1 / 47

Active Directory in Windows Server 2012, 2012 R2, and beyond

Active Directory in Windows Server 2012, 2012 R2, and beyond. MIKE KLINE Microsoft mvp – directory services mkline@gmail.com or mkline@outlook.com www.adisfun.com. TechGate 2013 – September 21, 2013 Reston, VA. @ mekline. Technical Reviewer. Agenda.

gasha
Télécharger la présentation

Active Directory in Windows Server 2012, 2012 R2, and beyond

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Active Directory in Windows Server 2012, 2012 R2, and beyond MIKE KLINE Microsoft mvp – directory services mkline@gmail.com or mkline@outlook.com www.adisfun.com TechGate 2013 – September 21, 2013 Reston, VA

  2. @mekline Technical Reviewer

  3. Agenda • A quick Look Back – where have we come from • Active Directory Features introduced in various versions • Improvements • Active Directory Features in Windows 2012 • Recycle Bin, Password Policies, and Powershell Integration via ADAC • Dynamic Access Control • Virtualization Aware Active Directory • Active Directory Features in Windows 2012 R2 and Beyond • Protected Users • Authentication Silos and Policies • BYOD

  4. A stroll down memory lane (what most enterprises are using today) April 24, 2003 Feb 4, 2008 July22, 2009

  5. Active Directory Features Introduced in Windows 2003 • Universal group membership caching • Drag and Drop Functionality • Global Catalog Partial Sync • Adding domain controllers using backup media • Application Directory partitions

  6. Active Directory Features Introduced in Windows Server 2008 • Read-Only Domain Controllers • Fine-Grained Password Policies (2008 Domain Functional Level) • DFSR replication of Sysvol • http://blogs.technet.com/b/askds/archive/2010/04/22/the-case-for-migrating-sysvol-to-dfsr.aspx • Re-startable Active Directory Services • Auditing Improvements • DSRM Password Sync

  7. Active Directory Features Introduced in Windows 2008 R2 • Active Directory Recycle bin (Windows 2008 R2 Forest Functional Level) • Active Directory Administrative Center • Active Directory Best Practices Analyzer • Bridgehead Server Selection Improvements • Native Active Directory PowerShell cmdlets

  8. Why We Are Here Today Oct 18, 2013 Sep 4, 2012

  9. What about Government Security Guidelines? DSAWG = Defense Information Assurance Security Accreditation Working Group

  10. Active Directory is Many Things These Days • Windows Azure Active Directory (WAAD) • Microsoft hosts it in their datacenters • Microsoft manages the infrastructure • You manage the data • Services: • Directory Services • Federated authentication • WS-Federation • SAML • Oauth 2.0 • More to come... • Access Control Services (ACS) • Windows Active Directory (AD) • You host it, on-premises / Cloud • You manage the infrastructure and the data • Services: • AD Directory Services (AD DS) • Kerberos authentication • NTLM authentication • AD Lightweight Directory Services (AD LDS) • aka ADAM • AD Federation Services (AD FS) • AD Certificate Services (AD CS) • AD Rights Management Services (AD RMS)

  11. Microsoft’s Broad Goals with AD in 2012 • Simplified Deployment of Active Directory • Complete integration of environment preparation, role installation and DC promotion into a single UI • DCs can be deployed rapidly to ease disaster recovery and workload balancing • DCs can be deployed remotely on multiple machines from a single Windows 8 machine • Consistent command-line experience through Windows PowerShell enables automation of deployment tasks • Simplified Management of Active Directory • GUI that simplifies complex tasks such as recovering a deleted object or managing password policies • Active Directory Windows PowerShell viewer shows the commands for actions performed in the GUI • Active Directory Windows PowerShell support for managing replication and topology data • Virtualization Improvements • All Active Directory features work equally well in physical, virtual or mixed environments

  12. Adding Windows 2012 DCs • Adding DCs prior to Windows 2012 contained many challenges: • Confusing • Prone to errors • Time Consuming • Not easy to script and no parity between GUI and command line • System Administrators had to deal with many challenges: • obtain the correct (new) version of the ADprep tools • interactively logon at specific per-domain DCs using a variety of different credentials • run the preparation tool in the correct sequence with the correct switches • wait for replication between each step

  13. Simplified Deployment • Adprep.exe integration into the AD DS installation process • Reduces the time required to install AD DS and reduces the chances for errors that might block domain controller promotion. • AD DS server role installation, which is built on Windows PowerShell and can be run remotely on multiple servers • Reduces the likelihood of administrative errors and the overall time that is required for installation, especially when you are deploying multiple domain controllers across global regions and domains • Prerequisite validation in the AD DS Configuration Wizard • Identifies potential errors before the installation begins. You can correct error conditions before they occur without the concerns that result from a partially complete upgrade.

