Installing Active Directory on Windows Server 2008
Microsoft Active Directory provides the structure to centralize the network management and store information about network resources across the entire domain.
Active Directory uses Domain Controllers to keep this centralized storage available to network users.
In order to configure a Windows Server 2008 machine to act as Domain Controller, several several steps should be performed.
Installing Active Directory Domain Services (AD-DS)
1. installation of Active Directory Domain Services (AD-DS) role on the server. In fact, the AD-DS role is what enables the server to act as a Domain Controller.
2. After that run DCPROMO to promote the server as Domain Controller.
AD-DS can be installed in one of 3 methods:
It's better always setting a hostname for the machine before installation mycomputer-------->Properties------->
1.1 Open Server Manager by clicking the icon in the Quick Launch toolbar, or from the Administrative Tools folder.
1.2 Wait till it finishes loading, then click on Roles > Add Roles link.
1.2.1 In the Before you begin window, click Next.
1.2.2 In the Select Server Roles window, click to select Active Directory Domain Services, and then click Next.
1.2.3 In the Active Directory Domain Services window read the provided information if you want to, and then click Next.
1.2.4 In the Confirm Installation Selections, read the provided information if you want to, and then click Next.
1.2.5 When it ends, click Close.
1.2.6 Going back to Server Manager, click on the Active Directory Domain Services link, and note that there's no information linked to it, because the DCPROMO command has not been run yet.
2. Now you can click on the DCPROMO link, or read on.
To run DCPROMO, enter the command in the Run command, or click on the DCPROMO link from Server Manager > Roles > Active Directory Domain Services
(dcpromo.exe)
2.1 Depending upon the question if AD-DS was previously installed or not, the Active Directory Domain Services Installation Wizard will appear immediately or after a short while.
Click Next.
2.2 In the Operating System Compatibility window, read the provided information and click Next.
2.3 In the Choosing Deployment Configuration window, click on "Create a new domain in a new forest" and click Next.
2.4 Enter an appropriate name for the new domain. Make sure you pick the right domain name, as renaming domains is a task you will not wish to perform on a daily basis. Click Next.
ctechz.blogspot.com
Note: Do NOT use single label domain names such as "mydomain" or similar. You MUST pick a full domain name such as "mydomain.local" or "mydomain.com" and so on.
The wizard will perform checks to see if the domain name is not already in use on the local network
2.5 Pick the right forest function level. Windows 2000 mode is the default, and it allows the addition of Windows 2000, Windows Server 2003 and Windows Server 2008 Domain Controllers to the forest you're creating.
Pick the right domain function level. Windows 2000 Native mode is the default, and it allows the addition of Windows 2000, Windows Server 2003 and Windows Server 2008 Domain Controllers to the
domain you're creating.
If you select "Windows Server 2008" for the forest function level, you will Not be prompted to pick a domain function level.
2.6 The wizard will perform checks to see if DNS is properly configured on the local network.
In this case, no DNS server has been configured, therefore, the wizard will offer to automatically install DNS on this server.
Note: The first DCs must also be a Global Catalog. Also, the first DCs in a forest cannot be a Read Only Domain controller.
2.7 It's most likely that you'll get a warning telling you that the server has one or more dynamic IP Addresses.
Running IPCONFIG /all will show that this is not the case, because as you can clearly see, I have given the server a static IP Address.
So, where did this come from? The answer is IPv6. I did not manually configure the IPv6 Address, hence the warning. In a network where IPv6 is not used, you can safely ignore this warning.
[ if u are not given the ip before ]
2.8 You'll probably get a warning about DNS delegation. Since no DNS has been configured yet, you can ignore the message and click Yes.
2.9 Next, change the paths for the AD database, log files and SYSVOL folder.
For large deployments, carefully plan your DC configuration to get the maximum performance. When satisfied, click Next.
2.10 Enter the password for the Active Directory Recovery Mode.
This password must be kept confidential, and because it stays constant while regular domain user passwords expire
based upon the password policy configured for the domain, the default is 42 days), it does not.
This password should be complex and at least 7 characters long.
I strongly suggest that you do NOT use the regular administrator's password, and that you write it down and securely store it. Click Next.
2.11 In the Summary window review your selections, and if required, save them to an unattended answer file. When satisfied, click Next.
2.12 The wizard will begin creating the Active Directory domain, and when finished, you will need to press Finish and reboot your computer.
You can automate the rebooting process by checking the Reboot on Completion check box.
