Previous section   Next section

PLANNING FOR THE ACTIVE DIRECTORY

The proper implementation of the Active Directory requires forethought and planning. Chapter 3 outlines many of the basic planning issues involved in the installation or upgrade of Windows Server 2003. Since these issues apply equally to the Active Directory, we strongly advise you to review that chapter in conjunction with the discussions here. In this chapter, you will learn the importance of planning for the creation of namespaces, domains, sites, and organizational units. As discussed in Chapter 4, such planning is based on the system administrator's knowledge of the current IT infrastructure, business computing requirements, anticipated change or growth, and available connectivity and bandwidth.

The DNS Namespace

The Domain Name System (DNS) is an industry standard name-resolution vehicle that the Internet uses to match IP addresses to specific namespaces, like ours, EntCert.com. Since domains and domain trees are defined by a common namespace based on DNS, the importance of establishing this strategy early is key. At the least, a baseline understanding of DNS and domain name registration is required prior to the installation of the Active Directory. For additional information on DNS, including its installation, refer to Chapter 12, "Networking Basics and Naming Services."

DNS NAMES FOR CHILD DOMAINS AND FORESTS

Defining namespaces is based on an understanding of the organization's current and projected structure, growth, and relationship with related organizations. In most cases, a single domain name can accommodate even very large organizations. However, it can also be used to create child domain relationships where such division is necessary. The child name is a single, descriptive text string that is added to the front of the domain name and separated from it by a period. Child domains can have children of their own. In this case the child name is added before the parent name, again separated by a period, giving the syntax child2.child1.domain.com. A child domain name should be fairly generic. Locations or broad, functional descriptive names are generally good choices. For example, for the domain EntCert.com, a location—asia.EntCert.com—or a function—sales.EntCert.com—is broad enough. The objective is to create child domain names that can survive over time.

Where multiple domain names are required or forced on an administrator because of preexisting names (such as when two companies merge but maintain separate identities), forest relationships need to be established. The forest is created by joining two-way transitive trusts multiple domain trees with different DNS namespaces. Separate identities are maintained while transitive trusts to network resources are provided.

DEBUGGING AND REPORTING INCORRECT DNS CONFIGURATION

New to Windows Server 2003, the DNS feature will not be noticed by the administrator if it is properly configured. However, in the event of a problem, this feature should make debugging and reporting easier. It should also help guide the administrator through a proper configuration setup. When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. In order to be located on a network, every DC must register in DNS DC locator DNS records. The Active Directory Installation Wizard verifies a proper configuration of the DNS infrastructure. All DNS configuration debugging and reporting activity is done with the Active Directory Installation Wizard.

DOMAIN NAMES FOR INTERNAL AND EXTERNAL USE

Another important namespace issue is whether the domain name will be extended for both internal and external use. In the first case, the goal is a single user logon for all Internet and intranet communications. To achieve this end, the system administrator must create two DNS zones: the first resolves the name for internal resources; the second resolves names for external mail systems, Web services, TCP, news, and Telnet connectivity.

In the second case, an organization may choose different domain names for internal and external use. If so, two namespaces must be reserved and domain trees created to manage the respective resources, and transitive trust relationships must be formed by grouping the trees into a forest. This approach to domain naming increases administrative tasks. However, each user should maintain a single logon name.

RENAMING A DOMAIN

A new feature available with Windows Server 2003 supports changing the DNS and/or NetBIOS names of existing domains in a forest. As organizations change, the ability to rename a domain permits the resulting forest to be "well-formed." A renamed domain retains its underlying domain globally unique identifier (GUID) and its domain security ID (SID). A computer's domain membership does not automatically change as a result of the holding domain's being renamed. It is important to note that although a forest root domain can be renamed, a different domain cannot be designated to become the new forest root.

This feature is primarily used when an organization changes its name or when an organization is merged with another corporation.

