Active Directory Delegation
Active Directory Delegation
Microsoft Corporation
Created: November 24, 2003
ii
     Acknowledgements
         Program Manager: Sanjay Tandon
         Writers: Mary Hillman
          We thank the following people for their contributions in the creation of the
          Active Directory Delegation Appendices and the Dsrevoke tool:
          Umit Akkus, Nona Allison, Colin Brace, Raman Chikkamagalur, Arren Conner,
          Raju Dantuluri, Dmitry Dukat, Levon Esibov, Dmitri Gavrilov, Don Hacherl,
          Saif Hasan, Xin He, David Hou, Gokay Hurmali, Khushru Irani, Kamal
          Janardhan, Gregory Johnson, Ian Jose, Richa Kumar, Klaas Langhout, William
          Lees, Xiaozhong Luo, Jaeger Mitchell, Nathan Muggli, Arun Nanda, Rich
          Randall, Ullattil Shaji, Brett Shirley, Scott Turnbull, Andrea Weiss, Jeff
          Westhead, and BJ Whalen.
          We thank the following people for reviewing the guide and providing valuable
          feedback:
          Laurie Brown, John Craddock, Robert DeLuca, Christoph Felix, Eric
          Fleischman, Guido Grillenmeier, Mike Hickey, David Kayano, Alain Lissoir,
          Andreas Luther, Astrid McClean, Paul Rich, Joe Richards, and David Trulli.
                                                                                                    Introduction     iii
Contents
       Introduction................................................................................. ...........1
           Abstract................................................................ ............................1
           Scope................................................................................. ...............1
           Intended Audience.......................................................... ..................2
       Chapter 1: Delegation of Administration Overview.................................4
           Business Case for Delegating Administration....................................4
           Benefits of Delegation................................................................ .......6
           Delegation at Work............................................. ..............................6
           Active Directory Management................................................ ...........8
           Creating a Successful Active Directory Delegation Model...............12
       Chapter 2: How Delegation Works in Active Directory..........................19
           Overview............................................................................... ..........19
           Active Directory Administrative Tasks.............................................22
           Active Directory Logical Structure and Data Storage......................23
           Delegation and Access Control................................................... .....26
       Chapter 3: Delegating Service Management........................................50
           Level-of-Privilege Considerations in Delegating Service Management51
           Recommended Approach to Service Management..........................52
           Service Management Overview................................................. ......53
           Creating a Service Management Delegation Model.........................77
           Implementing the Service Management Delegation Model.............80
           Maintaining the Service Management Delegation Model.................84
       Chapter 4: Delegating Data Management............................................87
           Recommended Approach to Data Management..............................87
           Understanding Data Management..................................................88
           Determining Data Management Stakeholder Needs........................95
           Creating the Data Management Delegation Model..........................96
           Implementing Your Data Management Delegation Model..............113
           Maintaining Your Data Management Delegation Model.................130
       Case Study: A Delegation Scenario.................................................. ...136
           Company Overview......................................................... ..............136
           Active Directory Infrastructure.................................... ..................137
           Managing Contoso’s Active Directory Environment.......................142
Introduction
     The Active Directory® directory service is an integral component of network
     infrastructures that are based on the Microsoft® Windows Server™ Server 2003,
     Standard Edition; Windows Server™ 2003, Enterprise Edition; Windows
     Server™ 2003, Datacenter Edition, and Windows® 2000 Server,
     Windows® 2000 Advanced Server, and Windows® 2000 Datacenter Server
     operating systems. Successful management of Active Directory environments
     requires distribution of administrative responsibilities among multiple
     administrators according to organizational, operational, legal, and administrative
     requirements. Having the necessary background information, requirements,
     practices, and recommendations can help you delegate administration to more
     securely and efficiently manage Active Directory services and data.
Abstract
     Active Directory provides an enterprise-ready, scalable, distributed directory
     service that allows organizations to centrally manage and share information
     about network resources and users, and is at the heart of distributed network
     security in a Windows Server–based enterprise. Active Directory thus plays a
     major role in accomplishing the business goals of your organization, and your
     ability to successfully manage Active Directory has a direct bearing on your
     ability to accomplish these goals.
     Delegation of administration, a key capability of Active Directory, provides a
     means to successfully manage an Active Directory environment. This document
     discusses in depth the issues involved in delegating administrative
     responsibilities, and can help you plan for, implement, and maintain an
     administrative delegation model that allows secure and efficient management of
     Active Directory.
Scope
    This document provides all the information required to create, implement, and
    maintain a security-conscious and efficient delegation model to manage your
    Active Directory environments. This information includes an overview of
    delegation, in-depth explanations of the rationale for delegation, technical
    descriptions of how delegation works in Active Directory, processes for creating
    delegation models for both service and data management, the steps needed to
    implement and maintain the models, and a detailed case study. Appendices to this
    document provide an exhaustive reference, including a comprehensive list of
    Active Directory administrative tasks and associated permissions required to
    delegate every administrative task in Active Directory.
    This document does not include Active Directory deployment instructions or
    recommendations. For information about planning and deploying an Active
    Directory environment, see Designing and Deploying Directory and Security
    Services of the Microsoft® Windows® Server 2003 Deployment Kit on the Web
    at http://go.microsoft.com/fwlink/?LinkID=4719.
2
    Intended Audience
         This document is intended for Information Technology (IT) professionals who
         are responsible for managing an Active Directory environment. In most IT
         infrastructures that consist of multiple integrated components and services, the
         responsibility to deliver a specific component or service is typically entrusted to
         a component or service owner, who is responsible for the overall delivery of the
         component or service.
         Ownership of Active Directory environments should be entrusted to two specific
         owners or owner groups, whose roles are typically strategic and managerial –
         service owners and data owners. Service owners and data owners have general,
         overriding responsibility for Active Directory. These usually high-ranking
         managers are respectively responsible for ensuring reliability and security in the
         delivery of the directory service and for managing the security of Active
         Directory content. To that end, they are responsible for delegating and
         distributing among their administrators responsibility for managing services and
         content. They do so by creating an administrative delegation model, which
         documents the distribution of administrative responsibilities among various
         administrative personnel.
         Administrative responsibilities for delegating Active Directory management are
         divided between:
         • Service owners, who are responsible for:
             • Planning, deployment, and long-term maintenance of the Active
                 Directory infrastructure.
             • Ensuring that the directory continues to function reliably and at the
                 desired level of security.
             • Ensuring that the goals established in service-level agreements are
                 maintained.
         • Data owners, who are responsible for maintaining the information that is
             stored in or protected by the Active Directory directory service, including:
             • Management of user and computer accounts.
             • Management of local resources, such as member servers and workstations
                 and the data they store.
         • Service administrators, who represent the operational arm of service owners
             and are responsible for carrying out the tasks that are required to maintain the
             delivery of the directory service,
         • Data administrators, who represent the operational arm of data owners and
             are responsible for carrying out the tasks that are required to manage the
             content that is stored in or protected by Active Directory.
         This document is intended for service and data owners to help them create a
         security conscious and efficient administrative delegation model that is tailored
         to the specific requirements of their organization. It is also intended for the
                                                                                    3
service and data administrators who are responsible for implementing the
delegation model.
To accommodate the needs of these different stakeholders, the information in this
document is divided into four chapters and a case study, as follows:
Chapter 1: Understanding Delegation of Administration
                   This chapter provides an overview of Active Directory
                   management categories and stakeholders and a roadmap
                   for successfully managing delegation of administration
                   in Active Directory. It is targeted at all stakeholders
                   involved in Active Directory management.
Chapter 2: How Delegation Works in Active Directory
                   This chapter takes an in-depth look at how delegation of
                   administration actually works in Active Directory and
                   presents all the technical aspects involved in delegation
                   of Administration. It contains a wealth of information
                   that will be useful for all stakeholders involved in
                   Active Directory management.
Chapter 3: Delegating Service Management
                   This chapter presents an end-to-end perspective of
                   Active Directory service management, and provides
                   guidance on how to create, implement, and maintain a
                   secure and efficient administrative delegation model for
                   service management. It is targeted at Service Owners
                   and Service Administrators.
Chapter 4: Delegating Data Management
                   This chapter presents an end-to-end perspective of
                   Active Directory data management, and provides
                   guidance on how to create, implement, and maintain a
                   secure and efficient administrative delegation model for
                   data management. Though it is targeted at Data Owners
                   and Data Administrators, Service Owners and Service
                   Administrators will also benefit from the information in
                   this chapter.
Case Study: A Delegation Scenario
                   The case study walks through the creation,
                   implementation, and maintenance of an administrative
                   delegation model for a fictitious Active Directory
                   environment based on the recommendations presented
                   in Chapters 3 and 4. While it is primarily targeted at
                   Service and Data administrators, service and data
                   owners will also benefit from the case-study.
4
The first three requirements express themselves as needs for autonomy and
isolation. Autonomy is the ability of the administrators of an organization to
independently manage:
• All or part of service management (service autonomy).
• All of part of the data stored in or protected by Active Directory (data
    autonomy).
Isolation is the ability of an administrator or an organization to prevent other
administrators from:
• Controlling or interfering with service management (service isolation).
• Controlling or viewing a subset of data in Active Directory or on member
    computers that are joined to Active Directory the directory (data isolation).
Strict service or data isolation often requires creating a separate forest or domain.
Addressing network architecture design considerations for accommodating
autonomy and isolation requirements is beyond the scope of this document.
Instead, this document addresses the need and process for delegating
administrative authority based on an organization’s requirements for
administration of its IT resources.
For more information about accommodating autonomy and isolation
requirements, see “Designing the Active Directory Logical Structure” in
Designing and Deploying Directory and Security Services of the Windows
Server 2003 Deployment Kit (or see “Designing the Active Directory Logical
Structure” on the Web at http://go.microsoft.com/fwlink/?LinkId=4723).
For the purpose of understanding an organization’s needs for delegating
administrative authority, organizations can be classified in the following
categories, based on their size:
• Small organizations, which typically have 25 to 50 workstations and three to
    five servers
• Medium organizations, which typically have 50 to 500 workstations and four
    to five servers
• Large organizations, which typically have at least 500 workstations and 50
    servers
Small and medium organizations typically have one or a few administrative
groups that are responsible for managing all aspects of Active Directory. Small
and medium organizations might not need to create an extensive delegation
model. Large organizations usually have a clear need to distribute and delegate
administrative authority to various administrative groups, possibly delegating
certain aspects of Active Directory management to centralized teams and
delegating other aspects to decentralized teams. While large organizations will
find the delegation capabilities of Active Directory most useful, small and
medium organizations can also achieve enhanced security, increased control,
more accountability, and reduced costs by implementing delegation.
6
    Benefits of Delegation
        By enabling efficient, security-conscious delegation and distribution of
        administrative responsibilities among various administrative groups that
        addresses the specific requirements imposed by participating business units,
        delegation of administration provides the means to successfully manage an
        Active Directory environment. Delegation of administration provides the
        following benefits:
        • Allows distribution of administrative responsibility among multiple
            administrative groups, each with a defined scope of authority and a defined
            set of responsibilities.
        • Enables decentralization of administrative authority.
        • Allows the security-conscious distribution of administrative responsibility.
        In addition, delegation of administration allows organizations to efficiently
        manage their IT infrastructures and enforce their security precautions by
        enabling organizations to:
        • Distribute administrative responsibilities on the basis of least privilege,
            which ensures that the individual or group of individuals to whom the task
            has been delegated can perform only the tasks that are delegated, and cannot
            perform tasks that have not been explicitly delegated or authorized.
        • Increase administrative efficiency by easily and conveniently assigning the
            responsibilities for managing Active Directory content and the directory
            service itself.
        • Reduce administrative costs by facilitating shared administrative
            responsibility. For example, administrative responsibility for providing
            account support to all accounts in the organization can be easily achieved
            within a matter of minutes.
    Delegation at Work
        A brief example at delegation at work will help you better understand the value
        and the benefits of delegation that organizations can use to enhance security,
        decrease TCO and make Active Directory and IT resource management more
        tractable and efficient.
        Contoso Pharmaceuticals, a fictitious company, has recently deployed Active
        Directory. Contoso Pharmaceuticals is a large organization that has its
        headquarters in Chicago, Illinois and has operations in five other locations in
        North America and Europe. The Active Directory infrastructure consists of a
        single forest, three domains, and six sites. The company has about 16,000 users,
        20,000 end-user workstations and about 3000 servers spread across five physical
        locations. Contoso has four business units that have a presence in each of the five
        physical locations. These business units include:
        • Research and Development
        • Production
                                                                                       7
• Business Management
• IT
With Active Directory delegation, Contoso was able to delegate responsibility in
the following areas:
• Workstation management. Contoso seamlessly and easily delegated all
    aspects of workstation management to local administrative groups, one for
    each physical location.
• Account management. Contoso delegated all aspects of account management
    to the Account Admins of each business unit regardless of the physical
    location of the managed users, while centrally retaining help desk operations.
• Security-sensitive operations. Contoso was able to grant Corporate Security
    personnel sufficient authority to carry out security-sensitive operations on
    every user account in the company, such as allowing Corporate Security
    personnel to disable or lock out any user account in the entire company at the
    click of a button.
• Resource management. Contoso delegated all aspects of resource
    management to the appropriate resource owners, enabling the resource
    owners to manage and retain control over their resources. This included the
    following:
    • A human resources portal on the intranet hosted on a small cluster of
        three high-performance servers running Internet Information Services
        (IIS). Contoso was able to delegate full control over the servers to the
        administrators of this application and grant them the ability to authorize
        access to their portal.
    • Multiple in-house applications hosted on a set of high-performance
        servers, with the administration of the servers entrusted to one set of
        administrators in the data center and the administration of each
        application entrusted to a separate set of administrators. Using delegation,
        Contoso could easily delegate to the administrative group responsible for
        managing the servers the ability to manage the servers while delegating to
        the administrative group responsible for managing each application the
        ability to manage their applications.
• Self-service user accounts. Contoso enabled self-service on user accounts,
    and was able to finely control specific information that users could change
    themselves. With delegation, Contoso could allow their users to modify their
    phone numbers and personal information while retaining control over the
    ability to modify sensitive data like the password-not-required flags on user
    objects. Contoso was also able to grant other stakeholders like Human
    Resources managers the ability to modify a user’s manager and office
    location information.
8
    Service Management
         Service management includes managing all aspects of the directory service that
         are essential to ensuring the uninterrupted delivery of the directory service across
         the enterprise. Service management includes, but is not limited to, the following
         administrative tasks:
         • Adding and removing domain controllers
         • Managing and monitoring replication
                                                                                           9
Data Management
    Data management includes managing the content that is stored in Active
    Directory, as well as content that is protected by Active Directory. Data
    management tasks include, but are not limited to, managing the following Active
    Directory content:
    • User accounts, which represent the identities of people who use the network
    • Computer accounts, which represent the computers that are joined to
        domains in the Active Directory forest
    • Security groups, which are used to aggregate accounts for the purpose of
        authorizing access to resources
    • Application-specific attributes for Active Directory-enabled and -integrated
        applications, such as Microsoft Exchange and Microsoft Real-Time
        Communication service
    In addition, Active Directory data management can also facilitate the distribution
    and delegation of these management tasks:
    • Workstation management, which includes managing all aspects of end-user
        workstations
    • Server management, which includes managing all aspects of all servers
        joined to any domain in an Active Directory forest
    • Resource management, which includes managing all aspects of services and
        applications hosted on member servers joined to any domain in an Active
        Directory forest, possibly including the server management aspects of the
        servers on which the application or resource is being hosted
Management Stakeholders
    Active Directory plays a central role in a Windows-based IT infrastructure and is
    an inherent part of distributed security and identity management, touching almost
    every critical aspect of an organization’s infrastructure. Thus, management of an
    Active Directory environment involves multiple stakeholders, each having
    specific responsibilities for managing the data, service, or security aspects of
    Active Directory, and each requiring the ability to perform their assigned
    administrative responsibilities.
    For example, administrative groups who are responsible for managing user
    identities require the ability to perform account management. Network operators
    who are responsible for delivering network services that are required for Active
10
           Directory to function, such as DNS, require the ability to manage DNS servers
           and data. Corporate security personnel might require the ability to audit logon
           events, and Help Desk operators might require administrative rights to perform
           support operations like resetting passwords for users. Administrators of Active
           Directory–enabled and –integrated applications require the ability to manage
           application-specific data stored in the directory.
           From a managerial and operational perspective, Active Directory management
           stakeholders primarily include service and data owners and administrators.
           However, because Active Directory plays a central role in a Windows Server–
           based IT infrastructure, it is not uncommon to have other stakeholders, including
           owners and administrators of other parts of the IT infrastructure who own,
           manage, or are responsible for aspects of the IT infrastructure related to or
           dependent on the organization’s Active Directory environment.
     Service and Data Owners
          In most IT infrastructures that consist of multiple, integrated components and
          services, responsibility for delivering a specific component or service is typically
          entrusted to an owner. This owner is responsible for the overall delivery of the
          component or service, but does not actually perform the work. Rather, the role of
          the owner is managerial and strategic, and the responsibility for the day-to-day
          administrative tasks that are involved in managing Active Directory is assigned
          by the owner to one or more administrators.
          Ownership of all Active Directory environments should be entrusted to two
          owner groups:
          • Service owners. Responsible for planning and long-term maintenance of the
              Active Directory infrastructure, ensuring that the directory service continues
              to function, and ensuring that goals established in service-level agreements
              are maintained. While the administrative responsibilities of managing the
              directory service can be shared among administrative groups from different
              business units, service ownership is typically not shared, but is held by a
              centralized service owner.
          • Data owners. Responsible for maintenance of the data that is stored in Active
              Directory, as well as content that is protected by Active Directory. This data
              includes user and computer accounts and local resources, such as member
              servers and workstations. Because an Active Directory environment might
              span multiple business units, these business units often require the ability to
              manage their data autonomously. It is not atypical for data ownership to be
              shared among multiple business units across the enterprise.
          Service and data owners create an administrative model to distribute and
          delegate administrative responsibilities among administrators, who are
          responsible for performing Active Directory operations. Service owners employ
          service administrators to manage the directory service, and data owners employ
          data administrators to manage the content stored in or protected by the directory
          service.
                                                                                     11
     Administrative Tasks
         Management of a dynamic Active Directory environment involves a wide variety
         of tasks that differ in nature, scope, impact, and sensitivity. For a comprehensive
         list of administrative tasks involved in Active Directory service and data
         management, see “Appendix A: Active Directory Administration Tasks” in “Best
         Practices for Delegating Active Directory Administration: Appendices,” which
         accompanies this document. This list is organized into service and data
         management categories. These categories are further subdivided on the basis of
         logical similarities between tasks. For an overview of these categories, see
         “Chapter 3: Delegating Service Management” and “Chapter 4: Delegating Data
         Management” later in this document. Each task in every category maps to an
         administrative role. In this way, all administrative tasks are covered by the set of
         Microsoft-recommended administrative roles. The sum of all categories and their
         related tasks provides full service and data administrative coverage for an Active
         Directory environment. Thus, the entire realm of Active Directory service and
         data management tasks can be assigned according to pre-defined management
         roles. You can also customize the existing roles and define new ones tailored to
         your organization.
         A roles-based approach to Active Directory administration offers multiple
         benefits. It makes management more tractable and provides the ability to
         implement uniform administrative coverage that addresses similar administrative
         needs across the organization. It also provides the ability to easily and reliably
         delegate responsibility to, and subsequently revoke delegated responsibility
         from, a set of administrators. This approach eliminates the need to specify
         multiple sets of permissions across a large set of objects.
         The following sections provide guidance on how a roles-based approach can be
         used to create, implement, and maintain a security-conscious and efficient Active
         Directory delegation model for managing an Active Directory environment.
     Understanding Active Directory Management
         A good understanding of both service management and data management is
         essential to creating an administrative delegation model that efficiently
         distributes administrative responsibility in accordance with your organization’s
         security policies.
         Service owners and service administrators are highly encouraged to gain a
         thorough understanding of all aspects of service management and should gain at
         least a good understanding of data management.