Note:- configuring a Windows Server 2008 Server Core machine REQUIRES you to perform an automated installation of Active Directory on that server, as there is NOT DCPROMO GUI on Server Core.
Your server now acts as a Domain Controller.
Make sure you properly back it up.
You can test functionality by using AD management tools such as Active Directory Users and Computers, examine the Event Logs, services and folders and shares that have been created.
After installing the AD-DS role, we need to run DCPROMO to perform the actual Active Directory database and function installation.
Note: This guide assumes this is the first Domain controller in the forest, thus creating a new domain in a new forest. For a guide on how to add additional Domain Controllers to existing domains, please read my upcoming "Installing Additional Windows Server 2008 Domain Controllers in your Existing Active Directory Domain" article.
Method 2 – Servermanagercmd.exe
Servermanagercmd.exe is the command prompt equivalent of the Add Roles and Add Features wizards in Server Manager.
Through the use of various command line options, you can quickly and easily add or remove features and roles to or from your server, including the AD-DS role.
To install AD-DS by using Servermanagercmd.exe, simply enter the following command in the Command Prompt window:
Servermanagercmd.exe –I ADDS-Domain-Controller
Let the command run and when it finishes, AD-DS will be installed on the server.
Method 3 – Letting DCPROMO do the job
Oh yes. If you forget to install AD-DS or simply want to skip clicking on some windows, you can run DCPROMO from the Run command and before it is executed, the server will check to see if the AD-DS binaries are installed. Since they are not, they will auto-install.
After you complete the Add Roles Wizard, either click the link to start the Active Directory Domain Services Installation Wizard, or close Server Manager and manually run DCPROMO from the Run command.
Running DCPROMO
After installing the AD-DS role, we need to run DCPROMO to perform the actual Active Directory database and function installation.
Note: This guide assumes this is the first Domain controller in the forest, thus creating a new domain in a new forest. For a guide on how to add additional Domain Controllers to existing domains, please read my upcoming "Installing Additional Windows Server 2008 Domain Controllers in your Existing Active Directory Domain" article.
Adding Client To Host
For WindowsXP
In Host --- Adding the Client to Domain/Creating a user
Don't want to create the user in client machine.
1. go to Server manager--------------->Roles--------->Active Directory Domain Services--------->Active Directory users and Computers------->ctechz.blogspot.com---->users
RightClick--------->New------>User.
Adding Client(Other Machines) To Domain(AD Server--Host)
1. First go to Client Machine
MyComputer----------->Properties---------->Computer Name---------->Change--------->Memberof Domain( add our domain name here------>ctechz.blogspot.com)
To be part of that domain it will ask for username and password
Give the Admin username and admin password
Administrator
redhat@123#
Then to log into the machine with normal username and password, that we created in AD
ctechz
redhat@123#
Adding a Linux Client to Domain AD
http://blog.scottlowe.org/2007/07/09/linux-ad-integration-with-windows-server-2008/
1. Go to server manager in AD
Roles------>Active directory domain services---------->AddRoleServices------>identity management for unix(select all options)
Install those services and restart the server.
Once that role service has been installed, then the AD schema now includes a partially RFC 2307-compliant set of UNIX attributes, such as UID, UID number, GID number, login shell, etc
At this point a new tab labeled “UNIX Attributes” will appear in the properties dialog box for users and groups in Active Directory. You’ll use this tab to edit the UNIX-specific attributes that are required for logins to Linux-based systems.
we'll describe how to unify your Linux and Active Directory environments. With minor changes, this same procedure can be used to authenticate your Linux hosts against eDirectory or any other LDAP compliant directory service.
2. Prepare Active Directory (Each User)
Each Active Directory account that will authenticate via Linux must be configured with a UID and other UNIX attributes. This is accomplished via the new “UNIX Attributes” tab on the properties dialog box of a user account.
After all the user accounts have been configured, then we are ready to configure Active Directory objects for each of the Linux server(s) that we’ll be integrating with AD.
Add the user in AD with all the unix attributes specified:-
RightClick --------> New ----------> User
After adding the user add a group also -------> RightClick --------> New ----------> Group-----> group name
Take Group Properties RightClick on groupname------> Properties--------> UNIX Attributes -------> give the domain name(ctechz)gid also it will show---->Apply---->ok
Then take the user we created,take the user properties --------> Unix Attributes --------> select Domain(ctechz) --------> [ fill the UID, Shell, Home Directory & Primary group ]
The user will be added to the primary group automatically
3. Prepare Active Directory (Each Server)
Prior to using Samba to join Linux computers to Active Directory and generate a keytab automatically, we had to use the ktpass.exe utility on Windows to generate a keytab.
