module 3: configuring active directory objects and trusts

46
Module 3: Configuring Active Directory Objects and Trusts

Upload: eric-sherman

Post on 01-Jan-2016

290 views

Category:

Documents


3 download

TRANSCRIPT

Module 3: Configuring Active Directory

Objects and Trusts

Module Overview

• Configuring Active Directory Objects

• Strategies for Using Groups

• Automating AD DS Object Management

• Delegating Administrative Access to AD DS Objects

• Configuring AD DS Trusts

Lesson 1: Configuring Active Directory Objects

• Types of AD DS Objects

• Demonstration: Configuring AD DS User Accounts

• AD DS Group Types

• AD DS Group Scopes

• Default AD DS Groups

• AD DS Special Identities

• Discussion: Using Default Groups and Special Identities

• Demonstration: Configuring AD DS Group Accounts

• Demonstration: Configuring Additional AD DS Objects

Types of AD DS Objects

User accounts

• Enables a single sign-on for a user• Provides access to resources

Computer accounts

• Enables authentication and auditing of computer access to resources

Group accounts

• Helps simplify administration

InetOrgPerson• Similar to a user account• Used for compatibility with other directory services

Organizational Unit

• Used to group similar objects for administration

Printers• Used to simplify the process of locating and connecting to printers

Shared folders

• Used to simplify the process of locating and connecting to shared folders

Demonstration: Configuring AD DS User Accounts

In this demonstration, you will see how to configure AD DS user accounts

AD DS Group Types

Distribution groups

Used only with e-mail applications

Not security-enabled

Security groups

Used to assign rights and permissions to groups of users and computers

Used most effectively when nested

The functional level determines the type of groups that you can create

Local

AD DS Group Scopes

Group members can include

In the same domain

Domain Local

In any trusted domain Global

Universal

Can be used to assign

permissions Group scope

• Universal groups, global groups, and other domain local groups from its own domain

• Accounts from any trusted domain

• Users, groups,and computers as members from any trusted domain

• Users, groups, and computers from its own domain

In any trusted domain

• Users, groups,and computers as members from any trusted domain

On the local computer

Default AD DS Groups

Default groups are designed to manage shared resources and delegate specific domain-wide administrative roles

Account operators

Administrators

Backup operators

Incoming forest trust builders

Network configuration operators

Performance log users

Performance monitor users

Pre-Windows 2000 compatible access

Print operators

Remote Desktop users

Replicator

Server operators

Users

AD DS Special Identities

Designed to provide access to resources without administrative or user interaction

Anonymous logon

Authenticated users

Batch

Creator group

Creator owner

Dialup

Everyone

Interactive

Local system

Network

Self

Service

Terminal Server users

Other organization

This organization

Discussion: Using Default Groups and Special Identities

Using the scenario, answer the questions in your workbook

Demonstration: Configuring AD DS Group Accounts

In this demonstration, you will see how to configure AD DS group accounts

Demonstration: Configuring Additional AD DS Objects

In this demonstration, you will see how to configure additional AD DS objects

Lesson 2: Strategies for Using Groups

• Options for Assigning Access to Resources

• Using Account Groups to Assign Access to Resources

• Using Account Groups and Resource Groups

• Discussion: Using Groups in a Single-Domain or Multiple-Domain Environment

Options for Assigning Access to Resources

When assigning access to resources:

• Plan for the lowest level of permissions

• Keep the plan as simple as possible

• Document the plan

Options include:

• Adding user accounts to the ACL on the resource

• Adding user accounts to groups, and adding the groups to the ACL on the resource

• Adding user accounts to account groups, adding the account groups to resource groups, and adding the resource groups to the ACL on the resource

Using Account Groups to Assign Access to Resources

PermissionsPermissionsAccount GroupsAccount Groups

User Accounts

User Accounts

Using Account Groups and Resource Groups

Resource Groups

Resource Groups PermissionsPermissionsAccount

GroupsAccount Groups

User Accounts

User Accounts

Discussion: Using Groups in a Single-Domain or Multiple-Domain Environment

Using the scenarios, answer the questions in your workbooks

Lesson 3: Automating AD DS Object Management

• Tools for Automating AD DS Object Management

• Configuring AD DS Objects Using Command-Line Tools

• Managing User Objects with LDIFDE

• Managing User Objects with CSVDE

• What Is Windows PowerShell?

• Windows PowerShell Cmdlets

• Demonstration: Configuring Active Directory Objects Using Windows PowerShell

Tools for Automating AD DS Object Management

Active Directory Users and Computers

Directory Service Tools

• Dsadd

• Dsmod

• Dsrm

Csvde and Ldifde Tools Windows PowerShell

Configuring AD DS Objects Using Command Line Tools

Command line tools:

• Dsadd

• Dsmod

• Dsrm

• Dsget

• net user

• Net group

• Net computer

filename.ldf

Managing User Objects with LDIFDE

Active Directory

import

export

• LDIFDE.exe

Managing User Objects with CSVDE

filename.csv Active Directory

import

export

• CSVDE.exe

What Is Windows PowerShell?

Windows PowerShell is a scripting and command line technology that you can use to manage AD DS and other Windows components

Windows PowerShell features include:

• Powerful single line cmdlets

• Aliases

• Variables

• Pipelining

• Scripting support

• Access to all cmd.exe commands

Windows PowerShell Cmdlets

Windows PowerShell cmdlets all use the same syntax

Noun Verb Date

Parameters Example

Get Get-Date

Start Service W3SVC Start-Service W3SVC

• Get-Service W3svc | format-list

• Get-Service | sort-object name

• Get-Service |where-object {$_.status –eq “running”} | sort-object name

Results from one cmdlet can be pipelined to another

Demonstration: Configuring Active Directory Objects Using Windows PowerShell

In this demonstration, you will see how to configure Active Directory Objects using Windows PowerShell

Lab A: Configuring Active Directory Objects

• Exercise 1: Configuring AD DS Objects

• Exercise 2: Implementing an AD DS Group Strategy

• Exercise 3: Automating the Management of AD DS Objects

Logon information

Virtual machines6425A-NYC-DC1, 6425A-NYC-DC2,6425A-NYC-CL1

User name Administrator

Password Pa$$w0rd

Estimated time: 40 minutes

Lab A Review

• How will the group strategies that you use in your organization compare with the strategy used in this lab?