Although it is now possible to rename the domain, it comes with a little bit of administrative pain. For example, every member domain controller must be rebooted and every member server must be rebooted twice. This extra procedure is in place so that domains are not renamed casually.

The Physical Structure: Sites and Replication

The underlying objectives of the physical structure are easy Active Directory replication, rapid user logons, and efficient resolution of queries for network objects. When planning the physical structure, and site topology in particular, remember that there is no direct relationship between sites and domains. A site can have multiple domains or portions of multiple domains, and vice versa. It is defined by fast and reliable connectivity, so the most critical issue in site planning is the bandwidth and other network constraints for related traffic. This means that site parameters should be dictated by the creation of subnets that share cheap, fast, and reliable connections.

In some cases, two or more remote locations can still be treated as a single site. However, if they are in different area codes and connectivity is based on more expensive connection technologies, the creation of multiple sites is probably in order. Each site should have at least one domain controller that is configured for each location, with replication services set for times when traffic is minimal and at the lowest rates.

Later in this chapter we will explore specific management of intrasite and multisite network traffic and topology. Before that, however, it is important to understand site requirements and site replication and topology.

NOTE

With Windows Server 2003 there is an ability to turn off compression of the replication traffic between domain controllers residing in different sites. This should reduce CPU utilization on the domain controllers and provide greater availability. This feature should be activated when CPU spiking occurs. By not compressing the replication traffic between domain controllers, you should free up CPU cycles.


PREPARING FOR REPLICATION AND SYNCHRONIZATION

To prepare for the creation of sites, it is important to understand data transfer and how it works in the Active Directory. There are two forms of data transfer. First, replication is used when Windows Server 2003 domain controllers communicate changes to each other. All domain controllers in a domain tree share a number of traits, including the same schema and control models. When a modification is recorded by one domain controller, it is automatically "replicated" to all other domain controllers in the domain tree according to prescribed scheduling rules. The transitive trust relationships that exist among all domains ensure that new information is written to all domain controllers. This is transparent and fairly rapid within one site. For intersite replication, the system administrator should determine the time and frequency of these updates based on an analysis of network traffic and cost.

Second, synchronization is used for communication between the Active Directory and other directory services such as Novell Directory Services (NDS). To share information, the two services must use an agent known as a security principle, which determines what schema information is common to both and selects the data to be shared. Since the structures of directory services vary, the data must then be mapped. This can be streamlined by directory services that employ LDAP, which provides a common method of resolving object names.

Some large enterprises may have more than a hundred different directory services in place, so planning consideration must be given to both Active Directory replication and heterogeneous synchronization. Clearly, Active Directory does not have the ability to synchronize data with all third-party directory services. However, services that employ both DNS and LDAP v3 are good candidates.

Planning the physical structure requires knowing where replication and synchronization might occur. Where possible, confine synchronization to intrasite topologies where internal traffic is the most reliable. Once the synchronization has taken place between Active Directory and other directories' services within a site, the receiving domain controller can replicate the data to other domain controllers throughout the domain tree.

REPLICATION LATENCY

When updates occur on one domain controller, varying amounts of time can pass before they are replicated to others. This is known as replication latency, and within a site it typically resolves within a few minutes (every 5 minutes by default). Depending on how the system administrator has configured replication among sites, latency can take place every few minutes or at intervals up to a week.

A part of intersite planning is determining how long a site can exist with latent data. In branch offices that perform well-defined activities and are not subject to regular change, latency is not much of an issue and replication can be safely set for a daily update. Since there is an acknowledged latency, the remote domain controller is in a state called loose consistency of Active Directory information. By the same token, a division headquarters site might demand replication from critical sites every half hour.

NOTE

One of the concerns of any administrator should include having an assurance the replication is occurring. A new feature available with Windows Server 2003 is the WMI classes that permit an administrator to view whether replications between domain controllers were successful. At the time this book went to publication, the method for applying these WMI classes was sketchy. However, the Microsoft development team suggested the classes will make it possible for administrators or third-party software developers to develop scripts or applications designed to monitor the health of replication.


