Chapter1 - Active Directory
Chapter1 - Active Directory
COURSE
NETWORK TECHNOLOGY
Chapter
ACTIVE DIRECTORY
01
Editor: Nguyen Viet Ha, Ph.D.
2
Workgroup
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 3/74
/50
Workgroup
Overload Weak
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 4/74
/50
Workgroup
❖Authentication
➢When connecting to a shared resource on a computer, you are first
prompted to supply a valid username and password on that
computer that has permissions to access the resource.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 5/74
/50
Workgroup
❖Authorization
➢Checks the permissions of the authenticated user and controls
access to functions based on the roles that are assigned to the user.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 6/74
/50
Workgroup
➢SAM_DOMAIN: A domain
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 8/74
/50
Workgroup
❖Advantages:
➢Very simple to manage.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 9/74
/50
Workgroup
❖Disadvantages:
➢Low security.
o Passwords may not be changed very often.
▪ If they are changed, a user may update his password on a few
systems but not on all of them, and then end up out of sync.
➢Less scalability.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 10/74
/50
Domain
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 12/74
/50
Domain
❖Advantage ❖Disadvantage
➢Centralization ➢Complex
➢Manageability ➢High level of administration
➢Scalability ➢High-performance devices (server,
➢Tight Security router, switch)
➢Single-Sign-On ➢Expensive
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 14/74
/50
2 Active Directory
15
Active Directory
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 16/74
/50
Active Directory
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 17/74
/50
Active Directory
19
Active Directory
❖After the domain controller validates your user name and password, it
issues your computer an encrypted token that lists:
➢Domain user account.
➢Domain group accounts of which you are a member.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 20/74
/50
Active Directory
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 21/74
/50
Active Directory
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 22/74
/50
3 Active Directory Structure
23
Active Directory Objects
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 26/74
/50
Active Directory Objects
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 27/74
/50
Active Directory Objects
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 28/74
/50
Active Directory Forests and Trees
❖Active Directory forests are used to provide for multiple domains within
the same organization.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 29/74
/50
Active Directory Forests and Trees
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 30/74
/50
Active Directory Forests and Trees
❖When install the first domain controller within the first domain in an
organization, a forest is created with the same name as this first
domain.
domain1.com domain2.com
(forest root domain)
hcm.domain2.com hn.domain2.com
domain1.com FOREST
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 31/74
/50
Active Directory Forests and Trees
❖Trees: a collection of one or more domains that share a common
namespace.
➢Ex: domain2.com, hcm.domain2.com, and hn.domain2.com
domains share the same core domain name, we refer to them as the
domain2.com tree.
❖The domain2.com domain is called the parent domain within the tree,
and the hcm.domain2.com and hn.domain2.com domains are called
child domains.
Child
Domain
FOREST DOMAIN 33
4 Active Directory Trusts
34
Active Directory Trusts
❖Small organizations often may have
only one domain, but larger
organizations will end up with
multiple domains.
❖To simplify administration and the user experience, you can set up
trusts between domains so that an authenticated user in one domain
can access resources in another domain without having to authenticate
with a separate set of credentials.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 35/74
/50
Active Directory Trusts
❖Trust Flow:
➢Transitive trust: Domain 1 trusts Domain 2, and Domain 2 trusts
Domain 3 => Domain 1 will also trust Domain 3.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 36/74
/50
Active Directory Trusts
❖AD DS Trust Types:
➢Parent-Child Trust: trust relationship automatically created and
establishes a relationship between a parent domain and a child
domain.
➢They’re transitive and they can be created as two-way trusts.
domain1.com
Parent-Child Parent-Child
trust trust
a.domain1.com b.domain1.com
37
Active Directory Trusts
❖AD DS Trust Types:
➢Tree-Root Trust: trust relationship automatically created and
establishes a relationship between the forest root domain and a new
tree.
➢They can be transitive and created as two-way trusts.
a.domain1.com b.domain1.com
c.domain2.com
domain1.com FOREST 38
Active Directory Trusts
❖AD DS Trust Types:
➢Shortcut trust: are used on Windows Server domains that reside in
the same forest, where there is a need to optimize the authentication
process (e.g., a user on Domain 1 frequently needs to authenticate
to Domain 2).
➢They can be transitive and created as one-way or two-way trusts.
Tree Root trust
domain1.com
Shortcut trust domain2.com
Parent-Child
trust
a.domain1.com b.domain1.com
c.domain2.com
domain1.com FOREST 39
Active Directory Trusts
❖AD DS Trust Types:
➢Realm trust: allows to create a trust between a Windows Server
domain and a non-Windows (Linux, Unix, or MacOS Server) Kerberos
realm.
➢They can be transitive or nontransitive and created as one-way or
two-way trusts.
