Active Directory Delegation
Active Directory Delegation
Active Directory Delegation
Microsoft Corporation
Created: November 24, 2003
ii
Acknowledgements
Program Manager: Sanjay Tandon
Writers: Mary Hillman
We thank the following people for their contributions in the creation of the
Active Directory Delegation Appendices and the Dsrevoke tool:
Umit Akkus, Nona Allison, Colin Brace, Raman Chikkamagalur, Arren Conner,
Raju Dantuluri, Dmitry Dukat, Levon Esibov, Dmitri Gavrilov, Don Hacherl,
Saif Hasan, Xin He, David Hou, Gokay Hurmali, Khushru Irani, Kamal
Janardhan, Gregory Johnson, Ian Jose, Richa Kumar, Klaas Langhout, William
Lees, Xiaozhong Luo, Jaeger Mitchell, Nathan Muggli, Arun Nanda, Rich
Randall, Ullattil Shaji, Brett Shirley, Scott Turnbull, Andrea Weiss, Jeff
Westhead, and BJ Whalen.
We thank the following people for reviewing the guide and providing valuable
feedback:
Laurie Brown, John Craddock, Robert DeLuca, Christoph Felix, Eric
Fleischman, Guido Grillenmeier, Mike Hickey, David Kayano, Alain Lissoir,
Andreas Luther, Astrid McClean, Paul Rich, Joe Richards, and David Trulli.
Introduction iii
Contents
Introduction................................................................................. ...........1
Abstract................................................................ ............................1
Scope................................................................................. ...............1
Intended Audience.......................................................... ..................2
Chapter 1: Delegation of Administration Overview.................................4
Business Case for Delegating Administration....................................4
Benefits of Delegation................................................................ .......6
Delegation at Work............................................. ..............................6
Active Directory Management................................................ ...........8
Creating a Successful Active Directory Delegation Model...............12
Chapter 2: How Delegation Works in Active Directory..........................19
Overview............................................................................... ..........19
Active Directory Administrative Tasks.............................................22
Active Directory Logical Structure and Data Storage......................23
Delegation and Access Control................................................... .....26
Chapter 3: Delegating Service Management........................................50
Level-of-Privilege Considerations in Delegating Service Management51
Recommended Approach to Service Management..........................52
Service Management Overview................................................. ......53
Creating a Service Management Delegation Model.........................77
Implementing the Service Management Delegation Model.............80
Maintaining the Service Management Delegation Model.................84
Chapter 4: Delegating Data Management............................................87
Recommended Approach to Data Management..............................87
Understanding Data Management..................................................88
Determining Data Management Stakeholder Needs........................95
Creating the Data Management Delegation Model..........................96
Implementing Your Data Management Delegation Model..............113
Maintaining Your Data Management Delegation Model.................130
Case Study: A Delegation Scenario.................................................. ...136
Company Overview......................................................... ..............136
Active Directory Infrastructure.................................... ..................137
Managing Contoso’s Active Directory Environment.......................142
Introduction
The Active Directory® directory service is an integral component of network
infrastructures that are based on the Microsoft® Windows Server™ Server 2003,
Standard Edition; Windows Server™ 2003, Enterprise Edition; Windows
Server™ 2003, Datacenter Edition, and Windows® 2000 Server,
Windows® 2000 Advanced Server, and Windows® 2000 Datacenter Server
operating systems. Successful management of Active Directory environments
requires distribution of administrative responsibilities among multiple
administrators according to organizational, operational, legal, and administrative
requirements. Having the necessary background information, requirements,
practices, and recommendations can help you delegate administration to more
securely and efficiently manage Active Directory services and data.
Abstract
Active Directory provides an enterprise-ready, scalable, distributed directory
service that allows organizations to centrally manage and share information
about network resources and users, and is at the heart of distributed network
security in a Windows Server–based enterprise. Active Directory thus plays a
major role in accomplishing the business goals of your organization, and your
ability to successfully manage Active Directory has a direct bearing on your
ability to accomplish these goals.
Delegation of administration, a key capability of Active Directory, provides a
means to successfully manage an Active Directory environment. This document
discusses in depth the issues involved in delegating administrative
responsibilities, and can help you plan for, implement, and maintain an
administrative delegation model that allows secure and efficient management of
Active Directory.
Scope
This document provides all the information required to create, implement, and
maintain a security-conscious and efficient delegation model to manage your
Active Directory environments. This information includes an overview of
delegation, in-depth explanations of the rationale for delegation, technical
descriptions of how delegation works in Active Directory, processes for creating
delegation models for both service and data management, the steps needed to
implement and maintain the models, and a detailed case study. Appendices to this
document provide an exhaustive reference, including a comprehensive list of
Active Directory administrative tasks and associated permissions required to
delegate every administrative task in Active Directory.
This document does not include Active Directory deployment instructions or
recommendations. For information about planning and deploying an Active
Directory environment, see Designing and Deploying Directory and Security
Services of the Microsoft® Windows® Server 2003 Deployment Kit on the Web
at http://go.microsoft.com/fwlink/?LinkID=4719.
2
Intended Audience
This document is intended for Information Technology (IT) professionals who
are responsible for managing an Active Directory environment. In most IT
infrastructures that consist of multiple integrated components and services, the
responsibility to deliver a specific component or service is typically entrusted to
a component or service owner, who is responsible for the overall delivery of the
component or service.
Ownership of Active Directory environments should be entrusted to two specific
owners or owner groups, whose roles are typically strategic and managerial –
service owners and data owners. Service owners and data owners have general,
overriding responsibility for Active Directory. These usually high-ranking
managers are respectively responsible for ensuring reliability and security in the
delivery of the directory service and for managing the security of Active
Directory content. To that end, they are responsible for delegating and
distributing among their administrators responsibility for managing services and
content. They do so by creating an administrative delegation model, which
documents the distribution of administrative responsibilities among various
administrative personnel.
Administrative responsibilities for delegating Active Directory management are
divided between:
• Service owners, who are responsible for:
• Planning, deployment, and long-term maintenance of the Active
Directory infrastructure.
• Ensuring that the directory continues to function reliably and at the
desired level of security.
• Ensuring that the goals established in service-level agreements are
maintained.
• Data owners, who are responsible for maintaining the information that is
stored in or protected by the Active Directory directory service, including:
• Management of user and computer accounts.
• Management of local resources, such as member servers and workstations
and the data they store.
• Service administrators, who represent the operational arm of service owners
and are responsible for carrying out the tasks that are required to maintain the
delivery of the directory service,
• Data administrators, who represent the operational arm of data owners and
are responsible for carrying out the tasks that are required to manage the
content that is stored in or protected by Active Directory.
This document is intended for service and data owners to help them create a
security conscious and efficient administrative delegation model that is tailored
to the specific requirements of their organization. It is also intended for the
3
service and data administrators who are responsible for implementing the
delegation model.
To accommodate the needs of these different stakeholders, the information in this
document is divided into four chapters and a case study, as follows:
Chapter 1: Understanding Delegation of Administration
This chapter provides an overview of Active Directory
management categories and stakeholders and a roadmap
for successfully managing delegation of administration
in Active Directory. It is targeted at all stakeholders
involved in Active Directory management.
Chapter 2: How Delegation Works in Active Directory
This chapter takes an in-depth look at how delegation of
administration actually works in Active Directory and
presents all the technical aspects involved in delegation
of Administration. It contains a wealth of information
that will be useful for all stakeholders involved in
Active Directory management.
Chapter 3: Delegating Service Management
This chapter presents an end-to-end perspective of
Active Directory service management, and provides
guidance on how to create, implement, and maintain a
secure and efficient administrative delegation model for
service management. It is targeted at Service Owners
and Service Administrators.
Chapter 4: Delegating Data Management
This chapter presents an end-to-end perspective of
Active Directory data management, and provides
guidance on how to create, implement, and maintain a
secure and efficient administrative delegation model for
data management. Though it is targeted at Data Owners
and Data Administrators, Service Owners and Service
Administrators will also benefit from the information in
this chapter.
Case Study: A Delegation Scenario
The case study walks through the creation,
implementation, and maintenance of an administrative
delegation model for a fictitious Active Directory
environment based on the recommendations presented
in Chapters 3 and 4. While it is primarily targeted at
Service and Data administrators, service and data
owners will also benefit from the case-study.
4
The first three requirements express themselves as needs for autonomy and
isolation. Autonomy is the ability of the administrators of an organization to
independently manage:
• All or part of service management (service autonomy).
• All of part of the data stored in or protected by Active Directory (data
autonomy).
Isolation is the ability of an administrator or an organization to prevent other
administrators from:
• Controlling or interfering with service management (service isolation).
• Controlling or viewing a subset of data in Active Directory or on member
computers that are joined to Active Directory the directory (data isolation).
Strict service or data isolation often requires creating a separate forest or domain.
Addressing network architecture design considerations for accommodating
autonomy and isolation requirements is beyond the scope of this document.
Instead, this document addresses the need and process for delegating
administrative authority based on an organization’s requirements for
administration of its IT resources.
For more information about accommodating autonomy and isolation
requirements, see “Designing the Active Directory Logical Structure” in
Designing and Deploying Directory and Security Services of the Windows
Server 2003 Deployment Kit (or see “Designing the Active Directory Logical
Structure” on the Web at http://go.microsoft.com/fwlink/?LinkId=4723).
For the purpose of understanding an organization’s needs for delegating
administrative authority, organizations can be classified in the following
categories, based on their size:
• Small organizations, which typically have 25 to 50 workstations and three to
five servers
• Medium organizations, which typically have 50 to 500 workstations and four
to five servers
• Large organizations, which typically have at least 500 workstations and 50
servers
Small and medium organizations typically have one or a few administrative
groups that are responsible for managing all aspects of Active Directory. Small
and medium organizations might not need to create an extensive delegation
model. Large organizations usually have a clear need to distribute and delegate
administrative authority to various administrative groups, possibly delegating
certain aspects of Active Directory management to centralized teams and
delegating other aspects to decentralized teams. While large organizations will
find the delegation capabilities of Active Directory most useful, small and
medium organizations can also achieve enhanced security, increased control,
more accountability, and reduced costs by implementing delegation.
6
Benefits of Delegation
By enabling efficient, security-conscious delegation and distribution of
administrative responsibilities among various administrative groups that
addresses the specific requirements imposed by participating business units,
delegation of administration provides the means to successfully manage an
Active Directory environment. Delegation of administration provides the
following benefits:
• Allows distribution of administrative responsibility among multiple
administrative groups, each with a defined scope of authority and a defined
set of responsibilities.
• Enables decentralization of administrative authority.
• Allows the security-conscious distribution of administrative responsibility.
In addition, delegation of administration allows organizations to efficiently
manage their IT infrastructures and enforce their security precautions by
enabling organizations to:
• Distribute administrative responsibilities on the basis of least privilege,
which ensures that the individual or group of individuals to whom the task
has been delegated can perform only the tasks that are delegated, and cannot
perform tasks that have not been explicitly delegated or authorized.
• Increase administrative efficiency by easily and conveniently assigning the
responsibilities for managing Active Directory content and the directory
service itself.
• Reduce administrative costs by facilitating shared administrative
responsibility. For example, administrative responsibility for providing
account support to all accounts in the organization can be easily achieved
within a matter of minutes.
Delegation at Work
A brief example at delegation at work will help you better understand the value
and the benefits of delegation that organizations can use to enhance security,
decrease TCO and make Active Directory and IT resource management more
tractable and efficient.
Contoso Pharmaceuticals, a fictitious company, has recently deployed Active
Directory. Contoso Pharmaceuticals is a large organization that has its
headquarters in Chicago, Illinois and has operations in five other locations in
North America and Europe. The Active Directory infrastructure consists of a
single forest, three domains, and six sites. The company has about 16,000 users,
20,000 end-user workstations and about 3000 servers spread across five physical
locations. Contoso has four business units that have a presence in each of the five
physical locations. These business units include:
• Research and Development
• Production
7
• Business Management
• IT
With Active Directory delegation, Contoso was able to delegate responsibility in
the following areas:
• Workstation management. Contoso seamlessly and easily delegated all
aspects of workstation management to local administrative groups, one for
each physical location.
• Account management. Contoso delegated all aspects of account management
to the Account Admins of each business unit regardless of the physical
location of the managed users, while centrally retaining help desk operations.
• Security-sensitive operations. Contoso was able to grant Corporate Security
personnel sufficient authority to carry out security-sensitive operations on
every user account in the company, such as allowing Corporate Security
personnel to disable or lock out any user account in the entire company at the
click of a button.
• Resource management. Contoso delegated all aspects of resource
management to the appropriate resource owners, enabling the resource
owners to manage and retain control over their resources. This included the
following:
• A human resources portal on the intranet hosted on a small cluster of
three high-performance servers running Internet Information Services
(IIS). Contoso was able to delegate full control over the servers to the
administrators of this application and grant them the ability to authorize
access to their portal.
• Multiple in-house applications hosted on a set of high-performance
servers, with the administration of the servers entrusted to one set of
administrators in the data center and the administration of each
application entrusted to a separate set of administrators. Using delegation,
Contoso could easily delegate to the administrative group responsible for
managing the servers the ability to manage the servers while delegating to
the administrative group responsible for managing each application the
ability to manage their applications.
• Self-service user accounts. Contoso enabled self-service on user accounts,
and was able to finely control specific information that users could change
themselves. With delegation, Contoso could allow their users to modify their
phone numbers and personal information while retaining control over the
ability to modify sensitive data like the password-not-required flags on user
objects. Contoso was also able to grant other stakeholders like Human
Resources managers the ability to modify a user’s manager and office
location information.
8
Service Management
Service management includes managing all aspects of the directory service that
are essential to ensuring the uninterrupted delivery of the directory service across
the enterprise. Service management includes, but is not limited to, the following
administrative tasks:
• Adding and removing domain controllers
• Managing and monitoring replication
9
Data Management
Data management includes managing the content that is stored in Active
Directory, as well as content that is protected by Active Directory. Data
management tasks include, but are not limited to, managing the following Active
Directory content:
• User accounts, which represent the identities of people who use the network
• Computer accounts, which represent the computers that are joined to
domains in the Active Directory forest
• Security groups, which are used to aggregate accounts for the purpose of
authorizing access to resources
• Application-specific attributes for Active Directory-enabled and -integrated
applications, such as Microsoft Exchange and Microsoft Real-Time
Communication service
In addition, Active Directory data management can also facilitate the distribution
and delegation of these management tasks:
• Workstation management, which includes managing all aspects of end-user
workstations
• Server management, which includes managing all aspects of all servers
joined to any domain in an Active Directory forest
• Resource management, which includes managing all aspects of services and
applications hosted on member servers joined to any domain in an Active
Directory forest, possibly including the server management aspects of the
servers on which the application or resource is being hosted
Management Stakeholders
Active Directory plays a central role in a Windows-based IT infrastructure and is
an inherent part of distributed security and identity management, touching almost
every critical aspect of an organization’s infrastructure. Thus, management of an
Active Directory environment involves multiple stakeholders, each having
specific responsibilities for managing the data, service, or security aspects of
Active Directory, and each requiring the ability to perform their assigned
administrative responsibilities.
For example, administrative groups who are responsible for managing user
identities require the ability to perform account management. Network operators
who are responsible for delivering network services that are required for Active
10
Directory to function, such as DNS, require the ability to manage DNS servers
and data. Corporate security personnel might require the ability to audit logon
events, and Help Desk operators might require administrative rights to perform
support operations like resetting passwords for users. Administrators of Active
Directory–enabled and –integrated applications require the ability to manage
application-specific data stored in the directory.
From a managerial and operational perspective, Active Directory management
stakeholders primarily include service and data owners and administrators.
However, because Active Directory plays a central role in a Windows Server–
based IT infrastructure, it is not uncommon to have other stakeholders, including
owners and administrators of other parts of the IT infrastructure who own,
manage, or are responsible for aspects of the IT infrastructure related to or
dependent on the organization’s Active Directory environment.
Service and Data Owners
In most IT infrastructures that consist of multiple, integrated components and
services, responsibility for delivering a specific component or service is typically
entrusted to an owner. This owner is responsible for the overall delivery of the
component or service, but does not actually perform the work. Rather, the role of
the owner is managerial and strategic, and the responsibility for the day-to-day
administrative tasks that are involved in managing Active Directory is assigned
by the owner to one or more administrators.
Ownership of all Active Directory environments should be entrusted to two
owner groups:
• Service owners. Responsible for planning and long-term maintenance of the
Active Directory infrastructure, ensuring that the directory service continues
to function, and ensuring that goals established in service-level agreements
are maintained. While the administrative responsibilities of managing the
directory service can be shared among administrative groups from different
business units, service ownership is typically not shared, but is held by a
centralized service owner.
• Data owners. Responsible for maintenance of the data that is stored in Active
Directory, as well as content that is protected by Active Directory. This data
includes user and computer accounts and local resources, such as member
servers and workstations. Because an Active Directory environment might
span multiple business units, these business units often require the ability to
manage their data autonomously. It is not atypical for data ownership to be
shared among multiple business units across the enterprise.
Service and data owners create an administrative model to distribute and
delegate administrative responsibilities among administrators, who are
responsible for performing Active Directory operations. Service owners employ
service administrators to manage the directory service, and data owners employ
data administrators to manage the content stored in or protected by the directory
service.
11
Administrative Tasks
Management of a dynamic Active Directory environment involves a wide variety
of tasks that differ in nature, scope, impact, and sensitivity. For a comprehensive
list of administrative tasks involved in Active Directory service and data
management, see “Appendix A: Active Directory Administration Tasks” in “Best
Practices for Delegating Active Directory Administration: Appendices,” which
accompanies this document. This list is organized into service and data
management categories. These categories are further subdivided on the basis of
logical similarities between tasks. For an overview of these categories, see
“Chapter 3: Delegating Service Management” and “Chapter 4: Delegating Data
Management” later in this document. Each task in every category maps to an
administrative role. In this way, all administrative tasks are covered by the set of
Microsoft-recommended administrative roles. The sum of all categories and their
related tasks provides full service and data administrative coverage for an Active
Directory environment. Thus, the entire realm of Active Directory service and
data management tasks can be assigned according to pre-defined management
roles. You can also customize the existing roles and define new ones tailored to
your organization.