Due to some current Samba-Windows Server 2008 interoperability issues, we can’t use Samba. That means we’ll be back to using ktpass.exe to map service principals onto accounts in Active Directory. Unfortunately, you’ll need to first disable User Account Control (UAC) on your server, since UAC interferes with ktpass.exe
Note:- User Account Control (UAC) ask for yes/no while we install a s/w ( as in vista before instalation it ask for confirmation )
Once you’ve disabled UAC (and rebooted your server), then you can map the service principal names (SPNs) using the following steps:
To disable UAC go to controlpanel ------> UserAccounts -------> Turn User Account Control on or off ------> Clear the Use User Account Control (UAC) to help protect your computer check box, and then click OK. ------> Restart
3A. Create a computer account (or a user account; either will work) with the name of the Linux server. ( the account that we created already with unix attributes will work )
[By default when key tables are created, they are owned by root and readable only by root. If a key table is created on Windows using ktpass and copied to the UNIX computer]
3B. Use the following command to map the needed SPN onto this account (backslashes indicate line continuation):
ktpass.exe -princ HOST/server.fqdn@REALM.COM -mapuser DOMAIN\AccountName$ -crypto all -pass Password123 -ptype KRB5_NT_PRINCIPAL -out filename.keytab
examplae:- ktpass.exe -princ HOST/cloudcc.ctechz.blogspot.com@ctechz.blogspot.com -mapuser ctechz.blogspot.com\sujith$ -crypto all -pass redhat@123# -ptype KRB5_NT_PRINCIPAL -out sujith.keytab
Edit the /etc/hosts file of both linux(client) machine and windows(AD server) machine
For Linux
vim /etc/hosts
192.168.1.67 cloudcc.perfomixint.com cloudcc
192.168.1.222 AD.ctechz.blogspot.com AD
For Windows
C:\Windows\System32\drivers\etc\hosts
192.168.1.222 AD.ctechz.blogspot.com AD
192.168.1.67 cloudcc.perfomixint.com cloudcc
cloudcc.ctechz.blogspot.com
Please find the screen shoots below
Microsoft Active Directory provides the structure to centralize the network management and store information about network resources across the entire domain.
Active Directory uses Domain Controllers to keep this centralized storage available to network users.
In order to configure a Windows Server 2008 machine to act as Domain Controller, several several steps should be performed.
Installing Active Directory Domain Services (AD-DS)
1. installation of Active Directory Domain Services (AD-DS) role on the server. In fact, the AD-DS role is what enables the server to act as a Domain Controller.
2. After that run DCPROMO to promote the server as Domain Controller.
AD-DS can be installed in one of 3 methods:
It's better always setting a hostname for the machine before installation mycomputer-------->Properties------->
1.1 Open Server Manager by clicking the icon in the Quick Launch toolbar, or from the Administrative Tools folder.
1.2 Wait till it finishes loading, then click on Roles > Add Roles link.
1.2.1 In the Before you begin window, click Next.
1.2.2 In the Select Server Roles window, click to select Active Directory Domain Services, and then click Next.
1.2.3 In the Active Directory Domain Services window read the provided information if you want to, and then click Next.
1.2.4 In the Confirm Installation Selections, read the provided information if you want to, and then click Next.
1.2.5 When it ends, click Close.
1.2.6 Going back to Server Manager, click on the Active Directory Domain Services link, and note that there's no information linked to it, because the DCPROMO command has not been run yet.
2. Now you can click on the DCPROMO link, or read on.
To run DCPROMO, enter the command in the Run command, or click on the DCPROMO link from Server Manager > Roles > Active Directory Domain Services
(dcpromo.exe)
2.1 Depending upon the question if AD-DS was previously installed or not, the Active Directory Domain Services Installation Wizard will appear immediately or after a short while.
Click Next.
2.2 In the Operating System Compatibility window, read the provided information and click Next.
2.3 In the Choosing Deployment Configuration window, click on "Create a new domain in a new forest" and click Next.
2.4 Enter an appropriate name for the new domain. Make sure you pick the right domain name, as renaming domains is a task you will not wish to perform on a daily basis. Click Next.
ctechz.blogspot.com
Note: Do NOT use single label domain names such as "mydomain" or similar. You MUST pick a full domain name such as "mydomain.local" or "mydomain.com" and so on.