         Data owners are highly encouraged to gain a complete and thorough
         understanding of all aspects of data management. Data administrators are
         encouraged to gain a good understanding of all aspects of data management
         relevant to their administrative role and required to carry out their assigned
         administrative responsibilities.
         For an end-to-end perspective of all aspects of data and service management, see
         “Chapter 3: Delegating Service Management” and “Chapter 4: Delegating Data
         Management” later in this document.
                                                                                         15
                  Note
                  You can use a script or the command-line
                  tool Dsrevoke.exe to remove all permissions
                  for a group or user in the DACLs of all OU
                  objects in a specified scope. For more
                  information about using Dsrevoke.exe, see
                  “Appendix G: Active Directory Delegation
                  Tools” in “Best Practices for Delegating
                  Active Directory Administration:
                  Appendices,” which accompanies this
                  document.
           For more information about maintaining service and data delegation models, see
           “Chapter 3: Delegating Service Management” and “Chapter 4: Delegating Data
           Management” later in this document.
                                                                                      19
Overview
    Through delegation of administration, responsibility for administrative tasks is
    transferred to the administrators who must perform the respective tasks, and to
    no one else. From a technical perspective, delegation of administration involves
    a higher-level administrator granting a controlled set of permissions to a
    relatively lower-level administrator to give the lower-level administrator the
    ability to perform a specific administrative task. In other words, a higher-level
    administrator authorizes the delegated lower-level administrator to carry out a
    specific administrative task.
    Every administrative task involves effecting a change to the state of some data,
    and changing the state of data involves performing a low-level operation on the
    object that stores that data. As mentioned earlier in this document, there are two
    major categories of administrative tasks in Active Directory – data management
    asks and service management tasks:
    • Data management tasks typically include such tasks as creating and
        managing user and computer accounts, security groups, and application-
        specific data, all of which are stored in Active Directory. In certain cases, a
        small subset of tasks might involve the modification of Group Policy settings
        to affect the configuration state of member computers. Creation of user
        accounts and modification of group memberships are both examples of data
        management tasks.
    • Service management tasks include tasks that are related to the creation and
        maintenance of Active Directory configuration data. For example, adding a
        domain controller to a child domain, associating a new subnet to a site, and
        extending the Active Directory schema are all Active Directory service
        management administrative tasks that effect changes to configuration data. A
        majority of Active Directory configuration data is stored in Active Directory
        itself. However, certain aspects of Active Directory behavior can or must be
        configured on a domain controller. The configuration data that is associated
        with these tasks might be stored in the registry or file system of domain
        controllers.
    Thus, data and service management administration tasks primarily involve
    effecting the change of data that is stored either in Active Directory, or in some
20
     cases on the file system or registry of Domain Controllers and other computers
     joined to Active Directory.
     Every administrative task effects a change to the state of some data, and
     changing the state of data involves performing a low-level operation on some
     data represented by an object in the directory (or in some cases by an object on
     the file system or registry of a computer or Domain Controller). For example, the
     administrative task of resetting a user’s password involves a low-level write
     operation on an attribute of the user object. Similarly, creating a new site
     involves creating a corresponding site object. Similarly, modifying the level of
     detail logged for security events involves modifying a registry key (data) on
     Domain Controllers. These low-level operations that constitute an administrative
     task typically involve creation, deletion, access to, modification of, or
     verification of data.
     All data stored in Active Directory is represented by directory objects, each of
     which can be individually secured. Similarly, all data stored on the file system on
     computers and in their registries is also represented by individually securable
     objects. Individually securable refers to the fact that all low-level operations on
     data (represented by objects) can be individually authorized. In other words, an
     administrator can specify who can do what on every specific unit of data.
     Since every Active Directory administrative task involves affecting the state of
     some data by means of a low-level operation, and since all data can be
     individually secured to allow or deny someone the ability to perform a low-level
     operation on that data, it follows that the ability to carry out every administrative
     task can be controlled by controlling the appropriate permissions that authorize
     the execution of the corresponding low-level operation on the target data that is
     involved in the administrative task.
     Thus, by being able to individually authorize every low-level operation on data,
     administrators can in effect authorize all administrative tasks that involve low-
     level operations. Since all administrative tasks involve at least one low-level
     operation, it follows that all administrative tasks can be individually authorized.
     Since delegation involves a higher-level administrator authorizing the delegated
     lower-level administrator to carry out a specific administrative task, every
     administrative task in Active Directory can be delegated by controlling the
     permissions required to perform the low-level operation involved in the
     administrative task.
     In summary:
     • Delegation involves granting a controlled set of permissions to someone so
         that can carry out an administrative task.
     • Every administrative task involves performing some low-level operation on
         data.
     • Low-level operations on data can be (individually) authorized.
     • By being able to authorize the corresponding low-level task, you can delegate
         a task.
                                                                                  21
The following example illustrates the crux of how delegation works in Active
Directory. Let us consider a day in the life of David Hamilton, a marketing
associate with Contoso Pharmaceuticals.
David Hamilton recently joined the company. When he joined the company, a
user account was created for him under the Business Division OU by the
Account Admins for the Business Division of the company. The creation of the
user account involved a create operation for an object of class User under the
parent object, which in this case happened to be the OU object for the Business
Division. Since the Account Admins had Create Child permissions on this OU,
they were able to create the account.
Once the account was created, David could log on to the Active Directory
domain and go about performing his assigned responsibilities. One day, David
forgot his password and thus could not log on. He then called the Help Desk for
help. Jeff Price, a member of the Help Desk operators group, received the call
and reset David’s password after verifying David’s identity. The reset password
operation involved modifying password related attributes on David’s user
account object and required that the Reset Password extended right on David’s
user account object be granted to the individual who should be able to reset
David’s password. During the implementation of the delegation model, the Help
Desk operators group, of which Jeff was a member, was granted this extended
right on all users in the domain. Thus, Jeff was authorized to reset David’s
password.
Within six months of employment, David was promoted to the position of senior
marketing associate and now reported to a new manager. Michelle Alexander, a
Contoso employee in the Human Resources department, needed to appropriately
update David’s manager information as stored on David’s user account in Active
Directory. Modifying a user’s manager information requires a low-level
operation involving the modification of the Manager attribute on user account
objects, and requires write-property permissions to the Manager attribute to
succeed. Account Admins had granted a group called Human Resources
Personnel, of which Michelle was a member, write-property permissions to
modify the manager attribute on all user objects. Michelle was thus able to
update David’s account by appropriately changing David’s manager information.
After one year with the company, David was offered a promotion and a new job
in the Research and Development (RandD) Division of the company. His user
account now needs to be moved to the OU for the RandD Division. Moving an
object involves multiple low-level operations, including the deletion of the object
from under its current parent object, the creation of a new object under the new
parent object, and the modification of the Common-Name and relative
distinguished name attributes on the object. (Note that technically the object is
not deleted – it only seems that it is deleted and re-created.) Michael Allen, a
member of the overall account management team for Contoso (which has
membership in the Contoso Account Admins group) was asked to move the
object between the two OUs. The Contoso Account Admins group is granted
sufficient permissions on both the source and target OUs to enable its members
to carry out object moves. Michael thus has the required Delete Child
22
           permissions to carry out the low-level delete operation on the Business OU and
           Create Child permissions to carry out the low-level create operation on the
           RandD OU, and additionally has write-all-properties permissions on the user
           object and was thus able to carry out the move operation for David’s user
           account.
Directory Partitions
     In Active Directory, data storage is partitioned into logical segments called
     directory partitions, and each directory partition replicates its changes separately
     among those domain controllers in the forest that store copies (replicas) of the
     same directory partitions.
     One specific directory partition stores forest-wide configuration information
     essential to the proper functioning of the forest. Another specific directory
     partition stores the Active Directory schema. Other directory partitions store
     information, such as users, groups, and OUs, that is specific to individual
     domains. Directory partitions that store domain information are replicated to
     domain controllers in that domain only. Directory partitions that store
24
                   Note
                   There is a distinction between a directory partition and a
                   database partition. The Active Directory database is not
                   partitioned. Only the directory tree, which is the logical
                   representation of the data that is stored on a domain
                   controller, is partitioned.
      Active Directory and describes all relevant aspects of access control that are
      required to delegate administrative authority.
      Access control involves three components:
      • The security credentials of the user attempting to access a resource
      • Authorization data that protects the resource that is being accessed
      • An access check that evaluates whether or not the requested access can be
          granted
      When a user (or a process that is running on behalf of the user) attempts to
      perform a low-level operation on a securable object, the operation being
      attempted is subject to an access check. The access check takes into account the
      user security credentials and the authorization data on the object on which the
      low-level operation is being requested to determine the abilities of the user in
      relation to the respective object. If the access check determines that the security
      credentials of the user requesting the operation and the authorization data on the
      target object provides sufficient permissions to execute the operation, the
      operation succeeds. If the user has insufficient permissions to execute the
      operation that is being requested, the request fails.
      The act of delegating Active Directory administrative responsibilities involves
      identifying the low-level operation that corresponds to the administrative task
      and the specific data on which it is being performed, and then appropriately
      modifying authorization settings that protect the data.
     Inheritance of permissions
     Allows administrators to easily assign and manage permissions for a large
     collection of objects. This feature allows administrators to specify permissions
     that can be applied automatically to all objects contained within a container by
     having the specified permissions be inherited by all child objects in the container.
     Administrative privileges
     Allow an administrator of a computer system to control which users have the
     right to perform various administrative functions, or to take any action that
     affects system-wide resources. There are two types of administrative privileges –
     user rights and privileges. User rights control the various ways in which users
     can log on to a system. Privileges control a user’s ability to perform a specific
     task, usually one that affects the entire computer system rather than a particular
     object.
     Auditing
     Enables the tracking of user or system activity by recording specific (specifiable)
     types of actions in security logs. Audit data can be used to detect attempts to
     circumvent protections on resources and to create a record of administrative
     actions on the computer system.
     Low-level operations
     As mentioned earlier, every administrative task involves some low-level
     operation on data. An understanding of the various kinds of low-level operations
     helps to understand the details of how an administrative task works.
     The following are the low-level operations can be performed on data:
     • Create an object. This low-level operation involves the creation of a new
         object in Active Directory. For example, the administrative task of creating a
         new user account involves a low-level operation of creating an object of class
         User under some parent object in Active Directory
     • View an object or all child objects of a specific object. This low-level
         operation involves being able to view or see an object in Active Directory.
         For example, when using one or more Active Directory administration tools,
         viewing the contents of an OU or a domain involves performing multiple
         low-level operations (one for each object displayed) to view objects in Active
         Directory.
     • Read object attributes. This low-level operation involves accessing and
         reading the values of one or more attributes on an Active Directory object.
         For example, any administrative task involving reading some information on
         a user (for example, phone number or name) involves a low-level read
         operation on one or more attributes (also referred to as a property) of the user
         object representing the user’s account.
                                                                                    29
       Note
       An administrative task involving changing
       permissions also involves the low-level
       operation of modifying the access-control
       list stored as part of the security descriptor,
       as described in “Modify the access control
       list protecting the object” later in this
       document.
•   Modify the access control list protecting the object. The security descriptor
    contains, among other information, a list of access control entries specifying
    who can perform what low-level operation on an object. Any administrative
    task involving viewing or changing permissions involves the low-level
    operation of reading and modifying the access control list stored in the
    security descriptor of an object. For example, the administrative task of
    delegating another administrative task or authorizing a user access to some
    object involves the low-level operation of reading the security descriptor and
    modifying the access-control list stored in the security-descriptor of the
    corresponding object.
•   Modify the owner of an object. Every securable object has an owner. The
    owner of an object has the inherent ability to modify the access control list of
    the object and to transfer the ownership. The identity of an object’s owner is
    also stored in the security descriptor of the object. The administrative tasks of
    taking ownership of an object or transferring ownership of an object involve
    the low-level operation of modifying the owner of the object.
30
                  Note
                  Active Directory applies default security settings that are
                  designed to provide an out-of-the-box security configuration.
                  These security settings grant specific pre-configured
                  permissions to specific security groups that are created by
                  default.
           The following standard permissions control the ability to perform the indicated
           low-level operations:
           • Create Child. The right to create children of the object.
           • Delete Child. The right to delete children of the object.
                                                                                            31
             Note
             This right is ignored if the third character of
             the dSHeuristics attribute of the object has
             a value of 0 or is not set. For more
             information about this right, see
             “Controlling Object Visibility” on the Web at
             http://go.microsoft.com/fwlink/?LinkID=1982
             8.
      •   Access System Security. The right to get or set the SACL in the object
          security descriptor
      For a detailed description of the standard Active Directory permissions, see
      “Appendix C: Active Directory Standard Permissions” in “Best Practices for
      Delegating Active Directory Administration: Appendices,” which accompanies
      this document.
Special Permissions
    In addition to the standard set of permissions that are applied in the DACLs of
    Active Directory objects, other permissions are available to accommodate special
    requirements that are not supported by the standard permissions. These
    permissions fall into two categories:
    • Validated writes
    • Extended rights
    Validated Writes
    Certain administrative operations in Active Directory require that, before writing
    a value to a property on an Active Directory object, the system perform value
    checking, or validation, beyond that which is required by the schema. Validated
    writes are a special type of permission that facilitates the ability to perform
32
wide effect on a computer. In the case of user rights on domain controllers, the
effect is on Active Directory, and thus on the entire domain.
User rights are set in the local policy on a computer. User rights are set in
Domain Controller Security Policy for rights on domain controllers, and in
Domain Security Policy for rights on all other computers in the domain. User
rights for computers that are joined to the domain can also be specified by using
Group Policy linked to OUs. User rights for all domain controllers in a domain
are specified in the Default Domain Controllers Policy Group Policy object
(GPO), which is applied to the Domain Controllers OU. Thus, all domain
controllers in a domain share the same set of user rights assignments.
       Note
       Although the system permits the specification of different user
       rights values for different domain controllers in a domain, this
       configuration is not supported. By design, all domain
       controllers in the same domain are expected to have identical
       user rights values.
             Note
             The exception to this rule is that the membership of a domain
             local group that was created in Domain A does not appear in
             the access token that is generated on a computer that is
             joined to Domain B.
Access Token
    A security principal’s security context is represented by an access token. When a
    security principal logs on to a computer, the security subsystem on that computer
    authenticates the security principal. After authentication, the security subsystem
    creates an access token for the security principal. The access token is a data
    structure that contains the SID for a security principal, SIDs for the groups that
    the security principal belongs to (with the earlier-noted exception of domain
    local groups from a different domain), and a list of the security principal’s
    privileges (also known as user rights) on the local computer. An access token is
    created for every security principal who logs on locally at the computer’s
    keyboard, or remotely through a network connection.
    The access token provides a security context for the security principal’s actions
    on the computer to which the security principal is logged on. It is important to
    note that when a user is logged on to a workstation and requests access to data in
    Active Directory, a logon session is generated on the domain controller to which
    the user binds, and a security context is generated for this user on the domain
    controller. The access token that is created on the domain controller represents
    the credentials of the user who is accessing Active Directory. Therefore, the
    information in this access token, not information from the workstation to which
    the user is logged on, is used by the access check.
    For more information about SIDs, see “Access Control” in the Distributed
    Systems Guide of the Windows 2000 Server Resource Kit, or see “Access
    Control” on the Web at http://go.microsoft.com/fwlink/?LinkId=18852. For more
    information about well-known SIDs, see “Appendix B: Default Active Directory
    Security Groups” in “Best Practices for Delegating Active Directory
    Administration: Appendices,” which accompanies this document.
Security Groups
    Security groups are security principals that you can use to aggregate users into
    categories and roles for the purpose of applying access control. Security groups
    have scopes that define where they can be applied and membership requirements
    that define the selection of members they can have and the groups of which they
    can be members. The different types of security groups that are available and
    whether or not they appear in a user’s access token is subject to the domain mode
    (Windows 2000) and domain or forest functional level (Windows Server 2003)
    that is in effect.
    Security groups play a key role in delegation of administration. Security groups
    are used to represent specific instances of administrative roles and contain as
    members the user accounts of all delegated administrators who have been
36
                  Note
                  When specifying read access to specific
                  attributes of, or list access to, an Active
                  Directory domain object, do not use a
                  domain local group to set permissions if the
                  attribute or attributes are included in the
                  partial attribute set that is replicated to
                  global catalog servers. Instead, use a global
                  group.
           •   Global. All domains in a forest; that is, a global group is visible for
               administration within its domain and all trusted domains and thus can be
               assigned permissions on objects in all domains in the forest. Because global
               groups have forest-wide visibility, they are best used to organize users or
               groups of users into administrative roles.
                                                                                          37
      •   Universal. All domains in a forest; that is, a universal group is visible for
          administration within its domain and all trusted domains and thus can be
          assigned permissions on objects in all domains in the forest. When multiple
          roles require the same access to a resource, add global groups to a single
          universal group and add the universal group to a domain local group for the
          resource.
Group Scope Availability and Membership Rules
    Group scopes vary according to functional conditions in the domain or forest.
    Not all scopes are available under all conditions, and group membership is
    subject to conditions in the domain or forest according to domain modes in
    Windows 2000 forests and domain functional levels in Windows Server 2003. A
    domain mode or functional level that indicates “mixed” provides functionality
    that is consistent with Windows NT 4.0 domain controllers. For this reason,
    features that are not compatible with Windows NT 4.0 are not available in mixed
    domains.
    The following rules limit the availability of group scopes:
    • Domain local groups are always available.
    • Global groups are always available.
    • Universal groups are not available in:
        • Windows 2000 mixed-mode domains.
        • Windows Server 2003 domains that have a domain functional level of
             Windows 2000 mixed.
    The following rules limit the membership of security groups:
    • Domain local groups:
        • Can always contain individual user accounts and global groups from any
             domain in the forest.
        • Can also contain universal groups from any domain in the forest as well
             as domain local groups from the same domain in Windows 2000 native-
             mode domains or Windows Server 2003 domains that have a domain
             functional level of Windows 2000 native or Windows Server 2003.
    • Global groups:
        • Can always contain users from the same domain.
        • Can also contain global groups from the same domain in Windows 2000
             native-mode domains or Windows Server 2003 domains that have a
             domain functional level of Windows 2000 native or Windows
             Server 2003.
    • Universal groups, when available, can always contain user accounts, global
        groups, and other universal groups from any domain in the forest.
    For more information about group scope and membership rules, see Help and
    Support Center for Windows Server 2003. For a list of the default administrative
38
           groups that are created when Active Directory is installed, and their default
           abilities, see “Appendix N: Default Active Directory Service Administrative
           Groups” in “Best Practices for Delegating Active Directory Administration:
           Appendices,” which accompanies this document.
     Local Security Groups
          Local groups can be used to grant access to local resources on a computer. As
          such, each computer (workstation, server, or domain controller) that is running a
          version of Windows has a set of default local group accounts. On domain
          controllers, these security groups are domain local accounts that are stored in the
          Builtin container. The domain controller itself does not have local computer
          groups. On workstations and servers, these accounts are local to the computer
          only.
          SIDs for these default local accounts are always placed in a user’s token,
          independent of the user’s domain and the computer’s domain. When a computer
          (workstation or server) is joined to a domain, by default the Domain Admins
          group is made a member of the Administrators local group on the computer.
          Local groups can contain any security principal. One exception is that on domain
          controllers, Builtin accounts cannot contain domain local groups.
          For information about the abilities that are assigned to local groups by default,
          see Help and Support Center for your version of Windows.
     Group Membership Changes and Replication
         Delegating administration might involve adding or removing members of large
         groups. Changing the membership of a large group can result in a significant
         volume of replication in Windows 2000 forests and in Windows Server 2003
         forests that have Windows 2000 domain controllers. The reason for the increase
         in replication is that group membership is stored in the single, linked,
         multivalued Members attribute of the group object, and with Windows 2000
         forests and domain controllers, the attribute is the smallest value that can be
         replicated. Therefore, changing the membership of a group results in replication
         of all group members, not just the changed member value. In addition, changes
         can be lost if two administrators change the membership of the same group on
         different domain controllers; only one of the changes can be written to the Active
         Directory database during the same period of replication latency.