A roles-based approach to Active Directory administration offers multiple
benefits. It makes management more tractable and provides the ability to
implement uniform administrative coverage that addresses similar administrative
needs across the organization. It also provides the ability to easily and reliably
delegate responsibility to, and subsequently revoke delegated responsibility
from, a set of administrators. This approach eliminates the need to specify
multiple sets of permissions across a large set of objects.
The following sections provide guidance on how a roles-based approach can be
used to create, implement, and maintain a security-conscious and efficient Active
Directory delegation model for managing an Active Directory environment.
Understanding Active Directory Management
A good understanding of both service management and data management is
essential to creating an administrative delegation model that efficiently
distributes administrative responsibility in accordance with your organization’s
security policies.
Service owners and service administrators are highly encouraged to gain a
thorough understanding of all aspects of service management and should gain at
least a good understanding of data management.
Data owners are highly encouraged to gain a complete and thorough
understanding of all aspects of data management. Data administrators are
encouraged to gain a good understanding of all aspects of data management
relevant to their administrative role and required to carry out their assigned
administrative responsibilities.
For an end-to-end perspective of all aspects of data and service management, see
“Chapter 3: Delegating Service Management” and “Chapter 4: Delegating Data
Management” later in this document.
15
Note
You can use a script or the command-line
tool Dsrevoke.exe to remove all permissions
for a group or user in the DACLs of all OU
objects in a specified scope. For more
information about using Dsrevoke.exe, see
“Appendix G: Active Directory Delegation
Tools” in “Best Practices for Delegating
Active Directory Administration:
Appendices,” which accompanies this
document.
For more information about maintaining service and data delegation models, see
“Chapter 3: Delegating Service Management” and “Chapter 4: Delegating Data
Management” later in this document.
19
Overview
Through delegation of administration, responsibility for administrative tasks is
transferred to the administrators who must perform the respective tasks, and to
no one else. From a technical perspective, delegation of administration involves
a higher-level administrator granting a controlled set of permissions to a
relatively lower-level administrator to give the lower-level administrator the
ability to perform a specific administrative task. In other words, a higher-level
administrator authorizes the delegated lower-level administrator to carry out a
specific administrative task.
Every administrative task involves effecting a change to the state of some data,
and changing the state of data involves performing a low-level operation on the
object that stores that data. As mentioned earlier in this document, there are two
major categories of administrative tasks in Active Directory – data management
asks and service management tasks:
• Data management tasks typically include such tasks as creating and
managing user and computer accounts, security groups, and application-
specific data, all of which are stored in Active Directory. In certain cases, a
small subset of tasks might involve the modification of Group Policy settings
to affect the configuration state of member computers. Creation of user
accounts and modification of group memberships are both examples of data
management tasks.
• Service management tasks include tasks that are related to the creation and
maintenance of Active Directory configuration data. For example, adding a
domain controller to a child domain, associating a new subnet to a site, and
extending the Active Directory schema are all Active Directory service
management administrative tasks that effect changes to configuration data. A
majority of Active Directory configuration data is stored in Active Directory
itself. However, certain aspects of Active Directory behavior can or must be
configured on a domain controller. The configuration data that is associated
with these tasks might be stored in the registry or file system of domain
controllers.
Thus, data and service management administration tasks primarily involve
effecting the change of data that is stored either in Active Directory, or in some
20
cases on the file system or registry of Domain Controllers and other computers
joined to Active Directory.
Every administrative task effects a change to the state of some data, and
changing the state of data involves performing a low-level operation on some
data represented by an object in the directory (or in some cases by an object on
the file system or registry of a computer or Domain Controller). For example, the
administrative task of resetting a user’s password involves a low-level write
operation on an attribute of the user object. Similarly, creating a new site
involves creating a corresponding site object. Similarly, modifying the level of
detail logged for security events involves modifying a registry key (data) on
Domain Controllers. These low-level operations that constitute an administrative
task typically involve creation, deletion, access to, modification of, or
verification of data.
All data stored in Active Directory is represented by directory objects, each of
which can be individually secured. Similarly, all data stored on the file system on
computers and in their registries is also represented by individually securable
objects. Individually securable refers to the fact that all low-level operations on
data (represented by objects) can be individually authorized. In other words, an
administrator can specify who can do what on every specific unit of data.
Since every Active Directory administrative task involves affecting the state of
some data by means of a low-level operation, and since all data can be
individually secured to allow or deny someone the ability to perform a low-level
operation on that data, it follows that the ability to carry out every administrative
task can be controlled by controlling the appropriate permissions that authorize
the execution of the corresponding low-level operation on the target data that is
involved in the administrative task.
Thus, by being able to individually authorize every low-level operation on data,
administrators can in effect authorize all administrative tasks that involve low-
level operations. Since all administrative tasks involve at least one low-level
operation, it follows that all administrative tasks can be individually authorized.
Since delegation involves a higher-level administrator authorizing the delegated
lower-level administrator to carry out a specific administrative task, every
administrative task in Active Directory can be delegated by controlling the
permissions required to perform the low-level operation involved in the
administrative task.
In summary:
• Delegation involves granting a controlled set of permissions to someone so
that can carry out an administrative task.
• Every administrative task involves performing some low-level operation on
data.
• Low-level operations on data can be (individually) authorized.
• By being able to authorize the corresponding low-level task, you can delegate
a task.
21
The following example illustrates the crux of how delegation works in Active
Directory. Let us consider a day in the life of David Hamilton, a marketing
associate with Contoso Pharmaceuticals.
David Hamilton recently joined the company. When he joined the company, a
user account was created for him under the Business Division OU by the
Account Admins for the Business Division of the company. The creation of the
user account involved a create operation for an object of class User under the
parent object, which in this case happened to be the OU object for the Business
Division. Since the Account Admins had Create Child permissions on this OU,
they were able to create the account.
Once the account was created, David could log on to the Active Directory
domain and go about performing his assigned responsibilities. One day, David
forgot his password and thus could not log on. He then called the Help Desk for
help. Jeff Price, a member of the Help Desk operators group, received the call
and reset David’s password after verifying David’s identity. The reset password
operation involved modifying password related attributes on David’s user
account object and required that the Reset Password extended right on David’s
user account object be granted to the individual who should be able to reset
David’s password. During the implementation of the delegation model, the Help
Desk operators group, of which Jeff was a member, was granted this extended
right on all users in the domain. Thus, Jeff was authorized to reset David’s
password.
Within six months of employment, David was promoted to the position of senior
marketing associate and now reported to a new manager. Michelle Alexander, a
Contoso employee in the Human Resources department, needed to appropriately
update David’s manager information as stored on David’s user account in Active
Directory. Modifying a user’s manager information requires a low-level
operation involving the modification of the Manager attribute on user account
objects, and requires write-property permissions to the Manager attribute to
succeed. Account Admins had granted a group called Human Resources
Personnel, of which Michelle was a member, write-property permissions to
modify the manager attribute on all user objects. Michelle was thus able to
update David’s account by appropriately changing David’s manager information.
After one year with the company, David was offered a promotion and a new job
in the Research and Development (RandD) Division of the company. His user
account now needs to be moved to the OU for the RandD Division. Moving an
object involves multiple low-level operations, including the deletion of the object
from under its current parent object, the creation of a new object under the new
parent object, and the modification of the Common-Name and relative
distinguished name attributes on the object. (Note that technically the object is
not deleted – it only seems that it is deleted and re-created.) Michael Allen, a
member of the overall account management team for Contoso (which has
membership in the Contoso Account Admins group) was asked to move the
object between the two OUs. The Contoso Account Admins group is granted
sufficient permissions on both the source and target OUs to enable its members
to carry out object moves. Michael thus has the required Delete Child
22
permissions to carry out the low-level delete operation on the Business OU and
Create Child permissions to carry out the low-level create operation on the
RandD OU, and additionally has write-all-properties permissions on the user
object and was thus able to carry out the move operation for David’s user
account.
Directory Partitions
In Active Directory, data storage is partitioned into logical segments called
directory partitions, and each directory partition replicates its changes separately
among those domain controllers in the forest that store copies (replicas) of the
same directory partitions.
One specific directory partition stores forest-wide configuration information
essential to the proper functioning of the forest. Another specific directory
partition stores the Active Directory schema. Other directory partitions store
information, such as users, groups, and OUs, that is specific to individual
domains. Directory partitions that store domain information are replicated to
domain controllers in that domain only. Directory partitions that store
24
Note
There is a distinction between a directory partition and a
database partition. The Active Directory database is not
partitioned. Only the directory tree, which is the logical
representation of the data that is stored on a domain
controller, is partitioned.
Active Directory and describes all relevant aspects of access control that are
required to delegate administrative authority.
Access control involves three components:
• The security credentials of the user attempting to access a resource
• Authorization data that protects the resource that is being accessed
• An access check that evaluates whether or not the requested access can be
granted
When a user (or a process that is running on behalf of the user) attempts to
perform a low-level operation on a securable object, the operation being
attempted is subject to an access check. The access check takes into account the
user security credentials and the authorization data on the object on which the
low-level operation is being requested to determine the abilities of the user in
relation to the respective object. If the access check determines that the security
credentials of the user requesting the operation and the authorization data on the
target object provides sufficient permissions to execute the operation, the
operation succeeds. If the user has insufficient permissions to execute the
operation that is being requested, the request fails.
The act of delegating Active Directory administrative responsibilities involves
identifying the low-level operation that corresponds to the administrative task
and the specific data on which it is being performed, and then appropriately
modifying authorization settings that protect the data.
Inheritance of permissions
Allows administrators to easily assign and manage permissions for a large
collection of objects. This feature allows administrators to specify permissions
that can be applied automatically to all objects contained within a container by
having the specified permissions be inherited by all child objects in the container.
Administrative privileges
Allow an administrator of a computer system to control which users have the
right to perform various administrative functions, or to take any action that
affects system-wide resources. There are two types of administrative privileges –
user rights and privileges. User rights control the various ways in which users
can log on to a system. Privileges control a user’s ability to perform a specific
task, usually one that affects the entire computer system rather than a particular
object.
Auditing
Enables the tracking of user or system activity by recording specific (specifiable)
types of actions in security logs. Audit data can be used to detect attempts to
circumvent protections on resources and to create a record of administrative
actions on the computer system.
Low-level operations
As mentioned earlier, every administrative task involves some low-level
operation on data. An understanding of the various kinds of low-level operations
helps to understand the details of how an administrative task works.
The following are the low-level operations can be performed on data:
• Create an object. This low-level operation involves the creation of a new
object in Active Directory. For example, the administrative task of creating a
new user account involves a low-level operation of creating an object of class
User under some parent object in Active Directory
• View an object or all child objects of a specific object. This low-level
operation involves being able to view or see an object in Active Directory.
For example, when using one or more Active Directory administration tools,
viewing the contents of an OU or a domain involves performing multiple
low-level operations (one for each object displayed) to view objects in Active
Directory.
• Read object attributes. This low-level operation involves accessing and
reading the values of one or more attributes on an Active Directory object.
For example, any administrative task involving reading some information on
a user (for example, phone number or name) involves a low-level read
operation on one or more attributes (also referred to as a property) of the user
object representing the user’s account.
29
Note
An administrative task involving changing
permissions also involves the low-level
operation of modifying the access-control
list stored as part of the security descriptor,
as described in “Modify the access control
list protecting the object” later in this
document.
• Modify the access control list protecting the object. The security descriptor
contains, among other information, a list of access control entries specifying
who can perform what low-level operation on an object. Any administrative
task involving viewing or changing permissions involves the low-level
operation of reading and modifying the access control list stored in the
security descriptor of an object. For example, the administrative task of
delegating another administrative task or authorizing a user access to some
object involves the low-level operation of reading the security descriptor and
modifying the access-control list stored in the security-descriptor of the
corresponding object.
• Modify the owner of an object. Every securable object has an owner. The
owner of an object has the inherent ability to modify the access control list of
the object and to transfer the ownership. The identity of an object’s owner is
also stored in the security descriptor of the object. The administrative tasks of
taking ownership of an object or transferring ownership of an object involve
the low-level operation of modifying the owner of the object.
30
Note
Active Directory applies default security settings that are
designed to provide an out-of-the-box security configuration.
These security settings grant specific pre-configured
permissions to specific security groups that are created by
default.
The following standard permissions control the ability to perform the indicated
low-level operations:
• Create Child. The right to create children of the object.
• Delete Child. The right to delete children of the object.
31
Note
This right is ignored if the third character of
the dSHeuristics attribute of the object has
a value of 0 or is not set. For more
information about this right, see
“Controlling Object Visibility” on the Web at
http://go.microsoft.com/fwlink/?LinkID=1982
8.
• Access System Security. The right to get or set the SACL in the object
security descriptor
For a detailed description of the standard Active Directory permissions, see
“Appendix C: Active Directory Standard Permissions” in “Best Practices for
Delegating Active Directory Administration: Appendices,” which accompanies
this document.
Special Permissions
In addition to the standard set of permissions that are applied in the DACLs of
Active Directory objects, other permissions are available to accommodate special
requirements that are not supported by the standard permissions. These
permissions fall into two categories:
• Validated writes
• Extended rights
Validated Writes
Certain administrative operations in Active Directory require that, before writing
a value to a property on an Active Directory object, the system perform value
checking, or validation, beyond that which is required by the schema. Validated
writes are a special type of permission that facilitates the ability to perform
32
wide effect on a computer. In the case of user rights on domain controllers, the
effect is on Active Directory, and thus on the entire domain.
User rights are set in the local policy on a computer. User rights are set in
Domain Controller Security Policy for rights on domain controllers, and in
Domain Security Policy for rights on all other computers in the domain. User
rights for computers that are joined to the domain can also be specified by using
Group Policy linked to OUs. User rights for all domain controllers in a domain
are specified in the Default Domain Controllers Policy Group Policy object
(GPO), which is applied to the Domain Controllers OU. Thus, all domain
controllers in a domain share the same set of user rights assignments.
Note
Although the system permits the specification of different user
rights values for different domain controllers in a domain, this
configuration is not supported. By design, all domain
controllers in the same domain are expected to have identical
user rights values.
Note
The exception to this rule is that the membership of a domain
local group that was created in Domain A does not appear in
the access token that is generated on a computer that is
joined to Domain B.
Access Token
A security principal’s security context is represented by an access token. When a
security principal logs on to a computer, the security subsystem on that computer
authenticates the security principal. After authentication, the security subsystem
creates an access token for the security principal. The access token is a data
structure that contains the SID for a security principal, SIDs for the groups that
the security principal belongs to (with the earlier-noted exception of domain
local groups from a different domain), and a list of the security principal’s
privileges (also known as user rights) on the local computer. An access token is
created for every security principal who logs on locally at the computer’s
keyboard, or remotely through a network connection.
The access token provides a security context for the security principal’s actions
on the computer to which the security principal is logged on. It is important to
note that when a user is logged on to a workstation and requests access to data in
Active Directory, a logon session is generated on the domain controller to which
the user binds, and a security context is generated for this user on the domain
controller. The access token that is created on the domain controller represents
the credentials of the user who is accessing Active Directory. Therefore, the
information in this access token, not information from the workstation to which
the user is logged on, is used by the access check.
For more information about SIDs, see “Access Control” in the Distributed
Systems Guide of the Windows 2000 Server Resource Kit, or see “Access
Control” on the Web at http://go.microsoft.com/fwlink/?LinkId=18852. For more
information about well-known SIDs, see “Appendix B: Default Active Directory
Security Groups” in “Best Practices for Delegating Active Directory
Administration: Appendices,” which accompanies this document.
Security Groups
Security groups are security principals that you can use to aggregate users into
categories and roles for the purpose of applying access control. Security groups
have scopes that define where they can be applied and membership requirements
that define the selection of members they can have and the groups of which they
can be members. The different types of security groups that are available and
whether or not they appear in a user’s access token is subject to the domain mode
(Windows 2000) and domain or forest functional level (Windows Server 2003)
that is in effect.
Security groups play a key role in delegation of administration. Security groups
are used to represent specific instances of administrative roles and contain as
members the user accounts of all delegated administrators who have been
36
Note
When specifying read access to specific
attributes of, or list access to, an Active
Directory domain object, do not use a
domain local group to set permissions if the
attribute or attributes are included in the
partial attribute set that is replicated to
global catalog servers. Instead, use a global
group.
• Global. All domains in a forest; that is, a global group is visible for
administration within its domain and all trusted domains and thus can be
assigned permissions on objects in all domains in the forest. Because global
groups have forest-wide visibility, they are best used to organize users or
groups of users into administrative roles.
37
• Universal. All domains in a forest; that is, a universal group is visible for
administration within its domain and all trusted domains and thus can be
assigned permissions on objects in all domains in the forest. When multiple
roles require the same access to a resource, add global groups to a single
universal group and add the universal group to a domain local group for the
resource.
Group Scope Availability and Membership Rules
Group scopes vary according to functional conditions in the domain or forest.
Not all scopes are available under all conditions, and group membership is
subject to conditions in the domain or forest according to domain modes in
Windows 2000 forests and domain functional levels in Windows Server 2003. A
domain mode or functional level that indicates “mixed” provides functionality
that is consistent with Windows NT 4.0 domain controllers. For this reason,
features that are not compatible with Windows NT 4.0 are not available in mixed
domains.
The following rules limit the availability of group scopes:
• Domain local groups are always available.
• Global groups are always available.
• Universal groups are not available in:
• Windows 2000 mixed-mode domains.
• Windows Server 2003 domains that have a domain functional level of
Windows 2000 mixed.
The following rules limit the membership of security groups:
• Domain local groups:
• Can always contain individual user accounts and global groups from any
domain in the forest.
