    PAS
Trust Relationships
• Extends concept of trusted identity store to another domain

• Trusting domain (with the resource) trusts the identity store
 and authentication services of the trusted domain
• A trusted user can authenticate to, and be given access to
 resources in, the trusting domain
• Within a forest, each domain trusts all other domains

• Trust relationships can be established with external domains




            Trusted Domain     Trusting Domain
Lesson 3: Install Active Directory Domain Services
• Install and Configure a Domain Controller

• Prepare to Create a New Forest with Windows Server 2008 R2
Install and Configure a Domain Controller


1 Install the Active Directory Domain Services role
  by using the Server Manager

   Run the Active Directory Domain Services
2 Installation Wizard

3 Choose the deployment configuration

4 Select the additional domain controller features

   Select the location for the database, log files, and
5 SYSVOL folder

   Configure the Directory Services Restore
6 Mode Administrator Password
Prepare to Create a New Forest with
Windows Server 2008 R2
• Domain’s DNS name (contoso.com)

• Domain’s NetBIOS name (contoso)

• Whether the new forest will need to support domain controllers
 running previous versions of Windows (affects choice of
 functional level)
• Details about how DNS will be implemented to support AD DS
     Default: Creating domain controller adds DNS Server role as well

• IP configuration for the domain controller
     IPv4 and, optionally, IPv6

• User name and password of an account in the server’s
 Administrators group. Account must have a password.
• Location for data store (ntds.dit) and SYSVOL
     Default: %systemroot% (c:windows)
Lab: Install an AD DS Domain Controller to
Create a Single Domain Forest
• Exercise 1: Perform Post-Installation Configuration Tasks

• Exercise 2: Install a New Windows Server 2008 Forest with
 the Windows Interface
• Exercise 3: Raise Domain and Forest Functional Levels




Logon information

Virtual machine       6425C-NYC-SVR-D

Logon user name       Administrator

Password              Pa$$w0rd


Estimated time: 30 minutes
Lab Scenario
You have been hired to improve identity and access at
Contoso, Ltd. The company currently has one server in a
workgroup configuration. Employees connect to the server
from their personal client computers. In anticipation of
near-term growth, you need to improve the manageability
and security of the company’s resources. You decide to
implement an AD DS domain and forest by promoting the
server to a domain controller. You have just finished
installing Windows Server 2008 R2 from the installation
DVD.
Lab Review
• What can you do with the Initial Configuration Tasks
 console?
• What must you do before starting the dcpromo wizard?

• Which tool is used to raise the domain functional level?
Module Review and Takeaways
• Review Questions

• Common Issues Related to AD DS Installation

• Best Practices Related to AD DS Installation

• Tools

Contenu connexe

Tendances

Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and applicationaminpathan11
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDSHarsh Sethi
 
Designing the active directory logical structure
Designing the active directory logical structureDesigning the active directory logical structure
Designing the active directory logical structureJohn Carlo Catacutan
 
Active directory
Active directory Active directory
Active directory deshvikas
 
Active directory ds ws2008 r2
Active directory ds ws2008 r2Active directory ds ws2008 r2
Active directory ds ws2008 r2MICTT Palma
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directoryMuuluu
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
ActivedirecotryfundamentalsShekhar Singh
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services202066
 
Windows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory GuideWindows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory Guidewebhostingguy
 
What is active directory
What is active directoryWhat is active directory
What is active directoryAdeel Khurram
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory ServicesVarun Arora
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directoryanilinvns
 

Tendances (20)

Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
 
Active Directory
Active Directory Active Directory
Active Directory
 
Designing the active directory logical structure
Designing the active directory logical structureDesigning the active directory logical structure
Designing the active directory logical structure
 
70 640 Lesson03 Ppt 041009
70 640 Lesson03 Ppt 04100970 640 Lesson03 Ppt 041009
70 640 Lesson03 Ppt 041009
 
