Skip to main content

Basic Info about Active Directory Domain Services.

Active Directory Domain Services:

Before proceeding with AD we will know something about Domain and Workgroup.

What is Domain?
Domain is a logical group of computers which shares the common directory database.

What is workgroup?
Workgroup is an standalone computer which use the own database. for example our home pc

Coming to Active Directory,

Active Directory is a directory database which stores information about the active directory objects like users, computers, groups, Organizational unit and group policies.

we have two types of structure in Active Directory as below.
Logical strcture and Physical Structure.

In logical Strcture we have domains, tree, organizational unit and forest.

Domain: As I mentioned above domain is a logical group of computers which shares common directory database.

Tree: A hierarchy of domains with a contiguous namespace as below.
Domain Tree


Forest: Group of one or more trees, and they don't share contiguous namespace as below.

Domain Forest
Note: First domain in the forest is called Root Domain.

Organizational unit:

Organizational unit is a container using this we can organize active directory objects(users, groups, organization unit).

We can create Sub OU's in ou if required and for example if we want to manage a department like sales, marketing and IT kind of thing, then we can create separate ou's for all the departments and we can add all the related users to that OU and we can manage them by applying group policy and delegation as well.

Suppose you are company hiring contract employee to handle part of the IT related work and want to call them as IT helpdesk, then you can create a OU as ITHelpdesk and you can add all the contract employees to that OU and apply required policy and delegation that you want give to them.

It is easy to manage Active directory objects using Organizational unit.

Will take one more example, suppose you want to apply a GPO to group of users and don't want to apply the same policy to remaining domain users, then simply you can create a OU and add the users you want to apply GPO, then create GPO and link with that OU.

This is all about the organizational unit.

Physical Structure of Active Directory:

In physical structure of AD we will find Domain controllers and Sites.

Domain Controllers:

Domain controller is a server that runs Active directory domain services and responds to authenticaion requests like login requests.

Sites:
Sites are defined as group of well connected highly reliable and fast TCP/IP subnets. A site allows administrator to configure active directory access and replication topology to take advantage of the physical network.

This is all about Physical and logical strcture of AD.

In active we have three different type of Partitions as below.

1. Domain Partition: It contains replicas of all the objects in that domain, this partition replicate only to other domain controller in the same domain.

2. Schema Partition: It contains the forest wide schema, each forest has one schema so that the definition of each object class is consistent.

3. Configuration partition: It contains the forest topology, is a record of all domain controllers and the connections between them in a forest.

Note: Changes made to the schema, are replicated to all the domains in the forest, this replication is called Multimaster replication.

Flexible Single Master Operations:

Totally we have two types of FSMO roles
1. Forest Wide roles
2. Domain wide roles

In forest wide roles we have two roles as follows.

1. Schema Master role
2. Domain Naming master role

In Domain wide roles we have three roles as follows

1. PDC emulator(Primary Domain Controller)
2. RID Master role(Relative Identifier)
3. Infrastrcture Master role.

Schema Master:
-  It keep the schema upto date in forest.
- Any modifications or updates to the existing schema will me updated by this role.
- Only one Schema Master role present in the entire Forest.

If Schema Master is down nothing will impact on Domain controller, however if schema tries to update any schema modifications or updates it will not work, hence we need to make sure that Schema Master is up before making any changes to schema in forest.

Domain Naming Master:
- It will manage the addition or removal of domains in the forest.

If Naming master is down nothing will impact on Domain, however it's not possible to add or remove any domains from the forest.

PDC Emulator:
- Responsible for updating any password changes in a domain.
- It is responsible for domain time sync.
- Responsible for updating Group Policy.

If PDC is down then we will face below issues.
- Users unable to change the password.
- Unsynced time can lead to login failures for users.
- GPO issues.

RID Master:

- It will allocates RID pools to Domains that will help in creating users.
- Initially each DC's will have a pool of 500 RID's once it drained then DC will contact to RID master for a new pool of RID's to create users accounts.

If RID master down then nothing will happen untill DC will have RID pool with it, once it's drained it's not possible to create new users as there are no RID's in DC.

Infrastrcture Master:

- Resoponsible for updating cross domain references.
- Do not place Infrstrcture master role in a DC holding Global Catalog, unless all the DC's in the environment are Global catalog.

- If Infrastrcture Master role is down nothing will not impact to DC's, but If there are multiple domains , any change in an object which is referenced by another object in another domain will not be reflected.

Global Catalog:

- It will contain full information of it's own domain and partial information of all the domain in a forest, that will help users to find the information related to their queries.