• Can also contain universal groups from any domain in the forest as well
as domain local groups from the same domain in Windows 2000 native-
mode domains or Windows Server 2003 domains that have a domain
functional level of Windows 2000 native or Windows Server 2003.
• Global groups:
• Can always contain users from the same domain.
• Can also contain global groups from the same domain in Windows 2000
native-mode domains or Windows Server 2003 domains that have a
domain functional level of Windows 2000 native or Windows
Server 2003.
• Universal groups, when available, can always contain user accounts, global
groups, and other universal groups from any domain in the forest.
For more information about group scope and membership rules, see Help and
Support Center for Windows Server 2003. For a list of the default administrative
38
groups that are created when Active Directory is installed, and their default
abilities, see “Appendix N: Default Active Directory Service Administrative
Groups” in “Best Practices for Delegating Active Directory Administration:
Appendices,” which accompanies this document.
Local Security Groups
Local groups can be used to grant access to local resources on a computer. As
such, each computer (workstation, server, or domain controller) that is running a
version of Windows has a set of default local group accounts. On domain
controllers, these security groups are domain local accounts that are stored in the
Builtin container. The domain controller itself does not have local computer
groups. On workstations and servers, these accounts are local to the computer
only.
SIDs for these default local accounts are always placed in a user’s token,
independent of the user’s domain and the computer’s domain. When a computer
(workstation or server) is joined to a domain, by default the Domain Admins
group is made a member of the Administrators local group on the computer.
Local groups can contain any security principal. One exception is that on domain
controllers, Builtin accounts cannot contain domain local groups.
For information about the abilities that are assigned to local groups by default,
see Help and Support Center for your version of Windows.
Group Membership Changes and Replication
Delegating administration might involve adding or removing members of large
groups. Changing the membership of a large group can result in a significant
volume of replication in Windows 2000 forests and in Windows Server 2003
forests that have Windows 2000 domain controllers. The reason for the increase
in replication is that group membership is stored in the single, linked,
multivalued Members attribute of the group object, and with Windows 2000
forests and domain controllers, the attribute is the smallest value that can be
replicated. Therefore, changing the membership of a group results in replication
of all group members, not just the changed member value. In addition, changes
can be lost if two administrators change the membership of the same group on
different domain controllers; only one of the changes can be written to the Active
Directory database during the same period of replication latency.
In Windows Server 2003 forests, group replication is improved to eliminate these
replication issues, but the improvements have functional level requirements. The
improvements are available in Windows Server 2003 forests that have a forest
functional level of:
• Windows Server 2003 (all domain controllers are running Windows
Server 2003), or
• Windows Server 2003 interim (all domain controllers are running either
Windows Server 2003 or Windows NT 4.0, but no domain controllers are
running Windows 2000).
39
principal that is associated with the thread that created the object. When a user
makes a request to create a new object in Active Directory, the information in the
user’s access token is used by the security subsystem on the domain controller to
establish object ownership. The information in the access token is generated by
the contacted domain controller. In addition to other information, the access
token contains the following information about the user:
• User. A field (Token-user) that contains the SID of the user who is logging
on.
• Default object owner A field (Default-owner-in-token) that contains the
SID of the user or security group that becomes the owner of any object that
this user creates.
When the access token is created, the user’s SID is inserted into the Default-
owner-in-token field unless the user is a member of certain administrative
groups. In this case, the SID of the group is inserted into the field and any
member of the administrative group can manage the object. If the user is a
member of more than one such administrative group, the group with the highest
level of authority is the object owner. As the object owner, you cannot change the
owner to another user or group; that is, you cannot change the value in the owner
field to specify an owner. However, you can apply a user right that allows
another user to take ownership.
For more information about how the list of the administrative groups that
become default object owners differs in Windows 2000 and Windows
Server 2003, see “Appendix J: Default Owners of Active Directory Objects” in
“Best Practices for Delegating Active Directory Administration: Appendices,”
which accompanies this document.
DACL
DACLs contain ACEs that identify the security principals that have access to the
object. Each ACE has fields that specify the abilities (permissions) for the
respective security principal. For each security principal that you add to the
access control list, you can define a set of permissions that specify the extent to
which that user or group of users can manipulate the object. If a user does not
appear in an ACE, either individually or as a member of a group, that user has no
access to the object.
SACL
The SACL is similar to the DACL except that it is used to audit rather than
control access to an object. When an audited action occurs, the operating system
records the event in the security log. Each ACE in a SACL has the following
elements: a header that indicates whether auditing is triggered by success,
failure, or both; a SID that specifies a particular user or security group to
monitor; and an access mask that lists the operations to audit. The content of the
SACL is controlled by security administrators for the local computer. Security
administrators are users who have been assigned the Manage auditing and
security log privilege. By default, this privilege is assigned to the built-in
Administrators group.
41
Note
If necessary, you can change the default permissions that are
specified in the default security descriptor for an object class
in the schema. However, as a best practice, you should avoid
changing the default permissions in the default security
descriptor for an object class unless you need to effect a
change in the default security for all instances of that class
across all domains in the forest.
As a best practice, you should also avoid removing any ACEs
from the DACL of the domain root object. Doing so could
impact the functionality of certain aspects of Active Directory
components or applications that depend on, and have access
to, Active directory data by virtue of the effective permissions
in the DACL of the domain root object.
Note
A DACL can be set to null programmatically (that is, no DACL
is passed) at creation time or at any later time.
The effect on security of having no DACL as opposed to having a DACL that has
no ACEs is significant:
• No DACL in the security descriptor has the effect of granting unconditional
access to Everyone.
• An empty DACL has the effect of not granting access to anyone.
In the case of an empty DACL, the owner of the object always has the inherent
right to modify the DACL and grant permissions. If no DACL exists, the owner
can create a DACL programmatically and then grant permissions.
For more information about using SDDL to specify permissions
programmatically, see the Microsoft Platform Software Development Kit (SDK)
link on the Web Resources page at http://go.microsoft.com/fwlink/?LinkID=291.
Protected DACLs
The DACL of an object can be marked as protected. Marking a DACL as
protected will block the inheritance of any permissions from the parent object.
Any inheritable permissions in the DACL of the parent objects will not be
inherited by this object. Additionally, child objects of an object whose DACL is
marked protected will also no longer inherit any permissions specified on the
protected object’s parent. However, they will continue to inherit all inheritable
permissions specified in the DACL of the protected object unless the child
objects also have their DACLs marked as protected.
45
ACEs
An ACE contains authorization intent for a specific security principal for whom
access is allowed, denied, or audited.
Every ACE in the DACL has the following structure:
(ACE Type ; ACE Flags ; Permissions ; Object Type ; Inherited Object Type ;
Trustee)
The following is a brief description of the various fields of an ACE:
• ACE Type – This field specifies whether the ACE is an Allow type ACE or a
DENY type ACE. An ALLOW type ACE allows access and a DENY type
denies access.
This field can take on one of six values:
• Allow – Indicates that the ACE is of the standard ACCESS ALLOWED
type, where the ObjectType and InheritedObjectType fields are NULL.
• Deny – Indicates that the ACE is of the standard system-audit type, where
the ObjectType and InheritedObjectType fields are NULL.
• System Audit – Indicates that the ACE is of the standard system type,
where the ObjectType and InheritedObjectType fields are NULL.
• Object Allow – Indicates that the ACE grants access to an object or a
subobject of the object, such as a property set or property. The
ObjectType or InheritedObjectType field or both contain a GUID that
identifies a property set, property, extended right, or type of child object.
• Object Deny – Indicates that the ACE denies access to an object or a
subobject of the object, such as a property set or property. The
ObjectType or InheritedObjectType field or both contain a GUID that
identifies a property set, property, extended right, or type of child object.
• Object System Audit – Indicates that the ACE audits access to an object
or a subobject of the object, such as a property set or property. The
ObjectType or InheritedObjectType field or both contain a GUID that
identifies a property set, property, extended right, or type of child object.
• ACE Flags – This field contains multiple inheritance related flags that govern
the inheritance aspects of the ACE.
This field can take values including but not limited to one or more of the
following:
• Container Inherit – Child objects will inherit this access-control entry
(ACE). The inherited ACE is inheritable unless the
ADS_ACEFLAG_NO_PROPAGATE_INHERIT_ACE flag is set.
• No Propagate – The system will clear the
ADS_ACEFLAG_INHERIT_ACE flag for the inherited ACEs of child
objects. This prevents the ACE from being inherited by subsequent
generations of objects.
46
• Inherit Only – Indicates an inherit-only ACE that does not exercise access
control on the object to which it is attached. If this flag is not set, the
ACE is an effective ACE that exerts access control on the object to which
it is attached.
• Inherited – Indicates whether or not the ACE was inherited. The system
sets this bit.
• Permissions – This field contains the specification of the permissions granted
or denied to the trustee (the security principal for whom the permissions
specified in this ACE will apply). This field can take one of the following
values:
• RC – Read Control
• SD – Standard Delete
• WD – Write DACL
• WO – Write Owner
• RP – Read Property
• WP – Write Property
• CC – Create Child
• DC – Delete Child
• LC – List Child
• LO – List Object
• SW – Validated write
• DT – Delete Tree
• CR – Extended Right
For more information about these rights, see “Appendix C: Active Directory
Standard Permissions” in “Best Practices for Delegating Active Directory
Administration: Appendices,” which accompanies this document.
• Object Type – This field can contain the GUID representing an object’s class.
The GUID refers to a property or a property-set if the permissions specified
are Read-Property or Write-Property permissions. The GUID specifies an
object class when the permissions specified are Create Child or Delete Child
permissions
• Inherited Object Type – This field can contain the GUID of an object class.
When such a GUID is set, the ACE is an effective ACE only on objects of the
class referred to by the GUID.
• Trustee – This field contains the SID of the security principal for whom the
permissions specified in this ACE will apply.
For a detailed description of the various fields of an ACE, see
“IADsAccessControlEntry” in the MSDN Library on the Web at
http://go.microsoft.com/fwlink/?LinkID=21262.
47
Example ACEs
The following example ACEs illustrate how ACEs specify delegation intent:
Note
To provide clarity in following examples, the display name of
the class or attribute has been shown instead of the actual
GUID for the class, and the name of the group has been used
instead of the SID for Account Admins. In actual ACEs, GUIDs
and SIDs are used instead of the display names shown here.
• An ACE that grants Account Admins the ability to create user objects in an
OU and in all OUs within the subtree rooted at this OU:
• (OA ; CI ; CC ; User Class ; Organizational Unit class ; Account Admins)
• An ACE that grants Account Admins the ability to reset user passwords in an
OU but only on User objects:
• (OA ; CI ; CR; Reset Password ; User class ; Account Admins)
• An ACE that grants Account Admins the ability to modify the membership of
all group objects (but only group objects) in a specific OU (on which this
ACE is being applied). This ACE does not give Account Admins the
permission to modify the group memberships of any groups that might exist
as child objects of other OUs that might be child objects of the OU on which
the ACE is being applied.
• (OA ; ; WP; Member ; Group class ; Account Admins)
Note the absence of any inheritance flags in this ACE.
Inheritance and Organizational Units
Active Directory data is stored in containers. While some containers are general
purpose containers, other containers have a specialized purpose in that they are
specific in the nature of data that they are intended to store. Generic containers
are represented by objects of the generic class Container, while specific
containers are represented by specific object classes. An example of a generic
container would be the Services container in the Configuration partition, which is
intended to contain various kinds of objects representing service specific
information. An example of a specific class of container is the Sites container in
the Configuration partition which is intended to contain site and subnet related
information and is represented by an object of class SitesContainer. While
different kinds of configuration information can be stored in different kinds of
containers, domain data is typically stored in a special purpose class of objects
called Organizational Units (OUs).
OUs are special purpose containers in that they are intended to contain domain
data like user accounts, computer accounts, and groups. Additionally, OUs can
contain other OUs within them. In this manner, domain data is stored within a
hierarchy of OUs which serve the role of containers for domain data. OUs are
different from other containers in that Group Policy can be applied to them. The
48
• Computers represents the default storage area for new computer objects that
were originally created through legacy APIs that are not Active Directory–
aware.
• Users represents the default storage area for new user accounts that are
created through legacy APIs that are not Active Directory–aware.
By default, when computers are joined to the domain, the computer accounts for
these computers are created in the Computers container. Because these two
containers are not OUs, Group Policy cannot be applied to them.
Note
Even though they are not OUs, inheritable permissions can
still be applied to the Computers and Users containers,
because the concept of inheritance of permissions applies to
other containers as well as to OUs. Inheritance works the
same in every directory partition, whether the Configuration
partition, the Schema partition, or a domain partition.
ensuring that all administrative access has been granted on the basis of
least privilege.
5. Maintain the implemented delegation model, which involves making
modifications to the implemented delegation model in response to changes
in administrative requirements or needs.
• Installation management
• Schema management
• Trust management
• Knowledge reference management
• Operations master roles management
• Backup and restore management
• LDAP policy management
• Directory service configuration management
• Replication management
• Functional level management
• Directory database management
• Security policy management
• DNS management
• Domain Controller management
For a complete list of the tasks that map to these categories, see “Appendix A:
Active Directory Administrative Tasks” in “Best Practices for Delegating Active
Directory Administration: Appendices,” which accompanies this document. Note
that this list does not include the list of tasks involved in managing the server
management aspects of domain controllers.
Installation Management
Active Directory is hosted on domain controllers across the enterprise. A forest is
created by installing Active Directory on one server that is running Windows
Server 2003 or Windows 2000 Server. After the forest root domain is installed,
subsequent installations of Active Directory on member servers result in the
creation of either new child domains in the forest, or additional domain
controllers in an existing domain.
Administrative tasks in this category include the creation and deletion of child
domains and the installation of additional domain controllers in domains. The
creation of child domains is typically an infrequent operation. Child domains are
usually created during deployment of Active Directory. Subsequent to initial
deployment, the addition of child domains does not happen frequently. In
contrast, the addition of new domain controllers to an existing domain must be
performed as and when required, typically either to address domain controller
failures in remote sites that have only one domain controller or to provide
domain controllers in new locations as needed.
For more information about managing domain controllers, see the Active
Directory Operations Guide on the Web at
http://go.microsoft.com/fwlink/?LinkID=21268.
55
Schema Management
The Active Directory Schema contains definitions for the set of objects that can
be stored in Active Directory, and it enforces the rules that govern both the
structure and the content of Active Directory. The schema consists of a set of the
classes, attributes, and syntaxes that represent an instance of one or more classes
in the schema. The schema also specifies the relationships between classes of
objects. The base schema that ships with Active Directory contains all class and
attribute definitions that are used by Windows 2000 Server and Windows
Server 2003 and their components. Schema objects can be modified to
accommodate needed object classes or attributes that are not available in the
default schema, or to remove existing class or attribute schema objects so that
instances cannot be created in Active Directory.
Administrative tasks in this category involve the extension and modification of
the Active Directory schema,
For more information about managing the schema, see the Active Directory
Operations Guide on the Web at http://go.microsoft.com/fwlink/?LinkID=21268.
Trust Management
A trust relationship is a link that is established between domains to enable users
in one domain to be authenticated by a domain controller in the other domain.
Trust relationships are authentication pipelines that must be present so that users
in one domain can be authorized for access to resources in another domain. All
domains in a forest have automatic, two-way, transitive trust relationships.
In addition to these automatic trust relationships, four other types of trusts can be
created in an Active Directory environment.
• Shortcut trust. Can be set up between two domains within a Windows
Server 2003 forest to improve user logon times between the domains.
• External trust. Can be set up to provide access to resources that are located
in Windows NT 4.0 domains or in domains that are located in a separate
Windows 2000 or Windows Server 2003 forest that is not joined by a forest
trust.
• Forest trust. In a Windows Server 2003 forest, can be used to link two
disjoined Windows Server 2003 forests together to form uni- or bi-directional
transitive trust relationships. A bi-directional cross-forest trust relationship
forms a transitive trust relationship between every domain in both forests.
• Non-Windows Kerberos realm trust. Can be set up between a non-
Windows-brand operating system Kerberos version 5 realm, such as a UNIX
realm, and an Active Directory domain.
Administrative tasks in this category involve the creation, deletion and
management of all aspects of trust relationships in the forest.
For more information about managing trusts, see the Active Directory
Operations Guide on the Web at http://go.microsoft.com/fwlink/?LinkID=21268.
56
Note
The state of cross-reference knowledge at
any specific time is subject to the effects of
directory replication latency.
• A superior reference, which is knowledge of a specifically designated referral
location that is used whenever the domain controller has no knowledge of the
search base.
Knowledge references are represented by crossRef objects in Active Directory
and are stored in the Configuration partition in the Partitions container.
Administrative tasks in this category include pre-creation of cross-references and
the specification of superior references.
Operations Master Roles Management
To provide conflict prevention, Active Directory enforces the requirement that
certain operations can be performed on only a single domain controller per forest
or per domain, depending on the operation. The domain controllers that are
designated as being able to perform these single-master operations are called
operations masters. Each operations master has a role that identifies the type of
operations for which it is solely responsible.
Active Directory defines five operations master roles. Two are forest-wide roles
and three are domain-wide roles:
• Schema master. The only domain controller in a forest that can perform
write operations to the schema directory partition.
• Domain naming master. The only domain controller in a forest that can add
or remove domain or application directory partitions.
57
Note
The schema master and domain naming
master are per-forest roles and should be
held by domain controllers that belong to
the forest root domain. The schema master
and domain naming master roles should
always be placed on the same domain
controller, and this domain controller must
be a global catalog server.
Administrative tasks in this category include the transfer and the seizure of the
five operations master roles.
For more information about managing operations masters, see the Active
Directory Operations Guide on the Web at
http://go.microsoft.com/fwlink/?LinkID=21268.
Backup and Restore Management
Backing up and restoring data is critical to failure recovery management. From a
management perspective, the only administrative operations in this category are
backing up and restoring Active Directory. Each of these operations is performed
on domain controllers and each is individually controlled by separate user rights.