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 04100970 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
Active directory
Active directory Active directory
Active directory
 
Active directory ds ws2008 r2
Active directory ds ws2008 r2Active directory ds ws2008 r2
Active directory ds ws2008 r2
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directory
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
Activedirecotryfundamentals
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
 
MCITP
MCITPMCITP
MCITP
 
Windows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory GuideWindows Server 2008 Active Directory Guide
Windows Server 2008 Active Directory Guide
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
70 640 Lesson04 Ppt 041009
70 640 Lesson04 Ppt 04100970 640 Lesson04 Ppt 041009
70 640 Lesson04 Ppt 041009
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Active Directory component
Active Directory componentActive Directory component
Active Directory component
 

En vedette

Checking the health of your active directory enviornment
Checking the health of your active directory enviornmentChecking the health of your active directory enviornment
Checking the health of your active directory enviornmentSpiffy
 
Tutorial on dhcp
Tutorial on dhcp Tutorial on dhcp
Tutorial on dhcp Salah Amean
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsPeter R. Egli
 
DHCP Server & Client Presentation
DHCP Server & Client PresentationDHCP Server & Client Presentation
DHCP Server & Client Presentationraini
 

En vedette (7)

Ad ds ws2008 r2
Ad ds ws2008 r2Ad ds ws2008 r2
Ad ds ws2008 r2
 
unit 2
unit 2unit 2
unit 2
 
Checking the health of your active directory enviornment
Checking the health of your active directory enviornmentChecking the health of your active directory enviornment
Checking the health of your active directory enviornment
 
Tutorial on dhcp
Tutorial on dhcp Tutorial on dhcp
Tutorial on dhcp
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
DHCP Server & Client Presentation
DHCP Server & Client PresentationDHCP Server & Client Presentation
DHCP Server & Client Presentation
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 

Similaire à 6425 c 01

Cram Class - Lesson 1
Cram Class - Lesson 1Cram Class - Lesson 1
Cram Class - Lesson 1AlexsCloud
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxMeriemBalhaddad
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptxAdiWidyanto2
 
ADDS (Active directory Domain Service) in side server
ADDS (Active directory Domain Service) in side serverADDS (Active directory Domain Service) in side server
ADDS (Active directory Domain Service) in side serverBilalMehmood44
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxJavedAjmal1
 
Introduction to System and network administrations
Introduction to System and network administrationsIntroduction to System and network administrations
Introduction to System and network administrationsgirmayou1
 
ukoug2008-oracle-activedirectory-wi-131847.ppt
ukoug2008-oracle-activedirectory-wi-131847.pptukoug2008-oracle-activedirectory-wi-131847.ppt
ukoug2008-oracle-activedirectory-wi-131847.pptMartinCarrozzo
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptxsyedasadraza13
 
IBM Spectrum Scale Authentication for File Access - Deep Dive
IBM Spectrum Scale Authentication for File Access - Deep DiveIBM Spectrum Scale Authentication for File Access - Deep Dive
IBM Spectrum Scale Authentication for File Access - Deep DiveShradha Nayak Thakare
 
Win2KServer Active Directory
Win2KServer Active DirectoryWin2KServer Active Directory
Win2KServer Active DirectoryPhil Ashman
 
Azure SQL Database
Azure SQL Database Azure SQL Database
Azure SQL Database nj-azure
 
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...Amazon Web Services
 
AD Basic and Azure AD.pptx
AD Basic and Azure AD.pptxAD Basic and Azure AD.pptx
AD Basic and Azure AD.pptxSumTingWong8
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioAVEVA
 
Windows Server 2008 - Active Directory Components
Windows Server 2008 - Active Directory ComponentsWindows Server 2008 - Active Directory Components
Windows Server 2008 - Active Directory ComponentsAndré Braga
 

Similaire à 6425 c 01 (20)

Cram Class - Lesson 1
Cram Class - Lesson 1Cram Class - Lesson 1
Cram Class - Lesson 1
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
 