The wizard will perform checks to see if the domain name is not already in use on the local network
2.5 Pick the right forest function level. Windows 2000 mode is the default, and it allows the addition of Windows 2000, Windows Server 2003 and Windows Server 2008 Domain Controllers to the forest you're creating.
Pick the right domain function level. Windows 2000 Native mode is the default, and it allows the addition of Windows 2000, Windows Server 2003 and Windows Server 2008 Domain Controllers to the
domain you're creating.
If you select "Windows Server 2008" for the forest function level, you will Not be prompted to pick a domain function level.
2.6 The wizard will perform checks to see if DNS is properly configured on the local network.
In this case, no DNS server has been configured, therefore, the wizard will offer to automatically install DNS on this server.
Note: The first DCs must also be a Global Catalog. Also, the first DCs in a forest cannot be a Read Only Domain controller.
2.7 It's most likely that you'll get a warning telling you that the server has one or more dynamic IP Addresses.
Running IPCONFIG /all will show that this is not the case, because as you can clearly see, I have given the server a static IP Address.
So, where did this come from? The answer is IPv6. I did not manually configure the IPv6 Address, hence the warning. In a network where IPv6 is not used, you can safely ignore this warning.
[ if u are not given the ip before ]
2.8 You'll probably get a warning about DNS delegation. Since no DNS has been configured yet, you can ignore the message and click Yes.
2.9 Next, change the paths for the AD database, log files and SYSVOL folder.
For large deployments, carefully plan your DC configuration to get the maximum performance. When satisfied, click Next.
2.10 Enter the password for the Active Directory Recovery Mode.
This password must be kept confidential, and because it stays constant while regular domain user passwords expire
based upon the password policy configured for the domain, the default is 42 days), it does not.
This password should be complex and at least 7 characters long.
I strongly suggest that you do NOT use the regular administrator's password, and that you write it down and securely store it. Click Next.
2.11 In the Summary window review your selections, and if required, save them to an unattended answer file. When satisfied, click Next.
2.12 The wizard will begin creating the Active Directory domain, and when finished, you will need to press Finish and reboot your computer.
You can automate the rebooting process by checking the Reboot on Completion check box.
Note:- configuring a Windows Server 2008 Server Core machine REQUIRES you to perform an automated installation of Active Directory on that server, as there is NOT DCPROMO GUI on Server Core.
Your server now acts as a Domain Controller.
Make sure you properly back it up.
You can test functionality by using AD management tools such as Active Directory Users and Computers, examine the Event Logs, services and folders and shares that have been created.
After installing the AD-DS role, we need to run DCPROMO to perform the actual Active Directory database and function installation.
Note: This guide assumes this is the first Domain controller in the forest, thus creating a new domain in a new forest. For a guide on how to add additional Domain Controllers to existing domains, please read my upcoming "Installing Additional Windows Server 2008 Domain Controllers in your Existing Active Directory Domain" article.
Method 2 – Servermanagercmd.exe
Servermanagercmd.exe is the command prompt equivalent of the Add Roles and Add Features wizards in Server Manager.
Through the use of various command line options, you can quickly and easily add or remove features and roles to or from your server, including the AD-DS role.
To install AD-DS by using Servermanagercmd.exe, simply enter the following command in the Command Prompt window:
Servermanagercmd.exe –I ADDS-Domain-Controller
Let the command run and when it finishes, AD-DS will be installed on the server.
Method 3 – Letting DCPROMO do the job
Oh yes. If you forget to install AD-DS or simply want to skip clicking on some windows, you can run DCPROMO from the Run command and before it is executed, the server will check to see if the AD-DS binaries are installed. Since they are not, they will auto-install.
After you complete the Add Roles Wizard, either click the link to start the Active Directory Domain Services Installation Wizard, or close Server Manager and manually run DCPROMO from the Run command.
Running DCPROMO
After installing the AD-DS role, we need to run DCPROMO to perform the actual Active Directory database and function installation.
Note: This guide assumes this is the first Domain controller in the forest, thus creating a new domain in a new forest. For a guide on how to add additional Domain Controllers to existing domains, please read my upcoming "Installing Additional Windows Server 2008 Domain Controllers in your Existing Active Directory Domain" article.
Adding Client To Host
For WindowsXP
In Host --- Adding the Client to Domain/Creating a user
Don't want to create the user in client machine.
1. go to Server manager--------------->Roles--------->Active Directory Domain Services--------->Active Directory users and Computers------->ctechz.blogspot.com---->users
RightClick--------->New------>User.
