DESKTOP

Windows Server 2008 R2 Active Directory Domain Services Primer : Understanding Domain Trusts

1/18/2011 3:12:53 PM
Domain trusts across forests used to require individual, explicitly defined trusts for each domain. This created an exponential trust relationship, which was difficult, to say the least, to manage. Windows 2003 took the trust relationship to a new level of functionality, with transitive trusts supplying automatic paths “up and down the forest tree.” These trusts are implicitly easier to understand and troubleshoot, and have greatly improved the manageability of Windows networks.

Conceptualizing Transitive Trusts

Two-way transitive trusts are automatically established upon the creation of a subdomain or with the addition of a domain tree into an AD DS forest. Transitive trusts are normally two-way, with each domain trusting the other domain. In other words, users in each domain can access resources such as printers or servers in the other domain if they are explicitly given rights in those domains. Bear in mind that just because two domains have a trust relationship does not mean that users from one domain can automatically access all the resources in the other domain; it is simply the first step in accessing those resources. The proper permissions still need to be applied.

Understanding Explicit Trusts

Explicit trusts are those that are set up manually, similar to the way that Windows NT trusts were constructed. A trust can be set up to join two unrelated domain trees into a shared security framework, for example. Explicit trusts are one-way, but two explicit trusts can be established to create a two-way trust. In Figure 1, an explicit trust has been established between the companyabc domain and the companyxyz domain to join them into the same structure. Explicit trusts to down-level (pre-Windows 2003 Functional mode) forests are required as cross-forest transitive trusts are not available until the forest is in Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2 Functional modes.

Figure 1. Sample explicit trust between two domain trees.

When an explicit trust is set up to expedite the flow of trusts from one subdomain to another, it is known as a shortcut trust. Shortcut trusts simply allow authentication verifications to be processed faster, as opposed to having to move up and down a domain tree. In Figure 2, while a transitive trust exists between the asia.companyabc.com and the europe.companyabc.com domains, a shortcut trust has been created to minimize authentication time for access between the two subdomains of this organization.

Figure 2. Sample shortcut trust between two subdomains in a forest.


Another possible use for explicit trusts is to allow connectivity between an AD DS forest and an external domain. These types of explicitly defined trusts are known as external trusts, and they allow different forests to share information without actually merging schema information or global catalogs.

Defining Organizational Units

As defined in the RFC for the LDAP standard, organizational units (OUs) are containers that logically store directory information and provide a method of addressing AD DS through LDAP. In AD DS, OUs are the primary method for organizing user, computer, and other object information into a more easily understandable layout. As shown in Figure 3, the organization has a root organizational unit where three nested organizational units (marketing, IT, and research) have been placed. This nesting enables the organization to distribute users across multiple containers for easier viewing and administration of network resources.

Figure 3. Viewing an organizational unit structure that provides a graphical view of network resource distribution.


As you can see, OUs can be further subdivided into resource OUs for easy organization and delegation of administration. Far-flung offices could have their own OUs for local administration as well. It is important to understand, however, that an OU should be created typically when the organization has a specific need to delegate administration to another set of administrators. If the same person or group of people administer the entire domain, there is no need to increase the complexity of the environment by adding OUs. In fact, too many OUs can affect group policies, logons, and other factors.

Determining Domain Usage Versus OU Usage

As previously mentioned, some administrators tend to start applying the AD DS domain structure to political boundaries within the organization. The dry-erase markers come out and, very soon, well-meaning managers get involved, organizing the AD DS structure based on political boundaries. Subdomains start to become multiple layers deep, with each department taking its own subdomain. The AD DS structure allows for this type of administrative granularity without division into multiple domains. In fact, the rule of thumb when designing domains is to start with a single domain and add additional domains only when necessary. In a nutshell, the type of administrative control required by many organizations can be realized by division of groups into separate organizational units rather than into separate domains.

OUs can, therefore, be structured to allow for separate departments to have various levels of administrative control over their own users. For example, a secretary in the Engineering department can be delegated control of resetting passwords for users within his own OU. Another advantage of OU use in these situations is that users can be easily dragged and dropped from one OU to another. For example, if users are moved from one department to another, moving them into their new department’s OU is extremely simple.

It is important to keep in mind that OU structure can be modified on the fly any time an administrator feels fit to make structural changes. This gives AD DS the added advantage of being forgiving for OU design flaws because changes can be made at any time.

Other  
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Outlining AD DS’s Components
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Examining AD DS’s Structure
  •  Fine-Tuning Windows 7’s Appearance and Performance : Balancing Appearance and Performance
  •  Windows 7: Customizing Menus and the Control Panel (part 2) - Navigating and Customizing the Control Panel
  •  Windows 7: Customizing Menus and the Control Panel (part 1) - Navigating and Customizing Your Computer’s Menus
  •  Installing Windows Server 2008 R2 and Server Core : Managing and Configuring a Server Core Installation
  •  Installing Windows Server 2008 R2 and Server Core : Understanding Server Core Installation
  •  Installing Windows Server 2008 R2 and Server Core : Upgrading to Windows Server 2008 R2
  •  Windows 7 : Using Desktop Gadgets (part 3) - Using the Stock, Currency, Slide Show gadget
  •  Windows 7 : Using Desktop Gadgets (part 2) - Using the Clock, CPU Meter, Weather gadget
  •  Windows 7 : Using Desktop Gadgets (part 1) - Using the Calendar gadget
  •  Installing a Clean Version of Windows Server 2008 R2 Operating System (part 2) - Finalizing the Installation and Customizing the Configuration
  •  Installing a Clean Version of Windows Server 2008 R2 Operating System (part 1)
  •  Installing Windows Server 2008 R2 and Server Core : Preplanning and Preparing a Server Installation
  •  Customizing Windows 7’s Desktop (part 3) - Getting Around the Taskbar
  •  Customizing Windows 7’s Desktop (part 2) - Getting Around the Start Menu
  •  Customizing Windows 7’s Desktop (part 1) - Getting Around the Desktop
  •  Becoming an Excel Programmer : Navigate Samples and Help
  •  Becoming an Excel Programmer : Write Bug-Free Code
  •  Windows Server 2008 : The Pilot Phase - Validating the Plan to a Limited Number of Users
  •  
    Most View
    Apple Macbook Air 11-inch (MID-2012) - Smallest And Cutest Mac Portable Ever Made
    The Contemporary APUs - AMD Trinity vs Intel Ivy Bridge (Part 2)
    Windows Vista : Build Your Network (part 5) - Lock Out Unauthorized PCs, Connect to a Public Wireless Network
    App Of The Week: LocalUncle
    Screen Play For Gaming (Part 2) : Asus VG278HE, BenQ XL242T, Dell S2440L, Dell 2913WM
    Lenovo Thinkpad T430 - Legendary Quality, Rock-Solid Durability
    Microsoft Visual Basic 2008 : Using the WMI Class
    Fuze Powered by Raspberry Pi
    Surveillance Through Facial Recognition (Part 2)
    Group Test: Which Are The Best Cases On The Market? (Part 1) - Corsair Graphite 600T Steel Silver Case, Xigmatek Elysium Windowed Case
    Top 10
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 10) - Color Gamut and Accuracy, Monitor Rating
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 9)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 8) - Battery life, AC draw, and charging speed
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 7)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 6)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 5) - Black Ops II, Battlefied 3, and Sniper Elite v2
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 4)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 3)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 2)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 1)