ADDS (Active directory Domain Service) in side server
ADDS (Active directory Domain Service) in side serverADDS (Active directory Domain Service) in side server
ADDS (Active directory Domain Service) in side server
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
Introduction to System and network administrations
Introduction to System and network administrationsIntroduction to System and network administrations
Introduction to System and network administrations
 
ukoug2008-oracle-activedirectory-wi-131847.ppt
ukoug2008-oracle-activedirectory-wi-131847.pptukoug2008-oracle-activedirectory-wi-131847.ppt
ukoug2008-oracle-activedirectory-wi-131847.ppt
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptx
 
IBM Spectrum Scale Authentication for File Access - Deep Dive
IBM Spectrum Scale Authentication for File Access - Deep DiveIBM Spectrum Scale Authentication for File Access - Deep Dive
IBM Spectrum Scale Authentication for File Access - Deep Dive
 
Final domain control policy
Final domain control policy  Final domain control policy
Final domain control policy
 
Active directoryfinal
Active directoryfinalActive directoryfinal
Active directoryfinal
 
Where should I be encrypting my data?
Where should I be encrypting my data? Where should I be encrypting my data?
Where should I be encrypting my data?
 
Win2KServer Active Directory
Win2KServer Active DirectoryWin2KServer Active Directory
Win2KServer Active Directory
 
MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03
 
Azure SQL Database
Azure SQL Database Azure SQL Database
Azure SQL Database
 
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
 
AD Basic and Azure AD.pptx
AD Basic and Azure AD.pptxAD Basic and Azure AD.pptx
AD Basic and Azure AD.pptx
 
Null talk
Null talkNull talk
Null talk
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Windows Server 2008 - Active Directory Components
Windows Server 2008 - Active Directory ComponentsWindows Server 2008 - Active Directory Components
Windows Server 2008 - Active Directory Components
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