• Which of the options for automating AD DS object management will be most useful in your organization?

Lesson 4: Delegating Administrative Access to AD DS Objects

• Active Directory Object Permissions

• Demonstration: Active Directory Domain Services Object Permission Inheritance

• What Are Effective Permissions?

• What Is Delegation of Control?

• Discussion: Scenarios for Delegating Control

• Demonstration: Configuring Delegation of Control

Active Directory Object Permissions

Active Directory permissions:

• Include standard permissions and special permissions:

Standard permissions are the most frequently assigned permissions

Special permissions provide a finer degree of control for assigning access to objects

• Can be allowed, implicitly denied, or explicitly denied

• Can be set at the object level, or inherited from the parent object

Demonstration: Active Directory Domain Services Object Permission Inheritance

In this demonstration, you will see how permissions are inherited for AD DS objects

What Are Effective Permissions?

Effective permissions are the actual permissions that are granted to the specified user or group

• Permissions are cumulative, including permissions assigned to the user account and the group account

• Explicitly deny permissions override allow permissions

• Explicitly allow permissions override explicit deny permissions

• Object owners can always change permissions

Object owners can always change permissions

• Special identities are not used when this tool calculates special permissions

What Is Delegation of Control?

Domain

OU1

OU2

Admin2Admin2

Admin1Admin1

Admin3Admin3

OU3

Assigns the responsibility of managing Active Directory objects to another user or group

• Delegated administration:

Eases administration by distributing routine administrative tasks

Provides users or groups more control over local network resources

Eliminates the need for multiple administrative accounts

Discussion: Scenarios for Delegating Control

• What are the benefits of delegating administrative permissions?

• How would you use delegation of control in your organization?

Demonstration: Configuring Delegation of Control

In this demonstration, you will see how to configure delegation of control

Lesson 5: Configuring AD DS Trusts

• What Are AD DS Trusts?

• AD DS Trust Options

• How Trusts Work Within a Forest

• How Trusts Work Between Forests

• Demonstration: Configuring Trusts

• What Are Universal Principal Names?

• What Are the Selective Authentication Settings?

• Demonstration: Configuring Advanced Trust Settings

What Are AD DS Trusts?

Provide a mechanism for users to gain access to resources in another domain

Trust characteristics:

• Transitive – the trust relationship extends beyond a two-domain trust to include other trusted domains

• Trust direction – the trust direction defines the account domain and the resource domain

• Authentication protocol – the protocol that you use to establish and maintain the trust

AD DS Trust Options

Forest(root)

Tree/RootTrust

Tree/RootTrust

Forest Trust

Forest Trust

Shortcut TrustShortcut TrustExternal

TrustExternal

Trust

Kerberos Realm

Realm Trust

Realm Trust

Domain D

Forest 1

Domain BDomain ADomain E

Domain F

Forest(root)

Domain P Domain Q

Parent/ChildTrust

Parent/ChildTrust

Forest 2

Domain C

How Trusts Work Within a Forest

Tree One

Tree Two

Domain 1

Tree Root Domain

Forest Root Domain

Domain 2

Domain C

Domain A

Domain B

How Trusts Work Between Forests

WoodgroveBank.com

contoso.com

Forest trust

Global catalog

Global catalog

Seattle

EMEA.WoodgroveBank.com NA.Contoso.com

Vancouver

22 44

66

11

3355

77

88

99

Forest 1

Forest 2

Demonstration: Configuring Trusts

In this demonstration, you will see how to configure shortcut, external, and forest trusts

What Are User Principal Names?

• The domain suffix can be the user’s home domain, any other domain in the forest, or a custom domain name

• Additional UPN domain suffixes can be added

• UPNs must be unique in a forest

UPN suffixes can be used for routing authentication requests between trusted forests:

• UPN suffix routing is automatically disabled if the same UPN suffix is used in both forests

• You can manually enable or disable name suffix routing across trusts

• A UPN is a logon name that includes the user logon name and a domain suffix

What Are the Selective Authentication Settings?

Selective authentication:

• Limits which computers can be accessed by users from a trusted domain, and which users in the trusted domain can access the computer

• Configured on the security descriptor of the computer object located in AD DS

To configure selective authentication:

• Configure the forest or external trust to use selective rather than domain-wide authentication

• Configure the computer accounts for selective authentication

Demonstration: Configuring Advanced Trust Settings

In this demonstration, you will see how to configure advanced trust settings

Lab B: Configuring Active Directory Delegation and Trusts

• Exercise 1: Delegating Control of AD DS Objects

• Exercise 2: Configuring AD DS Trusts

Logon information

Virtual machines

6425A-VAN-DC1,

6425A-NYC-DC2

6425A-NYC-DC1

6425A-NYC-CL1

User name Administrator

Password Pa$$w0rd

Estimated time: 20 minutes

Lab B Review

• After the trusts are configured as described in the lab, what resources will users in Woodgrove Bank be able to access in the NorthwindTraders.com domain?

• How would you configure a forest trust with another organization if the organization does not provide you with their administrator credentials?

Module Review and Takeaways

• Review questions

• Considerations for configuring Active Directory objects

• Tools