welcome thank you for taking our training. collection 6425: configure windows 2008 active directory...

35
Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at http://itacademy.microsoftelearning.com PowerPoint Presentations at: carrieclasses.wikispaces.com Course Companion “CD” – Student.zip file

Upload: bruno-barker

Post on 12-Jan-2016

221 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Welcome

•Thank you for taking our training.

Collection 6425: Configure Windows 2008 Active Directory Domain Services

Course 6710 – 6719 at

http://itacademy.microsoftelearning.com

Collection 6425: Configure Windows 2008 Active Directory Domain Services

Course 6710 – 6719 at

http://itacademy.microsoftelearning.com

•PowerPoint Presentations at: carrieclasses.wikispaces.com

•Course Companion “CD” – Student.zip file

Page 2: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Course Outline

• Week #1: Introducing Active Directory Domain Services

• Week #2: Domain Controllers and Operations Masters

• Week #3: Active Directory Administration and Manage computers

• Week #4: Manage Users and Groups

• Week #5: Group Policies

• Week #6: More Group Policies

• Week #7: AD DS and DNS Integration

• Week #8: Configure Active Directory Sites and Replication

• Week #9: Directory Service Continuity

• Week #10: Manage multiple domains and trusts.

Page 3: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Week 1 Introduction and Install Active Directory

• Introducing Active Directory, Identity, and Access

• Active Directory Components and Concepts

• Extend IDA with Active Directory Services

Page 4: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Information Protection in a Nutshell

• It’s all about connecting users to the information they require

… SECURELY!

• IDA: Identity and Access

• AAA: Authentication, Authorization, Accounting

• CIA: Confidentiality, Integrity, Availability ( & Authenticity)

Page 5: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Identity and Access (IDA)

• Identity: user account

• Saved in an identity store (directory database)

• Security principal

• Represented uniquely by the security identifier (SID)

• Resource: Shared Folder

• Secured with a security descriptor

• Discretionary access control list (DACL or “ACL”)

• Access control entries (ACEs or “permissions”)

Page 6: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Authentication and Authorization

The system creates a security token that represents the user with the user’s SID and all related group SIDs

The system creates a security token that represents the user with the user’s SID and all related group SIDs

A resources is secured with an access control list (ACL): permissions that pair a SID with a level of access

A resources is secured with an access control list (ACL): permissions that pair a SID with a level of access

The user’s security token is compared with the ACL of the resource to authorize a requested level of access

The user’s security token is compared with the ACL of the resource to authorize a requested level of access

A user presents credentials that are authenticated using the information stored withthe user’sidentity

A user presents credentials that are authenticated using the information stored withthe user’sidentity

Page 7: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Authentication

Two types of authentication

• Local (interactive) Logon – authentication for logon to the local computer

• Remote (network) logon – authentication for access to resources on another computer

Authentication is the process that verifies a user’s identityAuthentication is the process that verifies a user’s identity

Credentials: at least two components required

• Username • Secret, for example, password

Page 8: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Access Tokens

User’s Access TokenUser’s Access Token

Other access information

Privileges (“user rights”)

Member Group SIDs

User SID

Page 9: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Security Descriptors, ACLs and ACEs

Security DescriptorSecurity Descriptor

Discretionary ACL (DACL or “ACL”)

ACETrustee (SID)Access Mask

ACETrustee (SID)Access Mask

System ACL (SACL)

Page 10: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Authorization

Authorization is the process that determines whether to grant or deny a user a requested level of access to a resourceAuthorization is the process that determines whether to grant or deny a user a requested level of access to a resource

Three components required for authorization

• Resource • Security Token• Access Request

Security DescriptorSecurity Descriptor

Discretionary ACL (DACL or “ACL”)

ACETrustee (SID)Access Mask

ACETrustee (SID)Access Mask

System ACL (SACL)

User’s Access TokenUser’s Access Token

Other access information

List of user rights

Group SID

User SID

System finds first ACE in the ACL that allows or denies the requested access level for any SID in the user’s token

Page 11: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Stand-alone (Workgroup) Authentication

• The identity store is the security accounts manager (SAM) database on the Windows system

• No shared identity store

• Multiple user accounts

• Management of passwords is challenging

Page 12: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Active Directory Domains: Trusted Identity Store

• Centralized identity store trusted by all domain members

• Centralized authentication service

• Hosted by a server performing the role of an Active Directory Domain Services (AD DS) domain controller

Page 13: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Active Directory, Identity, and Access

• An IDA infrastructure should

Store information about users, groups, computers and other identities

Authenticate an identity

• Kerberos authentication used in Active Directory provides single sign-on. Users are authenticated only once.

