S 2.230 Planning of Active Directory administration

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Head of IT, Administrator

The Active Directory consists of various objects which are organised in a tree-like structure. Each object has certain attributes that store the object information. A Windows system Version 2000 or higher is administered using objects, and administration must be performed by an authorised administrator. Authorisations can be assigned to all Active Directory objects that control the access to the objects. This means that it is possible to specify which objects can be changed by which users and in which manner, for example for creating users or resetting user passwords.

In a standard installation of the Windows Server 2000 and Windows 2003 Server operating systems (these two server operating systems are collectively referred to as Windows Server in the following), administrators only have the right to make changes to objects, and therefore to administer a domain. Users are generally only granted read privileges at the most.

In general, it is also true in Windows Server that the administrative powers of the administrators of a domain end at the boundary of the domain. Only the members of the Enterprise Admins group have full access to all AD objects in every domain of a forest, and this access is allowed regardless of the access rights specified for these objects. The Enterprise Admins are members of the group of administrators of the forest root domain (FRD) by default.

In large domains, it is recommended to delegate the administrative tasks so that the administrative work can be divided between several administrators. Under certain circumstances, it may be advisable to implement the separation of roles as well. Administrative tasks are delegated in the Active Directory by assigning corresponding access rights to Active Directory objects for the corresponding groups of administrators. In this case, the Active Directory rights structure allows highly detailed assignments of rights. It is possible in this manner to allow an administrator to create user accounts and reset user passwords, but not to delete user accounts or move them to other organisational units (OUs). To simplify the process of assigning similar rights throughout an entire subtree, it is also possible for the objects in a subtree to inherit the rights of the object at the top of the subtree. Since it may not be desired under some circumstances to pass inherited rights on to certain objects in the subtree, the inheritance mechanism can also be blocked for certain objects, which means it is entirely possible for complex authorisation distribution scenarios to be created in this manner (see also S 3.27 Training to Active Directory administration).

From a security perspective, it is necessary to take the following aspects into account when planning the Active Directory administration:

Review questions: