ENTERPRISE

Active Directory Domain Services 2008 : Add a User, Group, or Computer to the Password Replication Policy

2/15/2011 8:57:44 AM
Problem: You recently deployed an RODC in your domain. You need to ensure that the RODC caches passwords for users from your company’s New York office.

Solution: Add all New York users to an Active Directory Domain Services (AD DS) group. Add a Password Replication Policy on the RODC to allow passwords to be cached for members of the AD DS group.

To add a user, group, or computer to the password replication policy, perform the following steps:

1.
Log on to a domain controller or a member computer that has Windows Server 2008 Remote Server Administration Tools (RSAT) installed.

2.
Click Start, click Administrative Tools, and then click Active Directory Users and Computers.

3.
Right-click Active Directory Users and Computers in the console tree, and click Change Domain Controller.

4.
On the Change Directory Server window, shown in Figure 1, select a writable domain controller that has W2K8 in the DC Version column and click OK.

Figure 1. The Change Directory Server window.

5.
In the console tree, expand the domain node and select the Domain Controllers node.

6.
In the details pane, right-click the RODC on which you want to configure the password replication policy; then click Properties.

7.
On the RODC Properties page, click the Password Replication Policy tab.

Note

The Password Replication Policy tab will only be presented on the properties page for read-only domain controllers. This tab will not be present for writable domain controllers.

8.
Click Add.

9.
On the Add Groups, Users and Computers window, shown in Figure 2, select Allow passwords for the account to replicate to this RODC or Deny passwords for the account from replicating to this RODC. Then click OK.

Figure 2. The Add Groups, Users and Computers window.


10.
Type the name of the user, group, or computer you want to allow or deny password replication, and click OK. The group, user, or computer will be added to the Password Replication Policy tab, as shown in Figure 3.

Figure 3. The Password Replication Policy tab.


11.
Click OK or Apply to save the changes.

Other  
  •  Exchange Server 2010 : Backing Up Specific Windows Services
  •  Create Bookmark Create Note or Tag Backing Up Windows Server 2008 and Exchange Server 2010
  •  What to Back Up on Exchange Servers 2010
  •  Leveraging and Optimizing Search in SharePoint 2010 : Define Content Sources
  •  Deploying a Native SharePoint 2010 Search Service Application
  •  Backing Up the Exchange Server 2010 Environment : Roles and Responsibilities & Developing a Backup Strategy
  •  Backing Up the Exchange Server 2010 Environment : Supporting Backups with Documentation
  •  Backing Up the Exchange Server 2010 Environment : Understanding the Importance of Backups & Establishing Service Level Agreements
  •  Making the Best Use of SAN/NAS Disks with Exchange Server 2010
  •  Optimizing an Exchange Server 2010 Environment - Properly Sizing Exchange Server 2010
  •  Optimizing an Exchange Server 2010 Environment - Analyzing and Monitoring Core Elements
  •  SharePoint 2010 : Beyond Built-In SharePoint PowerShell Cmdlets
  •  SharePoint 2010 : Understanding Advanced PowerShell Topics
  •  Optimizing an Exchange Server 2010 Environment : Monitoring Exchange Server 2010
  •  Optimizing Exchange Server 2010 Servers
  •  Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 3) - Business Connectivity Services Web Parts
  •  Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 2) - Writing to External Content Types
  •  Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 1) - External Lists & External Data
  •  Optimizing an Exchange Server 2010 Environment : Analyzing Capacity and Performance
  •  Examining Exchange Server 2010 Performance Improvements
  •  
    Top 10
    Managing Windows Firewall in Windows Vista
    Windows Server 2008 : DHCP/WINS/Domain Controllers - Exploring DHCP Changes in Windows Server 2008 R2
    Windows 7 : Managing and Applying LGPOs (part 1) - Configuring Local Security Policies
    Transact-SQL in SQL Server 2008 : New date and time Data Types and Functions
    Designing and Configuring Unified Messaging in Exchange Server 2010 : Unified Messaging Features
    Algorithms for Compiler Design: THE NFA WITH ∈-MOVES TO THE DFA
    ASP.NET Server-Side Support for AJAX & AJAX Client Support
    Hacking - Tools of the Trade
    Business Intelligence in SharePoint 2010 with Business Connectivity Services : Consuming External Content Types (part 1) - External Lists & External Data
    SQL Azure : Tuning Techniques (part 4) - Indexed Views & Stored Procedures
    Most View
    User Account Control in Windows Vista: Basic
    Creating and Managing Views in SQL Server 2008 : Definition of Views & Using Views
    Programming Microsoft SQL Server 2005: Using the Data Mining Wizard and Data Mining Designer (part 5) - Viewing Mining Models
    Randomized Stack Space
    Programming the Mobile Web : Geolocation and Maps - Detecting the Location (part 2) - Google Gears
    Windows Phone 7 Advanced Programming Model : Advanced Data Binding (part 1)
    Exchange Server 2010 : Installing OCS 2007 R2 (part 2) - Prepping the Domain & Delegating Setup and Administrative Privileges
    Building Out Of Browser Silverlight Applications - Using COM Interoperability and File System Access
    SQL Server 2005 : Implementing Service Broker
    Customizing Windows 7’s Desktop (part 2) - Getting Around the Start Menu
    Windows Server 2008 : The Design Phase - Documenting the Vision and the Plan
    Windows Server 2008 : Designing Organizational Unit and Group Structure - Exploring Sample Design Models
    Securing Data from the DBA
    Windows Server 2008 : Designing Organizational Unit and Group Structure - Understanding Group Design
    iPhone Application Development : Implementing a Custom Picker View (part 2)
    Microsoft Enterprise Library : Non-Formatted Trace Listeners
    iPhone 3D Programming : Adding Textures to ModelViewer (part 3) - Enabling Textures with ES1::RenderingEngine
    IIS 7.0 : Securing Configuration - Securing Sensitive Configuration
    Server-Side Browser Detection and Content Delivery : Mobile Detection (part 4) - Device Libraries
    SharePoint 2010 : Operations Management with the SharePoint Central Administration Tool (part 6)