IT tutorials
 
Technology
 

Active Directory 2008 : Managing Multiple Domains (part 3) - Managing UPN Suffixes, Managing Global Catalog Servers, Managing Universal Group Membership Caching

10/6/2013 7:53:36 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

6. Managing UPN Suffixes

User principal name (UPN) suffixes are the part of a user's name that appears after the @ symbol. So, for instance, the UPN suffix of [email protected] would be stellacon.com. By default, the UPN suffix is determined by the name of the domain in which the user is created. In this example, the user wpanek was created in the domain stellacon.com, so the two pieces of the UPN logically fit together. However, you might find it useful to provide an alternative UPN suffix to consolidate the UPNs forest-wide.

For instance, if you manage a forest that consists of stellacon.com and stellacon2.com, you might want all of your users to adopt the more generally applicable stellacon.com UPN suffix. By adding additional UPN suffixes to the forest, you can easily choose the appropriate suffix when it comes time to create new users. Exercise 3 shows you how to add additional suffixes to a forest.

Exercise 3: Adding a UPN Suffix

  1. Open the Active Directory Domains And Trusts administrative tool by clicking Start => Administrative Tools =>Active Directory Domains And Trusts.

  2. Right-click Active Directory Domains And Trusts in the left side of the window and select Properties.

  3. On the UPN Suffixes tab of the Active Directory Domains And Trusts Properties dialog box, enter an alternate UPN suffix in the Alternate UPN Suffixes field. Click the Add button to add the suffix to the list.



  4. To remove a UPN suffix, select its name in the list and click the Remove button.


7. Managing Global Catalog Servers

One of the best features of a distributed directory service like Active Directory is that you can store different pieces of information in different places within an organization. For example, a domain in Japan might store a list of users who operate within a company's Asian operations business unit, while one in New York would contain a list of users who operate within its North American operations business unit. This architecture allows systems administrators to place the most frequently accessed information on domain controllers in different domains, thereby reducing disk space requirements and replication traffic.

However, you may encounter a problem when you deal with information that is segmented into multiple domains. The issue involves querying information stored within Active Directory. What would happen, for example, if a user wanted a list of all of the printers available in all domains within the Active Directory forest? In this case, the search would normally require information from at least one domain controller in each of the domains within the environment. Some of these domain controllers may be located across slow WAN links or may have unreliable connections. The end result would include an extremely long wait while retrieving the results of the query, that is, if any results came up without timing out.

Fortunately, Active Directory has a mechanism that speeds up such searches. You can configure any number of domain controllers to host a copy of the GC. The GC contains all of the schema information and a subset of the attributes for all domains within the Active Directory environment. Although a default set of information is normally included with the GC, systems administrators can choose to add additional information to this data store if it is needed. To help reduce replication traffic and to keep the GC's database small, only a limited subset of each object's attributes are replicated. This is called the partial attribute set (PAS). You can change the PAS by modifying the schema and marking attributes for replication to the GC.

Servers that contain a copy of the GC are known as GC servers. Now, whenever a user executes a query that requires information from multiple domains, they need only contact the nearest GC server for this information. Similarly, when users must authenticate across domains, they do not have to wait for a response from a domain controller that may be located across the world. The end result is that the overall performance of Active Directory queries increases.

Exercise 4 walks you through the steps you need to take to configure a domain controller as a GC server. Generally, GC servers are only useful in environments that use multiple Active Directory domains.

Exercise 4: Managing GC Servers

  1. Open the Active Directory Sites And Services administrative tool by clicking Start => Administrative Tools => Active Directory Sites And Services.

  2. Find the name of the local domain controller within the list of objects (typically under Default First Site Name => Servers), and expand this object. Right-click NTDS Settings and select Properties.

  3. In the NTDS Settings Properties dialog box, type Primary GC Server for Domain in the Description field. Note that there is a checkbox that determines whether this computer contains a copy of the Global Catalog. If the box is checked, then this domain controller contains a subset of information from all other domains within the Active Directory environment. Select the Global Catalog checkbox, and then click OK to continue.



  4. When you are finished, close the Active Directory Sites And Services administrative tool.


8. Managing Universal Group Membership Caching

Many networks run into problems due to available network bandwidth and server hardware limitations. For this reason, it may not be wise to install a GC in smaller branch offices. Windows Server 2008 can help these smaller sites by deploying domain controllers that use universal group membership caching.

Once enabled, universal group membership caching stores information locally once a user attempts to log on for the first time. With the use of a GC, the domain controller retains the universal group membership for that logged on user.

The next time that user attempts to log on, the authenticating domain controller running Windows Server 2008 will obtain the universal group membership information from its local cache without the need to contact a GC. The universal group membership information is retained, by default, on the domain controller for 8 hours.

Some of the advantages of using universal group membership caching are as follows:


Faster logon times

Since the domain controller does not need to contact a global catalog, logon authentication is faster.


Reduced network bandwidth

The domain controller does not have to handle object replication for all the objects located in the forest.


Ability to use existing hardware.

There is no need to upgrade hardware to support a GC.

Exercise 5 shows you the steps that you need to take to configure universal group membership caching.

Exercise 5: Managing Universal Group Membership Caching

  1. Open the Active Directory Sites And Services administrative tool by clicking Start => Administrative Tools => Active Directory Sites And Services.

  2. Click Sites, then Click DefaultFirstSite. In the right pane, right-click NTDS Settings and choose Properties.

  3. In the NTDS Site Settings Properties dialog box, check the box labeled Enable Universal Group Membership Caching and then click OK to continue.



  4. When you are finished, close the Active Directory Sites And Services administrative tool.

 
Others
 
- Active Directory 2008 : Managing Multiple Domains (part 2) - Managing Trusts
- Active Directory 2008 : Managing Multiple Domains (part 1) - Assigning Single-Master Roles
- Active Directory 2008 : Installing and Managing Trees and Forests - Demoting a Domain Controller
- Windows 7 : Using a Windows Network - Managing Your Network
- Windows 7 : Using a Windows Network - Sharing Printers
- Windows Server 2008 : Tabbing Through PowerShell Commands, Understanding the Different Types of PowerShell Commands
- Windows Server 2008 : Understanding PowerShell Verbs and Nouns
- Windows Server 2008 : Installing and Launching PowerShell
- Sharepoint 2013 : Working with PowerShell (part 3) - PowerShell and SharePoint - Web Applications, Site Collections, Memory and Disposal
- Sharepoint 2013 : Working with PowerShell (part 2) - PowerShell and SharePoint - Administration Permissions, Content Databases
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us