         In Windows Server 2003 forests, group replication is improved to eliminate these
         replication issues, but the improvements have functional level requirements. The
         improvements are available in Windows Server 2003 forests that have a forest
         functional level of:
         • Windows Server 2003 (all domain controllers are running Windows
             Server 2003), or
         • Windows Server 2003 interim (all domain controllers are running either
             Windows Server 2003 or Windows NT 4.0, but no domain controllers are
             running Windows 2000).
                                                                                           39
     principal that is associated with the thread that created the object. When a user
     makes a request to create a new object in Active Directory, the information in the
     user’s access token is used by the security subsystem on the domain controller to
     establish object ownership. The information in the access token is generated by
     the contacted domain controller. In addition to other information, the access
     token contains the following information about the user:
     • User. A field (Token-user) that contains the SID of the user who is logging
         on.
     • Default object owner A field (Default-owner-in-token) that contains the
         SID of the user or security group that becomes the owner of any object that
         this user creates.
     When the access token is created, the user’s SID is inserted into the Default-
     owner-in-token field unless the user is a member of certain administrative
     groups. In this case, the SID of the group is inserted into the field and any
     member of the administrative group can manage the object. If the user is a
     member of more than one such administrative group, the group with the highest
     level of authority is the object owner. As the object owner, you cannot change the
     owner to another user or group; that is, you cannot change the value in the owner
     field to specify an owner. However, you can apply a user right that allows
     another user to take ownership.
     For more information about how the list of the administrative groups that
     become default object owners differs in Windows 2000 and Windows
     Server 2003, see “Appendix J: Default Owners of Active Directory Objects” in
     “Best Practices for Delegating Active Directory Administration: Appendices,”
     which accompanies this document.
     DACL
     DACLs contain ACEs that identify the security principals that have access to the
     object. Each ACE has fields that specify the abilities (permissions) for the
     respective security principal. For each security principal that you add to the
     access control list, you can define a set of permissions that specify the extent to
     which that user or group of users can manipulate the object. If a user does not
     appear in an ACE, either individually or as a member of a group, that user has no
     access to the object.
     SACL
     The SACL is similar to the DACL except that it is used to audit rather than
     control access to an object. When an audited action occurs, the operating system
     records the event in the security log. Each ACE in a SACL has the following
     elements: a header that indicates whether auditing is triggered by success,
     failure, or both; a SID that specifies a particular user or security group to
     monitor; and an access mask that lists the operations to audit. The content of the
     SACL is controlled by security administrators for the local computer. Security
     administrators are users who have been assigned the Manage auditing and
     security log privilege. By default, this privilege is assigned to the built-in
     Administrators group.
                                                                                        41
                  Note
                  If necessary, you can change the default permissions that are
                  specified in the default security descriptor for an object class
                  in the schema. However, as a best practice, you should avoid
                  changing the default permissions in the default security
                  descriptor for an object class unless you need to effect a
                  change in the default security for all instances of that class
                  across all domains in the forest.
                  As a best practice, you should also avoid removing any ACEs
                  from the DACL of the domain root object. Doing so could
                  impact the functionality of certain aspects of Active Directory
                  components or applications that depend on, and have access
                  to, Active directory data by virtue of the effective permissions
                  in the DACL of the domain root object.
                  Note
                  A DACL can be set to null programmatically (that is, no DACL
                  is passed) at creation time or at any later time.
           The effect on security of having no DACL as opposed to having a DACL that has
           no ACEs is significant:
           • No DACL in the security descriptor has the effect of granting unconditional
               access to Everyone.
           • An empty DACL has the effect of not granting access to anyone.
           In the case of an empty DACL, the owner of the object always has the inherent
           right to modify the DACL and grant permissions. If no DACL exists, the owner
           can create a DACL programmatically and then grant permissions.
           For more information about using SDDL to specify permissions
           programmatically, see the Microsoft Platform Software Development Kit (SDK)
           link on the Web Resources page at http://go.microsoft.com/fwlink/?LinkID=291.
     Protected DACLs
          The DACL of an object can be marked as protected. Marking a DACL as
          protected will block the inheritance of any permissions from the parent object.
          Any inheritable permissions in the DACL of the parent objects will not be
          inherited by this object. Additionally, child objects of an object whose DACL is
          marked protected will also no longer inherit any permissions specified on the
          protected object’s parent. However, they will continue to inherit all inheritable
          permissions specified in the DACL of the protected object unless the child
          objects also have their DACLs marked as protected.
                                                                                        45
ACEs
    An ACE contains authorization intent for a specific security principal for whom
    access is allowed, denied, or audited.
    Every ACE in the DACL has the following structure:
    (ACE Type ; ACE Flags ; Permissions ; Object Type ; Inherited Object Type ;
    Trustee)
    The following is a brief description of the various fields of an ACE:
    • ACE Type – This field specifies whether the ACE is an Allow type ACE or a
       DENY type ACE. An ALLOW type ACE allows access and a DENY type
       denies access.
       This field can take on one of six values:
       • Allow – Indicates that the ACE is of the standard ACCESS ALLOWED
            type, where the ObjectType and InheritedObjectType fields are NULL.
       • Deny – Indicates that the ACE is of the standard system-audit type, where
            the ObjectType and InheritedObjectType fields are NULL.
       • System Audit – Indicates that the ACE is of the standard system type,
            where the ObjectType and InheritedObjectType fields are NULL.
       • Object Allow – Indicates that the ACE grants access to an object or a
            subobject of the object, such as a property set or property. The
            ObjectType or InheritedObjectType field or both contain a GUID that
            identifies a property set, property, extended right, or type of child object.
       • Object Deny – Indicates that the ACE denies access to an object or a
            subobject of the object, such as a property set or property. The
            ObjectType or InheritedObjectType field or both contain a GUID that
            identifies a property set, property, extended right, or type of child object.
       • Object System Audit – Indicates that the ACE audits access to an object
            or a subobject of the object, such as a property set or property. The
            ObjectType or InheritedObjectType field or both contain a GUID that
            identifies a property set, property, extended right, or type of child object.
    • ACE Flags – This field contains multiple inheritance related flags that govern
       the inheritance aspects of the ACE.
       This field can take values including but not limited to one or more of the
       following:
       • Container Inherit – Child objects will inherit this access-control entry
            (ACE). The inherited ACE is inheritable unless the
            ADS_ACEFLAG_NO_PROPAGATE_INHERIT_ACE flag is set.
       • No Propagate – The system will clear the
            ADS_ACEFLAG_INHERIT_ACE flag for the inherited ACEs of child
            objects. This prevents the ACE from being inherited by subsequent
            generations of objects.
46
        •    Inherit Only – Indicates an inherit-only ACE that does not exercise access
             control on the object to which it is attached. If this flag is not set, the
             ACE is an effective ACE that exerts access control on the object to which
             it is attached.
         • Inherited – Indicates whether or not the ACE was inherited. The system
             sets this bit.
     • Permissions – This field contains the specification of the permissions granted
         or denied to the trustee (the security principal for whom the permissions
         specified in this ACE will apply). This field can take one of the following
         values:
         • RC – Read Control
         • SD – Standard Delete
         • WD – Write DACL
         • WO – Write Owner
         • RP – Read Property
         • WP – Write Property
         • CC – Create Child
         • DC – Delete Child
         • LC – List Child
         • LO – List Object
         • SW – Validated write
         • DT – Delete Tree
         • CR – Extended Right
         For more information about these rights, see “Appendix C: Active Directory
         Standard Permissions” in “Best Practices for Delegating Active Directory
         Administration: Appendices,” which accompanies this document.
     • Object Type – This field can contain the GUID representing an object’s class.
         The GUID refers to a property or a property-set if the permissions specified
         are Read-Property or Write-Property permissions. The GUID specifies an
         object class when the permissions specified are Create Child or Delete Child
         permissions
     • Inherited Object Type – This field can contain the GUID of an object class.
         When such a GUID is set, the ACE is an effective ACE only on objects of the
         class referred to by the GUID.
     • Trustee – This field contains the SID of the security principal for whom the
         permissions specified in this ACE will apply.
     For a detailed description of the various fields of an ACE, see
     “IADsAccessControlEntry” in the MSDN Library on the Web at
     http://go.microsoft.com/fwlink/?LinkID=21262.
                                                                                     47
Example ACEs
    The following example ACEs illustrate how ACEs specify delegation intent:
             Note
             To provide clarity in following examples, the display name of
             the class or attribute has been shown instead of the actual
             GUID for the class, and the name of the group has been used
             instead of the SID for Account Admins. In actual ACEs, GUIDs
             and SIDs are used instead of the display names shown here.
      •   An ACE that grants Account Admins the ability to create user objects in an
          OU and in all OUs within the subtree rooted at this OU:
          • (OA ; CI ; CC ; User Class ; Organizational Unit class ; Account Admins)
      •   An ACE that grants Account Admins the ability to reset user passwords in an
          OU but only on User objects:
          • (OA ; CI ; CR; Reset Password ; User class ; Account Admins)
      •   An ACE that grants Account Admins the ability to modify the membership of
          all group objects (but only group objects) in a specific OU (on which this
          ACE is being applied). This ACE does not give Account Admins the
          permission to modify the group memberships of any groups that might exist
          as child objects of other OUs that might be child objects of the OU on which
          the ACE is being applied.
          • (OA ; ; WP; Member ; Group class ; Account Admins)
          Note the absence of any inheritance flags in this ACE.
Inheritance and Organizational Units
     Active Directory data is stored in containers. While some containers are general
     purpose containers, other containers have a specialized purpose in that they are
     specific in the nature of data that they are intended to store. Generic containers
     are represented by objects of the generic class Container, while specific
     containers are represented by specific object classes. An example of a generic
     container would be the Services container in the Configuration partition, which is
     intended to contain various kinds of objects representing service specific
     information. An example of a specific class of container is the Sites container in
     the Configuration partition which is intended to contain site and subnet related
     information and is represented by an object of class SitesContainer. While
     different kinds of configuration information can be stored in different kinds of
     containers, domain data is typically stored in a special purpose class of objects
     called Organizational Units (OUs).
     OUs are special purpose containers in that they are intended to contain domain
     data like user accounts, computer accounts, and groups. Additionally, OUs can
     contain other OUs within them. In this manner, domain data is stored within a
     hierarchy of OUs which serve the role of containers for domain data. OUs are
     different from other containers in that Group Policy can be applied to them. The
48
•   Computers represents the default storage area for new computer objects that
    were originally created through legacy APIs that are not Active Directory–
    aware.
• Users represents the default storage area for new user accounts that are
    created through legacy APIs that are not Active Directory–aware.
By default, when computers are joined to the domain, the computer accounts for
these computers are created in the Computers container. Because these two
containers are not OUs, Group Policy cannot be applied to them.
       Note
       Even though they are not OUs, inheritable permissions can
       still be applied to the Computers and Users containers,
       because the concept of inheritance of permissions applies to
       other containers as well as to OUs. Inheritance works the
       same in every directory partition, whether the Configuration
       partition, the Schema partition, or a domain partition.
            ensuring that all administrative access has been granted on the basis of
            least privilege.
      5.    Maintain the implemented delegation model, which involves making
            modifications to the implemented delegation model in response to changes
            in administrative requirements or needs.
           • Installation management
           • Schema management
           • Trust management
           • Knowledge reference management
           • Operations master roles management
           • Backup and restore management
           • LDAP policy management
           • Directory service configuration management
           • Replication management
           • Functional level management
           • Directory database management
           • Security policy management
           • DNS management
           • Domain Controller management
           For a complete list of the tasks that map to these categories, see “Appendix A:
           Active Directory Administrative Tasks” in “Best Practices for Delegating Active
           Directory Administration: Appendices,” which accompanies this document. Note
           that this list does not include the list of tasks involved in managing the server
           management aspects of domain controllers.
     Installation Management
          Active Directory is hosted on domain controllers across the enterprise. A forest is
          created by installing Active Directory on one server that is running Windows
          Server 2003 or Windows 2000 Server. After the forest root domain is installed,
          subsequent installations of Active Directory on member servers result in the
          creation of either new child domains in the forest, or additional domain
          controllers in an existing domain.
          Administrative tasks in this category include the creation and deletion of child
          domains and the installation of additional domain controllers in domains. The
          creation of child domains is typically an infrequent operation. Child domains are
          usually created during deployment of Active Directory. Subsequent to initial
          deployment, the addition of child domains does not happen frequently. In
          contrast, the addition of new domain controllers to an existing domain must be
          performed as and when required, typically either to address domain controller
          failures in remote sites that have only one domain controller or to provide
          domain controllers in new locations as needed.
          For more information about managing domain controllers, see the Active
          Directory Operations Guide on the Web at
          http://go.microsoft.com/fwlink/?LinkID=21268.
                                                                                         55
Schema Management
    The Active Directory Schema contains definitions for the set of objects that can
    be stored in Active Directory, and it enforces the rules that govern both the
    structure and the content of Active Directory. The schema consists of a set of the
    classes, attributes, and syntaxes that represent an instance of one or more classes
    in the schema. The schema also specifies the relationships between classes of
    objects. The base schema that ships with Active Directory contains all class and
    attribute definitions that are used by Windows 2000 Server and Windows
    Server 2003 and their components. Schema objects can be modified to
    accommodate needed object classes or attributes that are not available in the
    default schema, or to remove existing class or attribute schema objects so that
    instances cannot be created in Active Directory.
    Administrative tasks in this category involve the extension and modification of
    the Active Directory schema,
    For more information about managing the schema, see the Active Directory
    Operations Guide on the Web at http://go.microsoft.com/fwlink/?LinkID=21268.
Trust Management
     A trust relationship is a link that is established between domains to enable users
     in one domain to be authenticated by a domain controller in the other domain.
     Trust relationships are authentication pipelines that must be present so that users
     in one domain can be authorized for access to resources in another domain. All
     domains in a forest have automatic, two-way, transitive trust relationships.
     In addition to these automatic trust relationships, four other types of trusts can be
     created in an Active Directory environment.
     • Shortcut trust. Can be set up between two domains within a Windows
         Server 2003 forest to improve user logon times between the domains.
     • External trust. Can be set up to provide access to resources that are located
         in Windows NT 4.0 domains or in domains that are located in a separate
         Windows 2000 or Windows Server 2003 forest that is not joined by a forest
         trust.
     • Forest trust. In a Windows Server 2003 forest, can be used to link two
         disjoined Windows Server 2003 forests together to form uni- or bi-directional
         transitive trust relationships. A bi-directional cross-forest trust relationship
         forms a transitive trust relationship between every domain in both forests.
     • Non-Windows Kerberos realm trust. Can be set up between a non-
         Windows-brand operating system Kerberos version 5 realm, such as a UNIX
         realm, and an Active Directory domain.
     Administrative tasks in this category involve the creation, deletion and
     management of all aspects of trust relationships in the forest.
     For more information about managing trusts, see the Active Directory
     Operations Guide on the Web at http://go.microsoft.com/fwlink/?LinkID=21268.
56
                  Note
                  The state of cross-reference knowledge at
                  any specific time is subject to the effects of
                  directory replication latency.
           •   A superior reference, which is knowledge of a specifically designated referral
               location that is used whenever the domain controller has no knowledge of the
               search base.
           Knowledge references are represented by crossRef objects in Active Directory
           and are stored in the Configuration partition in the Partitions container.
           Administrative tasks in this category include pre-creation of cross-references and
           the specification of superior references.
     Operations Master Roles Management
         To provide conflict prevention, Active Directory enforces the requirement that
         certain operations can be performed on only a single domain controller per forest
         or per domain, depending on the operation. The domain controllers that are
         designated as being able to perform these single-master operations are called
         operations masters. Each operations master has a role that identifies the type of
         operations for which it is solely responsible.
         Active Directory defines five operations master roles. Two are forest-wide roles
         and three are domain-wide roles:
         • Schema master. The only domain controller in a forest that can perform
             write operations to the schema directory partition.
         • Domain naming master. The only domain controller in a forest that can add
             or remove domain or application directory partitions.
                                                                                          57
             Note
             The schema master and domain naming
             master are per-forest roles and should be
             held by domain controllers that belong to
             the forest root domain. The schema master
             and domain naming master roles should
             always be placed on the same domain
             controller, and this domain controller must
             be a global catalog server.
      Administrative tasks in this category include the transfer and the seizure of the
      five operations master roles.
      For more information about managing operations masters, see the Active
      Directory Operations Guide on the Web at
      http://go.microsoft.com/fwlink/?LinkID=21268.
Backup and Restore Management
    Backing up and restoring data is critical to failure recovery management. From a
    management perspective, the only administrative operations in this category are
    backing up and restoring Active Directory. Each of these operations is performed
    on domain controllers and each is individually controlled by separate user rights.
    For more information about Active Directory backup and restore, see the Active
    Directory Operations Guide on the Web at
    http://go.microsoft.com/fwlink/?LinkID=21268.
LDAP Policy Management
    LDAP, an industry standard directory service protocol, is the directory access
    protocol used to query and retrieve information from Active Directory. LDAP
    defines how a directory client accesses a directory server, shares directory data,
    and performs directory operations. LDAP enables clients to query, create, update,
    and delete information stored in a directory service. Because LDAP is a query
    protocol, certain behavioral aspects of how queries are handled are configurable.
    By default, all domain controllers in the forest have the same LDAP policy.
58
                  Note
                  Although query policies can be configured on a per–domain
                  controller basis, it is advisable not to specify different LDAP
                  policies for different domain controllers. Also note that some
                  domain–controller specific LDAP policies can lead to a denial of
                  service if configured incorrectly.
      Active Directory uses the name resolution services that DNS provides to enable
      clients to locate domain controllers and to enable the domain controllers that host
      the directory service to communicate with each other.
      Active Directory is designed to enable easy integration of the Active Directory
      namespace into an existing DNS namespace. Features such as Active Directory–
      integrated zones make it easier to deploy DNS by eliminating the need to set up
      secondary zones and configure zone transfers.
      When DNS servers running on domain controllers store their zones in Active
      Directory, it is not necessary to configure a separate DNS replication topology
      that uses ordinary DNS zone transfers. Instead, all zone data is replicated
      automatically by means of Active Directory replication. Therefore, service
      administration of Active Directory–integrated DNS principally involves
      managing DNS data that is stored on domain controllers.
      The DNS infrastructure supports the Active Directory logical structure to provide
      computer name resolution throughout the forest and the Internet. The forest
      owner assigns an Active Directory DNS owner for the forest. The Active
      Directory DNS owner has a thorough understanding of the existing DNS
      infrastructure and the existing namespace of the organization.
      The Active Directory DNS owner for the forest is responsible for overseeing the
      deployment of the Active Directory DNS infrastructure and making sure that, if
      necessary, domain names are registered with the proper Internet authorities.
      The Active Directory DNS owner is responsible for the Active Directory DNS
      design for the forest. If your organization is currently operating the DNS service,
      then the DNS designer for the existing DNS service works with the Active
      Directory DNS owner to delegate the forest root DNS name to DNS servers
      running on domain controllers.
      The Active Directory DNS owner for the forest also maintains contact with the
      DHCP and DNS teams of the organization and coordinates the plans of any
      individual DNS owners of each domain in the forest with these groups. The DNS
      owner for the forest ensures that the DHCP and DNS teams are involved in the
      Active Directory DNS design process so that each group is aware of the DNS
      design plan and can provide input early on.
      For more information about configuring DNS, see “Designing the Active
      Directory Logical Structure” in Designing and Deploying Directory and Security
      Services and “Deploying DNS” in Deploying Network Services of the Windows
      Server 2003 Deployment Kit (or see “Designing the Active Directory Logical
      Structure” on the Web at http://go.microsoft.com/fwlink/?LinkID=4723 and
      “Deploying DNS” on the Web at http://go.microsoft.com/fwlink/?LinkID=4709).