For more information about Active Directory backup and restore, see the Active
Directory Operations Guide on the Web at
http://go.microsoft.com/fwlink/?LinkID=21268.
LDAP Policy Management
LDAP, an industry standard directory service protocol, is the directory access
protocol used to query and retrieve information from Active Directory. LDAP
defines how a directory client accesses a directory server, shares directory data,
and performs directory operations. LDAP enables clients to query, create, update,
and delete information stored in a directory service. Because LDAP is a query
protocol, certain behavioral aspects of how queries are handled are configurable.
By default, all domain controllers in the forest have the same LDAP policy.
58
Note
Although query policies can be configured on a per–domain
controller basis, it is advisable not to specify different LDAP
policies for different domain controllers. Also note that some
domain–controller specific LDAP policies can lead to a denial of
service if configured incorrectly.
Active Directory uses the name resolution services that DNS provides to enable
clients to locate domain controllers and to enable the domain controllers that host
the directory service to communicate with each other.
Active Directory is designed to enable easy integration of the Active Directory
namespace into an existing DNS namespace. Features such as Active Directory–
integrated zones make it easier to deploy DNS by eliminating the need to set up
secondary zones and configure zone transfers.
When DNS servers running on domain controllers store their zones in Active
Directory, it is not necessary to configure a separate DNS replication topology
that uses ordinary DNS zone transfers. Instead, all zone data is replicated
automatically by means of Active Directory replication. Therefore, service
administration of Active Directory–integrated DNS principally involves
managing DNS data that is stored on domain controllers.
The DNS infrastructure supports the Active Directory logical structure to provide
computer name resolution throughout the forest and the Internet. The forest
owner assigns an Active Directory DNS owner for the forest. The Active
Directory DNS owner has a thorough understanding of the existing DNS
infrastructure and the existing namespace of the organization.
The Active Directory DNS owner for the forest is responsible for overseeing the
deployment of the Active Directory DNS infrastructure and making sure that, if
necessary, domain names are registered with the proper Internet authorities.
The Active Directory DNS owner is responsible for the Active Directory DNS
design for the forest. If your organization is currently operating the DNS service,
then the DNS designer for the existing DNS service works with the Active
Directory DNS owner to delegate the forest root DNS name to DNS servers
running on domain controllers.
The Active Directory DNS owner for the forest also maintains contact with the
DHCP and DNS teams of the organization and coordinates the plans of any
individual DNS owners of each domain in the forest with these groups. The DNS
owner for the forest ensures that the DHCP and DNS teams are involved in the
Active Directory DNS design process so that each group is aware of the DNS
design plan and can provide input early on.
For more information about configuring DNS, see “Designing the Active
Directory Logical Structure” in Designing and Deploying Directory and Security
Services and “Deploying DNS” in Deploying Network Services of the Windows
Server 2003 Deployment Kit (or see “Designing the Active Directory Logical
Structure” on the Web at http://go.microsoft.com/fwlink/?LinkID=4723 and
“Deploying DNS” on the Web at http://go.microsoft.com/fwlink/?LinkID=4709).
Domain Controller Management
Domain Controllers are member servers that host the Active Directory directory
service. Unavailability of a domain controller directly impacts availability of the
Active Directory directory service, and a security breach involving unauthorized
access to a Domain Controller can directly undermine the security of an Active
Directory environment. Thus, providing adequate administrative coverage for all
62
Note
It might seem logical to eliminate the Domain Configuration
Operators role and to assign these tasks to the Forest
Configuration Operators role. However, it is usually advisable
to separate the responsibility for a domain from the
responsibility for the entire forest. Generally, all service
management tasks can have a forest-wide impact; therefore,
it can be argued that all such tasks should be assigned to the
Forest Configuration Operators role. However, the purpose of
the Forest Configuration Operators role is to address highly
security-sensitive administrative tasks, each of which has a
clearly visible forest-wide impact. The purpose of the Domain
Configuration Operators role is to separate powers among
different sets of administrators and assign responsibility for
managing highly security-sensitive administrative tasks, each
of which has a clearly visible domain-wide impact, though it is
true that these administrative tasks in the wrong hands could
be used to cause forest-wide impact. However, the objective is
not simply to grant restricted abilities — the objective is to
make service management more tractable.
Note
The lowest level at which you can apply user rights for the
Domain Controllers OU is the default OU. The Domain
Controllers OU is the default container for all domain controller
objects in a domain directory partition, and moving domain
controllers out of this OU is not recommended and not
supported. The user rights that apply to this OU apply to all
domain controllers in the OU, and thus, in the domain. The
default policies are applied to the Domain Controllers OU in a
manner that prohibits the effective use of child OUs for
domain controllers. Unlike other OUs, child OUs of the Domain
Controllers OU cannot be used to override the policy that is
applied at the Domain Controllers OU parent level. For this
reason, creating child OUs and delegating administration for
subsets of domain controllers is not supported.
Microsoft recommends the implementation of one instance of this role for each
Active Directory forest. Microsoft also recommends that no more than two or
three administrators be assigned to this role.
Note
It might seem logical to eliminate the Security Policy Admins
role and to assign these tasks to the Forest Configuration
Operators role. However, it is usually advisable to separate
the responsibility for security policy management from the
responsibility for the entire forest. Generally, all service
management tasks can have a forest-wide impact; therefore,
it can be argued that all such tasks should be assigned to the
Forest Configuration Operators role. However, the purpose of
the Forest Configuration Operators role is to address highly
security-sensitive administrative tasks, each of which has a
clearly visible forest-wide impact. The purpose of the Security
Policy Admins role is to separate powers among different sets
of administrators and assign responsibility for managing all
sensitive security policies for the entire forest to a specific set
of administrators, though it is true that these administrative
tasks in the wrong hands could be used to cause forest-wide
impact. However, the objective is not simply to grant
restricted abilities — the objective is to make service
management more tractable. An organization could very well
decide to make the same set of administrators members of
more than one service management role.
Note
It might seem logical to eliminate the Service Admin Managers
role and to assign these tasks to the Forest Configuration
Operators role. However, it is usually advisable to separate
the responsibility for service administrator group and member
management from the responsibility for the entire forest.
Generally, all service management tasks can have a forest-
wide impact; therefore, it can be argued that all tasks should
be assigned to the Forest Configuration Operators role.
However, the purpose of the Forest Configuration Operators
role is to address highly security-sensitive administrative
tasks, each of which has a clearly visible forest-wide impact.
The purpose of the Service Admin Managers role is to protect
and manage all service admin groups and accounts in the
entire forest. It is true that these administrative tasks in the
wrong hands could be used to cause forest-wide impact.
However, the objective is not simply to grant restricted
abilities — the objective is to make service management more
tractable. An organization could very well decide to make the
same set of administrators members of more than one service
management role.
For more information about planning for remote server management, see
“Planning for Remote Server Management” in Planning Server Deployments” of
the Windows Server 2003 Deployment Kit (or see “Planning for Remote Server
Management” on the Web at http://go.microsoft.com/fwlink/?LinkId=15309.
Note
It might seem completely logical to eliminate the Domain
Controller Admins role and to assign these tasks to the Forest
Configuration Operators role. However, the objective is to
separate responsibility in order to make service management
more tractable. The purpose of the Domain Controller Admins
role is to provide adequate coverage to ensure that the server
management aspects of Domain Controllers are more than
adequately taken care of. If a Domain Controller goes down,
its impact is immediately noticeable and usually unaffordable.
It is true that these administrative tasks in the wrong hands
could be used to cause forest-wide impact. Thus, as is the
case with all service management roles, ensure that you
assign only extremely trustworthy and highly skilled
administrators to all service management roles. An
organization could very well decide to make the same set of
administrators members of more than one service
management role.
Note that the administrative task of restoring Active Directory has been assigned
to the Domain Configuration Operators role. This is because the act of restoring
Active Directory, unlike backing up Active Directory, is not a regular or frequent
task – it is only performed when an Active Directory partition needs to be
restored from backup.
Note
It might seem completely logical to eliminate the Domain
Controller Admins role and to assign these tasks to the Forest
Configuration Operators role. After all, a Backup operator is
sufficiently privileged to be able to log on to a Domain
Controller and back up Active Directory. Should an
administrator in this role turn malicious or be coerced, he or
she could modify the backed up data to inject malicious
changes. However, the objective is to separate responsibility
to make service management more tractable. It is true that
these administrative tasks in the wrong hands could be used
to cause forest-wide impact. Thus, as is the case with all
service management roles, ensure that you assign only
extremely trustworthy and highly skilled administrators to all
service management roles. An organization could very well
decide to make the same set of administrators members of
more than one service management role.
Note
It might seem completely logical to eliminate the Schema
Admins role and to assign these tasks to the Forest
Configuration Operators role. After all, a Schema Administrator
could modify default security descriptors and escalate his or
her privilege. Should an administrator in this role, turn
malicious, or be coerced, he or she could modify the Schema
and in the worst case cause Active Directory to stop
functioning. However, the objective is to separate
responsibility to make service management more tractable. It
is true that these administrative tasks in the wrong hands
could be used to cause forest-wide impact. Thus, as is the
case with all service management roles, ensure that you
assign only extremely trustworthy and highly skilled
administrators to all service management roles. An
organization could very well decide to make the same set of
administrators members of more than one service
management role.
Note
It might seem logical to eliminate the Replication Management
Admins and Replication Monitoring Operators roles and to
assign these tasks to the Forest Configuration Operators role.
After all, any administrator in either role could disrupt service,
thereby causing forest–wide impact. However, the objective is
to separate responsibility to make service management more
tractable. It is true that these administrative tasks in the
wrong hands could be used to cause forest-wide impact. Thus,
as is the case with all service management roles, ensure that
you assign only extremely trustworthy and highly skilled
administrators to all service management roles. An
organization could very well decide to make the same set of
administrators members of more than one service
management role.
Note
Any DNS administrator could disrupt service, thereby causing
a forest–wide impact. However, the objective is to separate
responsibility to make service management more tractable. It
is true that these administrative tasks in the wrong hands
could be used to cause forest-wide impact. Thus, as is the
case with all service management roles, ensure that you
assign only extremely trustworthy and highly skilled
administrators to all service management roles. An
organization could very well decide to make the same set of
administrators members of more than one service
management role.
Note
The information in this document applies to Active Directory
infrastructures that have an existing forest and domain
structure. For information about creating a forest and domain
structure, see “Designing the Active Directory Logical
Structure” in Designing and Deploying Directory
and Security Services of the Windows
Server 2003 Deployment Kit (or see
“Designing the Active Directory Logical
Structure” on the Web at
http://go.microsoft.com/fwlink/?LinkId=4723
).
Guidelines for Creating a Service Delegation Model
Creating an efficient and security-conscious model based on these roles involves
the following steps:
1. Understand the nature of the responsibilities assigned to each Microsoft-
recommended role and, if needed, customize the definition of these roles
by adding or removing assigned tasks from the recommended role
definitions.
2. Determine the number of instances of the role that are required for your
environment. The number of instances of each Microsoft-recommended
role is presented earlier in this document and is summarized in Table 3:
Table 3 Service Management Roles and Recommended
Number of Instances
Service Management Role Recommended Number of
Instances
Forest Configuration One instance per forest
Operators
Domain Configuration One instance per domain
Operators
Security Policy One instance per forest
Administrators
Service Admin Managers One instance per forest
Domain Controller 1. One instance for every set of
Administrators domain controllers physically
located in a centrally or
remotely located datacenter
2. One instance for the set of all
domain controllers physically
located in remote locations
but centrally managed via
remote management
solutions
79
• Application-Specific Admins
Depending on its specific administrative needs, an organization might choose to
create and implement a delegation model based on Microsoft-recommended
roles or a set of custom roles (which might or might not be based on Microsoft
recommended roles) defined by the organization.
Business Unit Admins Role
It is not uncommon for multiple business units to participate in a shared Active
Directory environment. Each business unit, while participating in a shared Active
Directory environment, can have its own domain data and IT resources. Each
business unit should be assigned a data owner who should have overall
responsibility for all aspects of data management for that business unit.
Each business unit data owner should have a Business Unit Admins
administrative role representing the operational arm of data owners. This role
should be assigned at least one administrator and no more than a small number of
administrators. This administrative group will have complete authority over all
business unit data in the directory. Administrators in this role are the business
unit’s highest-ranking data administrators and are responsible for implementing
and maintaining the administrative delegation model for business unit data
management. Business Unit Admins also work closely with data owners during
the creation of the OU structure to advise about how features such as inheritance
of permissions and Group Policy affect the OU structure.
Typically, organizations will choose to first create and implement their service
management delegation model, following which the data management model
will be implemented. As a part of this process, the service owners should hand
over responsibility for Active Directory data management to data owners. During
the transfer of responsibility for data management to the data owner, the service
owner should create one instance of this role for every business unit. Depending
on the size of the business unit, this role should be assigned to no more than a
few administrators. Administrators in this role delegate responsibility for the
business unit by creating an OU hierarchy and creating and populating
administrative groups to manage each OU in the hierarchy.
For more information about the creation and delegation of this role, see
“Transferring Data Management to Business Unit Owners” later in this
document.
Account Admins Role
Every business unit has user accounts that need to be created, managed, and
supported. Microsoft recommends the role of Account Admins for providing
administrative coverage to manage user accounts. Responsibilities for user
account management include creating accounts, populating account attributes,
managing and maintaining accounts, and deleting accounts. Responsibility for
account support should ideally be assigned to the Help Desk Operators, thereby
removing that burden from the Account Admins role.
92
The Business Unit administrator of each business unit is responsible for creating
one or more instances of the Account Admins role to provide administrative
coverage for all aspects of Account management for all business unit user
accounts, depending on the OU structure and the distribution of accounts among
sub-units that the business unit might contain.
Workstation Admins Role
The Workstation Admins role is recommended for managing workstations.
Depending on the administrative model, a business unit can have one or more
instances of this role. For example, a business unit might be spread across
multiple locations and might staff each location with a local administrative group
that is responsible for managing these workstations. In this case, each local group
must be delegated responsibility for managing all workstations for the business
unit in that location. The number of members in each role depends on the
requirements for each role instance and is typically a function of the number of
workstations that need to be supported by a specific role instance.
Server Operators Role
Microsoft recommends the role of Server Operators to provide administrative
coverage for managing an organization’s server computers. Administrators
assigned to the role are typically responsible for managing servers.
Resource Admins Role
Microsoft recommends the Resource Admins role for facilitating administrative
coverage of a collection of one or more servers and the common services hosted
on this set of one or more servers. Administrators who are assigned to this role
are responsible for managing the resource (application, database, or files) and the
set of servers on which the resource is hosted. For instance, an organization
might choose to create a cluster out of a small number of physical servers, and
this cluster of servers might serve as a single virtual file server. Administrators
who have been granted responsibility for managing this single virtual file server
will require the ability to manage each of these servers and manage the virtual
file server. One instance of this role should be created for every such resource in
the business unit.
In some cases, depending on the administrative model, the group of
administrators who manage the servers is different from the group of
administrators who manage the services that are hosted on these servers. This
role can also be used to facilitate management of only the services hosted on one
or more servers. Thus, the meaning and the nature of tasks assigned to specific
instance of this generic role can differ from one instance to another.
Security Group Admins Role
Microsoft recommends the role of Security Group Admins for managing all
security groups required to meet the authorization needs of a Business Unit.
Administrators in this role are responsible for creating and managing both
account and resource security groups, and delegating the ability to manage the
93
Custom Roles
Microsoft-recommended roles are intended to facilitate the creation and
implementation of a well managed and efficient Active Directory data
management delegation model. They are by no means the only way to address
the delegation requirements of an organization.
In addition to the roles recommended by Microsoft, organizations can choose to
create custom roles to address unique administrative requirements. Creating a
custom role involves the following steps:
1. Understand and document the purpose of the new role.
2. Assign a set of administrative tasks to this new role.
3. Determine the minimal and precise set of permissions required to delegate
the set of administrative tasks identified earlier in this chapter.
4. Document the general scope where permissions must be applied in the
directory.
After making these decisions, you can determine the number of instances that are
required, create the groups to represent each instance of the role, assign
permissions to enable the role, and populate the groups with the appropriate
administrative user accounts.
Workstation Admins
One instance of this role will be required for every administrative group that
needs the ability to manage workstations. Most organizations have one or more
administrative groups for every location that houses workstations. For each such
administrative group, document the scope of authority by documenting the set of
workstations that should be managed by this group.
Workstation management typically includes being able to manage all aspects of
workstations; thus, incumbents in this role typically are Local Administrators on
member workstations.
Server Operators
One instance of this role will be required for every administrative group that
requires the ability to manage servers. Most organizations have one or more
administrative groups for every location that houses servers. For each such
administrative group, document the scope of authority by documenting the set of
servers that should be managed by this group.
Server management typically includes being able to manage all aspects of
member servers; thus, incumbents in this role typically are Local Administrators
on member servers.
Resource Admins
One instance of this role will be required for every administrative group that
needs the ability to manage resources (services or applications being hosted on a
set of one or more servers and collectively managed by a single group of
administrators). For each such administrative group, document the scope of
authority by documenting the set of servers and the specific service that
constitute the resource that should be managed by this group.
Resource management typically includes being able to manage all aspects of the
service and manage all aspects of the servers on which the service is being
hosted, although this might not always be the case. In some cases, the
responsibility might be restricted to being able to manage only the service that is
being hosted on or more servers.
Security Group Admins
There should only be one instance of this role for every business unit. Depending
on the specific administrative needs of the business unit, the business unit data
owners might decide to create more than one instance of this administrative role.
For each instance determine the set of administrative tasks that incumbents of the
role should be allowed to perform.
The following is a list of common administrative tasks that belong to this
category:
• Create security groups
• Modify the membership of security groups
• Modify other properties, such as managed-by information
• Delete security groups
98
For each instance evaluate the need for and document the set of administrative
tasks that incumbents of the role should be allowed to perform. This information
will be used during the implementation phase to delegate each of these
administrative role instances.
