Skip to main content

Active Directory FSMO Roles

Flexible Single Master Operations (FSMO) Roles or Operation Masters: Active Directory updates generally multi master "Changes can be made on any DC". But we still have some roles which Microsoft does not allow to multiple DC, these role call single master.
Assign automatically to the first domain controller in a domain. Used to reduce conflict and facilitate communication concerning replication between.
- First DC in a forest holds all roles
- First DC in a new domain within existing forest holds all domain roles
Forest wide roles: Only one DC contains these roles in a forest.
Schema Master: Responsible for schema update. If this operations master is unavailable, no schema changes can be made.
Domain Naming Master: Responsible for change to configuration naming context, adding and removing domain. After update it replicates to other DCs. If unavailable, cannot add or remove domain. Domain Naming Master must also be a global catalog server "May be unnecessary in single-domain forest? 
Domain wide roles: One DC contains these role with in domain.
Relative Identifier (RID) Master: Every object in AD have a unique security identifier (SID). RID master allocates each DC a pool of RIDs. When a DC’s RID pool falls too low, it requests additional RIDs from RID master. With no RID master, when a DC runs out of RIDs, new security principals (Ex. users, groups etc.) cannot be created on that DC
Primary Domain Controller (PDC) Emulator: Acts as NT PDC to NT BDCs. Password changes replicated preferentially to PDC emulator. Authentication failures due to bad password at another DC forwarded to PDC emulator before failing completely. PDC emulator also performs time synchronize.
In a Windows 2000/2003 domain, the PDC emulator role holder retains the following functions:
  • Password changes performed by other DCs in the domain are replicated preferentially to the PDC emulator.
  • Authentication failures that occur at a given DC in a domain because of an incorrect password are forwarded to the PDC emulator before a bad password failure message is reported to the user.
  • Account lockout is processed on the PDC emulator.
  • Editing or creation of Group Policy Objects (GPO) is always done from the GPO copy found in the PDC Emulator’s SYSVOL share, unless configured not to do so by the administrator.
The PDC emulator performs all of the functionality that a Microsoft Windows NT 4.0 Server-based PDC or earlier PDC performs for Windows NT 4.0-based or earlier clients.
Infrastructure Master:Object in domain referencing object in another domain uses GUID, SID and DN. E.g. group in one domain referencing user or group in another domain. Infrastructure master updates SID and DN in cross-domain references- e.g. if referenced object moves. Multiple-domain, infrastructure master role must not be held by GC server. Not a problem in single-domain forests (because no external references). IM sync its data with GC. GD always gets up to date data from all domains so if IM and GC together is same DC, IM will not work. So IM and GC should be different DC so that IM can compare his data with GC. If all DCs are GC so no need of IM as will always have up to date DATA.

Home                                                                                                                                                            Next

Comments

Popular posts from this blog

PKI Lab Setup

Resource Forest Active Directory Domain Service – DC01 Root Certificate Authority (Offline) – RCA01 Issuing Certificate Authority – ICA01 Client Server – WS01 Account Forest ADC01 AWS01 ------------------------------------------------------------------------------------------------------------------------------------------------------ Step 1 – Installing the Domain Controller Step 2 – Installing the Root Certificate Authority Ø   Install the AD CS Role on the server (RCA01) Ø   Configure the AD CS Role ü   Click – Configure Active Directory Certificate Service on the Destination Server ü   Click Next – If you have logged in with Administration Account or Choose the Account which will be responsible for CA ü   Select Role Service to configure – For my case I am selecting only Certification Authority ü   Select Standalone CA – As this will be offline CA on a work group machine ü   Select Root CA – As this will be the Root CA Server ü   Create a new private key – Mandato

What is Active Directory

Active Directory (AD)   is a  directory  service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Active Directory is a database that keeps track of all the user accounts and passwords in your organization. It allows you to store your user accounts and passwords in one protected location, improving your organization's security. Active Directory is subdivided into one or more domains By simple meaning,  Active Directory   is a centralize repository of  O bjects . Everything like User, Group, Service, Resources etc, is an object for Active Directory.  Active Directory  is simply a collection of all these resources. When we put all these object together under a logical grouping or boundary including network resources to construct  Active Directory  is know as  Domain . A single/ multiple  Domains  in contiguous namespace together construct a  Tree   and  single/ multiple  Trees  with a t

PKI (Public Key Infrastructure)

Public Key Infrastructure A Public Key Infrastructure is basically a setup where we can generate Digital Certificates and manage Public-Key encryption . This setup consist of a set of Hardware & Software, role and policies to create, manage, distribute, use and revoke the Digital Certificate. The purpose of a Digital Certificate is to Encrypt the Data so that an authorized person can Decrypt the data. Whenever we are using an encryption and send a data from one end to another end, we need two keys. Public Key & Private Key . Public Key is use for encrypt for the data and Private Key is use for decrypt the Data. An encryption ensure the security layer but it does not ensure that only the right person is decrypting the Data. Any person having the Private Key can decrypt the data. So here we need PKI to ensure that only the right person is having the Private Key. PKI identify and authenticate the Public Key owner. Check the LAB Setup which brief you a PKI infrastructure for m