Adding Client(Other Machines) To Domain(AD Server--Host)
1. First go to Client Machine
MyComputer----------->Properties---------->Computer Name---------->Change--------->Memberof Domain( add our domain name here------>ctechz.blogspot.com)
To be part of that domain it will ask for username and password
Give the Admin username and admin password
Administrator
redhat@123#
Then to log into the machine with normal username and password, that we created in AD
ctechz
redhat@123#
Adding a Linux Client to Domain AD
http://blog.scottlowe.org/2007/07/09/linux-ad-integration-with-windows-server-2008/
1. Go to server manager in AD
Roles------>Active directory domain services---------->AddRoleServices------>identity management for unix(select all options)
Install those services and restart the server.
Once that role service has been installed, then the AD schema now includes a partially RFC 2307-compliant set of UNIX attributes, such as UID, UID number, GID number, login shell, etc
At this point a new tab labeled “UNIX Attributes” will appear in the properties dialog box for users and groups in Active Directory. You’ll use this tab to edit the UNIX-specific attributes that are required for logins to Linux-based systems.
we'll describe how to unify your Linux and Active Directory environments. With minor changes, this same procedure can be used to authenticate your Linux hosts against eDirectory or any other LDAP compliant directory service.
2. Prepare Active Directory (Each User)
Each Active Directory account that will authenticate via Linux must be configured with a UID and other UNIX attributes. This is accomplished via the new “UNIX Attributes” tab on the properties dialog box of a user account.
After all the user accounts have been configured, then we are ready to configure Active Directory objects for each of the Linux server(s) that we’ll be integrating with AD.
Add the user in AD with all the unix attributes specified:-
RightClick --------> New ----------> User
After adding the user add a group also -------> RightClick --------> New ----------> Group-----> group name
Take Group Properties RightClick on groupname------> Properties--------> UNIX Attributes -------> give the domain name(ctechz)gid also it will show---->Apply---->ok
Then take the user we created,take the user properties --------> Unix Attributes --------> select Domain(ctechz) --------> [ fill the UID, Shell, Home Directory & Primary group ]
The user will be added to the primary group automatically
3. Prepare Active Directory (Each Server)
Prior to using Samba to join Linux computers to Active Directory and generate a keytab automatically, we had to use the ktpass.exe utility on Windows to generate a keytab.
Due to some current Samba-Windows Server 2008 interoperability issues, we can’t use Samba. That means we’ll be back to using ktpass.exe to map service principals onto accounts in Active Directory. Unfortunately, you’ll need to first disable User Account Control (UAC) on your server, since UAC interferes with ktpass.exe
Note:- User Account Control (UAC) ask for yes/no while we install a s/w ( as in vista before instalation it ask for confirmation )
Once you’ve disabled UAC (and rebooted your server), then you can map the service principal names (SPNs) using the following steps:
To disable UAC go to controlpanel ------> UserAccounts -------> Turn User Account Control on or off ------> Clear the Use User Account Control (UAC) to help protect your computer check box, and then click OK. ------> Restart
3A. Create a computer account (or a user account; either will work) with the name of the Linux server. ( the account that we created already with unix attributes will work )
[By default when key tables are created, they are owned by root and readable only by root. If a key table is created on Windows using ktpass and copied to the UNIX computer]
3B. Use the following command to map the needed SPN onto this account (backslashes indicate line continuation):
ktpass.exe -princ HOST/server.fqdn@REALM.COM -mapuser DOMAIN\AccountName$ -crypto all -pass Password123 -ptype KRB5_NT_PRINCIPAL -out filename.keytab
examplae:- ktpass.exe -princ HOST/cloudcc.ctechz.blogspot.com@ctechz.blogspot.com -mapuser ctechz.blogspot.com\sujith$ -crypto all -pass redhat@123# -ptype KRB5_NT_PRINCIPAL -out sujith.keytab
Edit the /etc/hosts file of both linux(client) machine and windows(AD server) machine
For Linux
vim /etc/hosts
192.168.1.67 cloudcc.perfomixint.com cloudcc
192.168.1.222 AD.ctechz.blogspot.com AD
For Windows
C:\Windows\System32\drivers\etc\hosts
192.168.1.222 AD.ctechz.blogspot.com AD
192.168.1.67 cloudcc.perfomixint.com cloudcc
cloudcc.ctechz.blogspot.com
Please find the screen shoots below
No comments:
Post a Comment