Tree Root trust
domain1.com Realm trust UNIX
Shortcut trust domain2.com Kerberos
Parent-Child V5 Realm
trust
a.domain1.com b.domain1.com
c.domain2.com
domain1.com FOREST 40
Active Directory Trusts
❖AD DS Trust Types:
➢External trust: External trusts connect a Windows Server domain
in one forest to another Windows Server domain (Windows NT 4.0
and non-Windows Kerberos realms) in a different forest.
➢They’re nontransitive and created as one-way or two-way trusts.
External trust
a.domain1.com b.domain1.com
c.domain2.com a.domain3.net b.domain3.net
External trust
a.domain1.com b.domain1.com
c.domain2.com a.domain3.net b.domain3.net
43
Global Catalog
❖A single forest can contain an unlimited number of domains.
➢Each domain can contain an unlimited number of objects.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 44/74
/50
Global Catalog
❖Global Catalog (GC):
➢Allows users and applications to find objects in an Active Directory
domain tree, given one or more attributes of the target object.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 48/74
/50
Global Catalog
❖In site environment,
➢Smaller branch offices with low capacity servers, which cannot
handle additional load of hosting a GC
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 49/74
/50
Global Catalog
❖In site environment,
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 50/74
/50
6 Authentication Process
51
Authentication Protocols
❖NT LAN Manager (NTLM):
➢Current version: 35.0 (4/29/2022)
➢Replaced by Kerberos.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 52/74
/50
Authentication Protocols
❖Kerberos Network Authentication Service (V5) protocol
(Kerberos V5):
➢Current version: Version 5, Release 1.20 (26 May 2022)
➢High security.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 53/74
/50
Authentication Protocols
❖Kerberos Network Authentication Service (V5) protocol
(Kerberos V5):
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 54/74
/50
KDC: Key Distribution Center
Authentication Process TGT: Ticket-Granting Ticket
The Key Distribution Center (KDC), resides on each domain controller and stores the
encrypted user credentials
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 58/74
/50
KDC: Key Distribution Center
Authentication Process TGT: Ticket-Granting Ticket
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 59/74
/50
KDC: Key Distribution Center
Authentication Process TGT: Ticket-Granting Ticket
11. The LSA compares the SIDs in the access token with the groups that are
assigned permissions in the resources discretionary access control list (DACL). If
they match, the user is granted access to the resource.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 60/74
/50
Flexible Single Master Operations
7 (FSMO) Role
61
Multi-master model
❖Active Directory is the central repository to store all objects in an
enterprise and their respective attributes.
➢It's a hierarchical, multi-master enabled database that can store
millions of objects.
➢Changes to the database can be processed at any domain controller
(DC) in the enterprise.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 62/74
/50
FSMO Role
❖Need a conflict resolution algorithm.
➢Which changes were written last, which is the last writer wins.
➢The changes in all other DCs are discarded.
➢However, there are times when conflicts are too difficult to resolve
using the last writer wins approach.
➢In such cases, it's best to prevent the conflict from occurring rather
than to try to resolve it after the fact.
❖Active Directory includes multiple roles, and the ability to transfer roles
to any DC in the enterprise.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 64/74
/50
FSMO Roles
❖Schema master
➢Manages the read-write copy of your Active Directory schema.
o The AD Schema defines all the attributes – things like employee
ID, phone number, email address, and login name – that you can
apply to an object in your AD database.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 65/74
/50
FSMO Roles
❖Schema master
➢Only one DC can process updates to the AD schema.
o Once the Schema update is complete, it's replicated from the
schema master to all other DCs in the directory.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 66/74
/50
FSMO Roles
❖Domain naming
➢Manages the forest-wide domain name space of the directory.
➢Only one DC can add or remove domains and application
directory partitions from the directory.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 67/74
/50
FSMO Roles
❖Relative Identifier (RID) master
➢Allocating Relative Identifier (RID) pools to DCs in its domain.
o When a DC creates a security principal object (e.g., user or
group), it attaches a unique SID to the object, consists of:
▪ A domain SID that's the same
for all SIDs created in a domain.
▪ A RID that's unique for each
security principal SID created in
a domain.
➢Backward compatibility.
o Performs all of the functionality that a Windows NT 4.0 Server-
based PDC or earlier PDC performs for Windows NT 4.0-based or
earlier clients.
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 72/74
/50
FSMO Roles
❖Infrastructure master
▪ Ex:
‐ CN=Jeff Smith,OU=Sales,DC=Fabrikam,DC=COM
‐ CN=Karen Berge,CN=admin,DC=corp,DC=Fabrikam,DC=COM
Nguyen Viet Ha, Ph.D. - Department of Telecommunications – Networks, FETEL, VNUHCM-US 73/74
/50
THANK YOU FOR YOUR ATTENTION