Title: Practical Active Directory Design Decisions
1Chapter 4
- Practical Active Directory Design Decisions
2Objectives
- Choose the best domain name system (DNS) name for
a domain - Make Active Directory forest design decisions
- Understand the roles and describe the
characteristics of trusts - Describe the characteristics of domains
- Describe the role and characteristics of
organizational units (OUs)
3Choosing a DNS Name
- A DNS name is used extensively throughout the
domain - Changing the domain name can be complicated, time
consuming, and expensive
4What Makes a Good DNS Name?
- Making the name meaningful and scalable
- Will be used for all child domains in the tree
- Will be used in the present and the future
- Two common uses
- Define how resources are located within the
network - Define its Internet presence
5Choosing How DNS Names for Internet and Active
Directory Will Be Related
- Use the same DNS name for both
- Use completely different names altogether
- Delegate a subdomain from your Internet name for
Active Directory
6Using the Same DNS Name for Active Directory and
Internet Presence
- Complicated steps are required to prevent
confidential data from being available publicly - Split DNS gives internal DNS servers complete
zone data and external servers public records
only - Internal users can access the network from the
outside using a virtual private network (VPN)
7Split DNS
8Using Completely Different Names for Active
Directory and Internet Presence
- Management of the Internet names and hosts is
separate from Active Directory - Internal names can be private or registered
separately - Clients can query internal servers using a
forwarder or recursion to resolve external names
9Separate DNS Structure
10Delegating a Subdomain from the Internet Presence
Subdomain for Active Directory
- A subdomain is delegated from the existing
Internet presence name - Delegation records point all queries related to
Active Directory to the correct servers
11Delegated DNS Subdomain
12Best Practices for Choosing a DNS Name
- A delegated subdomain is recommended
- All domain controllers (DCs) run the DNS Server
software with the Active Directory zones
configured as integrated zones - Replicate _msdcs zone to all domains as a
standard secondary zone in non-Windows 2003
Servers - Replicate the forest root zone to all DCs running
DNS by using an application partition in Windows
2003 Server
13Designing a Forest
- Design from the top down, from the forest to the
domains - Tackle the most important issues first
14Characteristics of a Forest
- Centrally controlled schema
- Common configuration including infrastructure and
topology elements - Single Global Catalog (GC) to allow for quick
searches - Complete trust relationships
15How Many Forests?
- A single forest is often sufficient for one
organization - Multiple forests justified when a high degree of
separation between entities is necessary - Different schema for different parts of an
organization - Complete separation of administration
- One part cannot participate in a complete trust
model - New forests require new implementations of Active
Directory
16Understanding and Implementing Trust Relationships
- A security principal in one domain can access a
resource in another domain without needing
separate credentials - The security principles exists in the trusted
domain - The resource is in the trusting domain
17Typical Trust Diagram
18Two-Way, Transitive Trusts
- Domain A trusts B
- Domain B trusts A
- Domain B trusts C
- A automatically trusts C
- Trusts established on a domain-to-domain level
19Two-way, Transitive Trusts Within a Forest
20Shortcut Trusts
- Authentications must follow a trust path
- Shortcut trusts point one domain directly to
another - Increase efficiency
- Reduce number of possible points of failure
21Adding Shortcut Trusts
22Adding Explicit Inter-Forest Trusts
23Designing Domains
- Determining the number of needed domains is an
important part of deployment - There are administrative and technical reasons
for creating more than one domain
24Functions of a Domain
- Partition of the forest
- Replication boundary
- Authentication
- Policy-based administration
- Setting of account policies for user accounts in
the domain - A directory for publishing shared resources
- An administrative boundary
25The Forest Root Domain
- First domain created in the forest
- Holds the security principals that can manage the
forest - Central point for trust relationships
- Difficult to rename and delete
26Is It a Security Boundary?
- Users authenticated only by their domain
- Group policy applied at domain level
- Account policies set at domain level
- Shares several partitions in the forest
- Sends information about security principles
outside of the domain
27Which Works Better Single or Multiple Domains?
- Single domain
- Easier to delegate authority
- Requires fewer hardware resources
- Requires fewer domain administrators
- Multiple domains
- Tighter administrative control
- Decentralized administrative structure
- Organizational considerations
- Less replication over slow links
28Using a Dedicated Forest Root
- Dedicate forest root domain to infrastructure
management - Allows greatest flexibility for the future
- Fewer administrators are allowed to make
forest-wide changes - One domain or multiple domains by geography
- These are best practices recommended by Microsoft
29Designing OUs
- Hierarchical structure of objects in a domain
- Allows for delegation of administration
- Controls the scope of policy specification
30Sample OU Configuration
31Best Practices for Designing OUs
- Use OUs to organize data, rather than create new
domains - Every OU should serve a purpose
- Nesting should be no more than 10 levels deep
32Chapter Summary
- Carefully choose the best DNS name for Active
Directory domains and forests - Most companies have two different uses for a DNS
name - Defining a public Internet presence
- Defining a namespace for Active Directory
- Most organizations would treat SRV resource
records as confidential information
33Chapter Summary (continued)
- Common choices for choosing DNS names for an
Internet presence and the Active Directory
domain - The same DNS name for both
- Completely different names
- A subdomain delegated from your Internet domain
34Chapter Summary (continued)
- Using the same DNS name for both Internet
presence and Active Directory is not recommended - Microsoft recommends running DNS services on all
DCs - A forest is an instance of Active Directory
35Chapter Summary (continued)
- Trust relationships are automatically created in
a forest - Trusts are transitive and established on a
one-to-one basis - A shortcut trust allows a direct route for
authentication between domains - Explicit trusts can be manually created
36Chapter Summary (continued)
- A domain is a partition of a forest
- A domain is a replication and administrative
boundary - Domains provide authentication and a directory in
which to publish shared resources - The first domain created in a forest is the root
- Managing a multiple-domain forest is more complex
and requires more resources than a single-domain
forest
37Chapter Summary (continued)
- Microsoft recommends
- Creating a forest root domain dedicated to
infrastructure functions - Using only one domain for all directory objects
- Using geography, rather than organization
boundaries, for additional domains - OUs are used to group objects within a domain
into a hierarchical structure - OUs can be nested without any practical limit
- OUs are comparatively easy to restructure
- A forest cannot be renamed or significantly
restructured without extensive disruption to the
network