Help Desk Operators
One instance of this role will be required for every administrative group that
needs the ability to provide account support to a subset of user accounts or to all
user accounts. For each such administrative group, document the scope of
authority by documenting the set of users for whom this group will provide
account support.
The following is a list of common administrative tasks that belong to this
category:
• Reset passwords on user accounts
• Unlock user accounts
• Optionally, a business unit might also decide to grant its help desk operators
the ability to modify certain attributes on user objects; these attributes will
typically be non-securitysensitive attributes that users cannot themselves
modify
For each instance, evaluate the need for and document the set of administrative
tasks incumbents of the role should be allowed to perform. This information will
be used during the implementation phase to delegate each of these administrative
role instances.
Application-Specific Admins
One instance of this role will be required for the administrative group of every
Active Directory–enabled or Active Directory–integrated application that
requires the ability to manage application-specific data stored in Active
Directory. For each such administrative group, document the scope of authority
by documenting the set of application-specific data that this group will require
the ability to manage.
The nature of administrative tasks in this category is typically a function of the
specific Active Directory–enabled or Active Directory–integrated application
deployed and the specific administrative requirements of that application. The
administrators of these applications should have a good understanding of these
administrative requirements. The business unit data owners should understand
these requirements and plan for facilitating the required access to enable these
administrators to carry out their administrative tasks.
Assigning Administrators to Role Instances
For each instance of every data management role required, document the
identities of all administrators who will be assigned to these role instances.
99
Planning an OU Hierarchy
Planning an OU hierarchy based on the administrative delegation and Group
Policy requirements of the business unit is one of the first steps in creating a
delegation model. A well-designed OU hierarchy should adequately address an
organization’s Group Policy requirements while also facilitating the delegation of
administrative authority based on the organization’s administrative requirements.
This section provides recommendations for creating a well-designed OU
hierarchy.
An OU for every Business Unit
In the section “Implementing Your Data Management Delegation Model” later in
this document, as part of the handoff process wherein service owners hand off
data management delegation to data owners, a single high-level OU named
Business Units will be created with the purpose of creating a subtree to contain a
single high-level OU for each business unit. That way, all domain data can be
contained within this one OU subtree rooted at the Business Units OU instead of
at the Domain root. This recommended approach has the following advantages:
• This facilitates delegation of administration of each business unit to the
respective business unit administrator while allowing the specification of any
permissions that might be required to delegate administrative authority over
data across all business units at the Business Units OU instead of at the
Domain root. This prevents the inheritance of any ACEs applied in the
System container and in the DNS containers, thereby substantially reducing
the number of ACEs, which might impact the size of that database
significantly in Windows 2000. In Windows 2003, the concept of single-
instances makes this a non-issue. For example, if the administrative needs of
Contoso Pharmaceuticals required that a single centralized administrative
group be delegated the authority to provide Account support for all business
units in the domain, their administrators would typically grant the security
group representing the operators in the Account support role inheritable
permissions expressed in three or four ACEs applied on the domain root
object. While this would have the effect of the ACEs flowing down to all user
objects in all business units, it would also result in these ACEs flowing down
on all DNS record objects in the DNS container; assuming that there are
about 5000 records in the DNS container, this approach would result in 5000
additional ACEs in Windows 2000, significantly impacting the database size.
On the other hand, if these inheritable ACEs were applied on the Business
Units OU in the recommended approach, they would only be inherited by
objects stored in the subtree rooted at the Business Units OU.
• This also increases the manageability of domain data by eliminating the need
to create multiple OUs that are peers of the OUs that exist by default. It
increases manageability because it leaves the top-level OU hierarchy
unchanged with the exception of the addition of a single OU, thereby
minimizing the possibility of confusion.
100
3. Create a single OU under the Business Unit OU for storing all business unit
user resources
You should plan on storing computer accounts for all your workstations
and servers within this OU. Recommendations on creating an OU
hierarchy within this OU to address specific administrative requirements
around workstation and server management and facilitate delegation of
resource management to specific administrative groups are provided later
in this section.
Figure 2 shows a representative OU structure based on the recommendations
presented earlier in this section. Note that Product Development and Business
Management are the two Business Unit OUs, one for each of the two business
units in the fictitious organization represented in the example.
Figure 2 High-Level OU Structure for a Business Unit OU
The OU structure thus far can be used to perform the following delegations:
• An organization can delegate account management of all business unit
accounts to a single administrative group by granting appropriate permissions
on the Accounts OU. This is sufficient for a small organization with a single
location and a relatively small number of users.
102
• Assume that your organization is spread across multiple locations and your
IT model requires delegation of account management to locally based
administrative groups. In this scenario, you can create an additional set of
OUs, one for each location, and then store user accounts in the OU
representing the physical location where the user account is based. You can
then distribute and delegate account management by specifying permissions
on these OUs.
Figure 3 illustrates the three-location OU structure that accommodates user
accounts that must be managed separately in Locations A, B, and C.
Figure 3 Decentralized Account Administration for Four
Locations
Note that the recommendations described earlier in this section are by no means
the only way to facilitate management of security groups. Organizations should
take their specific administrative needs into account when designing their OU
structures. For example, one alternative to storing resource specific security
groups in the Security Groups OU is to create an OU to store all security groups
for a specific resource under the specific OU representing this resource in the
Resource OU subtree, as presented later in this section. This has the additional
advantage of storing the security groups associated with a resource along with
the servers representing the resource, thereby storing all aspects of a resource in
one small subtree.
What is important is to understand how an OU enables delegation of
administrative authority and to apply this understanding to the creation of an OU
structure that addresses your organization’s administrative delegation and Group
Policy requirements.
107
Resource Management
A well-designed OU structure can also be used to manage servers and to delegate
management to the respective administrative groups of the various IT resources
that are hosted by a collection of servers. The recommendation earlier in this
chapter to create one OU for every type of resource under the Resources OU aids
in increasing manageability of resources.
Under the OU created for each resource type, introduce an additional level of
OUs with each OU in this level representing a specific resource. For example,
under the Web Servers OU, create a specific OU for storing the computers of all
servers on which the Human Resources Web portal is collectively hosted.
Figure 6 illustrates such an OU structure.
109
In the first example, assume that Group Policy requirements for this organization
include that a location-specific Group Policy be applied to all computers based
on their location, irrespective of the role of the computers. To accommodate this
requirement, the OU hierarchy structure in
111
administration tools and for details about how to use them, see “Appendix G:
Active Directory Delegation Tools” in “Best Practices for Delegating Active
Directory Administration: Appendices,” which accompanies this document. It is
recommended that you invest the time to gain familiarity with these tools, as
these tools are required to manage permissions. One alternative to using these
tools is to use scripting to manage permissions.
7. Create one user account for each Business Unit Admins administrator in his
or her respective business unit OU (these accounts will be moved to an
appropriate OU within the respective Accounts OU by the business unit
administrator after delegation of the business unit OU is implemented).
8. Add each user account to the respective security group that represents the
Business Unit Admins role instance for the business unit.
Figure 8 shows a prototype domain-level OU structure that is created by a
service administrator for handing off data administration to data owners in a
domain that has two business units.
Figure 8 Domain-Level OU Structure and Groups for
Transferring Data Administration
Business Unit Admins. Business Unit Admins now have complete control over
their Business Unit OUs and can proceed to implement their delegation models.
This section provides recommendations for implementing an efficient and
security-conscious delegation model.
The following are the recommended tasks involved in implementing the business
unit delegation model:
1. Implement the OU hierarchy structure.
2. Create security groups to represent the various administrative role
instances.
3. Enable Administrative Roles.
4. Delegate Administrative Roles.
Implementing the OU Structure
The first step in implementing the delegation model is to create the OU structure
in the directory. This step is usually simple and straightforward: The Business
Unit Admins create all OUs according to the documented OU structure for the
business unit.
Creating Security Groups to Represent Role Instances
The next step in implementing the OU structure is to create security groups to
represent all required administrative role instances as documented during the
creation of the model. This step is also very straightforward and involves the
following tasks:
1. For every required administrative role instance, the Business Unit Admins
create one security group in the Delegation OU, a child of the Business
Unit OU. These groups are typically Domain Local groups, as their scope
of application is the Domain.
Note
When specifying read access to specific attributes of, or list
access to, an Active Directory domain object, avoid using
domain local groups to set permissions if the attribute or
attributes are included in the partial attribute set that is
replicated to global catalog servers. Instead, consider using a
global group. Users of domain local groups might not be able
to access these attributes if they are outside the domain that
hosts the global catalog to which they are bound. Note,
however, that this affects only read and list access because
Global Catalogs are Read-Only by design.
2. After creating each group, Business Unit Admins can optionally choose to
grant these groups the ability to modify their own group memberships,
thereby allowing administrators in these roles to add or remove other
administrators without Business Unit Admin intervention. This step is
purely a function of the administrative requirements of an organization, and
116
For example, assume that the business unit data owners decided to
delegate only the following tasks to the Account Admins for the Division
A:
• Create user accounts
• Modify all attributes that belong to the Personal Information property-set
According to “Appendix A,” the following are the permissions required to
perform these administrative tasks:
• Create user accounts
• Create Child on parent object
• Modify all attributes that belong to the Personal Information property-set
• Write-Property to the Personal-Information property-set
Thus, in order to delegate this role, the security group representing the
Division A Account Admins role will need to be granted the following
permissions:
• Create Child on parent object
• Write-Property to the Personal-Information property-set
Also, note the specifics of where these permissions are required. Since the
Create Child permission is required on the parent object, which in this case
happens to the be the Division A OU, there is no need to mark that
permission as inheritable. On the other hand, since the Write-Property
permission will actually be required on the user objects, this permission will
need to be marked as inheritable.
3. Once you have determined the point of delegation and the minimal set of
permissions required to delegate the various roles, modify the DACL on
the object that corresponds to the point of delegation and grant the security
group representing each administrative role the identified set of
permissions.
Once these steps have been completed, all administrative roles for account
management will have been delegated.
Enabling security group management roles
Your business unit should have only one instance of the Security Group Admins
role that is responsible for security group management for the entire business
unit.
To delegate an instance of the Security Group Admins role, perform the
following tasks:
1. Refer to the documented role instance descriptions and identify the scope
of administrative authority. Then map this scope to an OU subtree in the
Security OU. Based on this information, determine the point of delegation
for delegating this role instance.
118
the groups to which a group can belong. The policy restricts membership by
enforcing the list: any members who are not on the list are removed from the
group; any security principals in the list that are not members of the group are
added to the group.
For more information about restricted groups, see “Restricted Groups” in Help
and Support Center for Windows Server 2003. For more information about
restricted groups, see article 810076, “Updates to Restricted Groups (“Member
of”) Behavior of User-Defined Local Groups” in the Microsoft Knowledge base.
To find this article, see the Microsoft Knowledge Base link on the on the Web
Resources page at http://go.microsoft.com/fwlink/?LinkID=291.
The following example illustrates the application of this feature to delegation of
the workstation management role.
The Production business unit of Contoso Pharmaceuticals has operations in two
physical locations – Chicago and Atlanta. 60 percent of the users of this business
unit are based in Chicago and 40 percent in Atlanta. Every user is typically
assigned one end-user workstation.
Contoso’s OU hierarchy thus has two OUs within the Workstations OU, one
representing Chicago and the other Atlanta. Computer accounts for all
workstations located in Chicago are stored in the Chicago OU. Accordingly,
computer accounts for all workstations located in Atlanta are stored in the
Atlanta OU. Contoso’s data owners have assigned the responsibility of managing
all workstations in the Chicago location to a locally based administrative group
called Chicago Workstation Admins. Members of this administrative group
require the ability to manage all aspects of computer management for these
workstations. They might be called upon to perform a variety of administrative
tasks including, but not limited to, troubleshooting operating system issues,
adding hardware, configuring drivers, and installing patches. Most of these tasks
require administrative access to these workstations.
Contoso’s administrators easily facilitated making this administrative group local
administrators on all workstations by performing the following steps:
1. Creating a security group called Chicago Workstation Admins to represent
this role
2. Granting this security group inheritable full-control on all computer objects
by modifying the DACL of the Chicago OU within the Workstations OU
3. Using the restricted groups feature of Group Policy to make this group a
member of the Local Administrators group on all workstations in Chicago
by applying Group Policy on the Chicago OU and specifying that the
Chicago Workstation Admins be made a member of the Local
Administrators group on all workstations whose computer accounts are
present in the Chicago OU
Enabling resource management administrative roles essentially involves
repeating the steps involved in this example for all administrative roles. The
following recommendations can be used to enable resource management roles.
120
Perform the following steps to enable the various instances of the Workstation
Admins role:
1. Refer to the documented role description for this instance and identify the
scope of administrative authority. Map this scope to an OU subtree in the
Workstations OU. Based on this information, determine the point of
delegation for delegating this role instance.
2. Grant the security group representing this role instance the following
inheritable permission on the point of delegation:
• Full-Control on Computer objects
3. Use the Restricted Groups feature of Group Policy by applying a GPO to
the OU that represents the point of delegation,to make this make the
security group representing the specific role instance a member of the local
Administrators group on all member workstations that are stored in the
OU.
Once these steps have been completed, all administrative roles for workstation
management will have been delegated.
For each instance of the Server Operators role, perform the following steps to
enable the instance:
1. Refer to the documented role description for this instance and identify the
scope of administrative authority. Then map this scope to an OU subtree in
the Resources OU. Based on this information, determine the point of
delegation for delegating this role instance. Refer to your OU model to
determine the specific OU created with the purpose of storing non resource
specific servers. You might have more than OU if you created a high-level
OU under the Resources OU to store non resource specific servers and
possibly created an additional level of OUs within this OU, one for each
physical location that has servers located and depends on local
administrative groups for management of these servers.
2. Grant the security group representing this role instance the following
inheritable permissions on the point of delegation:
• Full-Control on Computer objects
3. Use the Restricted Groups feature of Group Policy by applying a GPO to
the OU that represents the point of delegation, to make this make the
security group representing the specific role instance a member of the local
Administrators group on all member workstations that are stored in the
OU.
Once these steps have been completed for all instances of the Server Operators
role, all administrative roles for server management will have been delegated.
For each instance of the Resource Admins role, perform the following steps to
enable the instance:
1. Refer to the documented role description for this instance and identify the
scope of administrative authority. Map this scope to an OU subtree in the
121
2. Request that the Security Admins group grant to the Resource Admins
group the ability to modify the membership of these groups. On each
security group object, grant the following permissions to the security group
account itself:
• Property permission Read All Properties
• Property permission Write Members
The Security Group Admins can evaluate the request and if approved, create the
specific security groups in an appropriate location, thereby enabling Resource
Admins to authorize access to their resources.
Enabling help-desk roles
Every business unit will typically also have at least one instance of the Help
Desk Operators role. Administrators in this role are responsible for providing
account support for user accounts, and typical helpdesk operations include
resetting user passwords and unlocking user accounts. Since most of the
administrative tasks assigned to this role involve providing account support,
most of these administrative tasks involve low-level operations on user account
objects.
To delegate an instance of the Help Desk Operators role, perform the following
tasks:
1. Refer to the documented role instance descriptions and identify the scope
of administrative authority. Map this scope to an OU subtree in the
Accounts OU. Based on this information, determine the point of delegation
for delegating this role instance. For most business units, the scope of
delegation will typically map to the Accounts OU, since in most
organizations a single administrative group is responsible for providing
account support.
2. Based on the documented role instance description, determine the minimal
set of permissions required to delegate all assigned administrative tasks by
referring to “Appendix A: Active Directory Administrative Tasks” in “Best
Practices for Delegating Active Directory Administration: Appendices,”
which accompanies this document. This appendix documents the minimal
and precise set of permissions required to delegate every Active Directory
administrative task.
As mentioned earlier in this section, typical account support tasks include
the following:
• Resetting user passwords
• Unlocking locked out accounts
According to “Appendix A,” the following are the permissions required to
perform these administrative tasks:
• Resetting user passwords
• Reset User Password Extended right on the user account
• Unlocking locked out accounts
123
Thus, before delegating instances of the Application Specific Data Admins roles,
it is important to identify precisely where the application data is being stored.
This information will be required to determine the point of delegation and the
manner in which application is delegated. For example, if the application stores
data in a separate OU that it creates and this OU happens to be outside of any
Business Unit OU (for example, if it is a child of the Domain object), then the
Domain Admins will be responsible for delegating these roles and the scope of
delegation will typically be the specific OU. On the other hand, if this
application stores application specific data on user attributes (for example, the
application could extend the schema and store user specific information on user
objects), then this falls within the scope of administrative authority of the
Business Unit Admin and the scope of delegation then becomes the Accounts
OU.
To delegate an instance of the Application Specific Data Admins role, perform
the following tasks:
1. Refer to the documented role instance descriptions and identify the scope
of administrative authority. Map this scope to an OU subtree if it maps to
an OU within the business unit. If it maps to an OU outside of the Business
Unit, transfer responsibility for delegating this role to Domain Admins.
Based on this information, determine the point of delegation for delegating
this role instance.
Based on the documented role instance description, determine the minimal
set of permissions required to delegate all assigned administrative tasks by
consulting the application’s administrators.
2. Once you have determined the point of delegation and the minimal set of
permissions required to delegate this role, modify the DACL on the object
that corresponds to the point of delegation and grant the security group
representing this administrative role the identified set of permissions.
Once these steps have been completed, the Application Specific Data Admins
administrative role will have been delegated.
Delegating self-service on user accounts
User accounts store information about users in the form of properties, or
attributes, of the user object. For example, some of these properties include such
information as the user’s home phone number, mailing address, manager, cell
phone number, and so on. Active Directory defines certain property sets that are
collections of such properties. Specifically, a user object has the following
property sets:
• Personal-Information
• Email-Information
• Web-Information
• RAS-Information
• User-Account-Restrictions
125
• Membership
• General Information
• User Logon
• Domain Password
For more information about the membership of these property sets, refer to
“Appendix E: Active Directory Property Sets” in “Best Practices for Delegating
Active Directory Administration: Appendices,” which accompanies this
document.