REPLICATION TOPOLOGY

The Active Directory's Knowledge Consistency Checker (KCC) automatically establishes the most efficient replication topology. To formulate connection rules, the system administrator must input information that is critical to the calculation of the best connectivity routes. The KCC also dynamically establishes alternative connectivity to other sites in the event that a site has only one domain controller and that system fails.

One-directional connection objects are created by the KCC (or manually by the system administrator). Contained in a domain controller's NTDS settings object, each connection object points in one direction to a replication partner. Two paired connection objects create a bidirectional relationship between the partners. Connection objects replicate the three Active Directory partitions of schema, configuration data, and domain data.

The KCC uses the connection objects to establish a two-directional ring between intrasite domain controllers. It attempts to make connections such that there is a maximum of three hops between intersite domain controllers. When a domain controller receives a change, it notifies its partner domain controllers. Additional partners are then notified after a configurable delay, which is 30 seconds by default. By design, intrasite replication of a change should be passed to all domain controllers within 15 minutes.

Typically, intrasite replication requires minimal intervention by the system administrator. However, he or she must review the intersite topology and make manual changes where appropriate. As we shall illustrate later, topology links can be modified with the Active Directory Sites and Services administrative snap-in, but this requires that the connection objects be manually established. (If the KCC automatically creates the same connection object through its normal analysis of input data, no new manual connection objects are created.) Manual connection objects can never be deleted by the KCC. If they fail, however, the KCC automatically attempts to create a new connection to a domain controller.

The Active Directory Sites and Services administrative snap-in can also be employed to force replications or to execute the KCC manually, as explained later.

While the initial site topology is generally accomplished by the KCC, it is important to know the relative costs of connectivity between sites. It is also critical to define the minimum acceptable frequency of replication; this information is required by the KCC. After Windows Server 2003 is in place, several tools will allow you to analyze those segments that require manual intervention. The typical basis for this review is network traffic. The Network Monitor measures RCP and SMTP traffic between domain controllers, the Performance Monitor measures traffic from a specific server, and the Replication Monitor provides a view of intrasite topology.

APPLICATION DIRECTORY PARTITIONS AND REPLICA PLACEMENT

New to Windows Server 2003, Active Directory can dynamically host data without affecting network performance. This is accomplished by providing control over the scope of replication and placement of replicas. An application partition is a new type of naming context (NC) used with Active Directory services. This new NC can be organized into a hierarchy of any type of object except security principals (users, groups, and computers). It also can be configured to replicate to any set of domain controllers in the forest. No administration is necessary since this feature is now integral to the Active Directory.

Another use of application partitions relates to the range and replication of the DNS zones. Such DNS data stores result in a reduced number of objects stored in the Global Catalog. By default, as discussed in subsequent chapters, DNS-specific application partitions contain only domain controllers running the DNS server. The strength of this feature centers on the fact that replicating occurs only on the subset of domain controllers specified in the application partition. This is done while enabling replication of the DNS zone to DNS servers running on different domains within an Active Directory forest.

PLANNING FOR OPERATIONS MASTER LOCATIONS

As described in Chapter 5 and later in this chapter, each domain tree offloads important activities to selected domain controllers that perform up to five specialized activities. These operations master domain controllers perform the same activities as their peers plus one or more specialized functions.

Since all domain controllers rely on the information processed by the operations masters, it is important to carefully plan the location of the operations master domain controllers. As a general rule, they should be placed in a site with the best primary and secondary connectivity to the rest of the organization.

