Windows 2003 Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 6 November 2007

How to view and transfer FSMO roles in Windows Server 2003

Posted on 04:49 by Unknown
SUMMARY
This article describes how to transfer Flexible Single Master Operations (FSMO) roles (also known as operations master roles) by using the Active Directory snap-in tools in Microsoft Management Console (MMC) in Windows Server 2003.

You can transfer FSMO roles by using the Ntdsutil.exe command-line utility or by using an MMC snap-in tool. Depending on the FSMO role that you want to transfer, you can use one of the following three MMC snap-in tools:
Active Directory Schema snap-in
Active Directory Domains and Trusts snap-in
Active Directory Users and Computers snap-in
If a computer no longer exists, the role must be seized. To seize a role, use the Ntdsutil.exe utility.


Transfer the Schema Master Role
Use the Active Directory Schema Master snap-in to transfer the schema master role. Before you can use this snap-in, you must register the Schmmgmt.dll file.


Register Schmmgmt.dll
1. Click Start, and then click Run.
2. Type regsvr32 schmmgmt.dll in the Open box, and then click OK.
3. Click OK when you receive the message that the operation succeeded.

Transfer the Schema Master Role
1. Click Start, click Run, type mmc in the Open box, and then click OK.
2. On the File, menu click Add/Remove Snap-in.
3. Click Add.
4. Click Active Directory Schema, click Add, click Close, and then click OK.
5. In the console tree, right-click Active Directory Schema, and then click Change Domain Controller.
6. Click Specify Name, type the name of the domain controller that will be the new role holder, and then click OK.
7. In the console tree, right-click Active Directory Schema, and then click Operations Master.
8. Click Change.
9. Click OK to confirm that you want to transfer the role, and then click Close.



Transfer the Domain Naming Master Role
1. Click Start, point to Administrative Tools, and then click Active Directory Domains and Trusts.
2. Right-click Active Directory Domains and Trusts, and then click Connect to Domain Controller.

NOTE: You must perform this step if you are not on the domain controller to which you want to transfer the role. You do not have to perform this step if you are already connected to the domain controller whose role you want to transfer.
3. Do one of the following: • In the Enter the name of another domain controller box, type the name of the domain controller that will be the new role holder, and then click OK.

-or-
• In the Or, select an available domain controller list, click the domain controller that will be the new role holder, and then click OK.

4. In the console tree, right-click Active Directory Domains and Trusts, and then click Operations Master.
5. Click Change.
6. Click OK to confirm that you want to transfer the role, and then click Close.


Transfer the RID Master, PDC Emulator, and Infrastructure Master Roles
1. Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
2. Right-click Active Directory Users and Computers, and then click Connect to Domain Controller.

NOTE: You must perform this step if you are not on the domain controller to which you want to transfer the role. You do not have to perform this step if you are already connected to the domain controller whose role you want to transfer.
3. Do one of the following: • In the Enter the name of another domain controller box, type the name of the domain controller that will be the new role holder, and then click OK.

-or-
• In the Or, select an available domain controller list, click the domain controller that will be the new role holder, and then click OK.

4. In the console tree, right-click Active Directory Users and Computers, point to All Tasks, and then click Operations Master.
5. Click the appropriate tab for the role that you want to transfer (RID, PDC, or Infrastructure), and then click Change.
6. Click OK to confirm that you want to transfer the role, and then click Close.

How to view and transfer FSMO roles in the graphical user interface
Read More
Posted in | No comments

Active Directory FSMO roles in Windows 2000 and Windows 2003

Posted on 04:40 by Unknown
What is Active Directory?
Ans: The Microsoft Windows 2000/2003 Active Directory is the central repository in which all objects in an enterprise and their respective attributes are stored. It is a hierarchical, multi-master enabled database, capable of storing millions of objects. Because it is multi-master, changes to the database can be processed at any given domain controller (DC) in the enterprise regardless of whether the DC is connected or disconnected from the network.


Windows 2000/2003 Multi-Master Model
A multi-master enabled database, such as the Active Directory, provides the flexibility of allowing changes to occur at any DC in the enterprise, but it also introduces the possibility of conflicts that can potentially lead to problems once the data is replicated to the rest of the enterprise. One way Windows 2000 deals with conflicting updates is by having a conflict resolution algorithm handle discrepancies in values by resolving to the DC to which changes were written last (that is, "the last writer wins"), while discarding the changes in all other DCs. Although this resolution method may be acceptable in some cases, there are times when conflicts are just too difficult to resolve using the "last writer wins" approach. In such cases, it is best to prevent the conflict from occurring rather than to try to resolve it after the fact.

