Todo sobre Active Directory | Windows Server | Wild IT Academy
What is Active Directory and How to Implement It?
Introduction to Active Directory
- Active Directory (AD) is essential for many companies, particularly in managing user permissions and resources within a network.
- In environments with numerous interconnected devices, traditional methods of configuring users and permissions are impractical.
Functionality of Active Directory
- AD allows the creation of objects such as users, computers, and groups to manage credentials during login.
- It also enables centralized management of security policies across the network, ensuring proper authentication and authorization for users.
Benefits of Using Active Directory
- Simplifies administrative tasks while enhancing organizational security through group policy functions.
- Centralized file storage facilitates collaboration among users and ensures IT teams can back up data effectively.
Structure of Active Directory
- The main service in AD is called Active Directory Domain Services (AD DS), which runs on Windows Server.
- Domain Controllers (DCs) replicate directory changes across multiple servers to maintain consistency.
Understanding Domains, Trees, and Forests
- AD is structured into three primary levels: domains, trees, and forests. A domain consists of related users and objects.
- Multiple domains can form a tree based on a common root DNS hierarchy; several trees can exist within a forest.
Trust Relationships in Forest Structures
- Within a forest, trust relationships between domains are established automatically but can be managed by administrators as needed.
Understanding Active Directory and Its Implementation
Overview of Security Limits in Active Directory
- Objects from different forests cannot interact unless a trust relationship is established by the administrators of each forest.
- The database contains information about CTC objects, directory types, common objects, and Active Directory (AD), including users, computers, applications, printers, and shared folders.
Hierarchical Organization of Objects
- Organizations simplify management by organizing AD objects into Organizational Units (OUs) and optimizing security through user groups.
- User objects typically have attributes like name, password, department, email address; additional important data includes Global Unique Identifier (GUID) and Security Identifier (SID).
Starting the Implementation Process
- The implementation of the Active Directory server begins with an explanation of additional concepts that aid understanding future functionalities.
- Basic configurations are reviewed such as team name and IP addresses; preferred IP settings include Google’s DNS for external connectivity.
Adding Roles and Features to the Server
- The process involves selecting roles for local service installation; various services are available including Certificate Services for internal document authentication.
- Federated Services enhance authentication processes for web applications interacting with the AD server.
Exploring Additional Services
- Lightweight Directory Services offer a less feature-rich alternative to standard AD but can be useful in specific scenarios away from central management.
- Rights Management Services protect information by enabling features that ensure access is limited to authorized individuals.
Finalizing Installation Steps
- Various options like DNS configuration are discussed; however, AD automatically manages this setup during installation.
- A summary of installed services is provided along with tools for remote organization management and PowerShell modules related to user histories.
Completion of Active Directory Setup
- After installation completion, further steps involve joining or creating a domain within the newly implemented AD environment.
Setting Up a Domain Controller
Introduction to Domain Controllers
- The notification bar indicates a prompt to promote the server to a domain controller. Options are available for adding this domain or controller to an existing one, as well as creating a new domain within an existing forest.
Creating a New Forest
- The speaker emphasizes that many do not understand the initial setup of their first domain in an organization, which effectively becomes the root of a new forest.
- A new forest is created with the name "whitehaiti.alcaldemint.com," establishing it as the primary domain for organizational policies.
Functional Levels and DNS Configuration
- Discussion on functional levels for compatibility with Windows Server versions; recommends using 2016 or newer due to better support and features.
- Importance of understanding theoretical concepts behind configurations, such as DNS (Domain Name System) and Global Catalog functionality.
Password Setup and Read-Only Domain Controllers
- Setting up a password for future restoration of Active Directory configurations; introduces SRM (Service Recovery Manager).
- Explanation of read-only domain controllers (RODC), useful for remote offices where users cannot change configurations but can still access necessary services.
Finalizing Domain Configuration
- Steps taken towards creating NS delegation and determining NetBIOS names; highlights importance of database files in storing directory objects.
- Confirmation that all prerequisites have been met successfully before proceeding with installation; notes that some additional configurations can be added later.
Conclusion and Next Steps