programming4us
programming4us
DESKTOP

Designing a Windows Server 2008 R2 Active Directory : Understanding AD DS Domain Design

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire
1/21/2011 11:38:04 AM
Before any domain design decisions can be made, it is important to have a good grasp of AD DS’s domain structure and functionality. Some fairly major changes have been made in Windows Server 2008 R2 that require a reintroduction to the domain design process. In addition, real-world experience with AD domain design has changed some of the assumptions that were made previously.

Examining Domain Trusts

Windows Server 2008 R2’s AD DS domains can be linked to each other through the use of a concept known as trusts. A trust is essentially a mechanism that allows resources in one domain to be accessible by authenticated users from another domain. AD trusts take on many forms but typically fall into one of the four categories described in the following sections.

Transitive Trusts

Transitive trusts are automatic two-way trusts that exist between domains in the same forest in AD DS. These trusts connect resources between domains in AD DS and are different from explicit trusts in that the trusts flow through from one domain to the other. In other words, if Domain A trusts Domain B, and Domain B trusts Domain C, Domain A trusts Domain C. This flow greatly simplifies the trust relationships between Windows domains because it forgoes the need for multiple exponential trusts between each domain.

Explicit Trusts

An explicit trust is one that is set up manually between domains to provide for a specific path for authentication sharing between domains. This type of trust relationship can be one-way or two-way, depending on the needs of the environment. In other words, all trusts in legacy Windows NT 4.0 could have been defined as explicit trusts because they all are manually created and do not allow permissions to flow in the same way as transitive trusts do. The use of explicit trusts in AD DS allows designers to have more flexibility and to be able to establish trusts with external and down-level domains. All trusts between AD DS domains and other forest domains that aren’t in Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, or Windows Server 2008 R2 forest functional level are explicit trusts.

Shortcut Trusts

A shortcut trust is essentially an explicit trust that creates a shortcut between any two domains in a domain structure. For example, if a domain tree has multiple subdomains that are many layers deep, a shortcut trust can exist between two domains deep within the tree, similar to the shortcut trust shown in Figure 1. This relationship allows for increased connectivity between those two domains and decreases the number of hops required for authentication requests. Normally, those requests would have to travel up the transitive trust tree and back down again, thus increasing overhead.

Figure 1. Shortcut trusts minimize hops between domains.


The example in Figure 1 shows how a shortcut trust could theoretically be used to reduce the overhead involved in sharing resources between the two sales subdomains in the companyabc.com tree.

Cross-Forest Transitive Trusts

Cross-forest transitive trusts are essentially two-way transitive trusts that exist between two disparate AD DS forests. Although explicit trusts between separate AD domains in separate forests were possible in Windows 2000 Server, the cross-forest trusts in all versions of Windows Server beyond the 2003 release allow for two-way transitive trusts to exist between two separate forests.

Other  
  •  Personalizing Windows 7 (part 6) - Configuring Your Monitors
  •  Personalizing Windows 7 (part 5) - Choosing Your Mouse Pointers
  •  Personalizing Windows 7 (part 4) - Choosing Your System Sounds
  •  Personalizing Windows 7 (part 3) - Choosing and Configuring Your Screensaver
  •  Outlining AD DS Changes in Windows Server 2008 R2 (part 3) - Auditing Changes Made to AD Objects
  •  Outlining AD DS Changes in Windows Server 2008 R2 (part 2) - Implementing Multiple Password Policies per Domain
  •  Outlining AD DS Changes in Windows Server 2008 R2 (part 1)
  •  Personalizing Windows 7 (part 2) - Choosing Your Desktop Background
  •  Personalizing Windows 7 (part 1) - Fine-Tuning Your Window Colors and Experience Level
  •  Windows Server 2008 R2 Active Directory Domain Services Primer : Outlining the Role of DNS in AD DS
  •  
    Top 10
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
    - Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
    - Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
    - Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
    - Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
    - Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    programming4us programming4us
    programming4us
     
     
    programming4us