The default security descriptor for user objects, as defined in the Active
Directory schema, grants users the ability to modify the following property sets:
• Personal-Information
• Email-Information
• Web-Information
User in your business unit might require the ability to modify other properties on
user objects in addition to the properties that are covered by these three property
sets. In this case, additional administrative steps are required to grant users the
required permissions. To grant additional access to users, perform the following
tasks:
1. Identify the specific properties that users are to be able to modify.
2. To all users, grant Write-Property permissions (inheritable) to SELF.
Note
Alternatively, your organization might
choose to revoke the user’s ability to modify
certain attributes that users can modify by
default. Additional administrative steps are
also required to revoke specific permissions
from users.
For the exact set of permissions that are required to modify a specific property or
a collection of properties, see “Appendix A: Active Directory Administrative
Tasks” in “Best Practices for Delegating Active Directory Administration:
Appendices,” which accompanies this document.
Delegating Administrative Roles
The next step in implementing the delegation model involves delegating all the
required instances of the various administrative roles. Delegating a role simply
involves modifying the group memberships of the security groups of all
administrative roles that have been enabled. The act of making an administrator a
member of a security group that represents an administrative role results in the
role having been delegated to an administrator.
To delegate the various administrative roles that have been enabled, do the
following for each role instance:
126
Using Inheritance
You can use inheritance of permissions to more easily implement delegation. The
use of inheritance of permissions allows administrators to easily apply
permissions on a collection of objects without having to explicitly modify the
DACL of every object. This capability allows administrators to easily manage
and control permissions on large sets of objects by applying and managing
permissions on a relatively small set of objects, from which other objects inherit
permissions.
When using inheritance to specify permissions, administrators can control the
various ways in which an inheritable permission is propagated. The following
guidelines can help you use inheritance effectively:
• When specifying inheritable permissions on an object, if these permissions
need to apply only to a specific object class, specify the object class instead
of letting the permission apply onto all child objects. This will ensure that
these permissions, when inherited, are effective only on objects of the
specific class on which they are intended to be effective.
127
Note
Any user who has the ability to modify the DACL of any OU in
the OU hierarchy can use inheritance to grant him or
herself or any other user any permission on
any object in the subtree rooted at that OU.
Therefore, carefully grant permissions to
modify the DACL of an OU object.
Taking Ownership of Objects
Some features of object ownership can complicate management of Active
Directory data, and you should be aware of them when planning and
implementing delegation of administrative authority. Every object in Active
Directory has an owner. The owner of an object is the only person who has the
inherent right to control who has permission to perform operations on the object
and in what way – the owner has the inherent right to modify permissions on an
object even if he or she is explicitly denied all access to the object in the object’s
DACL. An object’s owner can also grant or deny permission for different kinds
of access to particular users or groups of users. An object’s owner can also
transfer ownership by giving another security principal permission to take
ownership. The creator of an object is usually also the owner of the object; the
only exception to this rule is that if an object is being created programmatically,
an owner can be explicitly specified. Thus, when a user creates an object, he or
she usually becomes the owner of the object.
128
This aspect of object ownership affects how Active Directory data can be
managed. Consider the scenario in which administrative authority has been
delegated to a group of administrators by implementing an administrative role.
As part of carrying out delegated responsibilities, one of the members of the
administrative role creates an object. As the creator of the object, this specific
administrator also becomes the owner of the object. At a later date, this
administrator might no longer be a member of this administrative role. If this
administrator is no longer a member of this administrative role, he or she should
ordinarily no longer be able to manage this object. Since this administrator is no
longer a member of the administrative group representing the administrative role
that he or she was a member of, and since inheritable permissions were used to
delegate control of these objects to members of this administrative role, it seems
reasonable to conclude that this administrator will no longer have access to this
object. However, the administrator will still have access to this object by virtue
of the fact that as the creator of the object, he or she still owns the object. This
can obviously complicate delegation of administrative authority.
While this issue can be addressed by putting in place business policies to add
certain checks when an administrator is removed from an administrative role,
such administrative checks will not be fool-proof. A business unit can enforce
policy that requires that when an administrator is removed from an
administrative role, a check is made to see what objects the administrator owns
and that ownership of all objects be appropriately transferred. However, this
check is not fool-proof because the administrator might have used his authority
as owner to grant himself or herself (or another user) sufficient permissions to
modify the DACL of this object, or permissions to perform other operations.
The following precaution is recommended to adequately address this issue with
respect to managing user and group objects: Create a script that runs in the
security context of a Domain Admin account on a periodic basis (like daily or
weekly). This script should perform the following actions:
1. Walk through a specifiable subtree of objects, rooted at some OU, and for
every object do the following:
a. Check the owner field of the object; if the owner field is not set to
Domain Admins, change the owner field to Domain Admins.
b. Additionally, check the DACL of the object to ensure that the only
explicit ACEs in the DACL are the ones that are found in the default
security descriptor for that object class in the Schema. This check
ensures that creator of the object did not modify the DACL explicitly to
grant anyone (including himself or herself) any additional permissions. If
any explicit ACEs are found that do not exist in the default security
descriptor for that object class, report their existence and remove these
ACEs.
The reason this approach will work only for user and group objects is that the
default Note
security descriptors of these object classes do not contain any ACEs for
ThisOwner
the Creator checkTrustee.
will limit an organization’s
The general abilityOwner ACEs on
problem with Creator
to apply explicit ACEs on objects. This
other object classes, however, is that some default security descriptors can
limitation can be overcome by having the
script report the existence of such ACEs and
prompt for manual deletion. This approach,
while continuing to allow the use of explicit
ACEs, will require manual intervention and
might require significant manual
intervention if many explicit ACEs are used.
However, if explicit ACEs have been used
sparingly and minimally, this approach can
be very useful.
129
contain ACEs for the Creator Owner Trustee, because during object creation, the
user field in any ACE for this trustee is replaced with the SID of the user creating
the object. Thus, when checking to see that only ACEs that were in the default
security descriptor are present, any ACE that was mapped to the SID of the
creator will show up as an explicit ACE that was not in the default security
descriptor and, if removed, could impact functionality.
Note
If your organization should decide to implement the script
approach described here, it is strongly advised
that this approach be thoroughly tested in
non-production environments before being
implemented in your production
environment.
Maintaining Your Data Management Delegation Model
Over time, your data management administrative delegation model might need to
be modified to address changing needs and requirements. The data management
tasks required to maintain a changing data management delegation model are the
same as those required to maintain a service management delegation model.
Tasks that are required to maintain the service delegation model can include:
• Adding (delegating) or removing (undelegating) members to or from data
administration role instances
• Adding new instances of roles in the event of changes in administrative needs
• Modifying a role by assigning or revoking a new or existing task from the
role definition
• Creating new custom roles if the need arises
• Undelegating a role completely by revoking all permissions that are granted
to the group that represents the role
In such cases, it is preferable to remove and re-assign the role. The Dsrevoke
command-line tool can be used to easily and reliably remove all permissions that
are granted to a security principal. For more information about using this tool,
see “Undelegating a Data Administration Role” later in this document.
To add a new task to a role for each role instance that needs to be modified,
perform the following tasks:
1. Identify the set of permissions that are required to perform the task.
2. Identify the location (specific OU or OU tree) in the OU hierarchy where
permissions have been granted to the security group that represents the role
instances.
3. Either revoke all permissions and then re-apply the updated set of
permissions, or grant this security group the additional minimal set of
permissions that are required to perform the new administrative task.
Depending on the requirement, you might need to update the set of
administrative tasks that are assigned to a specific instance of the role or to all
instances of the role.
child OUs by using inheritance. For ease of management, always use security
groups to apply permissions.
Using Dsrevoke
Dsrevoke.exe has the following syntax:
dsrevoke /report|/remove [/domain:domainname]
[/username:username]
[/password:password|*] [/root:domain/OU]
securityprincipal
Descriptions for each option are as follows:
• /report: Reports the explicit ACEs that are currently set for the specified
security principal on OU objects in the specified domain or an OU subtree.
By default, the command dsrevoke /report starts at the domain root and
searches every OU below that root for explicit ACEs that are granted to the
specified security principal. If you are sure that the permissions for a security
group are set only on or below a specific OU, you can specify the scope of
the search by using the /OU switch to make the search more efficient.
• /remove: Reports all explicit ACEs and then, after prompting for
confirmation, removes the ACEs that are currently set for the security
principal, including all inherited ACEs.
• /domain: The DNS or NetBIOS name of the domain in which the permissions
are to be removed. This value must be specified only when the ACEs that you
want to remove are set on OUs in a domain other than the domain of the
logged-on user.
• /username: The user name of the user who is using the tool. This value is
required when:
• The user is not logged on as an administrator.
• ACEs are being removed in a domain other than the domain of the
logged-on user.
• /password: The password of the tool user. If the command is entered with an
asterisk (*) in place of a password, the tool prompts the user for a password.
• /root: The OU or domain root at which to start the search for ACEs. If no
value is specified, the search begins at the root of the specified domain. If no
domain is specified, the search begins at the root of the domain of the
logged-on user. When specifying a root domain or OU, you must use the
distinguished name (for example,
/root:OU=BusUnits=DC=DomainA,DC=com). If spaces occur in any part of
the distinguished name, enclose the entire option in quotation marks (for
example, “/root:OU=Product Development,OU=Delegation,OU=Business
Units,DC=DomainA,DC=com”).
135
Company Overview
Contoso Pharmaceuticals is a large organization that has its headquarters in
Chicago, Illinois and has operations in five other locations in North America and
Europe. The Active Directory infrastructure consists of a single forest, three
domains, and six sites.
Physical Locations
The company has operations in six physical locations, three in North America
and three in Europe:
• North America — Chicago, New York, Atlanta
• Europe — London, Paris, Rome
Business Units
Contoso has four business units. Table 7 shows the business units and their
locations.
Table 7 Contoso Business Units and Locations
Business Units Locations
Research and Development Chicago
Production Atlanta
Business Management Chicago, New York, London,
Paris, Rome
IT Chicago, Atlanta, New York,
London, Paris, Rome
136
Servers
The servers include file servers, Web servers, database servers, and application
servers.
Table 9 shows the numbers of servers of each type and their respective business
units.
Table 9 Business Unit Server Numbers and Types, By Business
Unit
Business File Web Database Application
Unit Servers Servers Servers Servers
Research 800 50 100 50
and
Developm
ent
Production 300 20 100 100
Business 120 45 50 35
Managem
ent
IT 30 30 20 20
Site Topology
The Contoso site topology consists of six logical Active Directory sites, one for
each of the six physical locations, as shown in Figure 10.
Figure 10 Active Directory Site Topology for Contoso
Pharmaceuticals
Table 10 shows the distribution of domain controllers per domain across sites.
Table 10 Domain Controllers Per Domain in Each Site
Number of Domain Controllers per Domain
Site Concorp.cont NOAM.concorp.co Europe.concorp.co
oso.com ntoso.com ntoso.com
Chica 3 2 2
go
Atlant 2
a
New 2
York
Londo 2
n
Paris 2
Rome 2
DC1
EUROPE-
DC2
EUROPE- G
DC3
EUROPE-
DC4
EUROPE- G
DC5
EUROPE-
DC6
EUROPE- G
DC7
EUROPE-
DC8
All domain controllers are placed in highly secure physical locations to which
only authorized personnel are granted access. All domain controllers in remote
locations are equipped with a remote administration solution, such as Remote
Insight Lights-Out (RILO), so that administrators can control both hardware and
software on domain controllers remotely to manage systems where no IT staff
are stationed.
the Windows Server 2003 Deployment Kit (or see “Designing the Site Topology”
on the Web at http://go.microsoft.com/fwlink/?LinkId=4724).
Note
In Windows 2000, the domain naming
master must be placed on a global catalog
server.
Domain-wide Role Placement
The first domain controller that is installed in a domain has the three domain-
wide roles by default. Because the concorp.contoso.com domain is the forest root
domain, the first domain controller that is installed to create the forest root
domain contains the three domain roles and is also a global catalog server.
Because the infrastructure master must not be located on a global catalog server,
Contoso moves that role, as well as the other two domain-wide roles, to
CONTOSO-DC2, which is not a global catalog server.
The first domain controllers that are installed in noam.concorp.contoso.com and
in europe.concorp.contoso.com are not global catalog servers. Therefore, the
domain-level roles are left on these domain controllers, as shown in Table 12.
Table 12 Domain-Wide Operations Master Role Placement
Domain PDC Infrastructure RID Master
Master Master
concorp.contoso. CONTOSO CONTOSO-DC2 CONTOSO-
com -DC2 DC2
noam.concorp.co NOAM- NOAM-DC1 NOAM-DC1
ntoso.com DC1
europe.concorp.c EUROPE- EUROPE-DC1 EUROPE-
ontoso.com DC1 DC1
141
This team of administrators will create and implement the service and data
delegation models for the organization.
Table 15 shows the model creation entries in the template for this role.
Table 15 Model Creation Template for Forest Configuration
Operators Role
Field Assignment Information
Role Instance Name Contoso Forest Config Ops
Instance of Forest Configuration
Operators Role
Instance Number 1 of 1
Assigned Administrators Joe, Sally, Kevin
Assigned Tasks
Security Group
Permissions Assigned
Notes Based in Chicago
Operators Role
Instance Number 2 of 3
Assigned Administrators John, Sandra
Assigned Tasks
Security Group
Permissions Assigned
Notes Based in Chicago
Field Assignment Information
Role Instance Name EUROPE Dom Config Ops
Instance of Domain Configuration
Operators Role
Instance Number 3 of 3
Assigned Administrators Christoph, Anna
Assigned Tasks
Security Group
Permissions Assigned
Notes Based in London
modifications
Permissions Assigned
Notes Based in Chicago
Field Assignment Information
Role Instance Name EUROPE DNS Admins
Instance of DNS Admins
Instance Number 4 of 4
Assigned Administrators Laurie, Samuel
Assigned Tasks
Security Group
Permissions Assigned
Notes Based in Chicago
Table 22 shows the model creation entries in the template for this role.
Table 22 Model Creation Template for Service Admin Managers
Role
Field Assignment Information
Role Instance Name Contoso Srvc Admin
Managers
Instance of Service Admin Managers
Instance Number 1 of 1
Assigned Administrators Lisa
Mark (also assigned to
Security Policy Admins, DNS
Admins)
Assigned Tasks
Security Group
Permissions Assigned
Notes Based in Chicago
Now that the creation phase is complete, Contoso has a delegation model that
documents the division of responsibility for service management of the Active
Directory infrastructure. In the next step, the Enterprise Admins group will
implement the Active Directory directory service management model.
• Assumption: The three domains have been installed and are running
Out-of-Box Container Hierarchy for the Forest Root Domain
When the first domain controller is installed to create the forest root domain of
the Contoso forest, the default set of containers shown in Figure 11 is created:
Figure 11 Default Forest Root Domain Containers
154
Group Type: Universal if the forest root domain is in native mode, otherwise
global
Note
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
Windows 2000: the domain mode is
native
2. Grant the following permissions to Contoso Forest Config Ops:
Extended rights:
• DS-Replication-Get-Changes on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• Change-Schema-Master on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• Change-Domain-Master on
CN=Partitions,CN=Configuration,DC=concorp,DC=contoso,DC=com
Permissions on
CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
• Inherit-only Full-Control permissions on all objects of class NTDS-
Settings
156
• The computer object that represents the server that will be promoted to
create a new domain.
• CN=sites,CN=Configuration,DC=concorp,DC=contoso,DC=com
4. Add Contoso Forest Config Ops to the local Administrators group of any
member server that is to be promoted to a Domain Controller.
Implementing Domain Configuration Operators
A member of Enterprise Admins creates three instances of this role, one for each
domain, by performing the following steps.
To implement the Domain Configuration Operators role, forest
root domain instance, for concorp.contoso.com
1. In the concorp.contoso.com domain, create the following security group
under the Service Management OU:
Group Name: Contoso Root Dom Config Ops
Group Type: Universal if the forest root domain is in native mode, otherwise
global
Note
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
or higher
Windows 2000: the domain mode is
native
2. Grant the following permissions to Contoso Root Dom Config Ops:
Extended rights:
• DS-Install-Replica on DC=Contoso,DC=com
• DS-Replication-Get-Changes on DC=contoso,DC=com
• DS-Replication-Get-Changes on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on DC=contoso,DC=com
• DS-Replication-Manage-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
158
• DS-Replication-Manage-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on DC=contoso,DC=com
• DS-Replication-Synchronize on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• Change-RID-Master on CN=RID
Manager$,CN=System,DC=contoso,DC=com
• Change-Infrastructure-Master on DC=contoso,DC=com
• Change-PDC on DC=contoso,DC=com
Permissions on
CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
• Inherit-only Full-Control permissions on all objects of class NTDS-
Settings
• Inherit-only Create Child permissions to be able to create and delete
objects of class Server
• Inherit-only Delete Child permissions to be able to delete objects of class
NTDS-Settings
• Inherit-only Delete Child permissions to be able to delete objects of class
Server
Inheritable Full Control permissions on:
• CN=System,DC=contoso,DC=com
• CN=System,DC=noam,DC=concorp,DC=contoso,DC=com
• CN=System,DC=europe,DC=concorp,DC=contoso,DC=com
Create Child permissions on:
Note If the forest root domain is not in native mode, universal
groups are not available. In this case, create a new domain
local group in each domain and grant that group the
permissions specified earlier in this procedure. Then make the
Contoso Root Dom Config Ops global group a member of these
domain local groups.
