DESKTOP

Windows Server 2008 R2 Active Directory Domain Services Primer : Outlining the Role of Groups in an AD DS Environment

1/19/2011 9:14:47 AM
The AD DS group structure, although not new in AD DS, provides an efficient mechanism for managing security on large numbers of users. Without groups to logically organize users, permissions on each object in a network would have to be set up manually on a per-user basis. This means that if an entire department needed access to a printer, each user would need to be manually entered into the permissions list of that printer. These tasks would make administration of security daunting.

The concept of groups was therefore devised to ease administration. If a large department needed access to that same printer, the department’s group need only be supplied the necessary permissions. This greatly eases security-based administration and has the added advantage of providing for ease of transition if specific users leave the company or are transferred to a different department. For example, imagine an administrator in charge of printing and her user account is a member of a group named Printer Admins, which has full administrative privilege to the printers. Now, if this user transfers to become an email administrator, for example, reassigning permissions to a new print administrator is as simple as adding that new user to the Printer Admins group. This capability greatly simplifies these types of situations.

Groups in AD DS work in the way that previous group structures, particularly in Windows NT, have worked, but with a few modifications to their design. Groups are divided into two categories: group type and group scope. There are two group types in AD DS: security and distribution. Essentially, a security group can be used to apply permissions to objects for the members of the group. A distribution group, on the other hand, cannot be used for permissions but is used instead to send mail to members of the group. Group scope in AD DS is likewise divided into several components, defined as follows:

  • Machine local groups— Machine local groups, also known as simply “local groups,” can theoretically contain members from any trusted location. Users and groups in the local domain, as well as in other trusted domains and forests, can be included in this type of group. However, it is important to note that local groups allow resources to be accessed only on the machine where they are located, which greatly reduces their usability.

  • Domain local groups— Domain local groups are essentially the same thing as local groups in Windows NT, and are used to administer resources located only on their own domain. They can contain users and groups from any other trusted domain. Most typically, these types of groups are used to grant access to resources for groups in different domains.

  • Global groups— Global groups are on the opposite side from domain local groups. They can contain users only in the domain in which they exist but are used to grant access to resources in other trusted domains. These types of groups are best used to supply security membership to user accounts that share a similar function, such as the sales global group.

  • Universal groups— Universal groups can contain users and groups from any domain in the forest and can grant access to any resource in the forest. Along with this added power come a few caveats. First, universal groups are available only in domains with a functional level of Windows 2000 Native or later. Second, all members of each universal group are stored in the global catalog, increasing the replication load. It is important to note, however, that universal group membership replication has been noticeably streamlined and optimized in Windows Server 2008 R2 because the membership is incrementally replicated.

Types of Groups

The type of group used (domain local, global, or universal) has significant impact on replication of group objects for large, multidomain organizations as well as organizations with sites connected through slow links.

For a single-domain organization with high-speed connections to all sites, domain local, global, and universal groups are effectively the same because the organization has only one domain, and replication occurs at high speeds to all domain controllers.

However, in a multidomain environment, by default, only the group name of a global group replicates between domains, not the membership names. Therefore, if a user in one domain wants to view the member list of a global group in another domain, the user’s request will have to query across a WAN to the other domain to view the membership of the global group.

Universal groups, on the other hand, do replicate group membership information between domains, so a user query of a universal group membership list will be immediately available in the user’s local domain. However, because universal group membership replicates between domains, if a list of group members is not needed to replicate between domains, traffic can be minimized by simply making the group a global group.


Choosing Between OUs and Groups

Whereas OUs are primarily used to segregate administrative function, groups are useful for logical organization of security functions. Translated, OUs are created if there is a need for a department or physical location to have some certain type of administrative control over its own environment. For example, an organization with offices in Japan could organize its Japanese users into a separate OU and give a local administrator password-change and account-creation privileges for that OU. Groups, however, can be used to organize users to more easily apply security permissions. For example, you can create a group named Japanese Office Users that contains all the users from the office in Japan. Security permissions can then be established on objects in AD DS using that group. They could, for example, be given privileges to folders in the main corporate location, something that could not be done at the OU level.

To summarize, the basic differences between OUs and groups is that groups can be used when applying security to objects, whereas OUs exist when certain administrative functionality needs to be delegated. 

Other  
  •  Understanding Windows 7 Personalization
  •  Windows 7 : Understanding User Account Control and Its Impact on Performance
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Understanding Domain Trusts
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Outlining AD DS’s Components
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Examining AD DS’s Structure
  •  Fine-Tuning Windows 7’s Appearance and Performance : Balancing Appearance and Performance
  •  Windows 7: Customizing Menus and the Control Panel (part 2) - Navigating and Customizing the Control Panel
  •  Windows 7: Customizing Menus and the Control Panel (part 1) - Navigating and Customizing Your Computer’s Menus
  •  Installing Windows Server 2008 R2 and Server Core : Managing and Configuring a Server Core Installation
  •  Installing Windows Server 2008 R2 and Server Core : Understanding Server Core Installation
  •  Installing Windows Server 2008 R2 and Server Core : Upgrading to Windows Server 2008 R2
  •  Windows 7 : Using Desktop Gadgets (part 3) - Using the Stock, Currency, Slide Show gadget
  •  Windows 7 : Using Desktop Gadgets (part 2) - Using the Clock, CPU Meter, Weather gadget
  •  Windows 7 : Using Desktop Gadgets (part 1) - Using the Calendar gadget
  •  Installing a Clean Version of Windows Server 2008 R2 Operating System (part 2) - Finalizing the Installation and Customizing the Configuration
  •  Installing a Clean Version of Windows Server 2008 R2 Operating System (part 1)
  •  Installing Windows Server 2008 R2 and Server Core : Preplanning and Preparing a Server Installation
  •  Customizing Windows 7’s Desktop (part 3) - Getting Around the Taskbar
  •  Customizing Windows 7’s Desktop (part 2) - Getting Around the Start Menu
  •  Customizing Windows 7’s Desktop (part 1) - Getting Around the Desktop
  •  
    Most View
    Apple iPod Touch (2012) - A sleeker, Speedier Touch
    Apple iPhone 5 vs. iPhone 4S
    17 Killer Mac Apps Under $20 (Part 2)
    HTC Desire U - Beautiful Display And Smart Features
    Devolo dLAN LiveCam Starter Kit
    Hit List: Current iPad And iPhone Line-Ups (Part 2)
    Buyer’s Guide: e-Readers That Fits Your Needs Best (Part 1)
    Buying Guide: Tripods over $225 (Part 1)
    On Test - Postcard Apps (Part 1)
    Some Of The Biggest Brands In The World Had Their Products (Part 7) - Pioneer HTZ-828BD, Sharp BD-AMS10A, Samsung NX1000
    Top 10
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 10) - Color Gamut and Accuracy, Monitor Rating
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 9)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 8) - Battery life, AC draw, and charging speed
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 7)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 6)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 5) - Black Ops II, Battlefied 3, and Sniper Elite v2
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 4)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 3)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 2)
    MSI GX60 Review - Radeon HD 7970M In A $1,200 Gaming Notebook (Part 1)