For certain types of changes, Windows 2000 incorporates methods to prevent conflicting Active Directory updates from occurring.


Windows 2000 Single-Master Model
To prevent conflicting updates in Windows 2000, the Active Directory performs updates to certain objects in a single-master fashion. In a single-master model, only one DC in the entire directory is allowed to process updates. This is similar to the role given to a primary domain controller (PDC) in earlier versions of Windows (such as Microsoft Windows NT 3.51 and 4.0), in which the PDC is responsible for processing all updates in a given domain.

The Windows 2000 Active Directory extends the single-master model found in earlier versions of Windows to include multiple roles, and the ability to transfer roles to any domain controller (DC) in the enterprise. Because an Active Directory role is not bound to a single DC, it is referred to as a Flexible Single Master Operation (FSMO) role. Currently in Windows 2000 there are five FSMO roles:

• Schema master
• Domain naming master
• RID master
• PDC emulator
• Infrastructure Master


Schema Master FSMO Role
The schema master FSMO role holder is the DC responsible for performing updates to the directory schema (that is, the schema naming context or LDAP://cn=schema,cn=configuration,dc=). This DC is the only one that can process updates to the directory schema. Once the Schema update is complete, it is replicated from the schema master to all other DCs in the directory. There is only one schema master per directory.


Domain Naming Master FSMO Role
The domain naming master FSMO role holder is the DC responsible for making changes to the forest-wide domain name space of the directory (that is, the Partitions\Configuration naming context or LDAP://CN=Partitions, CN=Configuration, DC=). This DC is the only one that can add or remove a domain from the directory. It can also add or remove cross references to domains in external directories.


RID Master FSMO Role
The RID master FSMO role holder is the single DC responsible for processing RID Pool requests from all DCs within a given domain. It is also responsible for removing an object from its domain and putting it in another domain during an object move.

When a DC creates a security principal object such as a user or group, it attaches a unique Security ID (SID) to the object. This SID consists of a domain SID (the same for all SIDs created in a domain), and a relative ID (RID) that is unique for each security principal SID created in a domain.

Each Windows 2000 DC in a domain is allocated a pool of RIDs that it is allowed to assign to the security principals it creates. When a DC's allocated RID pool falls below a threshold, that DC issues a request for additional RIDs to the domain's RID master. The domain RID master responds to the request by retrieving RIDs from the domain's unallocated RID pool and assigns them to the pool of the requesting DC. There is one RID master per domain in a directory.


PDC Emulator FSMO Role
The PDC emulator is necessary to synchronize time in an enterprise. Windows 2000 includes the W32Time (Windows Time) time service that is required by the Kerberos authentication protocol. All Windows 2000-based computers within an enterprise use a common time. The purpose of the time service is to ensure that the Windows Time service uses a hierarchical relationship that controls authority and does not permit loops to ensure appropriate common time usage.

The PDC emulator of a domain is authoritative for the domain. The PDC emulator at the root of the forest becomes authoritative for the enterprise, and should be configured to gather the time from an external source. All PDC FSMO role holders follow the hierarchy of domains in the selection of their in-bound time partner.

In a Windows 2000 domain, the PDC emulator role holder retains the following functions: • Password changes performed by other DCs in the domain are replicated preferentially to the PDC emulator.
• Authentication failures that occur at a given DC in a domain because of an incorrect password are forwarded to the PDC emulator before a bad password failure message is reported to the user.
• Account lockout is processed on the PDC emulator.
• The PDC emulator performs all of the functionality that a Microsoft Windows NT 4.0 Server-based PDC or earlier PDC performs for Windows NT 4.0-based or earlier clients.
This part of the PDC emulator role becomes unnecessary when all workstations, member servers, and domain controllers that are running Windows NT 4.0 or earlier are all upgraded to Windows 2000. The PDC emulator still performs the other functions as described in a Windows 2000 environment.

The following information describes the changes that occur during the upgrade process:
• Windows 2000 clients (workstations and member servers) and down-level clients that have installed the distributed services client package do not perform directory writes (such as password changes) preferentially at the DC that has advertised itself as the PDC; they use any DC for the domain.
• Once backup domain controllers (BDCs) in down-level domains are upgraded to Windows 2000, the PDC emulator receives no down-level replica requests.
• Windows 2000 clients (workstations and member servers) and down-level clients that have installed the distributed services client package use the Active Directory to locate network resources. They do not require the Windows NT Browser service.