• OU=Domain Controllers,DC=contoso,DC=com
• OU=Domain Controllers,DC=noam,DC=concorp,DC=contoso,DC=com
159
• OU=Domain Controllers,DC=europe,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
DC=noam,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
DC=noam,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
DC=noam,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on
DC=noam,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com”
• Change-RID-Master on CN=RID
Manager$,CN=System,DC=noam,DC=concorp,DC=contoso,DC=com
• Change-Infrastructure-Master on
DC=noam,DC=concorp,DC=contoso,DC=com
• Change-PDC on DC=noam,DC=concorp,DC=contoso,DC=com
Permissions on
CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
• Inherit-only Full-Control permissions on all objects of class NTDS-
Settings
• Inherit-only Create Child permissions to be able to create and delete
objects of class Server
• Inherit-only Delete Child permissions to be able to delete objects of class
NTDS-Settings
• Inherit-only Delete Child permissions to be able to delete objects of class
Server
161
Group Type: Universal if the forest root domain is in native mode, otherwise
global
2. Grant the following permissions to EUROPE Dom Config Ops:
Extended rights:
• DS-Replication-Get-Changes on
DC=europe,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
DC=europe,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Get-Changes-All on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
DC=europe,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
DC=europe,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on
DC=europe,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Synchronize on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• Change-RID-Master on CN=RID
Manager$,CN=System,DC=europe,DC=concorp,DC=contoso,DC=com
• Change-Infrastructure-Master on
DC=europe,DC=concorp,DC=contoso,DC=com
• Change-PDC on DC=europe,DC=concorp,DC=contoso,DC=com
163
Permissions on
CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
• Inherit-only Full-Control permissions on all objects of class NTDS-
Settings
• Inherit-only Create Child permissions to be able to create and delete
objects of class Server
• Inherit-only Delete Child permissions to be able to delete objects of class
NTDS-Settings
• Inherit-only Delete Child permissions to be able to delete objects of class
Server
Inheritable Full Control permissions on:
• CN=System,DC=europe,DC=concorp,DC=contoso,DC=com
Note
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
or higher
Windows 2000: the domain mode is
native
2. Grant the following permissions to Contoso Repl Mgmt Admins:
Extended rights:
• DS-Replication-Manage-Topology on
DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
DC=noam,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
DC=europe,DC=concorp,DC=contoso,DC=com
• DS-Replication-Manage-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
165
• DS-Replication-Manage-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
DC=noam,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
DC=europe,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
Full Control permissions on
CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
Implementing Replication Management Admins
A member of Enterprise Admins creates one instance of this role.
To implement the Replication Management Admins role
1. In the concorp.contoso.com domain, create the following security group
under the Service Management OU:
Group Name: Contoso Repl Monitoring Ops
Group Type: Universal if the forest root domain is in native mode, otherwise
global
Note
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
or higher
Windows 2000: the domain mode is
native
2. Grant the following permissions to Contoso Repl Monitoring Ops:
Extended rights:
• DS-Replication-Monitor-Topology on
DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
DC=noam,DC=concorp,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
DC=europe,DC=concorp,DC=contoso,DC=com
166
• DS-Replication-Monitor-Topology on
CN=Configuration,DC=concorp,DC=contoso,DC=com
• DS-Replication-Monitor-Topology on
CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
Note environment is a
If your Active Directory
Windows 2000 environment, the
Replication-Monitor-Topology extended right
is not available. In this case, grant the
Replication-Manage-Topology extended right
on all of the objects specified in the
preceding step.
Full Control permissions on
CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
Implementing DNS Admins
A member of Enterprise Admins creates four instances of this role, as follows:
• Contoso Forest DNS Admins for the entire forest
• Contoso DNS Admins for the concorp.contoso.com domain
• NOAM DNS Admins for the noam.concorp.contoso.com domain
• Europe DNS Admins for the europe.concorp.contoso.com domain
To implement the DNS Admins role, Concorp instance
First the domain instances are implemented, and then the forest root instance,
which must be added to the security groups for each domain instance.
1. In the concorp.contoso.com domain, create the following security group
under the Service Management OU:
Group Name: Concorp DNS Admins
Group Type: Universal if the forest root domain is in native mode, otherwise
global
Note
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
or higher
Windows 2000: the domain mode is
native
2. Grant the following permissions to Concorp DNS Admins:
• Full Control on
CN=MicrosoftDNS,CN=System,DC=concorp,DC=contoso,DC=com
167
• Full Control on
CN=MicrosoftDNS,DC=DomainDnsZones,DC=concorp,DC=contoso,D
C=com
To implement the DNS Admins role, NOAM DNS Admins instance
1. In the concorp.contoso.com domain, create the following security group
under the Service Management OU:
Group Name: NOAM DNS Admins
Group Type: Universal if the forest root domain is in native mode, otherwise
global
2. Grant the following permissions to NOAM DNS Admins:
Full Control on
CN=MicrosoftDNS,CN=System,DC=noam,DC=concorp,DC=contoso,DC=c
om
Full Control over
CN=MicrosoftDNS,DC=DomainDnsZones,DC=noam,DC=concorp,DC=con
toso,DC=com
To implement the DNS Admins role, Europe instance
1. In the concorp.contoso.com domain, create the following security group
under the Service Management OU:
Group Name: Europe DNS Admins
Group Type: Universal if the forest root domain is in native mode, otherwise
global
2. Grant the following permissions to Europe DNS Admins:
Full Control on
CN=MicrosoftDNS,CN=System,DC=europe,DC=concorp,DC=contoso,DC=
com
Full Control over
CN=MicrosoftDNS,DC=DomainDnsZones,DC=europe,DC=concorp,DC=co
ntoso, DC=com
To implement the DNS Admins role, Contoso Forest instance
1. In the concorp.contoso.com domain, create the following security group
under the Service Management OU:
Group Name: Contoso Forest DNS Admins
Group Type: Universal if the forest root domain is in native mode, otherwise
global
2. Add the Contoso Forest DNS Admins group to the following groups:
• Concorp DNS Admins
• NOAM DNS Admins
• Europe DNS Admins
168
Note
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
or higher
Windows 2000: the domain mode is
native
2. Grant the following permissions to Contoso Sec Pol Admins on each of the
following objects:
Objects:
• DC=concorp,DC=contoso,DC=com
• DC=noam,DC=concorp,DC=contoso,DC=com
• DC=europeDC=concorp,DC=contoso,DC=com
• OU=Domain Controllers,DC=concorp,DC=contoso,DC=com
• OU=Domain Controllers,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Domain Controllers,DC=europe,DC=concorp,DC=contoso,DC=com
Permissions:
• Read-property permissions to read the GP-Link property
• Write-property permissions to read the GP-Link property
• Read-property permissions to read the GP-Options property
• Write-property permissions to read the GP-Options property
3. In the properties page for the Domain Controllers OU in each domain, on
the Group Policy tab, select the Default Domain Controllers GPO and on
the Security tab, grant Full Control to Contoso Sec Pol Admins.
169
Note
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
or higher
Windows 2000: the domain mode is
native
2. In each domain in the forest, modify permissions on the object
CN=AdminSDHolder,CN=System,DC=Domain Name, as follows:
a. Grant Contoso Srvc Admin Managers Full Control on the object.
b. Revoke permissions granted to the Domain Admins and Builtin
Administrators groups.
Note
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
or higher
Windows 2000: the domain mode is
native
2. Add Contoso Root & NOAM DC Admins to the security group
CN=Administrators,CN=Builtin,DC=contoso,DC=com
3. Add Contoso NOAM DC Admins to the security group
CN=Administrators,CN=Builtin,DC=noam,DC=concorp,DC=contoso,DC=
com
4. Make sure no other group is a member of the Builtin Administrators group
in noam.concorp.contoso.com.
To implement the Domain Controller Admins role, Europe DC
Admins instance
1. In the concorp.contoso.com domain, create the following security group
under the Service Management OU:
Group Name: Europe DC Admins
Group Type: Universal if the forest root domain is in native mode, otherwise
global
2. Add Contoso Europe DC Admins to the security group
CN=Administrators,CN=Builtin,DC=europe,DC=concorp,DC=contoso,DC
Note
=com
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
or higher
Windows 2000: the domain mode is
native
171
Note
“Native mode” has the following meaning,
depending on the operating system:
Windows Server 2003: the domain
functional level is Windows 2000 native
or higher
Windows 2000: the domain mode is
native
2. In Domain Controller Security Policy in each domain, grant the following
user rights under User Rights Assignment to the respective instance of the
Backup Operators role:
• Allow log on locally
• Back up files and directories
• Shut down the system
3. In Domain Controller Security Policy in each domain, modify the User
Rights Assignment settings to remove all user rights settings that are
granted by default to the Builtin\Backup Operators group, which are:
• Allow log on locally
• Back up files and directories
• Restore files and directories
• Shut down the system
4. Make sure that no other group is granted these user rights.
172
2. Create one OU for each business unit within the Business Units OU in each
domain by creating the objects in Table 27.
Table 27 OUs for Each Business Unit in NOAM and Europe
Domains
Object DN Object Class
OU=RandD,OU=Business organizationalU
Units,DC=noam,DC=concorp,DC=contoso, nit
DC=com
OU=Production,OU=Business organizationalU
Units,DC=noam,DC=concorp,DC=contoso, nit
DC=com
OU=BusMgmt,DC=noam,DC=concorp,DC organizationalU
=contoso,DC=com nit
OU=BusMgmt,DC= organizationalU
europe,DC=concorp,DC=contoso,DC=com nit
OU=IT,DC=noam,DC=concorp,DC=contos organizationalU
o,DC=com nit
OU=IT,DC=europe,DC=concorp,DC=conto organizationalU
so,DC=com nit
Units,DC=europe,DC=concorp,DC=contoso Unit
,DC=com
Figure 13 shows the resulting domain and OU structures for NOAM and Europe.
Figure 13 High-Level Business Unit OU Structure for NOAM and
Europe Domains
Figure 14 shows the domain and OU structures for each domain, including the
security groups within their respective Delegation OUs.
176
the domain. To do so, they modify the permissions on each business unit OU and
grant the appropriate security group full control over the OU.
Table 30 shows the business unit OUs and the respective security groups that
represent the Business Unit Admins role and receive Full Control permissions on
the OU.
Table 30 OUs and Business Unit Admins Groups That Receive
Full Control
OUs Allow Full Control To
OU=RandD,OU=Business RandD Bus Unit Admins
Units,DC=noam,DC=concorp,DC=
contoso,DC=com
OU=Production,OU=Business Production Bus Unit
Units,DC=noam,DC=concorp,DC= Admins
contoso,DC=com
OU=BusMgmt,OU=Business BusMgmt Bus Unit
Units,DC=noam,DC=concorp,DC= Admins
contoso,DC=com
OU=IT,OU=Business IT Bus Admins
Units,DC=noam,DC=concorp,DC=
contoso,DC=com
OU=BusMgmt,OU=Business BusMgmt Bus Admins
Units,DC=europe,DC=concorp,DC
=contoso,DC=com
OU=IT,OU=Business IT Bus Admins
Units,DC=europe,DC=concorp,DC
=contoso,DC=com
• RandD BU Admins
• Production BU Admins
• BusMgmt BU Admins
• IT BU Admins
• A member of the Europe Domain Config Ops group grants each of the
following security groups permission to modify the Member attribute on the
object that represents the respective security group:
• BusMgmt BU Admins
• IT BU Admins
At this point, all of the Business Unit Admins roles have been enabled by
creating the Business Unit Admins groups and granting them permissions to
manage their respective OUs. To delegate the roles, the Domain Configuration
Operators next create the user accounts that will perform each role and add them
to the appropriate groups.
Creating User Accounts for Business Unit Admins Groups
Data owners for each business group have communicated the identities of the
users who will serve as the Business Unit Admins to the Domain Configuration
Operators. The Domain Configuration Operators create these user accounts in the
respective business unit OUs, as shown in Table 31.
Table 31 Business Unit Administrator Accounts
Business Unit/Domain Business Unit Admins Role
Assignments
RandD/NOAM John
Chris
Production/NOAM Mary
Joe
Bus Mgmt/NOAM Sally
IT/NOAM Kevin
Bus Mgmt/Europe Frank
IT/Europe Anna
• CN=Mary,OU=Production,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• CN=Joe,OU=Production,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• CN=Sally,OU=BusMgmt,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• CN=Frank,OU=BusMgmt,OU=Business
Units,DC=europe,DC=concorp,DC=contoso,DC=com
• CN=Kevin,OU=IT,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• CN=Anna,OU=IT,OU=Business
Units,DC=europe,DC=concorp,DC=contoso,DC=com
Note that user accounts for Business Unit Admins of the BusMgmt and IT
business units are created in different domains in order to spread them across all
domains that have the same business unit.
Adding Business Unit Admins User Accounts to Administrative
Security Groups
To actually delegate the Business Unit Admins role and to complete the data
management handoff, the Domain Configuration Operators add the users whose
accounts they have created to the security groups that represent the respective
Business Unit Admins roles.
Table 32 shows the resulting Business Unit Admins group memberships:
Table 32 Business Unit Admin Role Security Groups and Added
Members
Group for User Business Unit Domain
Business Unit Accounts OU
Admins Role
RandD BU John RandD NOAM
Admins Chris
Production BU Mary Production NOAM
Admins Joe
Bus Mgmt BU Frank Bus Mgmt NOAM
Admins
IT BU Admins Kevin IT NOAM
Bus Mgmt BU Sally Bus Mgmt Europe
Admins
IT BU Admins Anna IT Europe
At this point, the data management handoff is complete. All Business Unit
Admins have full control over their business unit OUs.
180
Table 34 shows the distribution of servers across the Contoso business units by
type of server.
Table 34 Distribution of Servers by Type in Contoso Business
Units
Business File Web Database Application
Unit Servers Servers Servers Servers
RandD 800 50 100 50
Production 300 20 100 100
Bus Mgmt 120 45 50 35
IT 30 30 20 20
Table 37 shows the rationale for the OU structure shown in Figure 15.
Table 37 Purpose of Each OU in the RandD Business Unit OU
Hierarchy
Organizational Unit Purpose
User Accounts Main OU to store user
accounts
Delegation point for Account
Admins role
User Accounts\Research Used to apply Group Policy
for research user accounts
User Accounts\Development Used to apply Group Policy
for development user
accounts
Workstations Main OU to store computer
accounts for workstations
Delegation point for
Workstation Admins role
Workstations\Desktops Used to apply Group Policy
184
Table 39 shows the model creation template that the data owners fill out to
document the RandD Workstation Admins role.
Table 39 Model Creation Template for RandD Workstation
Admins Role
Field Assignment Information
Role Instance Name RandD Workstation Admins
Instance of Account Admins
Instance Number 1 of 1
186
Table 40 shows the model creation template that the data owners fill out to
document the RandD Resource Admins role.
Table 40 Model Creation Template for RandD Resource Admins
Role
Field Assignment Information
Role Instance Name: RandD Resource Admins
Instance of: Account Admins
Instance Number: 1 of n, where n = as many as
needed over time
Assigned Administrators: Deborah, Paul
Assigned Tasks: Overall responsibility for all
aspects of resource
management
Security Group Implementation
Permissions Assigned Implementation
Notes Creation/Implementation
Table 43 shows the rationale for the OU structure shown in Figure 16.
189
Table 45 shows the model creation template that the data owners fill out to
document the Production Workstation Admins role in the first Atlanta location.
Table 45 Model Creation Template for Production Workstation
Admins Role in Location 1
Field Assignment Information
Role Instance Name Production Location 1
Workstation Admins
Instance of Workstation Admins
Instance Number 1 of 2
Assigned Administrators Michael, Dave
Assigned Tasks Manage all aspects of
workstation management for
Location 1
Security Group Implementation
Permissions Assigned Implementation
191
Table 46 shows the model creation template that the data owners fill out to
document the Production Workstation Admins role in the second Atlanta
location.
Table 46 Model creation template for Production Workstation
Admins role in Location 2
Field Assignment Information
Role Instance Name Production Location 2
Workstation Admins
Instance of Workstation Admins
Instance Number 2 of 2
Assigned Administrators Adam, Charlotte
Assigned Tasks Manage all aspects of
workstation management for
Location 2
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 47 shows the model creation template that the data owners fill out to
document the Production Resource Admins role for the first application.
Table 47 Model Creation Template for Production Resource
Admins Role for Application 1
Field Assignment Information
Role Instance Name Production Application 1
Resource Admins
Instance of Resource Admins
Instance Number 1 of 4
Assigned Administrators Nick, Wade
Assigned Tasks Overall responsibility for all
aspects of resource
management for application
1
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
192
Table 48 shows the model creation template that the data owners fill out to
document the Production Resource Admins role for the second application.
Table 48 Model Creation Template for Production Resource
Admins Role for Application 2
Field Assignment Information
Role Instance Name Production Application 2
Resource Admins
Instance of Resource Admins
Instance Number 2 of 4
Assigned Administrators Jennifer, Brad
Assigned Tasks Overall responsibility for all
aspects of resource
management for application
2
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 49 shows the model creation template that the data owners fill out to
document the Production Resource Admins role for the third application.
Table 49 Model Creation Template for Production Resource
Admins Role for Application 3
Field Assignment Information
Role Instance Name Production Application 3
Resource Admins
Instance of Resource Admins
Instance Number 3 of 4
Assigned Administrators Scott, Laura
Assigned Tasks Overall responsibility for all
aspects of resource
management for application
3
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 50 shows the model creation template that the data owners fill out to
document the Production Resource Admins role for the common set of resources.
193
Creating the Delegation Model for the Bus Mgmt Business Unit
This business unit has two main divisions — business management and sales.
The business management unit is based in Chicago and includes the product
planning, legal, marketing, and other groups. The marketing and legal business
management teams and the sales team are spread over different physical
locations across North America and Europe.
Approximately 550 employees work for the Bus Mgmt business unit. The sales
division is the largest division, with 400 employees. Each sales representative
has a portable computer. All users in this business unit have a portable computer
and a desktop, making a total of 700 managed workstations. Additionally, about
250 servers provide various required services.
