IT tutorials
 
Technology
 

Windows Small Business Server 2011 : An Active Directory Primer (part 1) - Objects and Attributes

9/17/2013 8:08:23 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Active Directory Domain Services (AD DS) is a key element of the Windows SBS 2011 infrastructure, one that provides centralized authentication and authorization services for the entire network. It is important for Windows SBS administrators to understand the basic architecture of AD DS, although in most cases it is not necessary to delve into its vast complexities.

1. AD DS Functions

AD DS is, at its heart, a directory service; that is, a database that functions as a repository for information about your network. When Windows SBS network users sit down at their workstations and log on, they are logging on to the directory service, not to the individual workstations. Their user accounts and passwords are stored in AD DS, and the directory service grants them access to the network.

Two of the primary functions performed by AD DS are authentication and authorization. Authentication is the process by which a system verifies a user’s identity. Computers can authenticate a user’s identify by requiring that the user supply any or all of the following:

  • Something the user knows, such as a password

  • Something the user has: a possession, such as a smart card

  • Something the user is: a physical attribute, such as a fingerprint

Authentication protocols, such as Kerberos, enable these processes to occur without endangering passwords by transmitting them over the network. Authorization is the process by which a system grants a user access to specific resources. Once AD DS has authenticated a user, it can grant access to network resources by associating the user’s verified identity with the access control system built into the resource. For example, every file on the NTFS disks in your Windows SBS 2011 servers and workstations has a list of the users who are permitted access to that file.

Without AD DS, users would require separate accounts and passwords on every computer they need to access. Imagine how arduous your role as an administrator would be if, each time a new employee joined the company, you had to create 10 or 20 separate user accounts for the same person, on 10 or 20 different computers. Imagine having to modify 10 or 20 separate accounts each time a user is required to change his or her password (which, for security reasons, should be pretty frequently). AD DS uses one centralized user account and password for all network resources, greatly simplifying the administration process.

2. Domains and Domain Controllers

In AD DS, the fundamental administrative unit is the domain. An AD DS domain is a logical grouping of computers, users, and other network resources. By grouping elements into domains, administrators can create policies and assign them to all or part of a network at once.

AD DS is a highly flexible directory service that is sufficiently scalable to support networks of almost any size. A large enterprise network can consist of multiple domains, grouped in a hierarchical structure called a domain tree, and can even have multiple domain trees grouped in a structure called a forest. However, Windows SBS 2011 supports the use of only a single domain, which is more than sufficient to support the maximum of 75 workstations you can connect to the network.

One of the most complex parts of a large-scale AD DS deployment is designing the AD DS tree structure. Administrators of large networks must often devote a great deal of time and effort to creating a domain hierarchy that adequately represents their organizations. With Windows SBS 2011, however, there is no need for this effort. All you have to do is supply a name for your domain, and the Windows SBS setup program installs AD DS, creates the domain, and configures your server to support it.

A Windows server with AD DS installed and configured is called a domain controller. The domain controller contains a copy of the AD DS database, as well as the various applications and services that enable AD DS to function. When a user logs on to the domain, it is the domain controller that authenticates the user’s identity. When a user on a Windows SBS workstation accesses a server disk, the domain controller (which, in this case, is the same computer) authenticates the user’s identity and authorizes access to the files that the user requests. Even when a user accesses resources on another workstation instead of a server, the domain controller is involved in the authentication and authorization processes. The computers on the network, therefore, require continual access to the domain controller.

Larger networks usually have multiple domain controllers for each domain, which replicate information back and forth to keep them all updated and in the same state. Windows SBS 2011, however, supports only one domain and one domain controller. This simplifies the network design and eliminates the need for complex replication systems, but it also makes the continued operation of the Windows SBS domain controller all the more critical. It is strongly recommended that you use fault-tolerance mechanisms, such as an uninterruptible power supply (UPS) and regular server backups, to prevent extended domain controller downtime.

3. Objects and Attributes

The AD DS database consists of objects, which represent specific network resources, both physical and logical. Every user, computer, and group on your network has an AD DS object that represents it. Each object consists of a set of attributes, which contain information about that object. For example, some of the attributes of a user object are designed to hold the individual’s first and last names, address information, and password. When you open the Properties sheet for a user account, as shown in Figure 1, the properties that you can modify are actually attributes of the user object. Group objects contain, as an attribute, a list of the other objects that are members of the group.