  14. Simplified Deployment • Requirements • Windows Server 2012 • target forest must be Windows Server 2003 functional level or greater • introducing the first Windows Server 2012 DC requires Enterprise Admin and Schema Admin privileges • subsequent DCs require only Domain Admin privileges within the target domain

  15. Goodbye DCPromoand Adprep is on Life Support

  16. DCPromo Continued

  17. Recycle Bin User Interface • Background • the Recycle Bin feature introduced with Windows Server 2008 R2 provided an architecture permitting complete object recovery • scenarios requiring object recovery via the Recycle Bin are typically high-priority • recovery from accidental deletions, etc. resulting in failed logons / work-stoppages • the absence of a rich, graphical interface complicated its usage and slowed recovery • there were third party tools that added a GUI but no native tool

  18. Recycle Bin User Interface • Requirements • Recycle Bin’s own requirements must first be satisfied, e.g. • Windows Server 2008 R2 forest functional level • Recycle Bin optional-feature must be switched on • Windows Server 2012 Active Directory Administrative Center • Objects requiring recovery must have been deleted within Deleted Object Lifetime (DOL) • defaults to 180 days

  19. Recycle Bin Not Enabled Majority of attributes deleted Garbagecollection X Live object Tombstoneobject Delete Purged fromdirectory Offline authoritative restore Tombstone lifetime (180 days)

  20. Recycle Bin Enabled All attributes retained Live object Deletedobject Delete Deleted object lifetime (180 days) Online undelete Garbagecollection Recycledobject Garbagecollection X Purged fromdirectory Tombstone lifetime (180 days)

  21. Demo Active Directory Recycle Bin in Windows 2012 ADAC

  22. Fine-Grained Password Policy • the Fine-Grained Password Policy capability introduced with Windows Server 2008 provided more granular management of password-policies • in order to leverage the feature, administrators had to manually create password-settings objects (PSOs) • difficult to ensure that the manually defined policy-values behaved as desired • time-consuming, trial and error administration

  23. Fine-Grained Password Policy • Creating, editing and assigning PSOs now managed through the Active Directory Administrative Center • Simplifies management of password-settings objects • Note: FGPP still only applies to user and groups. You can’t link or associate policies to OUs • Requirements • FGPP requirements must be met • Windows Server 2008 domain functional level • Windows Server 2012 Active Directory Administrative Center

  24. Demo Fine-Grained Password Policies in Windows Server 2012

  25. ADAC PowerShell History Viewer • Background • Windows PowerShell is a key technology in creating a consistent experience between the command-line and the graphical user interface • Windows PowerShell increases productivity • but requires investment in learning how to use it

  26. ADAC PowerShell History Viewer • allow administrators to view the Windows PowerShell commands executed when using the Administrative Center, for example: • the administrator adds a user to a group • the UI displays the equivalent Active Directory Windows PowerShell command • Administrator’s can copy the resulting syntax and integrate it into their scripts • reduces learning-curve • increases confidence in scripting • further enhances Windows PowerShell discoverability • Requirements • Windows Server 2012 Active Directory Administrative Center • Windows 2012 domain controller not required

  27. PowerShell Conversion - Examples • DCPromo >> Install-ADDSDomain, Install-ADDSDomainController • DSGET-Computer >> Get-ADComputer • DSGET-Site >> Get-ADReplicationSite • DSADDD User >> New-ADUser • Repadmin /ShowUTDVec >> Get-ADReplicaionUpToDatenessVectorTable • http://blogs.technet.com/b/ashleymcglone/archive/2013/01/02/free-download-cmd-to-powershell-guide-for-ad.aspx

  28. Demo PowerShell History Viewer

  29. Installation Options • Background • In previous versions of Windows Server admins had to choose between the full GUI install and server core (Windows 2008+) • Windows 2012 allows admins to switch between options • Full GUI Server • Minimal Server Interface (aka MinShell) • does not include significant aspects of the Server Graphical Shell. It enables most local GUI management tasks without requiring the Server Graphical Shell or Internet Explorer to be installed. This reduces the security and servicing footprint of the server thereby increasing safety and uptime while expanding deployment scenarios. 

  30. Virtualized Domain Controllers – two new capabilities • Domain controllers can be safely cloned to deploy additional capacity and save configuration time • Accidental restoration of domain controller snapshots does not disrupt your AD DS environment.