Logical Structure Planning

Planning for the Active Directory is predicated on an understanding of the organization itself. In centralized frameworks, a single domain may serve all requirements and is obviously the easiest to administer. In larger and decentralized environments, multiple domains are often required. In both cases, it may be most efficient to divide the domain into organizational units to manage user accounts and resources. In planning for the Active Directory, early mapping of domains and organizational units is highly recommended. In so doing, it is also important to determine where administrative authority is to be granted and delegated. Best practices in forming domains and organizational units include the following considerations:

SINGLE DOMAIN AND ORGANIZATIONAL UNITS

Even though Windows Server 2003 fully supports multiple domains and organizational units, the KISS (keep it simple, stupid) principle still applies. Complexity increases as the number of domains and OUs grows. Always weigh the tradeoffs between administrative granularity and greater complexity. When creating organizational units, try to mirror the functional setup of the business structure; for example, the sales group might logically be a single OU. Likewise, resources can be grouped into organizational units, say, all printers in one domain. In this way, it is possible to delegate one administrator to manage the printer OU and another to manage the sales group user account OU.

A common planning question is when to create a child domain versus an organizational unit. Unfortunately, there is no clear answer, although it is generally determined by scope and complexity. In the next section we list some of the reasons for forming child domains. Here we will say that when control of smaller user groups or resources can be logically delegated, organizational units are more appropriate. Also, where change is anticipated within the organizational structure, OUs can more easily accommodate such shifts.

DOMAIN TREES AND CHILD DOMAINS

While the single domain is the simplest to create and maintain, there are organizational and administrative situations in which multiple domains, trees, and forests must be created. Security, administrative, and connectivity borders separate domains. When planning a domain tree or forest, it is important to understand how these components interact.

When Should Child Domains Be Created?

By default, a domain tree is created when the first domain controller is promoted with its own Windows Server Active Directory. When domains are added, they become child domains to this first, root, domain. In addition to automatic transitive trusts, all domains in the tree share a schema, configuration, and Global Catalog. Beyond this point, however, domain characteristics within a tree can vary. This is important because it is at this level of setting specific characteristics that decisions must be made about child domains. If you answer yes to one or more of the following questions, a child domain could be in order:

FORESTS

A forest is formed by joining two or more domain trees at the root. Transitive trusts are created by the forest relationship such that network resources become available to any tree in the forest and its associated domains. The resulting hierarchy permits the same Active Directory to resolve inquiries for objects in any of the trees in the forest. Each tree has a DNS namespace, but shares the schema, configuration, and Global Catalog. The forest itself is identified by the DNS name of the first tree created in it.

LDAP inquiries are conducted only within a tree and do not extend to the forest. The Global Catalog is used to resolve queries between trees; by default it is located on the first domain controller created in the forest. Part of the planning effort must be determining whether a dedicated domain controller should be used for Global Catalog activities. In addition, it must be decided if replicated Global Catalog domain controllers will be created to offload heavy intertree query traffic. For these reasons, the placement of the Global Catalog in the network is a key administrative task. Make sure there is fast and reliable connectivity to it.

The creation of a forest involves three primary steps. First, a DNS name must be selected (and registered) for the domain trees. Second, the configuration of each domain tree as described earlier must be laid out. Finally, the new tree must be added to the forest while the first domain controller is promoted through the Active Directory installation process. You will need to select Create New Domain Tree in an Existing Forest from the installation wizard.

When Should a Forest Be Created?

Despite the fact that management of a forest is considerably more complex than that of singular trees, situations still arise where distinct namespaces are required. If you answer affirmatively to one or more of the following questions, a forest may be necessary.

MULTIPLE FORESTS

Relationships between forests are not based on transitive trusts. They are generally established to created limited access for one domain in one forest to one domain in another forest. The trust relationship is one-directional and must be explicitly set. It does not impact any other domains. If it is necessary to create multiforest relationships, plan trust and resource management well in advance. Make sure that access is limited only to those resources required for the life of the relationship.