Control access

Provide an audit trail

• Active Directory services Active Directory Domain Services (AD DS)

Active Directory Lightweight Directory Services (AD LDS)

Active Directory Certificate Services (AD CS)

Active Directory Rights Management Services (AD RMS)

Active Directory Federation Services (AD FS)

Page 14: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Active Directory As a Database

• Active Directory is a database

Each “record” is an object

• Users, groups, computers, …

Each “field” is an attribute

• Logon name, SID, password, description, membership, …

Identities (security principals or “accounts”)

• Services: Kerberos, DNS, replication, etc.

• Accessing the database

Windows tools, user interfaces, and components

APIs (.NET, VBScript, Windows PowerShell)

Lightweight Directory Access Protocol (LDAP)

AD DS is, in the end, a databaseand the services that support or use that database

AD DS is, in the end, a databaseand the services that support or use that database

Schema DemoSchema Demo

Page 15: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Organizational Units

• Containers

Users

Computers

• Organizational Units

Containers that also support the management and configuration of objects using Group Policy

Create OUs to

• Delegate administrative permissions

• Apply Group Policy

Page 16: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Policy-Based Management

• Active Directory provides a single point of management for security and configuration through policies

Group Policy

• Domain password and lockout policy

• Audit policy

• Configuration

• Applied to users or computers by scoping a GPO containing configuration settings

Fine-grained password and lockout policies

Page 17: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

The Active Directory Data Store

• %systemroot%\NTDS\ntds.dit

• Logical partitions

Domain naming context

Schema

Configuration

Global catalog (aka Partial Attribute Set)

DNS (application partitions)

• SYSVOL

%systemroot%\SYSVOL

Logon scripts

Policies

PASPAS

DNSDNS

*Domain**Domain*

ConfigurationConfiguration

SchemaSchema

NTDS.DIT

Page 18: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Domain Controllers

• Servers that perform the AD DS role

Host the Active Directory database (NTDS.DIT) and SYSVOL

• Replicated between domain controllers

Kerberos Key Distribution Center (KDC) service: authentication

Other Active Directory services

• Best practices

Available: at least two in a domain

Secure: Server Core, Read-only domain controllers (RODCs)

Page 19: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Domain

• Made up of one or more DCs

• All DCs replicate the Domain naming context (Domain NC)

The domain is the context within which Users, Groups, Computers, and so on are created

“Replication boundary”

• Trusted identity source: Any DC can authenticate any logon in the domain

• The domain is the maximum scope (boundary) for certain administrative policies

Password

Lockout

Page 20: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Replication

• Multimaster replication

Objects and attributes in the database

Contents of SYSVOL are replicated

• Several components work to create an efficient and robust replication topology and to replicate granular changes to AD

• The Configuration partition of the database stores information about sites, network topology, and replication

DC2

DC1 DC3

Page 21: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Sites

• An Active Directory object that represents a well-connected portion of your network

Associated with subnet objects representing IP subnets

• Intrasite vs. intersite replication

Replication within a site occurs very quickly (15-45 seconds)

Replication between sites can be managed

• Service localization

Log on to a DC in your site

Site A

Site B

Page 22: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Tree

• One or more domains in a single instance of AD DS that share contiguous DNS namespace

proseware.com

treyresearch.net

antarctica.treyresearch.net

Page 23: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Forest

• A collection of one or more Active Directory domain trees

• First domain is the forest root domain

• Single configuration and schemareplicated to all DCs in the forest

• A security and replication boundary

Page 24: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

The Global Catalog

• Partial Attribute Set or Global Catalog

• Contains every object in every domain in the forest

• Contains only selected attributes

• A type of index

• Can be searched from any domain

• Very important for many applications

PASPAS

Domain ADomain A

PASPAS

Domain BDomain B

Page 25: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Functional Level

• Domain functional levels

• Forest functional levels

• New functionality requires that domain controllers are running a particular version of Windows