Domain Controller Management
   Domain Controllers are member servers that host the Active Directory directory
   service. Unavailability of a domain controller directly impacts availability of the
   Active Directory directory service, and a security breach involving unauthorized
   access to a Domain Controller can directly undermine the security of an Active
   Directory environment. Thus, providing adequate administrative coverage for all
62
                  Note
                  It might seem logical to eliminate the Domain Configuration
                  Operators role and to assign these tasks to the Forest
                  Configuration Operators role. However, it is usually advisable
                  to separate the responsibility for a domain from the
                  responsibility for the entire forest. Generally, all service
                  management tasks can have a forest-wide impact; therefore,
                  it can be argued that all such tasks should be assigned to the
                  Forest Configuration Operators role. However, the purpose of
                  the Forest Configuration Operators role is to address highly
                  security-sensitive administrative tasks, each of which has a
                  clearly visible forest-wide impact. The purpose of the Domain
                  Configuration Operators role is to separate powers among
                  different sets of administrators and assign responsibility for
                  managing highly security-sensitive administrative tasks, each
                  of which has a clearly visible domain-wide impact, though it is
                  true that these administrative tasks in the wrong hands could
                  be used to cause forest-wide impact. However, the objective is
                  not simply to grant restricted abilities — the objective is to
                  make service management more tractable.
       Note
       The lowest level at which you can apply user rights for the
       Domain Controllers OU is the default OU. The Domain
       Controllers OU is the default container for all domain controller
       objects in a domain directory partition, and moving domain
       controllers out of this OU is not recommended and not
       supported. The user rights that apply to this OU apply to all
       domain controllers in the OU, and thus, in the domain. The
       default policies are applied to the Domain Controllers OU in a
       manner that prohibits the effective use of child OUs for
       domain controllers. Unlike other OUs, child OUs of the Domain
       Controllers OU cannot be used to override the policy that is
       applied at the Domain Controllers OU parent level. For this
       reason, creating child OUs and delegating administration for
       subsets of domain controllers is not supported.
           Microsoft recommends the implementation of one instance of this role for each
           Active Directory forest. Microsoft also recommends that no more than two or
           three administrators be assigned to this role.
                  Note
                  It might seem logical to eliminate the Security Policy Admins
                  role and to assign these tasks to the Forest Configuration
                  Operators role. However, it is usually advisable to separate
                  the responsibility for security policy management from the
                  responsibility for the entire forest. Generally, all service
                  management tasks can have a forest-wide impact; therefore,
                  it can be argued that all such tasks should be assigned to the
                  Forest Configuration Operators role. However, the purpose of
                  the Forest Configuration Operators role is to address highly
                  security-sensitive administrative tasks, each of which has a
                  clearly visible forest-wide impact. The purpose of the Security
                  Policy Admins role is to separate powers among different sets
                  of administrators and assign responsibility for managing all
                  sensitive security policies for the entire forest to a specific set
                  of administrators, though it is true that these administrative
                  tasks in the wrong hands could be used to cause forest-wide
                  impact. However, the objective is not simply to grant
                  restricted abilities — the objective is to make service
                  management more tractable. An organization could very well
                  decide to make the same set of administrators members of
                  more than one service management role.
             Note
             It might seem logical to eliminate the Service Admin Managers
             role and to assign these tasks to the Forest Configuration
             Operators role. However, it is usually advisable to separate
             the responsibility for service administrator group and member
             management from the responsibility for the entire forest.
             Generally, all service management tasks can have a forest-
             wide impact; therefore, it can be argued that all tasks should
             be assigned to the Forest Configuration Operators role.
             However, the purpose of the Forest Configuration Operators
             role is to address highly security-sensitive administrative
             tasks, each of which has a clearly visible forest-wide impact.
             The purpose of the Service Admin Managers role is to protect
             and manage all service admin groups and accounts in the
             entire forest. It is true that these administrative tasks in the
             wrong hands could be used to cause forest-wide impact.
             However, the objective is not simply to grant restricted
             abilities — the objective is to make service management more
             tractable. An organization could very well decide to make the
             same set of administrators members of more than one service
             management role.
      For more information about planning for remote server management, see
      “Planning for Remote Server Management” in Planning Server Deployments” of
      the Windows Server 2003 Deployment Kit (or see “Planning for Remote Server
      Management” on the Web at http://go.microsoft.com/fwlink/?LinkId=15309.
             Note
             It might seem completely logical to eliminate the Domain
             Controller Admins role and to assign these tasks to the Forest
             Configuration Operators role. However, the objective is to
             separate responsibility in order to make service management
             more tractable. The purpose of the Domain Controller Admins
             role is to provide adequate coverage to ensure that the server
             management aspects of Domain Controllers are more than
             adequately taken care of. If a Domain Controller goes down,
             its impact is immediately noticeable and usually unaffordable.
             It is true that these administrative tasks in the wrong hands
             could be used to cause forest-wide impact. Thus, as is the
             case with all service management roles, ensure that you
             assign only extremely trustworthy and highly skilled
             administrators to all service management roles. An
             organization could very well decide to make the same set of
             administrators members of more than one service
             management role.
           Note that the administrative task of restoring Active Directory has been assigned
           to the Domain Configuration Operators role. This is because the act of restoring
           Active Directory, unlike backing up Active Directory, is not a regular or frequent
           task – it is only performed when an Active Directory partition needs to be
           restored from backup.
                  Note
                  It might seem completely logical to eliminate the Domain
                  Controller Admins role and to assign these tasks to the Forest
                  Configuration Operators role. After all, a Backup operator is
                  sufficiently privileged to be able to log on to a Domain
                  Controller and back up Active Directory. Should an
                  administrator in this role turn malicious or be coerced, he or
                  she could modify the backed up data to inject malicious
                  changes. However, the objective is to separate responsibility
                  to make service management more tractable. It is true that
                  these administrative tasks in the wrong hands could be used
                  to cause forest-wide impact. Thus, as is the case with all
                  service management roles, ensure that you assign only
                  extremely trustworthy and highly skilled administrators to all
                  service management roles. An organization could very well
                  decide to make the same set of administrators members of
                  more than one service management role.
             Note
             It might seem completely logical to eliminate the Schema
             Admins role and to assign these tasks to the Forest
             Configuration Operators role. After all, a Schema Administrator
             could modify default security descriptors and escalate his or
             her privilege. Should an administrator in this role, turn
             malicious, or be coerced, he or she could modify the Schema
             and in the worst case cause Active Directory to stop
             functioning. However, the objective is to separate
             responsibility to make service management more tractable. It
             is true that these administrative tasks in the wrong hands
             could be used to cause forest-wide impact. Thus, as is the
             case with all service management roles, ensure that you
             assign only extremely trustworthy and highly skilled
             administrators to all service management roles. An
             organization could very well decide to make the same set of
             administrators members of more than one service
             management role.
            Note
            It might seem logical to eliminate the Replication Management
            Admins and Replication Monitoring Operators roles and to
            assign these tasks to the Forest Configuration Operators role.
            After all, any administrator in either role could disrupt service,
            thereby causing forest–wide impact. However, the objective is
            to separate responsibility to make service management more
            tractable. It is true that these administrative tasks in the
            wrong hands could be used to cause forest-wide impact. Thus,
            as is the case with all service management roles, ensure that
            you assign only extremely trustworthy and highly skilled
            administrators to all service management roles. An
            organization could very well decide to make the same set of
            administrators members of more than one service
            management role.
                  Note
                  Any DNS administrator could disrupt service, thereby causing
                  a forest–wide impact. However, the objective is to separate
                  responsibility to make service management more tractable. It
                  is true that these administrative tasks in the wrong hands
                  could be used to cause forest-wide impact. Thus, as is the
                  case with all service management roles, ensure that you
                  assign only extremely trustworthy and highly skilled
                  administrators to all service management roles. An
                  organization could very well decide to make the same set of
                  administrators members of more than one service
                  management role.
                  Note
                  The information in this document applies to Active Directory
                  infrastructures that have an existing forest and domain
                  structure. For information about creating a forest and domain
                  structure, see “Designing the Active Directory Logical
                  Structure” in Designing and Deploying Directory
                  and Security Services of the Windows
                  Server 2003 Deployment Kit (or see
                  “Designing the Active Directory Logical
                  Structure” on the Web at
                  http://go.microsoft.com/fwlink/?LinkId=4723
                  ).
     Guidelines for Creating a Service Delegation Model
         Creating an efficient and security-conscious model based on these roles involves
         the following steps:
         1.    Understand the nature of the responsibilities assigned to each Microsoft-
               recommended role and, if needed, customize the definition of these roles
               by adding or removing assigned tasks from the recommended role
               definitions.
         2.    Determine the number of instances of the role that are required for your
               environment. The number of instances of each Microsoft-recommended
               role is presented earlier in this document and is summarized in Table 3:
             Table 3 Service Management Roles and Recommended
             Number of Instances
              Service Management Role                  Recommended Number of
                                                                 Instances
              Forest Configuration                 One instance per forest
              Operators
              Domain Configuration                 One instance per domain
              Operators
              Security Policy                      One instance per forest
              Administrators
              Service Admin Managers One instance per forest
              Domain Controller                    1. One instance for every set of
              Administrators                          domain controllers physically
                                                      located in a centrally or
                                                      remotely located datacenter
                                                   2. One instance for the set of all
                                                      domain controllers physically
                                                      located in remote locations
                                                      but centrally managed via
                                                      remote management
                                                      solutions
                                                                                         79
      • Application-Specific Admins
      Depending on its specific administrative needs, an organization might choose to
      create and implement a delegation model based on Microsoft-recommended
      roles or a set of custom roles (which might or might not be based on Microsoft
      recommended roles) defined by the organization.
Business Unit Admins Role
     It is not uncommon for multiple business units to participate in a shared Active
     Directory environment. Each business unit, while participating in a shared Active
     Directory environment, can have its own domain data and IT resources. Each
     business unit should be assigned a data owner who should have overall
     responsibility for all aspects of data management for that business unit.
     Each business unit data owner should have a Business Unit Admins
     administrative role representing the operational arm of data owners. This role
     should be assigned at least one administrator and no more than a small number of
     administrators. This administrative group will have complete authority over all
     business unit data in the directory. Administrators in this role are the business
     unit’s highest-ranking data administrators and are responsible for implementing
     and maintaining the administrative delegation model for business unit data
     management. Business Unit Admins also work closely with data owners during
     the creation of the OU structure to advise about how features such as inheritance
     of permissions and Group Policy affect the OU structure.
     Typically, organizations will choose to first create and implement their service
     management delegation model, following which the data management model
     will be implemented. As a part of this process, the service owners should hand
     over responsibility for Active Directory data management to data owners. During
     the transfer of responsibility for data management to the data owner, the service
     owner should create one instance of this role for every business unit. Depending
     on the size of the business unit, this role should be assigned to no more than a
     few administrators. Administrators in this role delegate responsibility for the
     business unit by creating an OU hierarchy and creating and populating
     administrative groups to manage each OU in the hierarchy.
     For more information about the creation and delegation of this role, see
     “Transferring Data Management to Business Unit Owners” later in this
     document.
Account Admins Role
    Every business unit has user accounts that need to be created, managed, and
    supported. Microsoft recommends the role of Account Admins for providing
    administrative coverage to manage user accounts. Responsibilities for user
    account management include creating accounts, populating account attributes,
    managing and maintaining accounts, and deleting accounts. Responsibility for
    account support should ideally be assigned to the Help Desk Operators, thereby
    removing that burden from the Account Admins role.
92
           The Business Unit administrator of each business unit is responsible for creating
           one or more instances of the Account Admins role to provide administrative
           coverage for all aspects of Account management for all business unit user
           accounts, depending on the OU structure and the distribution of accounts among
           sub-units that the business unit might contain.
     Workstation Admins Role
         The Workstation Admins role is recommended for managing workstations.
         Depending on the administrative model, a business unit can have one or more
         instances of this role. For example, a business unit might be spread across
         multiple locations and might staff each location with a local administrative group
         that is responsible for managing these workstations. In this case, each local group
         must be delegated responsibility for managing all workstations for the business
         unit in that location. The number of members in each role depends on the
         requirements for each role instance and is typically a function of the number of
         workstations that need to be supported by a specific role instance.
     Server Operators Role
         Microsoft recommends the role of Server Operators to provide administrative
         coverage for managing an organization’s server computers. Administrators
         assigned to the role are typically responsible for managing servers.
     Resource Admins Role
         Microsoft recommends the Resource Admins role for facilitating administrative
         coverage of a collection of one or more servers and the common services hosted
         on this set of one or more servers. Administrators who are assigned to this role
         are responsible for managing the resource (application, database, or files) and the
         set of servers on which the resource is hosted. For instance, an organization
         might choose to create a cluster out of a small number of physical servers, and
         this cluster of servers might serve as a single virtual file server. Administrators
         who have been granted responsibility for managing this single virtual file server
         will require the ability to manage each of these servers and manage the virtual
         file server. One instance of this role should be created for every such resource in
         the business unit.
         In some cases, depending on the administrative model, the group of
         administrators who manage the servers is different from the group of
         administrators who manage the services that are hosted on these servers. This
         role can also be used to facilitate management of only the services hosted on one
         or more servers. Thus, the meaning and the nature of tasks assigned to specific
         instance of this generic role can differ from one instance to another.
     Security Group Admins Role
         Microsoft recommends the role of Security Group Admins for managing all
         security groups required to meet the authorization needs of a Business Unit.
         Administrators in this role are responsible for creating and managing both
         account and resource security groups, and delegating the ability to manage the
                                                                                       93
     Custom Roles
         Microsoft-recommended roles are intended to facilitate the creation and
         implementation of a well managed and efficient Active Directory data
         management delegation model. They are by no means the only way to address
         the delegation requirements of an organization.
         In addition to the roles recommended by Microsoft, organizations can choose to
         create custom roles to address unique administrative requirements. Creating a
         custom role involves the following steps:
         1.    Understand and document the purpose of the new role.
         2.    Assign a set of administrative tasks to this new role.
         3.    Determine the minimal and precise set of permissions required to delegate
               the set of administrative tasks identified earlier in this chapter.
         4.    Document the general scope where permissions must be applied in the
               directory.
         After making these decisions, you can determine the number of instances that are
         required, create the groups to represent each instance of the role, assign
         permissions to enable the role, and populate the groups with the appropriate
         administrative user accounts.
Workstation Admins
One instance of this role will be required for every administrative group that
needs the ability to manage workstations. Most organizations have one or more
administrative groups for every location that houses workstations. For each such
administrative group, document the scope of authority by documenting the set of
workstations that should be managed by this group.
Workstation management typically includes being able to manage all aspects of
workstations; thus, incumbents in this role typically are Local Administrators on
member workstations.
Server Operators
One instance of this role will be required for every administrative group that
requires the ability to manage servers. Most organizations have one or more
administrative groups for every location that houses servers. For each such
administrative group, document the scope of authority by documenting the set of
servers that should be managed by this group.
Server management typically includes being able to manage all aspects of
member servers; thus, incumbents in this role typically are Local Administrators
on member servers.
Resource Admins
One instance of this role will be required for every administrative group that
needs the ability to manage resources (services or applications being hosted on a
set of one or more servers and collectively managed by a single group of
administrators). For each such administrative group, document the scope of
authority by documenting the set of servers and the specific service that
constitute the resource that should be managed by this group.
Resource management typically includes being able to manage all aspects of the
service and manage all aspects of the servers on which the service is being
hosted, although this might not always be the case. In some cases, the
responsibility might be restricted to being able to manage only the service that is
being hosted on or more servers.
Security Group Admins
There should only be one instance of this role for every business unit. Depending
on the specific administrative needs of the business unit, the business unit data
owners might decide to create more than one instance of this administrative role.
For each instance determine the set of administrative tasks that incumbents of the
role should be allowed to perform.
The following is a list of common administrative tasks that belong to this
category:
• Create security groups
• Modify the membership of security groups
• Modify other properties, such as managed-by information
• Delete security groups
98
           For each instance evaluate the need for and document the set of administrative
           tasks that incumbents of the role should be allowed to perform. This information
           will be used during the implementation phase to delegate each of these
           administrative role instances.
           Help Desk Operators
           One instance of this role will be required for every administrative group that
           needs the ability to provide account support to a subset of user accounts or to all
           user accounts. For each such administrative group, document the scope of
           authority by documenting the set of users for whom this group will provide
           account support.
           The following is a list of common administrative tasks that belong to this
           category:
           • Reset passwords on user accounts
           • Unlock user accounts
           • Optionally, a business unit might also decide to grant its help desk operators
               the ability to modify certain attributes on user objects; these attributes will
               typically be non-securitysensitive attributes that users cannot themselves
               modify
           For each instance, evaluate the need for and document the set of administrative
           tasks incumbents of the role should be allowed to perform. This information will
           be used during the implementation phase to delegate each of these administrative
           role instances.
           Application-Specific Admins
           One instance of this role will be required for the administrative group of every
           Active Directory–enabled or Active Directory–integrated application that
           requires the ability to manage application-specific data stored in Active
           Directory. For each such administrative group, document the scope of authority
           by documenting the set of application-specific data that this group will require
           the ability to manage.
           The nature of administrative tasks in this category is typically a function of the
           specific Active Directory–enabled or Active Directory–integrated application
           deployed and the specific administrative requirements of that application. The
           administrators of these applications should have a good understanding of these
           administrative requirements. The business unit data owners should understand
           these requirements and plan for facilitating the required access to enable these
           administrators to carry out their administrative tasks.
     Assigning Administrators to Role Instances
          For each instance of every data management role required, document the
          identities of all administrators who will be assigned to these role instances.
                                                                                     99
Planning an OU Hierarchy
     Planning an OU hierarchy based on the administrative delegation and Group
     Policy requirements of the business unit is one of the first steps in creating a
     delegation model. A well-designed OU hierarchy should adequately address an
     organization’s Group Policy requirements while also facilitating the delegation of
     administrative authority based on the organization’s administrative requirements.
     This section provides recommendations for creating a well-designed OU
     hierarchy.
An OU for every Business Unit
    In the section “Implementing Your Data Management Delegation Model” later in
    this document, as part of the handoff process wherein service owners hand off
    data management delegation to data owners, a single high-level OU named
    Business Units will be created with the purpose of creating a subtree to contain a
    single high-level OU for each business unit. That way, all domain data can be
    contained within this one OU subtree rooted at the Business Units OU instead of
    at the Domain root. This recommended approach has the following advantages:
    • This facilitates delegation of administration of each business unit to the
        respective business unit administrator while allowing the specification of any
        permissions that might be required to delegate administrative authority over
        data across all business units at the Business Units OU instead of at the
        Domain root. This prevents the inheritance of any ACEs applied in the
        System container and in the DNS containers, thereby substantially reducing
        the number of ACEs, which might impact the size of that database
        significantly in Windows 2000. In Windows 2003, the concept of single-
        instances makes this a non-issue. For example, if the administrative needs of
        Contoso Pharmaceuticals required that a single centralized administrative
        group be delegated the authority to provide Account support for all business
        units in the domain, their administrators would typically grant the security
        group representing the operators in the Account support role inheritable
        permissions expressed in three or four ACEs applied on the domain root
        object. While this would have the effect of the ACEs flowing down to all user
        objects in all business units, it would also result in these ACEs flowing down
        on all DNS record objects in the DNS container; assuming that there are
        about 5000 records in the DNS container, this approach would result in 5000
        additional ACEs in Windows 2000, significantly impacting the database size.
        On the other hand, if these inheritable ACEs were applied on the Business
        Units OU in the recommended approach, they would only be inherited by
        objects stored in the subtree rooted at the Business Units OU.
    • This also increases the manageability of domain data by eliminating the need
        to create multiple OUs that are peers of the OUs that exist by default. It
        increases manageability because it leaves the top-level OU hierarchy
        unchanged with the exception of the addition of a single OU, thereby
        minimizing the possibility of confusion.