6425 c 01

  • 1. Module 1 Introducing Active Directory® Domain Services
  • 2. Module Overview • Overview of Active Directory, Identity, and Access • Active Directory Components and Concepts • Install Active Directory Domain Services
  • 3. Lesson 1: Overview of Active Directory, Identity, and Access • Information Protection • Identity and Access • Authentication and Authorization • Authentication • Access Tokens • Security Descriptors, ACLs, and ACEs • Authorization • Stand-Alone (Workgroup) Authentication • Active Directory Domains: Trusted Identity Store • Active Directory, Identity, and Access • Active Directory IDA services
  • 4. Information Protection • It’s all about connecting users to the information they require securely • IDA: Identity and Access • AAA: Authentication, Authorization, Accounting • CIA: Confidentiality, Integrity, Availability, and Authenticity
  • 5. Identity and Access • Identity: User account • Resource: Shared Folder • Saved in an identity store • Secured with a security (directory database) descriptor • Security principal • DACL or ―ACL‖ • Represented uniquely by • ACEs or ―permissions‖ the SID
  • 6. Authentication and Authorization A user presents The system creates a credentials that are security token that authenticated by using represents the user with the information stored the user’s SID and all with the user’s related group SIDs identity A resources is secured The user’s security with an ACL: token is compared with Permissions that pair a the ACL of the resource SID with a level of to authorize a requested access level of access
  • 7. Authentication Authentication is the process that verifies a user’s identity Credentials: At least two components required • User name • Secret, for example, password Two types of authentication • Local (interactive) Logon– • Remote (network) Logon– authentication for logon to the authentication for access to local computer resources on another computer
  • 8. Access Tokens User’s Access Token User SID Member Group SIDs Privileges (―user rights‖) Other access information
  • 9. Security Descriptors, ACLs and ACEs Security Descriptor SACL DACL or ―ACL‖ ACE Trustee (SID) Access Mask ACE Trustee (SID) Access Mask
  • 10. Authorization Authorization is the process that determines whether to grant or deny a user a requested level of access to a resource Three components required for authorization • Resource • Access Request • Security Token System finds first User’s Access Token ACE in the ACL that Security Descriptor allows or denies the User SID requested access SACL level for any SID in the user’s token DACL or ―ACL‖ Group SID ACE List of user Trustee (SID) rights Access Mask Other access ACE Trustee (SID) information Access Mask
  • 11. Stand-Alone (Workgroup) Authentication • The identity store is the SAM database on the Windows system • No shared identity store • Multiple user accounts • Management of passwords is challenging
  • 12. Active Directory Domains: Trusted Identity Store • Centralized identity store trusted by all domain members • Centralized authentication service • Hosted by a server performing the role of an AD DS domain controller
  • 13. Active Directory, Identity, and Access An IDA infrastructure should:  Store information about users, groups, computers and other identities  Authenticate an identity • Kerberos authentication used in Active Directory provides single sign-on. Users are authenticated only once.  Control access  Provide an audit trail
  • 14. Active Directory IDA Services Active Directory IDA services :  Active Directory Lightweight Directory Services (AD LDS)  Active Directory Certificate Services (AD CS)  Active Directory Rights Management Services (AD RMS)  Active Directory Federation Services (AD FS)
  • 15. Lesson 2: Active Directory Components and Concepts • Active Directory as a Database • Active Directory Data Store • Domain Controllers • Demonstration: Active Directory Schema • Organizational Units • Domain • Forest • Tree • Replication • Sites • Global Catalog • Functional Levels • DNS and Application Partitions • Trust Relationships
  • 16. Active Directory as a Database • Active Directory is a database  Each ―record‖ is an object • Users, groups, computers, and so on  Each ―field‖ is an attribute • Logon name, SID, password, description, membership, and so on  Identities (security principals or ―accounts‖) • Services: Kerberos, DNS, and replication • Accessing the database  Windows tools, user interfaces, and components  APIs (.NET, VBScript, Windows PowerShell)  LDAP
  • 17. Active Directory Data Store • %systemroot%NTDSntds.dit • Logical partitions  Domain naming context  Schema  Configuration Schema  Global catalog (Partial Attribute Set)  DNS (application partitions) Configuration • SYSVOL *Domain*  %systemroot%SYSVOL  Logon scripts NTDS.DIT DNS  Policies PAS
  • 18. Domain Controllers • Servers that perform the AD DS role  Host the Active Directory database (NTDS.DIT) and SYSVOL • Replicated between domain controllers  Kerberos KDC service: Performs authentication  Other Active Directory services • Best practices  Availability: At least two in a domain  Security: Server Core and RODCs
  • 19. Demonstration: Active Directory Schema In this demonstration, you will see • How the Schema acts as a blueprint for Active Directory by exploring the following Attributes and Object classes: Attributes • objectSID • sAMAccountName • unicodePwd • member • Description Classes • User • Group
  • 20. Organizational Units • Objects  Users  Computers • Organizational Units  Containers that can be used to group objects within a domain  Create OUs to: • Delegate administrative permissions • Apply Group Policy