Windows 2000

Windows Server 2003

Windows Server 2008

• Cannot raise functional levelwhile DCs are running previousversions of Windows

• Cannot add DCs runningprevious versions of Windowsafter raising functional level

Page 26: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

DNS and Application Partitions

• Active Directory and DNS are tightly integrated

• One-to-one relationship between the DNS domain name and the logical domain unit of Active Directory

• Complete reliance on DNS to locate computers and services in the domain

• A domain controller acting as a DNS server can store the zone data in Active Directory itself—in an application partition

PASPAS

DNSDNS

DomainDomain

ConfigurationConfiguration

SchemaSchema

Page 27: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Trust Relationships

• Extends concept of trusted identity store to another domain

• Trusting domain (with the resource) trusts the identity store and authentication services of the trusted domain

• A trusted user can authenticate to, and be given access to resources in, the trusting domain

• Within a forest, each domain trusts all other domains

• Trust relationships can be established with external domains

Trusted domain Trusting domain

Page 28: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Active Directory Lightweight Directory Services (AD LDS)

• Standalone version of Active Directory

Used to support applications that require a directory store

Allow customization without impact to production Active Directory

• Characteristics

A subset of AD DS functionality, sharing the same code

• Schema, Configuration, and Application partitions

• Replication

Not dependent upon AD DS

Can use AD DS to authenticate Windows security principals

Can run multiple instances on a single server

Page 29: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Active Directory Certificate Services (AD CS)

• Extends the concept of trust

A certificate from a trusted certificate authority (CA) proves identity

Trust can be extended beyond the boundaries of your enterprise, as long as clients trust the CA of the certificates you present

• Creates a public key infrastructure (PKI)

Confidentiality, Integrity, Authenticity, Non-Repudiation

• Many uses

Internal-only or external

Secure Web sites (SSL)

VPN

Wireless authentication and encryption

Smart card authentication

• Integration with AD DS powerful, but not required

Page 30: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Active Directory Rights Management Services (AD RMS)

• Ensures the integrity of information

Traditional model: ACL defines access. No restriction on use.

AD RMS: Ensures access is limited and defines use.

• Examples

Limit access to specified individuals

View e-mail but do not forward or print

View and print document but cannot change or e-mail

• Requires

AD RMS

• IIS, Database (SQL Server or Windows Internal Database)

AD DS

RMS enabled applications including Microsoft Office applications, Internet Explorer

Page 31: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Active Directory Federation Services (AD FS)

• Extends the authority of AD DS to authenticate users

• Traditional “trust”

Two Windows domains

Numerous TCP ports open in firewalls

“Everyone” from trusted domain is trusted

• AD FS uses Web services technologies to implement trust

One AD DS/LDS directory; other side can be Active Directory or other platforms

Port 443: transactions are secure and encrypted

Rules specifying which users from trusted domain are trusted

• Uses

Business-to-business: partnership

Single sign-on

Page 32: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Install Windows Server 2008

• Boot with installation media (DVD)

• Follow prompts and select the operating system to install

Page 33: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Server Manager and Role-Based Configuration of Windows Server 2008

• Windows Server 2008 has minimal footprint

• Functionality is added as roles or features

• Server Manager: role and feature configuration along with the common administrative snap-ins for the server

Page 34: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Install and Configure a Domain Controller

Install the Active Directory Domain Services role using the Server Manager 11

Choose the deployment configuration 33

Select the additional domain controller features 44

Run the Active Directory Domain Services Installation Wizard 22

Select the location for the database, log files, and SYSVOL folder 55

Configure the Directory Services Restore Mode Administrator Password 66

Page 35: Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at

Prepare to Create a New Forest with Windows Server 2008

• Domain’s DNS name (e.g. contoso.com)

• Domain’s NetBIOS name (e.g. contoso)

• Whether the new forest will need to support DCs running previous versions of Windows (affects choice of functional level)

• Details about how DNS will be implemented to support AD DS

Default: Creating domain controller adds DNS Server role as well

• IP configuration for the DC

IPv4 and, optionally, IPv6

• Username and password of an account in the server’sAdministrators group. Account must have a password.

• Location for data store (ntds.dit) and SYSVOL

Default: %systemroot% (c:\windows)