Skip to main content

Active Directory Partitions

Active Directory Partitions or Active Directory Naming Contexts: A partition is a data structure within AD used to distinguish data for different replication purposes. Active Directory divides information into multiple partitions. Each domain controllers have a copy of the NTDS.DIT database file which contains a minimum of three NCs.
Schema NC: Contains the rules and definitions that are used to creating and modifying object classes and attributes within Active Directory. Information of this partition replicates to every domain controller in a forest.
Configuration NC: Contains information regarding the physical topology of the network. As well as other configuration data that must be replicated throughout the forest. This information flows to every domain controller within a forest.
Domain NC: Domain NC consists of user, computer, and other resource information for a particular Active Directory Domain. Information of this partition replicates to every domain controller within the domain only.
Application NC: Application partitions provide fine control. It helps administrators direct where information is relocated to a domain or forest. It results in greater flexibility and better control over replication performance. For Example:
ForestDNSZone is part of a forest. All domain controllers and DNS servers in a Forest receive a replica of this partition.
DomainDNSZone: are unique for each domain. All domain controllers that are DNS server in that domain receive a replica of this partition.

Comments

Popular posts from this blog

PKI Lab Setup

Resource Forest Active Directory Domain Service – DC01 Root Certificate Authority (Offline) – RCA01 Issuing Certificate Authority – ICA01 Client Server – WS01 Account Forest ADC01 AWS01 ------------------------------------------------------------------------------------------------------------------------------------------------------ Step 1 – Installing the Domain Controller Step 2 – Installing the Root Certificate Authority Ø   Install the AD CS Role on the server (RCA01) Ø   Configure the AD CS Role ü   Click – Configure Active Directory Certificate Service on the Destination Server ü   Click Next – If you have logged in with Administration Account or Choose the Account which will be responsible for CA ü   Select Role Service to configure – For my case I am selecting only Certification Authority ü   Select Standalone CA – As this will be offline CA on a work group machine ü   Select Root CA – As this will be the Root CA Server ü   Create a new private key – Mandato

What is Active Directory

Active Directory (AD)   is a  directory  service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Active Directory is a database that keeps track of all the user accounts and passwords in your organization. It allows you to store your user accounts and passwords in one protected location, improving your organization's security. Active Directory is subdivided into one or more domains By simple meaning,  Active Directory   is a centralize repository of  O bjects . Everything like User, Group, Service, Resources etc, is an object for Active Directory.  Active Directory  is simply a collection of all these resources. When we put all these object together under a logical grouping or boundary including network resources to construct  Active Directory  is know as  Domain . A single/ multiple  Domains  in contiguous namespace together construct a  Tree   and  single/ multiple  Trees  with a t

PKI (Public Key Infrastructure)

Public Key Infrastructure A Public Key Infrastructure is basically a setup where we can generate Digital Certificates and manage Public-Key encryption . This setup consist of a set of Hardware & Software, role and policies to create, manage, distribute, use and revoke the Digital Certificate. The purpose of a Digital Certificate is to Encrypt the Data so that an authorized person can Decrypt the data. Whenever we are using an encryption and send a data from one end to another end, we need two keys. Public Key & Private Key . Public Key is use for encrypt for the data and Private Key is use for decrypt the Data. An encryption ensure the security layer but it does not ensure that only the right person is decrypting the Data. Any person having the Private Key can decrypt the data. So here we need PKI to ensure that only the right person is having the Private Key. PKI identify and authenticate the Public Key owner. Check the LAB Setup which brief you a PKI infrastructure for m