  • 21. Domain • Requires one or more domain controllers • All domain controllers replicate the Domain naming context (Domain NC)  The domain is the context within which Users, Groups, Computers, and so on are created  ―Replication boundary‖ • Trusted identity source: Any domain controller can authenticate any logon in the domain • The domain is the maximum scope (boundary) for certain administrative policies  Password  Lockout
  • 22. Forest • A collection of one or more Active Directory domain trees • First domain is the forest root domain • Single configuration and schema replicated to all domain controllers in the forest • A security and replication boundary
  • 23. Tree • One or more domains in a single instance of AD DS that share contiguous DNS namespace treyresearch.net proseware.com antarctica.treyresearch.net
  • 24. Replication • Multimaster replication  Objects and attributes in the database  Contents of SYSVOL are replicated • Several components work to create an efficient and robust replication topology and to replicate granular changes to AD • The Configuration partition of the database stores information about sites, network topology, and replication DC1 DC3 DC2
  • 25. Sites • An Active Directory object that represents a well- connected portion of your network  Associated with subnet objects representing IP subnets • Intrasite vs. intersite replication  Replication within a site occurs very quickly (15–45 seconds)  Replication between sites can be managed • Service localization  Log on to a domain controller in your site Site B Site A
  • 26. Global Catalog • Partial Attribute Set or Global Catalog Domain A • Contains every object in PAS every domain in the forest • Contains only selected attributes • A type of index Domain B • Can be searched from any domain PAS • Very important for many applications
  • 27. Functional Levels • Domain functional levels • Forest functional levels • New functionality requires that domain controllers are running a particular version of Windows  Windows 2000  Windows Server 2003  Windows Server 2008  Windows Server 2008 R2 • Cannot raise functional level while domain controllers are running previous Windows versions • Cannot add domain controllers running previous Windows versions after raising functional level
  • 28. DNS and Application Partitions • Active Directory and DNS are closely integrated • One-to-one relationship between the DNS domain name and the logical domain unit of Active Directory • Complete reliance on DNS to locate Schema computers and services in the domain • A domain controller acting as a DNS Configuration server can store the zone data in Active Directory itself—in an application partition Domain DNS PAS
  • 29. Trust Relationships • Extends concept of trusted identity store to another domain • Trusting domain (with the resource) trusts the identity store and authentication services of the trusted domain • A trusted user can authenticate to, and be given access to resources in, the trusting domain • Within a forest, each domain trusts all other domains • Trust relationships can be established with external domains Trusted Domain Trusting Domain
  • 30. Lesson 3: Install Active Directory Domain Services • Install and Configure a Domain Controller • Prepare to Create a New Forest with Windows Server 2008 R2
  • 31. Install and Configure a Domain Controller 1 Install the Active Directory Domain Services role by using the Server Manager Run the Active Directory Domain Services 2 Installation Wizard 3 Choose the deployment configuration 4 Select the additional domain controller features Select the location for the database, log files, and 5 SYSVOL folder Configure the Directory Services Restore 6 Mode Administrator Password
  • 32. Prepare to Create a New Forest with Windows Server 2008 R2 • Domain’s DNS name (contoso.com) • Domain’s NetBIOS name (contoso) • Whether the new forest will need to support domain controllers running previous versions of Windows (affects choice of functional level) • Details about how DNS will be implemented to support AD DS  Default: Creating domain controller adds DNS Server role as well • IP configuration for the domain controller  IPv4 and, optionally, IPv6 • User name and password of an account in the server’s Administrators group. Account must have a password. • Location for data store (ntds.dit) and SYSVOL  Default: %systemroot% (c:windows)
  • 33. Lab: Install an AD DS Domain Controller to Create a Single Domain Forest • Exercise 1: Perform Post-Installation Configuration Tasks • Exercise 2: Install a New Windows Server 2008 Forest with the Windows Interface • Exercise 3: Raise Domain and Forest Functional Levels Logon information Virtual machine 6425C-NYC-SVR-D Logon user name Administrator Password Pa$$w0rd Estimated time: 30 minutes
  • 34. Lab Scenario You have been hired to improve identity and access at Contoso, Ltd. The company currently has one server in a workgroup configuration. Employees connect to the server from their personal client computers. In anticipation of near-term growth, you need to improve the manageability and security of the company’s resources. You decide to implement an AD DS domain and forest by promoting the server to a domain controller. You have just finished installing Windows Server 2008 R2 from the installation DVD.
  • 35. Lab Review • What can you do with the Initial Configuration Tasks console? • What must you do before starting the dcpromo wizard? • Which tool is used to raise the domain functional level?
  • 36. Module Review and Takeaways • Review Questions • Common Issues Related to AD DS Installation • Best Practices Related to AD DS Installation • Tools