Table 51 shows the number of user, workstation, and server accounts that are
stored in the Bus Mgmt business unit in the Chicago and London locations.
Table 51 Users, Workstations, and Servers in the Bus Mgmt
Business Unit
Locations Users Workstations Servers
Chicago, 5,500 7,000 250
London
Table 52 shows the number of user, workstation, and server accounts that are
stored in the Bus Mgmt business unit in the Chicago and London locations,
separated by each division. Because business unit users are based across two
different continents, business unit content is distributed across the two domains
noam.concorp.contoso.com and europe.concorp.contoso.com.
194
Table 53 shows the numbers of server types that Bus Mgmt stores.
Table 53 Distribution of Server Types in Bus Mgmt Business
Unit
File
Locations Servers Web Database Application
Servers Servers Servers
Chicago, 120 45 50 35
London
• User Accounts. All user accounts in North America need one Group Policy
for user configuration settings. Similarly, all accounts in Europe need one
Group Policy for user configuration settings. Additionally all users in each
division need a common user configuration policy.
• Workstations. Requirements for scripts and other computer configuration
settings necessitate that different Group Policy settings be applied for
desktop and portable computers.
• Resources. Computer configuration settings necessitate that different Group
Policy settings be applied for different kinds of resources and might require
the application of specific Group Policy settings for the various specific
resources.
Bus Mgmt OU Structure Based on Administrative and Group
Policy Requirements
Figure 17 shows the OU structure for the Bus Mgmt OU that accommodates the
administrative and Group Policy requirements for the
noam.concorp.contoso.com domain.
Figure 17 Bus Mgmt OU Structure for
noam.concorp.contoso.com
196
Figure 18 shows the OU structure for the Bus Mgmt OU that accommodates the
administrative and Group Policy requirements for the
europe.concorp.contoso.com domain.
Figure 18 Bus Mgmt OU Structure for
europe.concorp.contoso.com
201
Note
One group is instantiated in the
noam.concorp.contoso.com domain and one
in the europe.concorp.contoso.com domain.
• Workstation Management. Because a different administrative group is
required for each of the five physical locations, five instances of the
Workstation Admins role are required.
Note
Certain groups are shared across both
noam.concorp.contoso.com domain and the
europe.concorp.contoso.com domain.
• Resource Management. Based on the business unit requirements, one
Resource Admins role instance is required to manage all servers that belong
to all the business applications hosted in Chicago and one instance of the
Resource Admins role is required for every physical location of this business
unit, for a total of six role instances.
Table 56 shows the model creation template that the data owners fill out to
document the Bus Mgmt NOAM Account Admins role.
204
Table 57 shows the model creation template that the data owners fill out to
document the Bus Mgmt Europe Account Admins role.
Table 57 Model Creation Template for Bus Mgmt Europe
Account Admins Role
Field Assignment Information
Role Instance Name Business Mgmt Europe
Account Admins
Instance of Account Admins
Instance Number 2 of 2
Assigned Administrators Robert, Michelle
Assigned Tasks Manage all aspects of
account management for all
accounts in Europe
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 58 shows the model creation template that the data owners fill out to
document the Bus Mgmt Chicago Workstation Admins role.
Table 58 Model creation template for Bus Mgmt Chicago
Workstation Admins role
Field Assignment Information
205
Table 59 shows the model creation template that the data owners fill out to
document the Bus Mgmt London Workstation Admins role.
Table 59 Model creation template for Bus Mgmt London
Workstation Admins role
Field Assignment Information
Role Instance Name Business Mgmt London
Workstation Admins
Instance of Workstation Admins
Instance Number 2 of 5
Assigned Administrators Stuart, Ken
Assigned Tasks Manage all aspects of
workstation management for
all workstations in London
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 60 shows the model creation template that the data owners fill out to
document the Bus Mgmt New York Workstation Admins role.
Table 60 Model Creation Template for Bus Mgmt New York
Workstation Admins Role
Field Assignment Information
Role Instance Name Business Mgmt New York
Workstation Admins
Instance of Workstation Admins
206
Instance Number 3 of 5
Assigned Administrators Linda, Steve
Assigned Tasks Manage all aspects of
workstation management for
all workstations in New York
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 61 shows the model creation template that the data owners fill out to
document the Bus Mgmt Paris Workstation Admins role.
Table 61 Model Creation Template for Bus Mgmt Paris
Workstation Admins Role
Field Assignment Information
Role Instance Name Business Mgmt Paris
Workstation Admins
Instance of Workstation Admins
Instance Number 4 of 5
Assigned Administrators Marc, Sara
Assigned Tasks Manage all aspects of
workstation management for
all workstations in Paris
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 62 shows the model creation template that the data owners fill out to
document the Bus Mgmt Rome Workstation Admins role.
Table 62 Model Creation Template for Bus Mgmt Rome
Workstation Admins Role
Field Assignment Information
Role Instance Name Business Mgmt Rome
Workstation Admins
Instance of Workstation Admins
Instance Number 5 of 5
Assigned Administrators Victor, Rosa
Assigned Tasks Manage all aspects of
207
Table 63 shows the model creation template that the data owners fill out to
document the Bus Mgmt Application Admins role.
Table 63 Model Creation Template for Bus Mgmt Application
Admins Role
Field Assignment Information
Role Instance Name Business Mgmt Application
Admins
Instance of Resource Admins
Instance Number 1 of 6
Assigned Administrators Fred, Glenn
Assigned Tasks Manage all aspects of all
business management
business unit applications
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 64 shows the model creation template that the data owners fill out to
document the Bus Mgmt Chicago Resource Admins role.
Table 64 Model Creation Template for Bus Mgmt Chicago
Resource Admins Role
Field Assignment Information
Role Instance Name Business Mgmt Chicago
Resource Admins
Instance of Resource Admins
Instance Number 2 of 6
Assigned Administrators Kristen, Terry
Assigned Tasks Manage all aspects of other
business management
business unit resources in
Chicago
Security Group Implementation
208
Table 65 shows the model creation template that the data owners fill out to
document the Bus Mgmt London Resource Admins role.
Table 65 Model Creation Template for Bus Mgmt London
Resource Admins Role
Field Assignment Information
Role Instance Name Business Mgmt London
Resource Admins
Instance of Resource Admins
Instance Number 3 of 6
Assigned Administrators Ron, Allison
Assigned Tasks Manage all aspects of other
business management
business unit resources in
London
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 66 shows the model creation template that the data owners fill out to
document the Bus Mgmt New York Resource Admins role.
Table 66 Model Creation Template for Bus Mgmt New York
Resource Admins Role
Field Assignment Information
Role Instance Name Business Mgmt New York
Resource Admins
Instance of Resource Admins
Instance Number 4 of 6
Assigned Administrators Chris, Julian
Assigned Tasks Manage all aspects of other
business management
business unit resources in
New York
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
209
Table 67 shows the model creation template that the data owners fill out to
document the Bus Mgmt Paris Resource Admins role.
Table 67 Model Creation Template for Bus Mgmt Paris Resource
Admins Role
Field Assignment Information
Role Instance Name Business Mgmt Paris
Resource Admins
Instance of Resource Admins
Instance Number 5 of 6
Assigned Administrators Albert, Emile
Assigned Tasks Manage all aspects of other
business management
business unit resources in
Paris
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 68 shows the model creation template that the data owners fill out to
document the Bus Mgmt Rome Resource Admins role.
Table 68 Model Creation Template for Bus Mgmt Rome
Resource Admins Role
Field Assignment Information
Role Instance Name Business Mgmt Rome
Resource Admins
Instance of Resource Admins
Instance Number 6 of 6
Assigned Administrators David, Thomas
Assigned Tasks Manage all aspects of other
business management
business unit resources in
Rome
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
210
Table 70 shows the numbers of server types that the IT business unit stores.
Table 70 Distribution of Server Types in the IT Business Unit
Business File Web Database Application
Unit Servers Servers Servers Servers
IT 30 30 20 20
• User Accounts. All user accounts in North America require one Group
Policy for user configuration settings. Similarly, all accounts in Europe need
one Group Policy for user configuration settings.
• Workstations. All workstations in North America require one Group Policy
for computer configuration settings and all workstations in Europe need one
Group Policy for computer configuration settings.
• Resources. Computer configuration settings necessitate that different Group
Policy settings be applied for different kinds of resources and might require
the application of specific Group Policy settings for the various specific
resources.
IT OU Structure Based on Administrative and Group Policy
Requirements
Figure 19 shows the OU structure for the IT OU that accommodates the
administrative and Group Policy requirements for the
noam.concorp.contoso.com domain.
212
Note
One group is instantiated in the
noam.concorp.contoso.com domain and one
in the europe.concorp.contoso.com domain.
• Workstation Management. Because a different administrative group is
required for each of the five physical locations, five instances of the
Workstation Admins role are required.
Note
Certain groups are shared across both
noam.concorp.contoso.com domain and the
europe.concorp.contoso.com domain
• Resource Management. Based on the business unit requirements, one
instance of the Resource Admins role is required to manage all the servers
that belong to all the IT applications in Chicago and one instance of the
Resource Admins role is required for every physical location where this
business unit is located.
Table 71 shows the model creation template that the data owners fill out to
document the IT NOAM Account Admins role.
Table 71 Model Creation Template for IT NOAM Account Admins
Role
Field Assignment Information
Role Instance Name IT NOAM Account Admins
Instance of Account Admins
Instance Number 1 of 2
Assigned Administrators Roderick, Francisco
Assigned Tasks Manage all aspects of acct
mgmt for all IT accounts in
North America
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 72 shows the model creation template that the data owners fill out to
document the IT Europe Account Admins role.
215
Table 73 shows the model creation template that the data owners fill out to
document the IT Chicago Workstation Admins role.
Table 73 Model Creation Template for IT Chicago Workstation
Admins Role
Field Assignment Information
Role Instance Name IT Chicago Workstation
Admins
Instance of Workstation Admins
Instance Number 1 of 5
Assigned Administrators Larry, John
Assigned Tasks Manage all aspects of
workstation mgmt for all IT
business unit workstations in
Chicago
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 74 shows the model creation template that the data owners fill out to
document the IT London Workstation Admins role.
Table 74 Model Creation Template for IT London Workstation
Admins Role
Field Assignment Information
216
Table 75 shows the model creation template that the data owners fill out to
document the IT New York Workstation Admins role.
Table 75 Model Creation Template for IT New York Workstation
Admins Role
Field Assignment Information
Role Instance Name IT New York Workstation
Admins
Instance of Workstation Admins
Instance Number 3 of 5
Assigned Administrators Neil, Paulette
Assigned Tasks Manage all aspects of
workstation mgmt for all IT
business unit workstations in
New York
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 76 shows the model creation template that the data owners fill out to
document the IT Paris Workstation Admins role.
Table 76 Model Creation Template for IT Paris Workstation
Admins Role
Field Assignment Information
Role Instance Name IT Paris Workstation Admins
Instance of Workstation Admins
217
Instance Number 4 of 5
Assigned Administrators Elliott, Marie
Assigned Tasks Manage all aspects of
workstation mgmt for all IT
business unit workstations in
Paris
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 77 shows the model creation template that the data owners fill out to
document the IT Rome Workstation Admins role.
Table 77 Model Creation Template for IT Rome Workstation
Admins Role
Field Assignment Information
Role Instance Name: IT Rome Workstation Admins
Instance of Workstation Admins
Instance Number 5 of 5
Assigned Administrators Paul, Eleonora
Assigned Tasks Manage all aspects of
workstation mgmt for all IT
business unit workstations in
Rome
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 78 shows the model creation template that the data owners fill out to
document the IT Application Admins role.
Table 78 Model Creation Template for IT Application Admins
Role
Field Assignment Information
Role Instance Name: IT Application Admins
Instance of Resource Admins
Instance Number 1 of 6
Assigned Administrators Karen, Luke
Assigned Tasks Manage all aspects of all IT
218
Table 79 shows the model creation template that the data owners fill out to
document the IT Chicago Resource Admins role.
Table 79 Model Creation Template for IT Chicago Resource
Admins Role
Field Assignment Information
Role Instance Name IT Chicago Resource Admins
Instance of Resource Admins
Instance Number 2 of 6
Assigned Administrators Perry, Steve
Assigned Tasks Manage all aspects of other
IT business unit resources in
Chicago
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 80 shows the model creation template that the data owners fill out to
document the IT London Resource Admins role.
Table 80 Model Creation Template for IT London Resource
Admins Role
Field Assignment Information
Role Instance Name IT London Resource Admins
Instance of Resource Admins
Instance Number 3 of 6
Assigned Administrators Jerry, Carol
Assigned Tasks Manage all aspects of other
IT business unit resources in
London
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
219
Table 81 shows the model creation template that the data owners fill out to
document the IT New York Resource Admins role.
Table 81 Model Creation Template for IT New York Resource
Admins Role
Field Assignment Information
Role Instance Name IT New York Resource Admins
Instance of Resource Admins
Instance Number 4 of 6
Assigned Administrators Jack, Erica
Assigned Tasks Manage all aspects of other
IT business unit resources in
New York
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 82 shows the model creation template that the data owners fill out to
document the IT Paris Resource Admins role.
Table 82 Model Creation Template for IT Paris Resource Admins
Role
Field Assignment Information
Role Instance Name IT Paris Resource Admins
Instance of Resource Admins
Instance Number 5 of 6
Assigned Administrators Guy, Lise
Assigned Tasks Manage all aspects of other
IT business unit resources in
Paris
Security Group Implementation
Permissions Assigned Implementation
Notes Creation and implementation
Table 83 shows the model creation template that the data owners fill out to
document the IT Rome Resource Admins role.
Table 83 Model Creation Template for IT Rome Resource Admins
Role
Field Assignment Information
220
• OU=Workstations,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Resources,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Research,OU=User Accounts,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Development,OU=User Accounts,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Desktops,OU=Workstations,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Laptops,OU=Workstations,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=File Servers,OU=Resources,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Web Servers,OU=Resources,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Database Servers,OU=Resources,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Application Servers,OU=Resources,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com
Implementing RandD Role Instances
To implement the RandD business administrative roles, the RandD business unit
administrator creates security groups in the Delegation OU to represent the role
instances for the business unit.
In OU=Delegation,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com, the following groups are
created:
• RandD Account Admins
• RandD Workstation Admins
• RandD Resource Admins
The RandD the business unit administrator grants permissions to security groups
as follows:
• RandD Account Admins: Full Control on the Accounts OU
• RandD Workstation Admins: Full Control on the Workstations OU
• RandD Resource Admins: Full Control on the Resources OU
Additionally, the Restricted Groups feature of Group Policy is used to add the
security groups representing the Workstation Admins and Resource Admins roles
to the local Administrators groups on member servers.
222
NOAM .contoso.com
Account
Admins
BusMgmt Full Control Accounts OU europe.conco
Europe rp.contoso.co
Account m
Admins
BusMgmt Full Control Chicago OU noam.concorp
Chicago within the .contoso.com
Workstation Workstations
Admins OU
BusMgmt Full Control London OU noam.concorp
London within the .contoso.com
Workstation Workstations
Admins OU
BusMgmt Full Control New York OU noam.concorp
New York within the .contoso.com
Workstation Workstations
Admins OU
BusMgmt Full Control Paris OU europe.conco
Paris within the rp.contoso.co
Workstation Workstations m
Admins OU
BusMgmt Full Control Rome OU europe.conco
Rome within the rp.contoso.co
Workstation Workstations m
Admins OU
BusMgmt Full Control Applications noam.concorp
Application OU within the .contoso.com
Admins Resources OU
BusMgmt Full Control Chicago OU noam.concorp
Chicago within the .contoso.com
Resource Resources OU
Admins
BusMgmt Full Control London OU europe.conco
London within the rp.contoso.co
Resource Resources OU m
Admins
BusMgmt Full Control New York OU noam.concorp
New York within the .contoso.com
Resource Resources
Admins
BusMgmt Full Control Paris OU europe.conco
Paris within the rp.contoso.co
Resource Resources OU m
227
Admins
BusMgmt Full Control Rome OU europe.conco
Rome within the rp.contoso.co
Resource Resources OU m
Admins
Additionally, the Restricted Groups feature of Group Policy is used to add the
security groups representing Workstation Admins and Resource Admins roles to
the local Administrators groups on member servers.
Assigning Bus Mgmt Administrative Users to Roles
The Bus Mgmt business unit administrator adds the accounts of the
administrative personnel listed for each role in the delegation model templates to
the respective security groups that represent the role instances.
Implementing the Data Delegation Model for the IT Business Unit
The IT business unit administrator is responsible for creating the business unit
OU structure and implementing the data management delegation model for this
business unit.
Creating the OU structure for the IT Business Unit
To create the Bus Mgmt OU structure, the IT business unit administrator creates
the OU objects shown in Figures 17 and 18 earlier in this document.
Implementing IT Role Instances
To implement the IT business unit administrative roles, the IT business unit
administrator creates security groups in the Delegation OU of each domain to
represent the required role instances:
In OU=Delegation,OU=IT,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com, the following groups are
created:
• IT NOAM Account Admins
• IT Chicago Workstation Admins
• IT New York Workstation Admins
• IT Application Admins
• IT Chicago Resource Admins
• IT New York Resource Admins
In OU=Delegation,OU=IT,OU=Business
Units,DC=europe,DC=concorp,DC=contoso,DC=com, the following groups are
created:
• IT Europe Account Admins
• IT London Workstation Admins
• IT Paris Workstation Admins
228
Additionally, the Restricted Groups feature of Group Policy is used to add the
security groups representing the Workstation Admins and Resource Admins roles
to the local Administrators groups on member servers.
Assigning IT Administrative Users to Roles
The IT BU Admin adds the accounts of the administrative personnel listed for
each role in the delegation model templates to the respective security groups that
represent the role instances.
This completes Contoso’s implementation of the delegation model. From this
point, Contoso will follow the recommendations for maintaining the delegation
model.