|
Yes, it is anchored in the root domain naming...
:o) And it does exist on every DC. :o) <I'm just a
grape in the middle of the road.>
I want to restate one item from Guido as I misread it at
first so I wanted to make it a little clearer.
"Child DAs do have the permissions to create connection
objects on DCs in their own domain "
I believe he meant to state that Child DAs do have the
permissions to create connection objects FOR DCs in their own domain ". Choice
of domain controller in the forest where they do that creation does not matter,
the reason they can do it is due to explicit rights on the NTDSDSA object under
the Server object and obviously those permissions would be replicated to all DCs
within the forest. The first and second time I read that I incorrectly read it
as they could make the change because it was on their DC.
I was poking around trying to figure out how the initial
object is created and it seems it could be one of two ways. A special call to an
existing DC to say, hey could you help me out here and create this OR if at the
start of the promo process the new DC gets recognized as part of
the Enterprise Domain Controllers well known security principal group. The
NTDSDSA object gets created within minutes of the promo process before anything
is replicated so I know it am pretty confident it doesn't do it on the local
machine and replicate it out.
Actually I have a problem with that process and asked for a
possible functionality change around that because that new NTDSDSA object can
have adverse affects on the coverage generation for sites that previously didn't
have coverage for a specific domain. Say you have a siteX that usually gets
domainA coverage from DCs for domainA in siteW. Well you start to spin up DC1X
for domainA in siteX and the NTDSDSA object hits the rest of the Forest fairly
quickly. If it is a large domain, far in advance of DC1X being able to actually
cover the site. But since there is no flag on the NTDSDSA object to say whether
or not it is actually live or not the DCs that previously covered siteX stop
covering it and remove their DNS entries from that site. This means any MS
clients start failing over to ANY site in the world that has a DC for domainA
and non-MS clients that only know how to read a single DNS SRV Record for site
coverage fail completely.
I also asked that they add a checkbox for autoreboot of a
DC that successfully promotes in the wizard that works like the INI file switch
does for unattended dcpromos.
Anyway, anyone know if the new DC registers that new object
or does another DC register it on the first DC's behalf?
joe
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rick Kingslan Sent: Saturday, January 24, 2004 9:57 AM To: [EMAIL PROTECTED] Subject: RE: [ActiveDir] Sites and Services Permissions Guido,
Thanks for the corrections and for the information.
Granted, the Configuration Container is a writeable NC in the forest, and
available on all DCs. But, by DN - is anchored at the root,
yes?
-rtk From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of GRILLENMEIER,GUIDO (HP-Germany,ex1) Sent: Saturday, January 24, 2004 4:59 AM To: [EMAIL PROTECTED] Subject: RE: [ActiveDir] Sites and Services Permissions the configuration container is not in the root - it's a
writable naming context on any DC in the forest (obviously it is created when
you create the root).
one more minor correction: Child DAs do have the
permissions to create connection objects on DCs in their own domain (to
replicate from any DC in the forest - they can't add a CO to the
other DCs in the forest to have it pull the changes from their
DC...)
/Guido
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rick Kingslan Sent: Samstag, 24. Januar 2004 00:52 To: [EMAIL PROTECTED] Subject: RE: [ActiveDir] Sites and Services Permissions John,
We have a multi-tree environment with domains below the
empty root. Our admins in the child domains can promote DCs in their own
domain, even though they have no implicitly granted rights in Sites and
Services. I know where the Configuration Container is - it's in the
root. The other tree Admins can promote/demote DCs as well. BUT!
make no mistake - I DO NOT want anyone else short of myself and the other AD
Engineer making any changes to the replication topology.
By default (and, I
honestly have no idea if I have changed this) our empty root grants the empty
root DA and the Enterprise Admin rights to Site and Services. Other than
(well, there is SYSTEM) Authenticated Users have READ - that's about
it.
What I'm saying is that I suspect that the Child DA's
don't have to have explicit permission to the Sites and Services. System
is there, and I suspect that System is actually taking care of what the child
admins need in creating the server and NTDS objects. Then, the KCC would
take over. Unless the KCC has been shut off, of course. In this
case, the EA or DA of the root is going to have to handle
it.
Rick Kingslan MCSE, MCSA, MCT From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Witasick Sent: Thursday, January 22, 2004 3:47 PM To: [EMAIL PROTECTED] Subject: [ActiveDir] Sites and Services Permissions We have a multi-domain environment (empty root & 7 child
domains). Our Central Office is responsible for creating and maintaining
sites, site links, subnets, connection objects, replication schedules, . .
.
We'd like to restrict all child domain admins from making any
modifications within Sites and Services. If we restrict their access to
read-only throughout all of Sites and Services, will domain admins still be able
to promote and demote DCs? Will we break replication? Will we break
anything?
Thanks.
John
This E-mail, including any attachments, may be intended solely for the personal and confidential use of the sender and recipient (s) named above. This message may include advisory, consultative and/or deliberative material and, as such, would be privileged and confidential and not a public document. Any Information in this e-mail identifying a client of the department of Human Services is confidential. If you have received this e-mail in error, you must not review, transmit, convert to hard copy, copy, use or disseminate this e-mail or any attachments to it and you must delete this message. You are requested to notify the sender by return e-mail. |
- RE: [ActiveDir] Sites and Services Per... joe
- Re: [ActiveDir] Sites and Service... John Witasick
- RE: [ActiveDir] Sites and Services Per... Rick Kingslan
- RE: [ActiveDir] Sites and Services Per... Roger Seielstad
- RE: [ActiveDir] Sites and Services Per... GRILLENMEIER,GUIDO (HP-Germany,ex1)
- RE: [ActiveDir] Sites and Services Per... GRILLENMEIER,GUIDO (HP-Germany,ex1)
- RE: [ActiveDir] Sites and Service... Rick Kingslan
- Re: [ActiveDir] Sites and Ser... Jeremy.Hicks
- RE: [ActiveDir] Sites and... Rick Kingslan
- Re: [ActiveDir] Sites... Jeremy.Hicks
- RE: [ActiveDir] Sites and Ser... joe
- RE: [ActiveDir] Sites and Services Per... GRILLENMEIER,GUIDO (HP-Germany,ex1)