100
3.    Create a single OU under the Business Unit OU for storing all business unit
      user resources
       You should plan on storing computer accounts for all your workstations
       and servers within this OU. Recommendations on creating an OU
       hierarchy within this OU to address specific administrative requirements
       around workstation and server management and facilitate delegation of
       resource management to specific administrative groups are provided later
       in this section.
Figure 2 shows a representative OU structure based on the recommendations
presented earlier in this section. Note that Product Development and Business
Management are the two Business Unit OUs, one for each of the two business
units in the fictitious organization represented in the example.
Figure 2 High-Level OU Structure for a Business Unit OU
The OU structure thus far can be used to perform the following delegations:
• An organization can delegate account management of all business unit
   accounts to a single administrative group by granting appropriate permissions
   on the Accounts OU. This is sufficient for a small organization with a single
   location and a relatively small number of users.
102
•  Assume that your organization is spread across multiple locations and your
   IT model requires delegation of account management to locally based
   administrative groups. In this scenario, you can create an additional set of
   OUs, one for each location, and then store user accounts in the OU
   representing the physical location where the user account is based. You can
   then distribute and delegate account management by specifying permissions
   on these OUs.
Figure 3 illustrates the three-location OU structure that accommodates user
accounts that must be managed separately in Locations A, B, and C.
   Figure 3 Decentralized Account Administration for Four
   Locations
      Note that the recommendations described earlier in this section are by no means
      the only way to facilitate management of security groups. Organizations should
      take their specific administrative needs into account when designing their OU
      structures. For example, one alternative to storing resource specific security
      groups in the Security Groups OU is to create an OU to store all security groups
      for a specific resource under the specific OU representing this resource in the
      Resource OU subtree, as presented later in this section. This has the additional
      advantage of storing the security groups associated with a resource along with
      the servers representing the resource, thereby storing all aspects of a resource in
      one small subtree.
      What is important is to understand how an OU enables delegation of
      administrative authority and to apply this understanding to the creation of an OU
      structure that addresses your organization’s administrative delegation and Group
      Policy requirements.
                                                                                    107
      Resource Management
      A well-designed OU structure can also be used to manage servers and to delegate
      management to the respective administrative groups of the various IT resources
      that are hosted by a collection of servers. The recommendation earlier in this
      chapter to create one OU for every type of resource under the Resources OU aids
      in increasing manageability of resources.
      Under the OU created for each resource type, introduce an additional level of
      OUs with each OU in this level representing a specific resource. For example,
      under the Web Servers OU, create a specific OU for storing the computers of all
      servers on which the Human Resources Web portal is collectively hosted.
      Figure 6 illustrates such an OU structure.
                                                                                109
           In the first example, assume that Group Policy requirements for this organization
           include that a location-specific Group Policy be applied to all computers based
           on their location, irrespective of the role of the computers. To accommodate this
           requirement, the OU hierarchy structure in
                                                                                    111
      administration tools and for details about how to use them, see “Appendix G:
      Active Directory Delegation Tools” in “Best Practices for Delegating Active
      Directory Administration: Appendices,” which accompanies this document. It is
      recommended that you invest the time to gain familiarity with these tools, as
      these tools are required to manage permissions. One alternative to using these
      tools is to use scripting to manage permissions.
            7.    Create one user account for each Business Unit Admins administrator in his
                  or her respective business unit OU (these accounts will be moved to an
                  appropriate OU within the respective Accounts OU by the business unit
                  administrator after delegation of the business unit OU is implemented).
            8.    Add each user account to the respective security group that represents the
                  Business Unit Admins role instance for the business unit.
            Figure 8 shows a prototype domain-level OU structure that is created by a
            service administrator for handing off data administration to data owners in a
            domain that has two business units.
            Figure 8 Domain-Level OU Structure and Groups for
            Transferring Data Administration
      Business Unit Admins. Business Unit Admins now have complete control over
      their Business Unit OUs and can proceed to implement their delegation models.
      This section provides recommendations for implementing an efficient and
      security-conscious delegation model.
      The following are the recommended tasks involved in implementing the business
      unit delegation model:
      1.    Implement the OU hierarchy structure.
      2.    Create security groups to represent the various administrative role
            instances.
      3.    Enable Administrative Roles.
      4.    Delegate Administrative Roles.
Implementing the OU Structure
     The first step in implementing the delegation model is to create the OU structure
     in the directory. This step is usually simple and straightforward: The Business
     Unit Admins create all OUs according to the documented OU structure for the
     business unit.
Creating Security Groups to Represent Role Instances
    The next step in implementing the OU structure is to create security groups to
    represent all required administrative role instances as documented during the
    creation of the model. This step is also very straightforward and involves the
    following tasks:
    1.    For every required administrative role instance, the Business Unit Admins
          create one security group in the Delegation OU, a child of the Business
          Unit OU. These groups are typically Domain Local groups, as their scope
          of application is the Domain.
             Note
             When specifying read access to specific attributes of, or list
             access to, an Active Directory domain object, avoid using
             domain local groups to set permissions if the attribute or
             attributes are included in the partial attribute set that is
             replicated to global catalog servers. Instead, consider using a
             global group. Users of domain local groups might not be able
             to access these attributes if they are outside the domain that
             hosts the global catalog to which they are bound. Note,
             however, that this affects only read and list access because
             Global Catalogs are Read-Only by design.
      2.   After creating each group, Business Unit Admins can optionally choose to
           grant these groups the ability to modify their own group memberships,
           thereby allowing administrators in these roles to add or remove other
           administrators without Business Unit Admin intervention. This step is
           purely a function of the administrative requirements of an organization, and
116
       For example, assume that the business unit data owners decided to
       delegate only the following tasks to the Account Admins for the Division
       A:
    • Create user accounts
    • Modify all attributes that belong to the Personal Information property-set
    According to “Appendix A,” the following are the permissions required to
    perform these administrative tasks:
    • Create user accounts
    • Create Child on parent object
    • Modify all attributes that belong to the Personal Information property-set
    • Write-Property to the Personal-Information property-set
    Thus, in order to delegate this role, the security group representing the
    Division A Account Admins role will need to be granted the following
    permissions:
    • Create Child on parent object
    • Write-Property to the Personal-Information property-set
    Also, note the specifics of where these permissions are required. Since the
    Create Child permission is required on the parent object, which in this case
    happens to the be the Division A OU, there is no need to mark that
    permission as inheritable. On the other hand, since the Write-Property
    permission will actually be required on the user objects, this permission will
    need to be marked as inheritable.
3.    Once you have determined the point of delegation and the minimal set of
      permissions required to delegate the various roles, modify the DACL on
      the object that corresponds to the point of delegation and grant the security
      group representing each administrative role the identified set of
      permissions.
Once these steps have been completed, all administrative roles for account
management will have been delegated.
Enabling security group management roles
Your business unit should have only one instance of the Security Group Admins
role that is responsible for security group management for the entire business
unit.
To delegate an instance of the Security Group Admins role, perform the
following tasks:
1.    Refer to the documented role instance descriptions and identify the scope
      of administrative authority. Then map this scope to an OU subtree in the
      Security OU. Based on this information, determine the point of delegation
      for delegating this role instance.
118
the groups to which a group can belong. The policy restricts membership by
enforcing the list: any members who are not on the list are removed from the
group; any security principals in the list that are not members of the group are
added to the group.
For more information about restricted groups, see “Restricted Groups” in Help
and Support Center for Windows Server 2003. For more information about
restricted groups, see article 810076, “Updates to Restricted Groups (“Member
of”) Behavior of User-Defined Local Groups” in the Microsoft Knowledge base.
To find this article, see the Microsoft Knowledge Base link on the on the Web
Resources page at http://go.microsoft.com/fwlink/?LinkID=291.
The following example illustrates the application of this feature to delegation of
the workstation management role.
The Production business unit of Contoso Pharmaceuticals has operations in two
physical locations – Chicago and Atlanta. 60 percent of the users of this business
unit are based in Chicago and 40 percent in Atlanta. Every user is typically
assigned one end-user workstation.
Contoso’s OU hierarchy thus has two OUs within the Workstations OU, one
representing Chicago and the other Atlanta. Computer accounts for all
workstations located in Chicago are stored in the Chicago OU. Accordingly,
computer accounts for all workstations located in Atlanta are stored in the
Atlanta OU. Contoso’s data owners have assigned the responsibility of managing
all workstations in the Chicago location to a locally based administrative group
called Chicago Workstation Admins. Members of this administrative group
require the ability to manage all aspects of computer management for these
workstations. They might be called upon to perform a variety of administrative
tasks including, but not limited to, troubleshooting operating system issues,
adding hardware, configuring drivers, and installing patches. Most of these tasks
require administrative access to these workstations.
Contoso’s administrators easily facilitated making this administrative group local
administrators on all workstations by performing the following steps:
1.     Creating a security group called Chicago Workstation Admins to represent
       this role
2.     Granting this security group inheritable full-control on all computer objects
       by modifying the DACL of the Chicago OU within the Workstations OU
3.     Using the restricted groups feature of Group Policy to make this group a
       member of the Local Administrators group on all workstations in Chicago
       by applying Group Policy on the Chicago OU and specifying that the
       Chicago Workstation Admins be made a member of the Local
       Administrators group on all workstations whose computer accounts are
       present in the Chicago OU
Enabling resource management administrative roles essentially involves
repeating the steps involved in this example for all administrative roles. The
following recommendations can be used to enable resource management roles.
120
      Perform the following steps to enable the various instances of the Workstation
      Admins role:
      1.     Refer to the documented role description for this instance and identify the
             scope of administrative authority. Map this scope to an OU subtree in the
             Workstations OU. Based on this information, determine the point of
             delegation for delegating this role instance.
      2.     Grant the security group representing this role instance the following
             inheritable permission on the point of delegation:
             • Full-Control on Computer objects
      3.     Use the Restricted Groups feature of Group Policy by applying a GPO to
             the OU that represents the point of delegation,to make this make the
             security group representing the specific role instance a member of the local
             Administrators group on all member workstations that are stored in the
             OU.
      Once these steps have been completed, all administrative roles for workstation
      management will have been delegated.
      For each instance of the Server Operators role, perform the following steps to
      enable the instance:
      1.     Refer to the documented role description for this instance and identify the
             scope of administrative authority. Then map this scope to an OU subtree in
             the Resources OU. Based on this information, determine the point of
             delegation for delegating this role instance. Refer to your OU model to
             determine the specific OU created with the purpose of storing non resource
             specific servers. You might have more than OU if you created a high-level
             OU under the Resources OU to store non resource specific servers and
             possibly created an additional level of OUs within this OU, one for each
             physical location that has servers located and depends on local
             administrative groups for management of these servers.
      2.     Grant the security group representing this role instance the following
             inheritable permissions on the point of delegation:
             • Full-Control on Computer objects
      3.     Use the Restricted Groups feature of Group Policy by applying a GPO to
             the OU that represents the point of delegation, to make this make the
             security group representing the specific role instance a member of the local
             Administrators group on all member workstations that are stored in the
             OU.
      Once these steps have been completed for all instances of the Server Operators
      role, all administrative roles for server management will have been delegated.
      For each instance of the Resource Admins role, perform the following steps to
      enable the instance:
      1.     Refer to the documented role description for this instance and identify the
             scope of administrative authority. Map this scope to an OU subtree in the
                                                                                  121
      2.     Request that the Security Admins group grant to the Resource Admins
             group the ability to modify the membership of these groups. On each
             security group object, grant the following permissions to the security group
             account itself:
             • Property permission Read All Properties
             • Property permission Write Members
      The Security Group Admins can evaluate the request and if approved, create the
      specific security groups in an appropriate location, thereby enabling Resource
      Admins to authorize access to their resources.
      Enabling help-desk roles
      Every business unit will typically also have at least one instance of the Help
      Desk Operators role. Administrators in this role are responsible for providing
      account support for user accounts, and typical helpdesk operations include
      resetting user passwords and unlocking user accounts. Since most of the
      administrative tasks assigned to this role involve providing account support,
      most of these administrative tasks involve low-level operations on user account
      objects.
      To delegate an instance of the Help Desk Operators role, perform the following
      tasks:
      1.     Refer to the documented role instance descriptions and identify the scope
             of administrative authority. Map this scope to an OU subtree in the
             Accounts OU. Based on this information, determine the point of delegation
             for delegating this role instance. For most business units, the scope of
             delegation will typically map to the Accounts OU, since in most
             organizations a single administrative group is responsible for providing
             account support.
      2.     Based on the documented role instance description, determine the minimal
             set of permissions required to delegate all assigned administrative tasks by
             referring to “Appendix A: Active Directory Administrative Tasks” in “Best
             Practices for Delegating Active Directory Administration: Appendices,”
             which accompanies this document. This appendix documents the minimal
             and precise set of permissions required to delegate every Active Directory
             administrative task.
              As mentioned earlier in this section, typical account support tasks include
             the following:
             • Resetting user passwords
             • Unlocking locked out accounts
          According to “Appendix A,” the following are the permissions required to
          perform these administrative tasks:
             • Resetting user passwords
             • Reset User Password Extended right on the user account
             • Unlocking locked out accounts
                                                                                 123
      Thus, before delegating instances of the Application Specific Data Admins roles,
      it is important to identify precisely where the application data is being stored.
      This information will be required to determine the point of delegation and the
      manner in which application is delegated. For example, if the application stores
      data in a separate OU that it creates and this OU happens to be outside of any
      Business Unit OU (for example, if it is a child of the Domain object), then the
      Domain Admins will be responsible for delegating these roles and the scope of
      delegation will typically be the specific OU. On the other hand, if this
      application stores application specific data on user attributes (for example, the
      application could extend the schema and store user specific information on user
      objects), then this falls within the scope of administrative authority of the
      Business Unit Admin and the scope of delegation then becomes the Accounts
      OU.
      To delegate an instance of the Application Specific Data Admins role, perform
      the following tasks:
      1.     Refer to the documented role instance descriptions and identify the scope
             of administrative authority. Map this scope to an OU subtree if it maps to
             an OU within the business unit. If it maps to an OU outside of the Business
             Unit, transfer responsibility for delegating this role to Domain Admins.
             Based on this information, determine the point of delegation for delegating
             this role instance.
              Based on the documented role instance description, determine the minimal
              set of permissions required to delegate all assigned administrative tasks by
              consulting the application’s administrators.
      2.     Once you have determined the point of delegation and the minimal set of
             permissions required to delegate this role, modify the DACL on the object
             that corresponds to the point of delegation and grant the security group
             representing this administrative role the identified set of permissions.
      Once these steps have been completed, the Application Specific Data Admins
      administrative role will have been delegated.
      Delegating self-service on user accounts
      User accounts store information about users in the form of properties, or
      attributes, of the user object. For example, some of these properties include such
      information as the user’s home phone number, mailing address, manager, cell
      phone number, and so on. Active Directory defines certain property sets that are
      collections of such properties. Specifically, a user object has the following
      property sets:
      • Personal-Information
      • Email-Information
      • Web-Information
      • RAS-Information
      • User-Account-Restrictions
                                                                                       125
      • Membership
      • General Information
      • User Logon
      • Domain Password
      For more information about the membership of these property sets, refer to
      “Appendix E: Active Directory Property Sets” in “Best Practices for Delegating
      Active Directory Administration: Appendices,” which accompanies this
      document.
      The default security descriptor for user objects, as defined in the Active
      Directory schema, grants users the ability to modify the following property sets:
      • Personal-Information
      • Email-Information
      • Web-Information
      User in your business unit might require the ability to modify other properties on
      user objects in addition to the properties that are covered by these three property
      sets. In this case, additional administrative steps are required to grant users the
      required permissions. To grant additional access to users, perform the following
      tasks:
      1.     Identify the specific properties that users are to be able to modify.
      2.     To all users, grant Write-Property permissions (inheritable) to SELF.
             Note
             Alternatively, your organization might
             choose to revoke the user’s ability to modify
             certain attributes that users can modify by
             default. Additional administrative steps are
             also required to revoke specific permissions
             from users.
      For the exact set of permissions that are required to modify a specific property or
      a collection of properties, see “Appendix A: Active Directory Administrative
      Tasks” in “Best Practices for Delegating Active Directory Administration:
      Appendices,” which accompanies this document.
Delegating Administrative Roles
    The next step in implementing the delegation model involves delegating all the
    required instances of the various administrative roles. Delegating a role simply
    involves modifying the group memberships of the security groups of all
    administrative roles that have been enabled. The act of making an administrator a
    member of a security group that represents an administrative role results in the
    role having been delegated to an administrator.
    To delegate the various administrative roles that have been enabled, do the
    following for each role instance:
126
      Using Inheritance
           You can use inheritance of permissions to more easily implement delegation. The
           use of inheritance of permissions allows administrators to easily apply
           permissions on a collection of objects without having to explicitly modify the
           DACL of every object. This capability allows administrators to easily manage
           and control permissions on large sets of objects by applying and managing
           permissions on a relatively small set of objects, from which other objects inherit
           permissions.
           When using inheritance to specify permissions, administrators can control the
           various ways in which an inheritable permission is propagated. The following
           guidelines can help you use inheritance effectively:
           • When specifying inheritable permissions on an object, if these permissions
               need to apply only to a specific object class, specify the object class instead
               of letting the permission apply onto all child objects. This will ensure that
               these permissions, when inherited, are effective only on objects of the
               specific class on which they are intended to be effective.
                                                                                         127
              Note
              Any user who has the ability to modify the DACL of any OU in
              the OU hierarchy can use inheritance to grant him or
              herself or any other user any permission on
              any object in the subtree rooted at that OU.
              Therefore, carefully grant permissions to
              modify the DACL of an OU object.
Taking Ownership of Objects
     Some features of object ownership can complicate management of Active
     Directory data, and you should be aware of them when planning and
     implementing delegation of administrative authority. Every object in Active
     Directory has an owner. The owner of an object is the only person who has the
     inherent right to control who has permission to perform operations on the object
     and in what way – the owner has the inherent right to modify permissions on an
     object even if he or she is explicitly denied all access to the object in the object’s
     DACL. An object’s owner can also grant or deny permission for different kinds
     of access to particular users or groups of users. An object’s owner can also
     transfer ownership by giving another security principal permission to take
     ownership. The creator of an object is usually also the owner of the object; the
     only exception to this rule is that if an object is being created programmatically,
     an owner can be explicitly specified. Thus, when a user creates an object, he or
     she usually becomes the owner of the object.
128
      This aspect of object ownership affects how Active Directory data can be
      managed. Consider the scenario in which administrative authority has been
      delegated to a group of administrators by implementing an administrative role.
      As part of carrying out delegated responsibilities, one of the members of the
      administrative role creates an object. As the creator of the object, this specific
      administrator also becomes the owner of the object. At a later date, this
      administrator might no longer be a member of this administrative role. If this
      administrator is no longer a member of this administrative role, he or she should
      ordinarily no longer be able to manage this object. Since this administrator is no
      longer a member of the administrative group representing the administrative role
      that he or she was a member of, and since inheritable permissions were used to
      delegate control of these objects to members of this administrative role, it seems
      reasonable to conclude that this administrator will no longer have access to this
      object. However, the administrator will still have access to this object by virtue
      of the fact that as the creator of the object, he or she still owns the object. This
      can obviously complicate delegation of administrative authority.
      While this issue can be addressed by putting in place business policies to add
      certain checks when an administrator is removed from an administrative role,
      such administrative checks will not be fool-proof. A business unit can enforce
      policy that requires that when an administrator is removed from an
      administrative role, a check is made to see what objects the administrator owns
      and that ownership of all objects be appropriately transferred. However, this
      check is not fool-proof because the administrator might have used his authority
      as owner to grant himself or herself (or another user) sufficient permissions to
      modify the DACL of this object, or permissions to perform other operations.