Infrastructure FSMO Role
When an object in one domain is referenced by another object in another domain, it represents the reference by the GUID, the SID (for references to security principals), and the DN of the object being referenced. The infrastructure FSMO role holder is the DC responsible for updating an object's SID and distinguished name in a cross-domain object reference.

NOTE: The Infrastructure Master (IM) role should be held by a domain controller that is not a Global Catalog server(GC). If the Infrastructure Master runs on a Global Catalog server it will stop updating object information because it does not contain any references to objects that it does not hold. This is because a Global Catalog server holds a partial replica of every object in the forest. As a result, cross-domain object references in that domain will not be updated and a warning to that effect will be logged on that DC's event log.

If all the domain controllers in a domain also host the global catalog, all the domain controllers have the current data, and it is not important which domain controller holds the infrastructure master role.
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • Active Directory Inside Out 10 Hrs of CBT
    TechNet Webcast: Active Directory Fundamentals—Level 200 Event Overview Do you want to get a better understanding of the basic concep...
  • What are Preliminary AD DS Installation Steps and what all commands are available to upgrade the Forest schema to accept Windows server 2008?
    For new Forest: . Strong password. . Correct Network settings. . Latest Security updates. For Existing Forest: . Extend Schema using adprep...
  • How are Fine grained password Policies are stored in Windows server 2008? What are different objects associated with it?
    To store fine-grained password policies, Windows Server 2008 includes two new object classes in the Active Directory Domain Services schema:...
  • What is Well known Security principal?
    Well-Known Security Principals The term well-known security principal refers to fixed accounts that are somewhat like users or groups. Howev...
  • What is access token and how it is used?
    Access Tokens An access token describes the security context of a process. When the process tries to perform various operations in the compu...
  • Steps to create a Clone of Domain Controller in Windows 2012
    1) Make sure your hypervisor generates VM-Generation-ID.  2) Make sure your PDC FSMO runs on Windows 2012.             BTW you cannot clon...
  • How is Kerberos used while accessing file share on the network? What is the background processing involved in it?
    When user is already logged onto a domain and wants to access a resource located on a server within the same domain, a network logon process...
  • What are the new features in Windows 2012 Active Directory
    All the new features of Windows 2012 Active Directory are given below. You can use Active Directory Domain Services (AD DS) in Windows Serve...
  • What are the improvements introduced in AD Directory Domain Service Installation wizard?
    Active Directory Domain Services Installation Wizard New Wizard Page Description Additional optio...
  • How do we login in domain and what happens in the background at time of logon
    How does authentication and authoriztion happens in active directory? Everything starts when User presses Ctrl+Alt+Del and User chooses to l...

Categories

  • Active Directory Recycle bin
  • AD replication
  • Advance audit policy settings
  • Advance Audit policy settings in Windows 2008 and Windows 7.
  • Advanced Audit policy settings
  • Burflags registry Key
  • Clone Windows 2012 DC
  • Cloning Domain Controller Windows 2012 Active Directory
  • D2
  • D4
  • DCPROMO
  • domain functional levels
  • Forest functional levels
  • Group Policy preference
  • Group policy preferences in Windows 2008
  • how to rebuild sysvol
  • Journal Wrap
  • Managed service accounts in Windows 2008 R2
  • Metadata cleanup
  • NTLM Blocker
  • NTLM Blocker in Windows 2008
  • Recycle bin and Active Directory
  • Recycle Bin GUI in windows 2012
  • Recycle Bin in Windows 2008 R2
  • Recycle Bin in Windows 2012
  • Rolling back forest functional level of Windows 2008.
  • steps to clone Windows 2012 DC
  • Troubleshooting Journal Wrap
  • Upgrade Windows 2003 domain Controller to Windows 2012 Domain Controller
  • Upgrade Windows 2003 Server to windows 2012 Server
  • Upgrading domain functional level
  • upgrading forest functional level
  • USN rollback
  • Windows 2003 AD upgrade to Windows 2012 AD

Blog Archive

  • ►  2013 (1)
    • ►  January (1)
  • ►  2012 (6)
    • ►  August (1)
    • ►  February (5)
  • ►  2011 (3)
    • ►  March (3)
  • ►  2009 (2)
    • ►  November (1)
    • ►  August (1)
  • ►  2008 (1)
    • ►  May (1)
  • ▼  2007 (28)
    • ▼  November (2)
      • How to view and transfer FSMO roles in Windows Ser...
      • Active Directory FSMO roles in Windows 2000 and Wi...
    • ►  October (2)
    • ►  September (24)
Powered by Blogger.

About Me

Unknown
View my complete profile