Title: Active Directory Operations Masters
1Active Directory Operations Masters
2Operations Masters
- Schema master
- Domain naming master
- Relative ID master
- Primary Domain Controller (PDC) emulator
- Infrastructure master
3Forest-wide Roles
- Certain operations can only be performed by
single domain controller in entire forest - Forest-wide FSMO roles
- Schema master
- Domain naming master
- Can be located on different domain controllers
- Most often located on same domain controller
4Schema Master
- Schema master controls all updates and
modifications to the schema - To change it, use the AD Schema Manager
- Has writable copy of schema naming context for
entire forest - Changes replicated to other domain controllers
- Using standard, non-urgent replication
5Schema Master - Placement
- Assigned to first domain controller in forest
- Additional load is negligible
- Often left on first domain controller in forest
without any issues - May be necessary to move
- If server frequently unavailable
6Schema Master - Impact if Unavailable
- Users do not notice impact
- Network administrators most likely do not notice
loss - Unless they are attempting to modify schema
7Operations Masters
8Operations Masters
9Identifying the Schema Master of the Forest
10Domain Naming Master
- Every domain must have unique name
- Adds domains to forest
- Ensure name is unique
- Removing domains from forest
- To modify, use AD Domains and Trusts
11Domain Naming Master - Placement
- Assigned to first domain controller in forest
- Additional load negligible
- Forest functional level of Windows 2000
- Only place on global catalog server
- Forest functional level Windows Server 2003
- Not necessary to place on global catalog server
12Domain Naming Master - Impact if Unavailable
- Users do not notice any impact
- Network administrators most likely do not notice
loss - Unless they are attempting to add or remove
domain from forest
13Domain-wide Roles
- Some operations can only be performed by single
domain controller in domain - Domain-wide FSMO roles
- PDC emulator
- RID master
- Infrastructure master
14Domain-wide Roles
- To modify, use AD Users and Computers
15Domain-wide Roles Placement Options
- All three reside on one domain controller
- All three reside on different domain controllers
- Any combination of
- Two of the roles are on one domain controller
- Third role on its own domain controller
- Domain controller may even hold domain-wide roles
and forest-wide roles
16PDC Emulator
- Acts as Windows NT 4.0 PDC for domain
- Replicate appropriate change(s) to Windows NT 4.0
BDCs in domain - Responsible for performing operations for client
workstations running - Windows NT 4.0 Workstation
- Windows 98
17PDC Emulator (continued)
- Used for synchronizing system clock
- Password updates preferentially replicated to PDC
emulator
18PDC Emulator - Placement
- Assigned to first domain controller in every new
domain - Should be highly available
- Need additional processing power for PDC emulator
in a large domain - Or do not place on global catalog server
- Centrally located on network
19PDC Emulator - Impact if Unavailable
- Users may notice impact
- Validation of user passwords may randomly pass or
fail - Replication of updates to Windows NT 4.0 BDCs
will not occur
20RID Master
- Security principle has own unique security
identifier (SID) - Made up of
- SID of domain
- Relative identifier (RID)
- RID is unique for every security principle in
domain - RID master
- Allocates blocks of RIDs to domain controllers
21RID Master (continued)
- Responsible for moving objects between domains to
prevent object duplication - Move object to new domain
- Then delete it from old domain
22RID Master - Placement
- Assigned to first domain controller in every new
domain - Additional load negligible
- Highly available
- Locate in site where most new security principles
are created
23RID Master - Impact if Unavailable
- Users do not notice any impact
- Network administrators most likely do not notice
loss - Unless they are attempting to create many
security principles (users, groups, or computers) - Since domain controller will run out of RIDs
24Infrastructure Master
- Update object references in its domain that point
to objects located in another domain (groups that
have members in other domains) and all other
inter-domain object references - Updates distinguished name and SID if object
moves within or between domains - Object references contain
- GUID of object
- Distinguished name of object
- Possibly SID of object if it is security principle
25Infrastructure Master - Placement
- Forest with multiple domains
- Do not place on global catalog server
- Do locate in site that contains global catalog
server - Assigned to first domain controller in every new
domain - Does not place much additional load
26Infrastructure Master - Impact if Unavailable
- Users typically do not notice any impact
- Network administrators may notice that group
membership does not appear to be updated - User accounts may appear with incorrect names in
groups membership list
27Transferring and Seizing Roles
- May be necessary to transfer FSMO roles
- Usually orderly process
- May be situations where original role holder is
permanently unavailable - Role will be seized by another domain controller
28Transfer Roles
- Preferred method
- Perform transfer operation
- Both domain controllers must be available
- Ensures no data loss occurs
- Administrator needs to be member of certain group
- Depends on role being moved
29Groups Authorized to Move FSMO Roles Between
Domain Controllers
30Viewing Roles
- Dcdiag /testKnowsofroleholders /v
- ntdsutil
- domain management
- connections
- connect to tcpip1.central.pbcc.edu
- quit
- select operation target
- list roles for connected server
31Seizing Roles
- Transfer when original role holder is unavailable
- Should only be done as last step
- Any recent changes cannot be replicated
- May be lost
- Original role holder cannot be informed that it
no longer holds the role - Never place server back on network unless it is
formatted and Windows is reinstalled
32Consequences of Bringing a Domain Controller
Back Online After FSMO Role Seizure
33Seizing Roles
- Methods
- Active Directory Users and Computers
- Use only for PDC emulator or infrastructure
master - NTDSUTIL
34Seizing a FSMO Role Using NTDSUTIL
35Seizing a FSMO Role Using NTDSUTIL
- ntdsutil
- roles
- connections
- connect to tcpip1.central.pbcc.edu
- quit
- seize RID master