      The following precaution is recommended to adequately address this issue with
      respect to managing user and group objects: Create a script that runs in the
      security context of a Domain Admin account on a periodic basis (like daily or
      weekly). This script should perform the following actions:
      1.    Walk through a specifiable subtree of objects, rooted at some OU, and for
            every object do the following:
            a. Check the owner field of the object; if the owner field is not set to
               Domain Admins, change the owner field to Domain Admins.
            b. Additionally, check the DACL of the object to ensure that the only
               explicit ACEs in the DACL are the ones that are found in the default
               security descriptor for that object class in the Schema. This check
               ensures that creator of the object did not modify the DACL explicitly to
               grant anyone (including himself or herself) any additional permissions. If
               any explicit ACEs are found that do not exist in the default security
               descriptor for that object class, report their existence and remove these
               ACEs.
      The reason this approach will work only for user and group objects is that the
      default Note
               security descriptors of these object classes do not contain any ACEs for
              ThisOwner
      the Creator   checkTrustee.
                             will limit   an organization’s
                                    The general                   abilityOwner ACEs on
                                                  problem with Creator
              to  apply   explicit  ACEs    on  objects.    This
      other object classes, however, is that some default security descriptors can
              limitation can be overcome by having the
              script report the existence of such ACEs and
              prompt for manual deletion. This approach,
              while continuing to allow the use of explicit
              ACEs, will require manual intervention and
              might require significant manual
              intervention if many explicit ACEs are used.
              However, if explicit ACEs have been used
              sparingly and minimally, this approach can
              be very useful.
                                                                                       129
      contain ACEs for the Creator Owner Trustee, because during object creation, the
      user field in any ACE for this trustee is replaced with the SID of the user creating
      the object. Thus, when checking to see that only ACEs that were in the default
      security descriptor are present, any ACE that was mapped to the SID of the
      creator will show up as an explicit ACE that was not in the default security
      descriptor and, if removed, could impact functionality.
             Note
             If your organization should decide to implement the script
             approach described here, it is strongly advised
             that this approach be thoroughly tested in
             non-production environments before being
             implemented in your production
             environment.
Maintaining Your Data Management Delegation Model
    Over time, your data management administrative delegation model might need to
    be modified to address changing needs and requirements. The data management
    tasks required to maintain a changing data management delegation model are the
    same as those required to maintain a service management delegation model.
    Tasks that are required to maintain the service delegation model can include:
    • Adding (delegating) or removing (undelegating) members to or from data
        administration role instances
    • Adding new instances of roles in the event of changes in administrative needs
    • Modifying a role by assigning or revoking a new or existing task from the
        role definition
    • Creating new custom roles if the need arises
    • Undelegating a role completely by revoking all permissions that are granted
        to the group that represents the role
            In such cases, it is preferable to remove and re-assign the role. The Dsrevoke
            command-line tool can be used to easily and reliably remove all permissions that
            are granted to a security principal. For more information about using this tool,
            see “Undelegating a Data Administration Role” later in this document.
            To add a new task to a role for each role instance that needs to be modified,
            perform the following tasks:
            1.    Identify the set of permissions that are required to perform the task.
            2.    Identify the location (specific OU or OU tree) in the OU hierarchy where
                  permissions have been granted to the security group that represents the role
                  instances.
            3.    Either revoke all permissions and then re-apply the updated set of
                  permissions, or grant this security group the additional minimal set of
                  permissions that are required to perform the new administrative task.
            Depending on the requirement, you might need to update the set of
            administrative tasks that are assigned to a specific instance of the role or to all
            instances of the role.
            child OUs by using inheritance. For ease of management, always use security
            groups to apply permissions.
      Using Dsrevoke
           Dsrevoke.exe has the following syntax:
              dsrevoke /report|/remove [/domain:domainname] 
              [/username:username]
              [/password:password|*] [/root:domain/OU] 
              securityprincipal
           Descriptions for each option are as follows:
           • /report: Reports the explicit ACEs that are currently set for the specified
              security principal on OU objects in the specified domain or an OU subtree.
              By default, the command dsrevoke /report starts at the domain root and
              searches every OU below that root for explicit ACEs that are granted to the
              specified security principal. If you are sure that the permissions for a security
              group are set only on or below a specific OU, you can specify the scope of
              the search by using the /OU switch to make the search more efficient.
           • /remove: Reports all explicit ACEs and then, after prompting for
              confirmation, removes the ACEs that are currently set for the security
              principal, including all inherited ACEs.
           • /domain: The DNS or NetBIOS name of the domain in which the permissions
              are to be removed. This value must be specified only when the ACEs that you
              want to remove are set on OUs in a domain other than the domain of the
              logged-on user.
           • /username: The user name of the user who is using the tool. This value is
              required when:
              • The user is not logged on as an administrator.
              • ACEs are being removed in a domain other than the domain of the
                  logged-on user.
           • /password: The password of the tool user. If the command is entered with an
              asterisk (*) in place of a password, the tool prompts the user for a password.
           • /root: The OU or domain root at which to start the search for ACEs. If no
              value is specified, the search begins at the root of the specified domain. If no
              domain is specified, the search begins at the root of the domain of the
              logged-on user. When specifying a root domain or OU, you must use the
              distinguished name (for example,
              /root:OU=BusUnits=DC=DomainA,DC=com). If spaces occur in any part of
              the distinguished name, enclose the entire option in quotation marks (for
              example, “/root:OU=Product Development,OU=Delegation,OU=Business
              Units,DC=DomainA,DC=com”).
                                                                                       135
Company Overview
      Contoso Pharmaceuticals is a large organization that has its headquarters in
      Chicago, Illinois and has operations in five other locations in North America and
      Europe. The Active Directory infrastructure consists of a single forest, three
      domains, and six sites.
Physical Locations
        The company has operations in six physical locations, three in North America
        and three in Europe:
        • North America — Chicago, New York, Atlanta
        • Europe — London, Paris, Rome
Business Units
       Contoso has four business units. Table 7 shows the business units and their
       locations.
       Table 7 Contoso Business Units and Locations
                  Business Units                          Locations
        Research and Development              Chicago
        Production                            Atlanta
        Business Management                   Chicago, New York, London,
                                              Paris, Rome
        IT                                    Chicago, Atlanta, New York,
                                              London, Paris, Rome
136
      Servers
          The servers include file servers, Web servers, database servers, and application
          servers.
          Table 9 shows the numbers of servers of each type and their respective business
          units.
          Table 9 Business Unit Server Numbers and Types, By Business
          Unit
            Business           File           Web          Database Application
               Unit         Servers          Servers        Servers         Servers
           Research       800             50              100            50
           and
           Developm
           ent
           Production 300                 20              100            100
           Business       120             45              50             35
           Managem
           ent
           IT             30              30              20             20
Site Topology
        The Contoso site topology consists of six logical Active Directory sites, one for
        each of the six physical locations, as shown in Figure 10.
        Figure 10 Active Directory Site Topology for Contoso
        Pharmaceuticals
         Table 10 shows the distribution of domain controllers per domain across sites.
         Table 10 Domain Controllers Per Domain in Each Site
                         Number of Domain Controllers per Domain
           Site Concorp.cont NOAM.concorp.co Europe.concorp.co
                     oso.com              ntoso.com                 ntoso.com
          Chica           3                    2                        2
          go
          Atlant                               2
          a
          New                                  2
          York
          Londo                                                         2
          n
          Paris                                                         2
          Rome                                                          2
          DC1
          EUROPE-
          DC2
          EUROPE-                                          G
          DC3
          EUROPE-
          DC4
          EUROPE-                                                    G
          DC5
          EUROPE-
          DC6
          EUROPE-                                                           G
          DC7
          EUROPE-
          DC8
         All domain controllers are placed in highly secure physical locations to which
         only authorized personnel are granted access. All domain controllers in remote
         locations are equipped with a remote administration solution, such as Remote
         Insight Lights-Out (RILO), so that administrators can control both hardware and
         software on domain controllers remotely to manage systems where no IT staff
         are stationed.
            the Windows Server 2003 Deployment Kit (or see “Designing the Site Topology”
            on the Web at http://go.microsoft.com/fwlink/?LinkId=4724).
                   Note
                   In Windows 2000, the domain naming
                   master must be placed on a global catalog
                   server.
      Domain-wide Role Placement
         The first domain controller that is installed in a domain has the three domain-
         wide roles by default. Because the concorp.contoso.com domain is the forest root
         domain, the first domain controller that is installed to create the forest root
         domain contains the three domain roles and is also a global catalog server.
         Because the infrastructure master must not be located on a global catalog server,
         Contoso moves that role, as well as the other two domain-wide roles, to
         CONTOSO-DC2, which is not a global catalog server.
         The first domain controllers that are installed in noam.concorp.contoso.com and
         in europe.concorp.contoso.com are not global catalog servers. Therefore, the
         domain-level roles are left on these domain controllers, as shown in Table 12.
         Table 12 Domain-Wide Operations Master Role Placement
                Domain                PDC           Infrastructure        RID Master
                                     Master              Master
          concorp.contoso. CONTOSO CONTOSO-DC2 CONTOSO-
          com                     -DC2                                   DC2
          noam.concorp.co NOAM-                   NOAM-DC1               NOAM-DC1
          ntoso.com               DC1
          europe.concorp.c EUROPE- EUROPE-DC1                            EUROPE-
          ontoso.com              DC1                                    DC1
                                                                                     141
            This team of administrators will create and implement the service and data
            delegation models for the organization.
      Table 15 shows the model creation entries in the template for this role.
      Table 15 Model Creation Template for Forest Configuration
      Operators Role
                     Field                      Assignment Information
       Role Instance Name                   Contoso Forest Config Ops
       Instance of                          Forest Configuration
                                            Operators Role
       Instance Number                      1 of 1
       Assigned Administrators              Joe, Sally, Kevin
      Assigned Tasks
      Security Group
      Permissions Assigned
      Notes                                Based in Chicago
                                     Operators Role
Instance Number                      2 of 3
Assigned Administrators              John, Sandra
Assigned Tasks
Security Group
Permissions Assigned
Notes                                Based in Chicago
            Field                       Assignment Information
Role Instance Name                   EUROPE Dom Config Ops
Instance of                          Domain Configuration
                                     Operators Role
Instance Number                      3 of 3
Assigned Administrators              Christoph, Anna
Assigned Tasks
Security Group
Permissions Assigned
Notes                                Based in London
modifications
      Permissions Assigned
      Notes                                 Based in Chicago
                  Field                        Assignment Information
      Role Instance Name                    EUROPE DNS Admins
      Instance of                           DNS Admins
      Instance Number                       4 of 4
      Assigned Administrators               Laurie, Samuel
      Assigned Tasks
      Security Group
      Permissions Assigned
      Notes                                 Based in Chicago
Table 22 shows the model creation entries in the template for this role.
Table 22 Model Creation Template for Service Admin Managers
Role
               Field                      Assignment Information
 Role Instance Name                   Contoso Srvc Admin
                                      Managers
 Instance of                          Service Admin Managers
 Instance Number                      1 of 1
 Assigned Administrators              Lisa
                                      Mark (also assigned to
                                      Security Policy Admins, DNS
                                      Admins)
 Assigned Tasks
 Security Group
 Permissions Assigned
 Notes                                Based in Chicago
            Now that the creation phase is complete, Contoso has a delegation model that
            documents the division of responsibility for service management of the Active
            Directory infrastructure. In the next step, the Enterprise Admins group will
            implement the Active Directory directory service management model.
      •   Assumption: The three domains have been installed and are running
Out-of-Box Container Hierarchy for the Forest Root Domain
     When the first domain controller is installed to create the forest root domain of
     the Contoso forest, the default set of containers shown in Figure 11 is created:
     Figure 11 Default Forest Root Domain Containers
154
     Group Type: Universal if the forest root domain is in native mode, otherwise
     global
        Note
        “Native mode” has the following meaning,
        depending on the operating system:
         Windows Server 2003: the domain
          functional level is Windows 2000 native
         Windows 2000: the domain mode is
          native
2.     Grant the following permissions to Contoso Forest Config Ops:
     Extended rights:
     • DS-Replication-Get-Changes on
        CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Get-Changes on
        CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Get-Changes-All on
        CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Get-Changes-All on
        CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Manage-Topology on
        CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Manage-Topology on
        CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Monitor-Topology on
        CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Monitor-Topology on
        CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Synchronize on
        CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Synchronize on
        CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
     • Change-Schema-Master on
        CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
     • Change-Domain-Master on
        CN=Partitions,CN=Configuration,DC=concorp,DC=contoso,DC=com
     Permissions on
     CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
     • Inherit-only Full-Control permissions on all objects of class NTDS-
        Settings
156
     • The computer object that represents the server that will be promoted to
       create a new domain.
   • CN=sites,CN=Configuration,DC=concorp,DC=contoso,DC=com
4.   Add Contoso Forest Config Ops to the local Administrators group of any
     member server that is to be promoted to a Domain Controller.
Implementing Domain Configuration Operators
A member of Enterprise Admins creates three instances of this role, one for each
domain, by performing the following steps.
To implement the Domain Configuration Operators role, forest
root domain instance, for concorp.contoso.com
1.   In the concorp.contoso.com domain, create the following security group
     under the Service Management OU:
   Group Name: Contoso Root Dom Config Ops
   Group Type: Universal if the forest root domain is in native mode, otherwise
   global
         Note
         “Native mode” has the following meaning,
         depending on the operating system:
          Windows Server 2003: the domain
           functional level is Windows 2000 native
           or higher
          Windows 2000: the domain mode is
           native
2.    Grant the following permissions to Contoso Root Dom Config Ops:
     Extended rights:
     • DS-Install-Replica on DC=Contoso,DC=com
     • DS-Replication-Get-Changes on DC=contoso,DC=com
     • DS-Replication-Get-Changes on
        CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Get-Changes on
        CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Get-Changes-All on DC=contoso,DC=com
     • DS-Replication-Get-Changes-All on
        CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Get-Changes-All on
        CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Manage-Topology on DC=contoso,DC=com
     • DS-Replication-Manage-Topology on
        CN=Configuration,DC=concorp,DC=contoso,DC=com
158
      •  DS-Replication-Manage-Topology on
         CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Monitor-Topology on DC=contoso,DC=com
      • DS-Replication-Monitor-Topology on
         CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Monitor-Topology on
         CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Synchronize on DC=contoso,DC=com
      • DS-Replication-Synchronize on
         CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Synchronize on
         CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
      • Change-RID-Master on CN=RID
         Manager$,CN=System,DC=contoso,DC=com
      • Change-Infrastructure-Master on DC=contoso,DC=com
      • Change-PDC on DC=contoso,DC=com
      Permissions on
      CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
      • Inherit-only Full-Control permissions on all objects of class NTDS-
         Settings
      • Inherit-only Create Child permissions to be able to create and delete
         objects of class Server
      • Inherit-only Delete Child permissions to be able to delete objects of class
         NTDS-Settings
      • Inherit-only Delete Child permissions to be able to delete objects of class
         Server
      Inheritable Full Control permissions on:
      • CN=System,DC=contoso,DC=com
      • CN=System,DC=noam,DC=concorp,DC=contoso,DC=com
      • CN=System,DC=europe,DC=concorp,DC=contoso,DC=com
      Create Child permissions on:
          Note    If the forest root domain is not in native mode, universal
                  groups are not available. In this case, create a new domain
                  local group in each domain and grant that group the
                  permissions specified earlier in this procedure. Then make the
                  Contoso Root Dom Config Ops global group a member of these
                  domain local groups.
      •   OU=Domain Controllers,DC=contoso,DC=com
      •   OU=Domain Controllers,DC=noam,DC=concorp,DC=contoso,DC=com
                                                                                159
• OU=Domain Controllers,DC=europe,DC=concorp,DC=contoso,DC=com
      •  DS-Replication-Get-Changes-All on
         DC=noam,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Get-Changes-All on
         CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Get-Changes-All on
         CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Manage-Topology on
         DC=noam,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Manage-Topology on
         CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Manage-Topology on
         CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Monitor-Topology on
         DC=noam,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Monitor-Topology on
         CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Monitor-Topology on
         CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Synchronize on
         DC=noam,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Synchronize on
         CN=Configuration,DC=concorp,DC=contoso,DC=com
      • DS-Replication-Synchronize on
         CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com”
      • Change-RID-Master on CN=RID
         Manager$,CN=System,DC=noam,DC=concorp,DC=contoso,DC=com
      • Change-Infrastructure-Master on
         DC=noam,DC=concorp,DC=contoso,DC=com
      • Change-PDC on DC=noam,DC=concorp,DC=contoso,DC=com
      Permissions on
      CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
      • Inherit-only Full-Control permissions on all objects of class NTDS-
         Settings
      • Inherit-only Create Child permissions to be able to create and delete
         objects of class Server
      • Inherit-only Delete Child permissions to be able to delete objects of class
         NTDS-Settings
      • Inherit-only Delete Child permissions to be able to delete objects of class
         Server
                                                                                161
         Group Type: Universal if the forest root domain is in native mode, otherwise
         global
      2.   Grant the following permissions to EUROPE Dom Config Ops:
         Extended rights:
         • DS-Replication-Get-Changes on
            DC=europe,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Get-Changes on
            CN=Configuration,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Get-Changes on
            CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Get-Changes-All on
            DC=europe,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Get-Changes-All on
            CN=Configuration,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Get-Changes-All on
            CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Manage-Topology on
            DC=europe,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Manage-Topology on
            CN=Configuration,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Manage-Topology on
            CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Monitor-Topology on
            DC=europe,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Monitor-Topology on
            CN=Configuration,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Monitor-Topology on
            CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Synchronize on
            DC=europe,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Synchronize on
            CN=Configuration,DC=concorp,DC=contoso,DC=com
         • DS-Replication-Synchronize on
            CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
         • Change-RID-Master on CN=RID
            Manager$,CN=System,DC=europe,DC=concorp,DC=contoso,DC=com
         • Change-Infrastructure-Master on
            DC=europe,DC=concorp,DC=contoso,DC=com
         • Change-PDC on DC=europe,DC=concorp,DC=contoso,DC=com
                                                                                163
   Permissions on
   CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
   • Inherit-only Full-Control permissions on all objects of class NTDS-
      Settings
   • Inherit-only Create Child permissions to be able to create and delete
      objects of class Server
   • Inherit-only Delete Child permissions to be able to delete objects of class
      NTDS-Settings
   • Inherit-only Delete Child permissions to be able to delete objects of class
      Server
   Inheritable Full Control permissions on:
   • CN=System,DC=europe,DC=concorp,DC=contoso,DC=com
              Note
              “Native mode” has the following meaning,
              depending on the operating system:
               Windows Server 2003: the domain
                functional level is Windows 2000 native
                or higher
               Windows 2000: the domain mode is
                native
      2.    Grant the following permissions to Contoso Repl Mgmt Admins:
           Extended rights:
           • DS-Replication-Manage-Topology on
              DC=concorp,DC=contoso,DC=com
           • DS-Replication-Manage-Topology on
              DC=noam,DC=concorp,DC=contoso,DC=com
           • DS-Replication-Manage-Topology on
              DC=europe,DC=concorp,DC=contoso,DC=com
           • DS-Replication-Manage-Topology on
              CN=Configuration,DC=concorp,DC=contoso,DC=com
                                                                            165
     • DS-Replication-Manage-Topology on
       CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
   • DS-Replication-Monitor-Topology on
       DC=concorp,DC=contoso,DC=com
   • DS-Replication-Monitor-Topology on
       DC=noam,DC=concorp,DC=contoso,DC=com
   • DS-Replication-Monitor-Topology on
       DC=europe,DC=concorp,DC=contoso,DC=com
   • DS-Replication-Monitor-Topology on
       CN=Configuration,DC=concorp,DC=contoso,DC=com
   • DS-Replication-Monitor-Topology on
       CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
   Full Control permissions on
   CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
Implementing Replication Management Admins
A member of Enterprise Admins creates one instance of this role.