The Properties sheet for a Windows SBS 2011 user object.

Figure 1. The Properties sheet for a Windows SBS 2011 user object.

The types of objects that you can create in the AD DS database, and the attributes of each object type, are specified in the AD DS schema. Applications can modify the schema to add object types to the AD DS implementation, or add attributes to existing object types. For example, Microsoft Exchange modifies the schema to add specialized attributes to every user object in the directory.

It is also possible for administrators to modify the schema manually, using tools provided with Windows Server 2008 R2. However, the average Windows SBS 2011 administrator should not have reason to do this.

Caution

Modifying the AD DS schema is similar to modifying a Windows computer’s registry, in that a minor mistake can have a profound effect on the functionality of the system. Do not make any manual changes to the schema (or to the registry, for that matter), unless you know precisely what you are doing, and why.

In addition to objects that represent network resources, the AD DS has objects that represent logical divisions in the network, which you can use for organizational functions. The domain is such an object, as is a forest. Within a domain, you can also create objects called organizational units (OUs) to subdivide the domain in various ways. Unlike domains, which you can create only by installing a new domain controller, you can create as many OUs as you want, at any time.

OUs are known as container objects because other objects can be subordinate to them. You can create user, group, and computer objects in an OU, or even other OUs. Objects that cannot contain other objects, such as user and computer objects, are known as leaf objects.

Note

Four container objects appear in every domain by default: Built-in, Computers, ForeignSecurityPrincipals, and Users. These are not OUs; the name of their object type is container. You cannot create new objects using the container type, but you can create objects, such as OUs, that are containers (in the generic sense).

The default domain for your Windows SBS 2011 network has a number of OUs in addition to the Domain Controllers OU found in every AD DS domain. The MyBusiness OU has four OUs beneath it, called Computers, Distribution Groups, Security Groups, and Users, as shown in Figure 2. The Computers OU has two subordinate OUs of its own, called SBSComputers and SBSServers, and the Users OU has a subordinate OU called SBSUsers.

Note

Group objects are a special case because while they have a list of other objects that are members of the group as an attribute, they do not contain those objects in the AD DS sense. Groups are therefore not considered container objects, as domains or OUs are.

The default OU hierarchy in a Windows SBS 2011 domain.

Figure 2. The default OU hierarchy in a Windows SBS 2011 domain.

The function of these OUs is to separate the leaf objects that Windows SBS 2011 creates in your domain by their functions; users go in one OU, computers in another, and so forth. Here again, Windows SBS 2011 has made the AD DS design decisions for you. It includes specialized tools that are based on this default design. To manage AD DS user, group, and computer objects using the Windows SBS Console, the objects must be located in the appropriate OUs. You can conceivably redesign the domain hierarchy by creating your own OUs and moving the objects into them, using any organizational paradigm you want, such as the geographical locations of your company’s branch offices. To do so, however, you would then have to use the standard Windows Server 2008 R2 tools to manage them instead of the Windows SBS Console. You would also have to reconfigure the default Windows SBS 2011 Group Policy objects (GPOs), which are designed around the default OU hierarchy.

Caution

It is strongly recommended that you do not modify the default AD DS hierarchy, at least at first, until you fully understand the ramifications of your actions.

 
Others
 
- Sharepoint 2013 : Authentication and authorization infrastructure (part 4) - Authorization infrastructure
- Sharepoint 2013 : Authentication and authorization infrastructure (part 3) - Configuring FBA with SQL Membership Provider
- Sharepoint 2013 : Authentication and authorization infrastructure (part 2) - Claims-based authentication types
- Sharepoint 2013 : Authentication and authorization infrastructure (part 1) - Authentication infrastructure
- Windows 8 : Managing Disk Compression and File Encryption (part 2) - Encrypting Drives and Data
- Windows 8 : Managing Disk Compression and File Encryption (part 1) - Compressing Drives and Data
- Windows 8 : Managing Disk Drives and File Systems - Working with Removable Storage Devices, Working with Data Discs
- Sharepoint 2010 : Business Connectivity Services - The BCS Object Model
- Sharepoint 2010 : Business Connectivity Services - BCS with Visual Studio 2010
- Sharepoint 2010 : Business Connectivity Services - BCS and SharePoint Designer
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us