CROSS-FOREST AUTHENTICATION

Cross-forest authentication provides secure access to resources between forests. Using either Kerberos or Windows NT LAN Manager (NTLM), the feature provides security without sacrificing the single sign-on and administrative benefits. Cross-forest authentication includes:

Planning for Upgrades to the Active Directory

Upgrades to the Active Directory from Windows NT Server environments are handled slightly differently depending on the domain structure in the current enterprise. Remember, as discussed in Chapter 5, the multimaster replication model of the Active Directory supplants the four types of domain models employed by Windows NT. Consider the following issues when planning an Active Directory promotion:

UPGRADING THE PDC AND THE BDC

Sound planning of an upgrade usually requires a conservative approach to full deployment. Therefore, we recommend that the initial Active Directory installation and domain tree formation be separate from the installation of the production environment. One way to accomplish this and preserve Windows NT domain data is to pull an existing BDC off production and promote it to a PDC in a detached lab environment. At this stage, installation of Windows Server 2003 and the Active Directory can go forward on this domain controller while initial testing and fine-tuning are completed. When satisfactory testing is achieved, the domain controller can be returned to production as the root domain controller.

An alternative and less conservative approach is to install the Windows Server 2003 Active Directory in a production environment, first removing an existing Windows NT BDC from the network and production for safety purposes. In the unlikely event that the Windows Server 2003 deployment fails, you can remove it from production and restore the previous Windows NT environment. The offline BDC is put back in service and promoted to the PDC.

Planning for Domain Controllers

Every domain and child domain must have at least one domain controller. The addition of domain controllers generally improves reliability, speed, and flexibility. Since a user's network logon is predicated on access to a domain controller, fast and reliable connectivity is required. Therefore, we recommend that there be more than one domain controller for each domain and each site.

It is often wise to establish at least two domain controllers to serve as operations master domain controllers. The PDC Emulator and Relative Identifier Master roles should be assigned to these mirrored domain controllers for redundancy.

The role of the standard domain controller and Global Catalog are also often filled by different domain controller servers. It is always advisable to separate the GC from the domain controller assigned to the Infrastructure Master role.

Sizing the Active Directory

Sizing the minimal requirements for the Active Directory server hardware involves a series of estimates. The process entails creating a sample population of Active Directory objects and then applying size factors to each. This should include a real-world collection of objects including users, computer accounts, groups, printers, and files. Objects that are security principals should be allocated 3,600 bytes each. Nonsecurity principal objects should be allocated 1,100 bytes. For each attribute of 10 or fewer characters, allocate an additional 100 bytes. Attributes that contain binary information should include the size of the data plus a 25 percent buffer.

We recommend a simple spreadsheet be used to calculate the size requirements of the sample population. The sample population's storage requirements are estimated by adding the numbers for the objects and associated attributes, as illustrated in the following example. Make sure to include in the calculation every attribute associated with an object.

The next step is to estimate the number of objects that must be managed by the Active Directory. This estimate should include all users, groups, printers, contacts, and files on the system and should then be doubled. The storage requirements can then be proportionately extrapolated by using the number of objects you estimate for your enterprise. For example, if the sample population represented 1/10 of 1 percent of the Active Directory objects, multiply that amount by 1,000. If the sample population storage estimate were 360,000 KB, then the requirements for the Active Directory size would be 360,000,000 KB, or 360 MB. It is generally recommended that the disk space be two to three times larger than the estimated size of the Active Directory to accommodate possible miscalculation and growth.

Determining Domain Controller Resources

New to Windows Server 2003 is a versioning mechanism that can be used by Active Directory core components to determine what features are available on each domain controller in a forest. This feature can flag domain controller setup and release inconsistencies. Many enterprises have a requirement for the same level of Windows Server Active Directory. This feature permits a rapid review of all domain controllers to ensure product release management. For example, there are two new features in Active Directory that cannot be activated until all the DCs in a forest are upgraded to Windows Server 2003: (1) Active Directory: Group Membership Replication Improvements and (2) Active Directory Improved Inter-Site Replication Topology Generator.


  Previous section   Next section
Top