To implement the Replication Management Admins role
1.   In the concorp.contoso.com domain, create the following security group
     under the Service Management OU:
   Group Name: Contoso Repl Monitoring Ops
   Group Type: Universal if the forest root domain is in native mode, otherwise
   global
         Note
         “Native mode” has the following meaning,
         depending on the operating system:
          Windows Server 2003: the domain
           functional level is Windows 2000 native
           or higher
          Windows 2000: the domain mode is
           native
2.    Grant the following permissions to Contoso Repl Monitoring Ops:
     Extended rights:
     • DS-Replication-Monitor-Topology on
        DC=concorp,DC=contoso,DC=com
     • DS-Replication-Monitor-Topology on
        DC=noam,DC=concorp,DC=concorp,DC=contoso,DC=com
     • DS-Replication-Monitor-Topology on
        DC=europe,DC=concorp,DC=contoso,DC=com
166
           •   DS-Replication-Monitor-Topology on
               CN=Configuration,DC=concorp,DC=contoso,DC=com
           •   DS-Replication-Monitor-Topology on
               CN=Schema,CN=Configuration,DC=concorp,DC=contoso,DC=com
               Note                      environment is a
                      If your Active Directory
                      Windows 2000 environment, the
                      Replication-Monitor-Topology extended right
                      is not available. In this case, grant the
                      Replication-Manage-Topology extended right
                      on all of the objects specified in the
                      preceding step.
          Full Control permissions on
          CN=Sites,CN=Configuration,DC=concorp,DC=contoso,DC=com:
      Implementing DNS Admins
      A member of Enterprise Admins creates four instances of this role, as follows:
          • Contoso Forest DNS Admins for the entire forest
          • Contoso DNS Admins for the concorp.contoso.com domain
          • NOAM DNS Admins for the noam.concorp.contoso.com domain
          • Europe DNS Admins for the europe.concorp.contoso.com domain
      To implement the DNS Admins role, Concorp instance
      First the domain instances are implemented, and then the forest root instance,
      which must be added to the security groups for each domain instance.
      1.     In the concorp.contoso.com domain, create the following security group
             under the Service Management OU:
          Group Name: Concorp DNS Admins
          Group Type: Universal if the forest root domain is in native mode, otherwise
          global
               Note
               “Native mode” has the following meaning,
               depending on the operating system:
                Windows Server 2003: the domain
                 functional level is Windows 2000 native
                 or higher
                Windows 2000: the domain mode is
                 native
      2.    Grant the following permissions to Concorp DNS Admins:
           • Full Control on
             CN=MicrosoftDNS,CN=System,DC=concorp,DC=contoso,DC=com
                                                                              167
     •   Full Control on
         CN=MicrosoftDNS,DC=DomainDnsZones,DC=concorp,DC=contoso,D
         C=com
To   implement the DNS Admins role, NOAM DNS Admins instance
1.     In the concorp.contoso.com domain, create the following security group
       under the Service Management OU:
     Group Name: NOAM DNS Admins
     Group Type: Universal if the forest root domain is in native mode, otherwise
     global
2.     Grant the following permissions to NOAM DNS Admins:
     Full Control on
     CN=MicrosoftDNS,CN=System,DC=noam,DC=concorp,DC=contoso,DC=c
     om
     Full Control over
     CN=MicrosoftDNS,DC=DomainDnsZones,DC=noam,DC=concorp,DC=con
     toso,DC=com
To   implement the DNS Admins role, Europe instance
1.     In the concorp.contoso.com domain, create the following security group
       under the Service Management OU:
     Group Name: Europe DNS Admins
     Group Type: Universal if the forest root domain is in native mode, otherwise
     global
2.     Grant the following permissions to Europe DNS Admins:
     Full Control on
     CN=MicrosoftDNS,CN=System,DC=europe,DC=concorp,DC=contoso,DC=
     com
     Full Control over
     CN=MicrosoftDNS,DC=DomainDnsZones,DC=europe,DC=concorp,DC=co
     ntoso, DC=com
To   implement the DNS Admins role, Contoso Forest instance
1.     In the concorp.contoso.com domain, create the following security group
       under the Service Management OU:
     Group Name: Contoso Forest DNS Admins
     Group Type: Universal if the forest root domain is in native mode, otherwise
     global
2.     Add the Contoso Forest DNS Admins group to the following groups:
     • Concorp DNS Admins
     • NOAM DNS Admins
     • Europe DNS Admins
168
            Note
            “Native mode” has the following meaning,
            depending on the operating system:
             Windows Server 2003: the domain
              functional level is Windows 2000 native
              or higher
             Windows 2000: the domain mode is
              native
      2.  Grant the following permissions to Contoso Sec Pol Admins on each of the
          following objects:
         Objects:
         • DC=concorp,DC=contoso,DC=com
         • DC=noam,DC=concorp,DC=contoso,DC=com
         • DC=europeDC=concorp,DC=contoso,DC=com
         • OU=Domain Controllers,DC=concorp,DC=contoso,DC=com
         • OU=Domain Controllers,DC=noam,DC=concorp,DC=contoso,DC=com
         • OU=Domain Controllers,DC=europe,DC=concorp,DC=contoso,DC=com
         Permissions:
         • Read-property permissions to read the GP-Link property
         • Write-property permissions to read the GP-Link property
         • Read-property permissions to read the GP-Options property
         • Write-property permissions to read the GP-Options property
      3.  In the properties page for the Domain Controllers OU in each domain, on
          the Group Policy tab, select the Default Domain Controllers GPO and on
          the Security tab, grant Full Control to Contoso Sec Pol Admins.
                                                                               169
      Note
      “Native mode” has the following meaning,
      depending on the operating system:
       Windows Server 2003: the domain
        functional level is Windows 2000 native
        or higher
       Windows 2000: the domain mode is
        native
2.   In each domain in the forest, modify permissions on the object
     CN=AdminSDHolder,CN=System,DC=Domain Name, as follows:
     a. Grant Contoso Srvc Admin Managers Full Control on the object.
     b. Revoke permissions granted to the Domain Admins and Builtin
        Administrators groups.
            Note
            “Native mode” has the following meaning,
            depending on the operating system:
             Windows Server 2003: the domain
              functional level is Windows 2000 native
              or higher
             Windows 2000: the domain mode is
              native
      2.   Add Contoso Root & NOAM DC Admins to the security group
           CN=Administrators,CN=Builtin,DC=contoso,DC=com
      3.   Add Contoso NOAM DC Admins to the security group
           CN=Administrators,CN=Builtin,DC=noam,DC=concorp,DC=contoso,DC=
           com
      4.   Make sure no other group is a member of the Builtin Administrators group
           in noam.concorp.contoso.com.
      To implement the Domain Controller Admins role, Europe DC
      Admins instance
      1.   In the concorp.contoso.com domain, create the following security group
           under the Service Management OU:
         Group Name: Europe DC Admins
         Group Type: Universal if the forest root domain is in native mode, otherwise
         global
      2.   Add Contoso Europe DC Admins to the security group
           CN=Administrators,CN=Builtin,DC=europe,DC=concorp,DC=contoso,DC
             Note
           =com
             “Native mode” has the following meaning,
             depending on the operating system:
                Windows Server 2003: the domain
                 functional level is Windows 2000 native
                 or higher
                Windows 2000: the domain mode is
                 native
                                                                                  171
          Note
          “Native mode” has the following meaning,
          depending on the operating system:
           Windows Server 2003: the domain
            functional level is Windows 2000 native
            or higher
           Windows 2000: the domain mode is
            native
2.       In Domain Controller Security Policy in each domain, grant the following
         user rights under User Rights Assignment to the respective instance of the
         Backup Operators role:
     •     Allow log on locally
     •     Back up files and directories
     •     Shut down the system
3.       In Domain Controller Security Policy in each domain, modify the User
         Rights Assignment settings to remove all user rights settings that are
         granted by default to the Builtin\Backup Operators group, which are:
     •     Allow log on locally
     •     Back up files and directories
     •     Restore files and directories
     •     Shut down the system
4.       Make sure that no other group is granted these user rights.
172
      2.   Create one OU for each business unit within the Business Units OU in each
           domain by creating the objects in Table 27.
      Table 27 OUs for Each Business Unit in NOAM and Europe
      Domains
                         Object DN                             Object Class
       OU=RandD,OU=Business                                 organizationalU
       Units,DC=noam,DC=concorp,DC=contoso, nit
       DC=com
       OU=Production,OU=Business                            organizationalU
       Units,DC=noam,DC=concorp,DC=contoso, nit
       DC=com
       OU=BusMgmt,DC=noam,DC=concorp,DC organizationalU
       =contoso,DC=com                                      nit
       OU=BusMgmt,DC=                                       organizationalU
       europe,DC=concorp,DC=contoso,DC=com nit
       OU=IT,DC=noam,DC=concorp,DC=contos organizationalU
       o,DC=com                                             nit
       OU=IT,DC=europe,DC=concorp,DC=conto organizationalU
       so,DC=com                                            nit
            Units,DC=europe,DC=concorp,DC=contoso Unit
            ,DC=com
           Figure 13 shows the resulting domain and OU structures for NOAM and Europe.
           Figure 13 High-Level Business Unit OU Structure for NOAM and
           Europe Domains
Figure 14 shows the domain and OU structures for each domain, including the
security groups within their respective Delegation OUs.
176
      the domain. To do so, they modify the permissions on each business unit OU and
      grant the appropriate security group full control over the OU.
      Table 30 shows the business unit OUs and the respective security groups that
      represent the Business Unit Admins role and receive Full Control permissions on
      the OU.
      Table 30 OUs and Business Unit Admins Groups That Receive
      Full Control
                          OUs                           Allow Full Control To
       OU=RandD,OU=Business                          RandD Bus Unit Admins
       Units,DC=noam,DC=concorp,DC=
       contoso,DC=com
       OU=Production,OU=Business                     Production Bus Unit
       Units,DC=noam,DC=concorp,DC= Admins
       contoso,DC=com
       OU=BusMgmt,OU=Business                        BusMgmt Bus Unit
       Units,DC=noam,DC=concorp,DC= Admins
       contoso,DC=com
       OU=IT,OU=Business                             IT Bus Admins
       Units,DC=noam,DC=concorp,DC=
       contoso,DC=com
       OU=BusMgmt,OU=Business                        BusMgmt Bus Admins
       Units,DC=europe,DC=concorp,DC
       =contoso,DC=com
       OU=IT,OU=Business                             IT Bus Admins
       Units,DC=europe,DC=concorp,DC
       =contoso,DC=com
               • RandD BU Admins
               • Production BU Admins
               • BusMgmt BU Admins
               • IT BU Admins
           • A member of the Europe Domain Config Ops group grants each of the
               following security groups permission to modify the Member attribute on the
               object that represents the respective security group:
               • BusMgmt BU Admins
               • IT BU Admins
           At this point, all of the Business Unit Admins roles have been enabled by
           creating the Business Unit Admins groups and granting them permissions to
           manage their respective OUs. To delegate the roles, the Domain Configuration
           Operators next create the user accounts that will perform each role and add them
           to the appropriate groups.
      Creating User Accounts for Business Unit Admins Groups
          Data owners for each business group have communicated the identities of the
          users who will serve as the Business Unit Admins to the Domain Configuration
          Operators. The Domain Configuration Operators create these user accounts in the
          respective business unit OUs, as shown in Table 31.
          Table 31 Business Unit Administrator Accounts
            Business Unit/Domain               Business Unit Admins Role
                                                       Assignments
           RandD/NOAM                     John
                                          Chris
           Production/NOAM                Mary
                                          Joe
           Bus Mgmt/NOAM                  Sally
           IT/NOAM                        Kevin
           Bus Mgmt/Europe                Frank
           IT/Europe                      Anna
      •  CN=Mary,OU=Production,OU=Business
         Units,DC=noam,DC=concorp,DC=contoso,DC=com
      • CN=Joe,OU=Production,OU=Business
         Units,DC=noam,DC=concorp,DC=contoso,DC=com
      • CN=Sally,OU=BusMgmt,OU=Business
         Units,DC=noam,DC=concorp,DC=contoso,DC=com
      • CN=Frank,OU=BusMgmt,OU=Business
         Units,DC=europe,DC=concorp,DC=contoso,DC=com
      • CN=Kevin,OU=IT,OU=Business
         Units,DC=noam,DC=concorp,DC=contoso,DC=com
      • CN=Anna,OU=IT,OU=Business
         Units,DC=europe,DC=concorp,DC=contoso,DC=com
      Note that user accounts for Business Unit Admins of the BusMgmt and IT
      business units are created in different domains in order to spread them across all
      domains that have the same business unit.
Adding Business Unit Admins User Accounts to Administrative
Security Groups
    To actually delegate the Business Unit Admins role and to complete the data
    management handoff, the Domain Configuration Operators add the users whose
    accounts they have created to the security groups that represent the respective
    Business Unit Admins roles.
    Table 32 shows the resulting Business Unit Admins group memberships:
    Table 32 Business Unit Admin Role Security Groups and Added
    Members
        Group for           User       Business Unit             Domain
      Business Unit Accounts                 OU
      Admins Role
     RandD BU           John          RandD              NOAM
     Admins             Chris
     Production BU Mary               Production         NOAM
     Admins             Joe
     Bus Mgmt BU Frank                Bus Mgmt           NOAM
     Admins
     IT BU Admins Kevin               IT                 NOAM
     Bus Mgmt BU Sally                Bus Mgmt           Europe
     Admins
     IT BU Admins Anna                IT                 Europe
      At this point, the data management handoff is complete. All Business Unit
      Admins have full control over their business unit OUs.
180
      Table 34 shows the distribution of servers across the Contoso business units by
      type of server.
      Table 34 Distribution of Servers by Type in Contoso Business
      Units
        Business         File         Web          Database        Application
           Unit       Servers       Servers         Servers          Servers
       RandD          800          50            100              50
       Production 300              20            100              100
       Bus Mgmt 120                45            50               35
       IT             30           30            20               20
Table 37 shows the rationale for the OU structure shown in Figure 15.
Table 37 Purpose of Each OU in the RandD Business Unit OU
Hierarchy
       Organizational Unit                          Purpose
 User Accounts                         Main OU to store user
                                       accounts
                                       Delegation point for Account
                                       Admins role
 User Accounts\Research                Used to apply Group Policy
                                       for research user accounts
 User Accounts\Development Used to apply Group Policy
                                       for development user
                                       accounts
 Workstations                          Main OU to store computer
                                       accounts for workstations
                                       Delegation point for
                                       Workstation Admins role
 Workstations\Desktops                 Used to apply Group Policy
184
Table 39 shows the model creation template that the data owners fill out to
document the RandD Workstation Admins role.
Table 39 Model Creation Template for RandD Workstation
Admins Role
               Field                     Assignment Information
 Role Instance Name                  RandD Workstation Admins
 Instance of                         Account Admins
 Instance Number                     1 of 1
186
            Table 40 shows the model creation template that the data owners fill out to
            document the RandD Resource Admins role.
            Table 40 Model Creation Template for RandD Resource Admins
            Role
                           Field                     Assignment Information
             Role Instance Name:                 RandD Resource Admins
             Instance of:                        Account Admins
             Instance Number:                    1 of n, where n = as many as
                                                 needed over time
             Assigned Administrators:            Deborah, Paul
             Assigned Tasks:                     Overall responsibility for all
                                                 aspects of resource
                                                 management
             Security Group                      Implementation
             Permissions Assigned                Implementation
             Notes                               Creation/Implementation
      Table 43 shows the rationale for the OU structure shown in Figure 16.
                                                                           189
      Table 45 shows the model creation template that the data owners fill out to
      document the Production Workstation Admins role in the first Atlanta location.
      Table 45 Model Creation Template for Production Workstation
      Admins Role in Location 1
                     Field                     Assignment Information
       Role Instance Name                  Production Location 1
                                           Workstation Admins
       Instance of                         Workstation Admins
       Instance Number                     1 of 2
       Assigned Administrators             Michael, Dave
       Assigned Tasks                      Manage all aspects of
                                           workstation management for
                                           Location 1
       Security Group                      Implementation
       Permissions Assigned                Implementation
                                                                              191
Table 46 shows the model creation template that the data owners fill out to
document the Production Workstation Admins role in the second Atlanta
location.
Table 46 Model creation template for Production Workstation
Admins role in Location 2
               Field                     Assignment Information
 Role Instance Name                  Production Location 2
                                     Workstation Admins
 Instance of                         Workstation Admins
 Instance Number                     2 of 2
 Assigned Administrators             Adam, Charlotte
 Assigned Tasks                      Manage all aspects of
                                     workstation management for
                                     Location 2
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
Table 47 shows the model creation template that the data owners fill out to
document the Production Resource Admins role for the first application.
Table 47 Model Creation Template for Production Resource
Admins Role for Application 1
               Field                     Assignment Information
 Role Instance Name                  Production Application 1
                                     Resource Admins
 Instance of                         Resource Admins
 Instance Number                     1 of 4
 Assigned Administrators             Nick, Wade
 Assigned Tasks                      Overall responsibility for all
                                     aspects of resource
                                     management for application
                                     1
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
192
      Table 48 shows the model creation template that the data owners fill out to
      document the Production Resource Admins role for the second application.
      Table 48 Model Creation Template for Production Resource
      Admins Role for Application 2
                     Field                     Assignment Information
       Role Instance Name                  Production Application 2
                                           Resource Admins
       Instance of                         Resource Admins
       Instance Number                     2 of 4
       Assigned Administrators             Jennifer, Brad
       Assigned Tasks                      Overall responsibility for all
                                           aspects of resource
                                           management for application
                                           2
       Security Group                      Implementation
       Permissions Assigned                Implementation
       Notes                               Creation and implementation
      Table 49 shows the model creation template that the data owners fill out to
      document the Production Resource Admins role for the third application.
      Table 49 Model Creation Template for Production Resource
      Admins Role for Application 3
                     Field                     Assignment Information
       Role Instance Name                  Production Application 3
                                           Resource Admins
       Instance of                         Resource Admins
       Instance Number                     3 of 4
       Assigned Administrators             Scott, Laura
       Assigned Tasks                      Overall responsibility for all
                                           aspects of resource
                                           management for application
                                           3
       Security Group                      Implementation
       Permissions Assigned                Implementation
       Notes                               Creation and implementation
      Table 50 shows the model creation template that the data owners fill out to
      document the Production Resource Admins role for the common set of resources.
                                                                                          193
Creating the Delegation Model for the Bus Mgmt Business Unit
    This business unit has two main divisions — business management and sales.
    The business management unit is based in Chicago and includes the product
    planning, legal, marketing, and other groups. The marketing and legal business
    management teams and the sales team are spread over different physical
    locations across North America and Europe.
    Approximately 550 employees work for the Bus Mgmt business unit. The sales
    division is the largest division, with 400 employees. Each sales representative
    has a portable computer. All users in this business unit have a portable computer
    and a desktop, making a total of 700 managed workstations. Additionally, about
    250 servers provide various required services.
    Table 51 shows the number of user, workstation, and server accounts that are
    stored in the Bus Mgmt business unit in the Chicago and London locations.
    Table 51 Users, Workstations, and Servers in the Bus Mgmt
    Business Unit
        Locations              Users          Workstations           Servers
     Chicago,            5,500               7,000              250
     London
      Table 52 shows the number of user, workstation, and server accounts that are
      stored in the Bus Mgmt business unit in the Chicago and London locations,
      separated by each division. Because business unit users are based across two
      different continents, business unit content is distributed across the two domains
      noam.concorp.contoso.com and europe.concorp.contoso.com.
194
      Table 53 shows the numbers of server types that Bus Mgmt stores.
      Table 53 Distribution of Server Types in Bus Mgmt Business
      Unit
                       File
       Locations Servers           Web          Database        Application
                                 Servers          Servers         Servers
       Chicago, 120            45             50             35
       London
•  User Accounts. All user accounts in North America need one Group Policy
   for user configuration settings. Similarly, all accounts in Europe need one
   Group Policy for user configuration settings. Additionally all users in each
   division need a common user configuration policy.
• Workstations. Requirements for scripts and other computer configuration
   settings necessitate that different Group Policy settings be applied for
   desktop and portable computers.
• Resources. Computer configuration settings necessitate that different Group
   Policy settings be applied for different kinds of resources and might require
   the application of specific Group Policy settings for the various specific
   resources.