  31. Safe Virtualization • Common virtualization operations such as creating snapshots or copying VMs/VHDs can rollback the state of a virtual DC • Can cause issues leading to permanently divergent state causing: • USN Rollbacks • Lingering objects • schema mismatches if the Schema FSMO is rolled back • the potential also exists for security principals to be created with duplicate SIDs

  32. Virtual Domain Controller Safe Restore • Windows Server 2012 virtual DCs track the VM-generation ID to detect changes and protect Active Directory • When the virtual machine boots up, the current value of the VM-Generation ID from the virtual machine is compared against the value in the database. If the two values are different • the DC's unique Invocation ID is reset • domain controller also discards the now-duplicated local Relative Identifier (RID) pool • Since other domain controllers do not recognize the new Invocation ID, they conclude that they have not already seen these USNs and accept the updates • non-authoritatively restores the SYSVOL folder

  33. Hypervisor Support for Snapshots & Cloning Windows Server 2012 Standard Edition (Hyper-V) Windows Server 2012 Enterprise Edition (Hyper-V) Hyper-V Server 2012  (Hyper-V) Windows 8 Professional (Hyper-V) Windows 8 Enterprise (Hyper-V) VMware Workstation 9.0 & 10.0 VMware vSphere 5.0 with Update 4 VMware vSphere 5.1 & 5.5

  34. Dynamic Access Control (DAC) • A new claims-based authorization platform that enhances, not replaces, the existing model, which includes: • new claims-based authorization platform that enhances, not replaces, existing model • user-claims and device-claims • user+device claims = compound identity • use of file-classification information in authorization decisions • New central access policies (CAP) model • Use of file-classification information in authorization decisions • modern authorization expressions, e.g. • evaluation of ANDed authorization conditions • leveraging classification and resource properties in ACLs • easier Access-Denied remediation experience • access- and audit-policies can be defined flexibly and simply

  35. Dynamic Access Control (DAC) • Requirements • One or more Windows Server 2012 domain controllers • Windows Server 2012 file server • Enable the claims-policy in the Default Domain Controllers Policy • Windows Server 2012 Active Directory Administrative Center • For device-claims, compound ID must be switched on at the target service account by using Group Policy or editing the object directly

  36. http://blogs.technet.com/b/askds/archive/2012/09/07/let-the-bogging-begin.aspxhttp://blogs.technet.com/b/askds/archive/2012/09/07/let-the-bogging-begin.aspx “…This isn't your grandfather's authorization either. Dynamic Access Control or DAC as we’ll call it, requires planning, diligence, and an understanding of many dependencies, such as Active Directory, Kerberos, and effective access…there are many knobs you must turn to configure it….”

  37. Demo Dynamic Access Control

  38. Protected Users • Added protection for Administrators and other privileged accounts • Add user to Protected User Group which will enable: • Only Kerberos Authentication • 4 Hour TGT Lifetime • Delegation not Allowed • Requires • Windows 8.1 (or Server 2012 R2 hosts) • Windows Server 2012 R2 Domain & DCs • Renew user tickets (TGTs) beyond initial 4 hour lifetime

  39. Protected Users • Requirements • User Accounts in the Protected Users groups are restricted to only using Kerberos (Required for Authentication Policies & Silos to be effective) • Limits • Protected Users cannot sign on if Kerberos is broken • Accounts in the group can’t: • Authenticate with NTLM • Use DES or RC4 in Kerberos pre-authentication • Renew user tickets (TGTs) beyond initial 4 hour lifetime

  40. Authentication Policies & Silos • Authentication Policies • Forest Based Active Directory Policies • Applies to accounts in Windows Server 2012 R2 Domains • Controls which hosts an account can sign-in to • Configuration of access control conditions for authentication • Authentication Policy Silos • Allows isolation of related accounts that have constrained scope

  41. Scenarios enabled by Active Directory BYOD • Single Sign On (SSO) experience on Workplace Joined devices • Join Windows and iOS devices to the Workplace • SSO across browser and enterprise applications Enable users to work from anywhere, adhering to IT risk management strategy • IT can conditionally grant access to company applications • Workplace joined devices provide a seamless second factor authentication • Conditions include user, device and strength of authentication • Audit logs capture the user and device information IT/ISV can author enterprise apps that deliver native experiences on devices and are integrated with AD for SSO and conditional access

  42. Workplace Join Associates the device with a user • Provides a seamless second factor authentication Enables a better end user experience with SSO • Avoids risks involved in saving passwords with each application • Avoids users having to repeatedly enter their credentials Enabled by device registration service in AD FS

  43. Sample Demo Environment Allow access from specific users, when accessing from devices they have workplace joined Firewall Web application proxy AD FS Device registration service WhoAmI (Claims based) Web app (Windows auth) Active Directory

  44. Future Talks • Go in-depth into Windows 2012 features such as Dynamic Access Control. • Windows Azure Active Directory – WAAD/AAD • Deploying Active Directory on Windows Azure Virtual Machines • Other??

  45. Please don’t forget your evaluations … www.adisfun.com Email: mkline@gmail.com Questions?

More Related