Transfer and Seize FSMO roles:

Transfer FSMO roles via NTDSUTIL:

- Go to Command prompt
- Type NTDSUTIL
- Type roles
- Type Connections
- Connect to Server Servername
- type q (will bring you back to Fsmo maintainance)
- Transfer Schema master
- Transfer RID master
- Transfer PDC
- Transfer Naming Master
- Transfer Infrastrcture master

Once done you can check the status by typing netdom query fsmo in command prompt.

Seize FSMO roles:

- Go to Command prompt
- Type NTDSUTIL
- Type roles
- Type Connections
- Connect to Server Servername
- type q (will bring you back to Fsmo maintainance)
- Seize Schema master
- Seize RID master
- Seize PDC
- Seize Naming Master
- Seize Infrastrcture master

Once done you can check the status by typing netdom query fsmo in command prompt.

Note:

You can find the RID, PDC and Infrastrcture roles in Active Directory users and computers.
and Domain naming master role @ Active directory domains and trusts.

To find Schema master you have to follow below steps.

- In Run box type regsvr32 schmmgmt.dll (this command will register schmmgmt.dll on your computer)
- Go to Start
- Type mmc /a
- Click on file menu -> add or remove snap-in and then click add
- under the available snap-ins double click on Active Directory Schema and click close and then click on ok.
- Save this by clicking on file menu and then save it as schmmgmt.msc
- now you can open the Schema to transfer this role via GUI.

Installing and Configuring Active Directory:

- First we need to install Active directory domain services role using Server manager.
- Then restart the system.
- Type dcpromo in run box and proceed with the Installation of Active Directory.

Once after completing the configuration of ADDS we will get the below options in the Administrative tools.

- Active Directory users and Computers
- Active directory Sites and services.
- Active Directory domains and trusts.
- ADSI Edit
- Active Directory administrative center

below are the default folders created after installing active directory.

C:\windows\NTDS\ntds.dit
C:\Windows\SYSVOL

NTDS.dit is active directory database file, default size will be in between 14MB to 16MB
SYSVOL folder contains all the security related information like group policies and authentication related info.


This is just a basic info about Active Directory domain services.
Please let us know if anything above mentioned is not correct.


Note: Even I am a learner in Windows, I am sharing my knowledge to others because it will improve my knowledge to an extent, thanks for reading this post.

Please be inform if any mistakes in the post.


Comments

Popular posts from this blog

Unable to Install SCCM Client- File C:\Windows\ccmsetup\MicrosoftPolicyPlatformSetup.Msi Error text : ExitCode: 1625

Today while troubleshooting SCCM client issue in one of the server I came across the below issue and thought of sharing with all of you. Hope it helps. Issue: Unable to Install SCCM Client getting below error in CCMSetup.log Reason:  Per the below log entry, setup was failing because the installation of MicrosoftPolicyPlatformSetup.Msi failed in the backend. Resolution: To resolve the issue, we need to perform manual installation of MicrosoftPolicyPlatformSetup.Msi. To perform the installation, follow below steps: Go to C:\windows\ccmsetup\ and right click on MicrosoftPolicyPlatformSetup.Msi and run as administrator to install it manually Post installing the MicrosoftPolicyPlatformSetup.Msi, run the CCMSETUP.exe setup once again and monitor the logs to check the installation status and the log should end with ccmsetup is exiting with return code 0. Post installation you can verify the configuration manager client in control panel and it should show all the 11

Unable to transfer Schema master role from Primary Domain Controller to Additional domain controller (backup server) In Windows Server

Issue: Unable to transfer Schema master role from PDC to ADC. Symptoms: You will get below error while transferring Schema master using NTDSUTIL fsmo maintenance: seize schema master Attempting safe transfer of schema FSMO before seizure. ldap_modify_sW error 0x32(50 (Insufficient Rights). Ldap extended error message is 00002098: SecErr: DSID-0315137D, problem 4003 (INSUFF_ACCESS_RIGHTS), data 0 Resolution: Add your user to Enterprise admin  group in Active directory to resolve this issue.

Configuring Service Connection Point Role in System Center Configuration Manager 1702 Version

In Today’s guide, we will learn about Installing Service connection point role in Configuration Manager version 1702 . Using Service connection point role, we can keep the Configuration Manager up to date with latest updates. Before moving forward, we will understand about the Service Connection Point role in brief. What is Service Connection Point Role? A service connection point connects Configuration Manger to Microsoft cloud services and is used for Microsoft Intune subscription and servicing, and to update your Configuration Manager installation. This will help you in keep your Configuration Manager installation up-to date with latest updates. To install Service Connection Point Role, follow the below steps . Open Configuration Manager Console. From Workspace, Click on Administrations as shown in below screenshot In Navigation Pane – expand Site Configuration – Right click on Sites – and click on Add Site System Roles to proceed further. On General Screen, provide or