Bus Mgmt OU Structure Based on Administrative and Group
Policy Requirements
Figure 17 shows the OU structure for the Bus Mgmt OU that accommodates the
administrative and Group Policy requirements for the
noam.concorp.contoso.com domain.
Figure 17 Bus Mgmt OU Structure for
noam.concorp.contoso.com
196
      Figure 18 shows the OU structure for the Bus Mgmt OU that accommodates the
      administrative and Group Policy requirements for the
      europe.concorp.contoso.com domain.
      Figure 18 Bus Mgmt OU Structure for
      europe.concorp.contoso.com
                                                        201
       Note
       One group is instantiated in the
       noam.concorp.contoso.com domain and one
       in the europe.concorp.contoso.com domain.
•   Workstation Management. Because a different administrative group is
    required for each of the five physical locations, five instances of the
    Workstation Admins role are required.
       Note
       Certain groups are shared across both
       noam.concorp.contoso.com domain and the
       europe.concorp.contoso.com domain.
•  Resource Management. Based on the business unit requirements, one
   Resource Admins role instance is required to manage all servers that belong
   to all the business applications hosted in Chicago and one instance of the
   Resource Admins role is required for every physical location of this business
   unit, for a total of six role instances.
Table 56 shows the model creation template that the data owners fill out to
document the Bus Mgmt NOAM Account Admins role.
204
      Table 57 shows the model creation template that the data owners fill out to
      document the Bus Mgmt Europe Account Admins role.
      Table 57 Model Creation Template for Bus Mgmt Europe
      Account Admins Role
                     Field                     Assignment Information
       Role Instance Name                  Business Mgmt Europe
                                           Account Admins
       Instance of                         Account Admins
       Instance Number                     2 of 2
       Assigned Administrators             Robert, Michelle
       Assigned Tasks                      Manage all aspects of
                                           account management for all
                                           accounts in Europe
       Security Group                      Implementation
       Permissions Assigned                Implementation
       Notes                               Creation and implementation
      Table 58 shows the model creation template that the data owners fill out to
      document the Bus Mgmt Chicago Workstation Admins role.
      Table 58 Model creation template for Bus Mgmt Chicago
      Workstation Admins role
                     Field                     Assignment Information
                                                                              205
Table 59 shows the model creation template that the data owners fill out to
document the Bus Mgmt London Workstation Admins role.
Table 59 Model creation template for Bus Mgmt London
Workstation Admins role
               Field                     Assignment Information
 Role Instance Name                  Business Mgmt London
                                     Workstation Admins
 Instance of                         Workstation Admins
 Instance Number                     2 of 5
 Assigned Administrators             Stuart, Ken
 Assigned Tasks                      Manage all aspects of
                                     workstation management for
                                     all workstations in London
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
Table 60 shows the model creation template that the data owners fill out to
document the Bus Mgmt New York Workstation Admins role.
Table 60 Model Creation Template for Bus Mgmt New York
Workstation Admins Role
               Field                     Assignment Information
 Role Instance Name                  Business Mgmt New York
                                     Workstation Admins
 Instance of                         Workstation Admins
206
      Instance Number                        3 of 5
      Assigned Administrators                Linda, Steve
      Assigned Tasks                         Manage all aspects of
                                             workstation management for
                                             all workstations in New York
      Security Group                         Implementation
      Permissions Assigned                   Implementation
      Notes                                  Creation and implementation
      Table 61 shows the model creation template that the data owners fill out to
      document the Bus Mgmt Paris Workstation Admins role.
      Table 61 Model Creation Template for Bus Mgmt Paris
      Workstation Admins Role
                     Field                     Assignment Information
       Role Instance Name                  Business Mgmt Paris
                                           Workstation Admins
       Instance of                         Workstation Admins
       Instance Number                     4 of 5
       Assigned Administrators             Marc, Sara
       Assigned Tasks                      Manage all aspects of
                                           workstation management for
                                           all workstations in Paris
       Security Group                      Implementation
       Permissions Assigned                Implementation
       Notes                               Creation and implementation
      Table 62 shows the model creation template that the data owners fill out to
      document the Bus Mgmt Rome Workstation Admins role.
      Table 62 Model Creation Template for Bus Mgmt Rome
      Workstation Admins Role
                     Field                     Assignment Information
       Role Instance Name                  Business Mgmt Rome
                                           Workstation Admins
       Instance of                         Workstation Admins
       Instance Number                     5 of 5
       Assigned Administrators             Victor, Rosa
       Assigned Tasks                      Manage all aspects of
                                                                              207
Table 63 shows the model creation template that the data owners fill out to
document the Bus Mgmt Application Admins role.
Table 63 Model Creation Template for Bus Mgmt Application
Admins Role
               Field                     Assignment Information
 Role Instance Name                  Business Mgmt Application
                                     Admins
 Instance of                         Resource Admins
 Instance Number                     1 of 6
 Assigned Administrators             Fred, Glenn
 Assigned Tasks                      Manage all aspects of all
                                     business management
                                     business unit applications
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
Table 64 shows the model creation template that the data owners fill out to
document the Bus Mgmt Chicago Resource Admins role.
Table 64 Model Creation Template for Bus Mgmt Chicago
Resource Admins Role
               Field                     Assignment Information
 Role Instance Name                  Business Mgmt Chicago
                                     Resource Admins
 Instance of                         Resource Admins
 Instance Number                     2 of 6
 Assigned Administrators             Kristen, Terry
 Assigned Tasks                      Manage all aspects of other
                                     business management
                                     business unit resources in
                                     Chicago
 Security Group                      Implementation
208
      Table 65 shows the model creation template that the data owners fill out to
      document the Bus Mgmt London Resource Admins role.
      Table 65 Model Creation Template for Bus Mgmt London
      Resource Admins Role
                     Field                     Assignment Information
       Role Instance Name                  Business Mgmt London
                                           Resource Admins
       Instance of                         Resource Admins
       Instance Number                     3 of 6
       Assigned Administrators             Ron, Allison
       Assigned Tasks                      Manage all aspects of other
                                           business management
                                           business unit resources in
                                           London
       Security Group                      Implementation
       Permissions Assigned                Implementation
       Notes                               Creation and implementation
      Table 66 shows the model creation template that the data owners fill out to
      document the Bus Mgmt New York Resource Admins role.
      Table 66 Model Creation Template for Bus Mgmt New York
      Resource Admins Role
                     Field                     Assignment Information
       Role Instance Name                  Business Mgmt New York
                                           Resource Admins
       Instance of                         Resource Admins
       Instance Number                     4 of 6
       Assigned Administrators             Chris, Julian
       Assigned Tasks                      Manage all aspects of other
                                           business management
                                           business unit resources in
                                           New York
       Security Group                      Implementation
       Permissions Assigned                Implementation
       Notes                               Creation and implementation
                                                                              209
Table 67 shows the model creation template that the data owners fill out to
document the Bus Mgmt Paris Resource Admins role.
Table 67 Model Creation Template for Bus Mgmt Paris Resource
Admins Role
               Field                     Assignment Information
 Role Instance Name                  Business Mgmt Paris
                                     Resource Admins
 Instance of                         Resource Admins
 Instance Number                     5 of 6
 Assigned Administrators             Albert, Emile
 Assigned Tasks                      Manage all aspects of other
                                     business management
                                     business unit resources in
                                     Paris
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
Table 68 shows the model creation template that the data owners fill out to
document the Bus Mgmt Rome Resource Admins role.
Table 68 Model Creation Template for Bus Mgmt Rome
Resource Admins Role
               Field                     Assignment Information
 Role Instance Name                  Business Mgmt Rome
                                     Resource Admins
 Instance of                         Resource Admins
 Instance Number                     6 of 6
 Assigned Administrators             David, Thomas
 Assigned Tasks                      Manage all aspects of other
                                     business management
                                     business unit resources in
                                     Rome
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
210
            Table 70 shows the numbers of server types that the IT business unit stores.
            Table 70 Distribution of Server Types in the IT Business Unit
              Business       File        Web          Database          Application
                Unit      Servers      Servers          Servers           Servers
             IT           30         30             20                20
•  User Accounts. All user accounts in North America require one Group
   Policy for user configuration settings. Similarly, all accounts in Europe need
   one Group Policy for user configuration settings.
• Workstations. All workstations in North America require one Group Policy
   for computer configuration settings and all workstations in Europe need one
   Group Policy for computer configuration settings.
• Resources. Computer configuration settings necessitate that different Group
   Policy settings be applied for different kinds of resources and might require
   the application of specific Group Policy settings for the various specific
   resources.
IT OU Structure Based on Administrative and Group Policy
Requirements
Figure 19 shows the OU structure for the IT OU that accommodates the
administrative and Group Policy requirements for the
noam.concorp.contoso.com domain.
212
             Note
             One group is instantiated in the
             noam.concorp.contoso.com domain and one
             in the europe.concorp.contoso.com domain.
      •   Workstation Management. Because a different administrative group is
          required for each of the five physical locations, five instances of the
          Workstation Admins role are required.
             Note
             Certain groups are shared across both
             noam.concorp.contoso.com domain and the
             europe.concorp.contoso.com domain
      •   Resource Management. Based on the business unit requirements, one
          instance of the Resource Admins role is required to manage all the servers
          that belong to all the IT applications in Chicago and one instance of the
          Resource Admins role is required for every physical location where this
          business unit is located.
      Table 71 shows the model creation template that the data owners fill out to
      document the IT NOAM Account Admins role.
      Table 71 Model Creation Template for IT NOAM Account Admins
      Role
                       Field                        Assignment Information
       Role Instance Name                      IT NOAM Account Admins
       Instance of                             Account Admins
       Instance Number                         1 of 2
       Assigned Administrators                 Roderick, Francisco
       Assigned Tasks                          Manage all aspects of acct
                                               mgmt for all IT accounts in
                                               North America
       Security Group                          Implementation
       Permissions Assigned                    Implementation
       Notes                                   Creation and implementation
      Table 72 shows the model creation template that the data owners fill out to
      document the IT Europe Account Admins role.
                                                                              215
Table 73 shows the model creation template that the data owners fill out to
document the IT Chicago Workstation Admins role.
Table 73 Model Creation Template for IT Chicago Workstation
Admins Role
               Field                     Assignment Information
 Role Instance Name                  IT Chicago Workstation
                                     Admins
 Instance of                         Workstation Admins
 Instance Number                     1 of 5
 Assigned Administrators             Larry, John
 Assigned Tasks                      Manage all aspects of
                                     workstation mgmt for all IT
                                     business unit workstations in
                                     Chicago
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
Table 74 shows the model creation template that the data owners fill out to
document the IT London Workstation Admins role.
Table 74 Model Creation Template for IT London Workstation
Admins Role
               Field                     Assignment Information
216
      Table 75 shows the model creation template that the data owners fill out to
      document the IT New York Workstation Admins role.
      Table 75 Model Creation Template for IT New York Workstation
      Admins Role
                     Field                     Assignment Information
       Role Instance Name                  IT New York Workstation
                                           Admins
       Instance of                         Workstation Admins
       Instance Number                     3 of 5
       Assigned Administrators             Neil, Paulette
       Assigned Tasks                      Manage all aspects of
                                           workstation mgmt for all IT
                                           business unit workstations in
                                           New York
       Security Group                      Implementation
       Permissions Assigned                Implementation
       Notes                               Creation and implementation
      Table 76 shows the model creation template that the data owners fill out to
      document the IT Paris Workstation Admins role.
      Table 76 Model Creation Template for IT Paris Workstation
      Admins Role
                     Field                     Assignment Information
       Role Instance Name                  IT Paris Workstation Admins
       Instance of                         Workstation Admins
                                                                              217
Instance Number                       4 of 5
Assigned Administrators               Elliott, Marie
Assigned Tasks                        Manage all aspects of
                                      workstation mgmt for all IT
                                      business unit workstations in
                                      Paris
Security Group                        Implementation
Permissions Assigned                  Implementation
Notes                                 Creation and implementation
Table 77 shows the model creation template that the data owners fill out to
document the IT Rome Workstation Admins role.
Table 77 Model Creation Template for IT Rome Workstation
Admins Role
               Field                     Assignment Information
 Role Instance Name:                 IT Rome Workstation Admins
 Instance of                         Workstation Admins
 Instance Number                     5 of 5
 Assigned Administrators             Paul, Eleonora
 Assigned Tasks                      Manage all aspects of
                                     workstation mgmt for all IT
                                     business unit workstations in
                                     Rome
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
Table 78 shows the model creation template that the data owners fill out to
document the IT Application Admins role.
Table 78 Model Creation Template for IT Application Admins
Role
               Field                     Assignment Information
 Role Instance Name:                 IT Application Admins
 Instance of                         Resource Admins
 Instance Number                     1 of 6
 Assigned Administrators             Karen, Luke
 Assigned Tasks                      Manage all aspects of all IT
218
      Table 79 shows the model creation template that the data owners fill out to
      document the IT Chicago Resource Admins role.
      Table 79 Model Creation Template for IT Chicago Resource
      Admins Role
                     Field                     Assignment Information
       Role Instance Name                  IT Chicago Resource Admins
       Instance of                         Resource Admins
       Instance Number                     2 of 6
       Assigned Administrators             Perry, Steve
       Assigned Tasks                      Manage all aspects of other
                                           IT business unit resources in
                                           Chicago
       Security Group                      Implementation
       Permissions Assigned                Implementation
       Notes                               Creation and implementation
      Table 80 shows the model creation template that the data owners fill out to
      document the IT London Resource Admins role.
      Table 80 Model Creation Template for IT London Resource
      Admins Role
                     Field                     Assignment Information
       Role Instance Name                  IT London Resource Admins
       Instance of                         Resource Admins
       Instance Number                     3 of 6
       Assigned Administrators             Jerry, Carol
       Assigned Tasks                      Manage all aspects of other
                                           IT business unit resources in
                                           London
       Security Group                      Implementation
       Permissions Assigned                Implementation
       Notes                               Creation and implementation
                                                                              219
Table 81 shows the model creation template that the data owners fill out to
document the IT New York Resource Admins role.
Table 81 Model Creation Template for IT New York Resource
Admins Role
               Field                     Assignment Information
 Role Instance Name                  IT New York Resource Admins
 Instance of                         Resource Admins
 Instance Number                     4 of 6
 Assigned Administrators             Jack, Erica
 Assigned Tasks                      Manage all aspects of other
                                     IT business unit resources in
                                     New York
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
Table 82 shows the model creation template that the data owners fill out to
document the IT Paris Resource Admins role.
Table 82 Model Creation Template for IT Paris Resource Admins
Role
               Field                     Assignment Information
 Role Instance Name                  IT Paris Resource Admins
 Instance of                         Resource Admins
 Instance Number                     5 of 6
 Assigned Administrators             Guy, Lise
 Assigned Tasks                      Manage all aspects of other
                                     IT business unit resources in
                                     Paris
 Security Group                      Implementation
 Permissions Assigned                Implementation
 Notes                               Creation and implementation
Table 83 shows the model creation template that the data owners fill out to
document the IT Rome Resource Admins role.
Table 83 Model Creation Template for IT Rome Resource Admins
Role
               Field                     Assignment Information
220
•   OU=Workstations,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Resources,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Research,OU=User Accounts,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Development,OU=User Accounts,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Desktops,OU=Workstations,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Laptops,OU=Workstations,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=File Servers,OU=Resources,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Web Servers,OU=Resources,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Database Servers,OU=Resources,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
• OU=Application Servers,OU=Resources,OU=RandD,OU=Business
    Units,DC=noam,DC=concorp,DC=contoso,DC=com
Implementing RandD Role Instances
To implement the RandD business administrative roles, the RandD business unit
administrator creates security groups in the Delegation OU to represent the role
instances for the business unit.
In OU=Delegation,OU=RandD,OU=Business
Units,DC=noam,DC=concorp,DC=contoso,DC=com, the following groups are
created:
• RandD Account Admins
• RandD Workstation Admins
• RandD Resource Admins
The RandD the business unit administrator grants permissions to security groups
as follows:
• RandD Account Admins: Full Control on the Accounts OU
• RandD Workstation Admins: Full Control on the Workstations OU
• RandD Resource Admins: Full Control on the Resources OU
Additionally, the Restricted Groups feature of Group Policy is used to add the
security groups representing the Workstation Admins and Resource Admins roles
to the local Administrators groups on member servers.
222
      NOAM                                         .contoso.com
      Account
      Admins
      BusMgmt       Full Control   Accounts OU     europe.conco
      Europe                                       rp.contoso.co
      Account                                      m
      Admins
      BusMgmt       Full Control   Chicago OU      noam.concorp
      Chicago                      within the      .contoso.com
      Workstation                  Workstations
      Admins                       OU
      BusMgmt       Full Control   London OU       noam.concorp
      London                       within the      .contoso.com
      Workstation                  Workstations
      Admins                       OU
      BusMgmt       Full Control   New York OU     noam.concorp
      New York                     within the      .contoso.com
      Workstation                  Workstations
      Admins                       OU
      BusMgmt       Full Control   Paris OU        europe.conco
      Paris                        within the      rp.contoso.co
      Workstation                  Workstations    m
      Admins                       OU
      BusMgmt       Full Control   Rome OU         europe.conco
      Rome                         within the      rp.contoso.co
      Workstation                  Workstations    m
      Admins                       OU
      BusMgmt       Full Control   Applications    noam.concorp
      Application                  OU within the   .contoso.com
      Admins                       Resources OU
      BusMgmt       Full Control   Chicago OU      noam.concorp
      Chicago                      within the      .contoso.com
      Resource                     Resources OU
      Admins
      BusMgmt       Full Control   London OU    europe.conco
      London                       within the   rp.contoso.co
      Resource                     Resources OU m
      Admins
      BusMgmt       Full Control   New York OU     noam.concorp
      New York                     within the      .contoso.com
      Resource                     Resources
      Admins
      BusMgmt       Full Control   Paris OU     europe.conco
      Paris                        within the   rp.contoso.co
      Resource                     Resources OU m
                                                                                      227
      Admins
      BusMgmt             Full Control       Rome OU      europe.conco
      Rome                                   within the   rp.contoso.co
      Resource                               Resources OU m
      Admins
      Additionally, the Restricted Groups feature of Group Policy is used to add the
      security groups representing Workstation Admins and Resource Admins roles to
      the local Administrators groups on member servers.
      Assigning Bus Mgmt Administrative Users to Roles
      The Bus Mgmt business unit administrator adds the accounts of the
      administrative personnel listed for each role in the delegation model templates to
      the respective security groups that represent the role instances.
Implementing the Data Delegation Model for the IT Business Unit
     The IT business unit administrator is responsible for creating the business unit
     OU structure and implementing the data management delegation model for this
     business unit.
     Creating the OU structure for the IT Business Unit
     To create the Bus Mgmt OU structure, the IT business unit administrator creates
     the OU objects shown in Figures 17 and 18 earlier in this document.
     Implementing IT Role Instances
     To implement the IT business unit administrative roles, the IT business unit
     administrator creates security groups in the Delegation OU of each domain to
     represent the required role instances:
     In OU=Delegation,OU=IT,OU=Business
     Units,DC=noam,DC=concorp,DC=contoso,DC=com, the following groups are
     created:
     • IT NOAM Account Admins
     • IT Chicago Workstation Admins
     • IT New York Workstation Admins
     • IT Application Admins
     • IT Chicago Resource Admins
     • IT New York Resource Admins
     In OU=Delegation,OU=IT,OU=Business
     Units,DC=europe,DC=concorp,DC=contoso,DC=com, the following groups are
     created:
     • IT Europe Account Admins
     • IT London Workstation Admins
     • IT Paris Workstation Admins
228
Additionally, the Restricted Groups feature of Group Policy is used to add the
security groups representing the Workstation Admins and Resource Admins roles
to the local Administrators groups on member servers.
Assigning IT Administrative Users to Roles
The IT BU Admin adds the accounts of the administrative personnel listed for
each role in the delegation model templates to the respective security groups that
represent the role instances.
This completes Contoso’s implementation of the delegation model. From this
point, Contoso will follow the recommendations for maintaining the delegation
model.