Book description
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service.
For the third edition, Active Directory expert Laura E. Hunter offers troubleshooting recipes based on valuable input from Windows administrators, in addition to her own experience. You'll find solutions for the Lightweight Directory Access Protocol (LDAP), ADAM (Active Directory Application Mode), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many other features. The Active Directory Cookbook will help you:
- Perform Active Directory tasks from the command line
- Use scripting technologies to automate Active Directory tasks
- Manage new Active Directory features, such as Read-Only Domain Controllers, fine-grained password policies, and more
- Create domains and trusts
- Locate users whose passwords are about to expire
- Apply a security filter to group policy objects
- Check for potential replication problems
- Restrict hosts from performing LDAP queries
- View DNS server performance statistics
Each recipe includes a discussion explaining how and why the solution works, so you can adapt the problem-solving techniques to similar situations. Active Directory Cookbook is ideal for any IT professional using Windows Server 2008, Exchange 2007, and Identity Lifecycle Manager 2007, including Active Directory administrators looking to automate task-based solutions.
"It is rare for me to visit a customer site and not see a copy of Active Directory Cookbook on a shelf somewhere, which is a testament to its usefulness. The Cookbook takes the pain out of everyday AD tasks by providing concise, clear and relevant recipes. The fact that the recipes are provided using different methods (graphical user interface, command line and scripting) means that the book is suitable for anyone working with AD on a day-to-day basis. The introduction of PowerShell examples in this latest edition will be of particular interest for those looking to transition from VBScript. Laura has also done a great job in extending the Cookbook in this edition to encompass the broad range of changes to AD in Windows Server 2008."
--Tony Murray, Founder of Activedir.org and Directory Services MVP
"If you already understand Active Directory fundamentals and are looking fora quick solution to common Active Directory related tasks, look no further,you have found the book that you need."
--joe Richards, Directory Services MVP
"The Active Directory Cookbook is the real deal... a soup-to-nuts catalog of every administrative task an Active Directory administrator needs to perform. If you administer an Active Directory installation, this is the very first book you have to put on your shelf."
--Gil Kirkpatrick, Chief Architect, Active Directory and Identity Management, Quest Software and Directory Services MVP
Publisher resources
Table of contents
- Active Directory Cookbook
- A Note Regarding Supplemental Files
- Preface
- 1. Getting Started
-
2. Forests, Domains, and Trusts
- 2.0. Introduction
- 2.1. Creating a Forest
- 2.2. Removing a Forest
- 2.3. Creating a Domain
- 2.4. Removing a Domain
- 2.5. Removing an Orphaned Domain
- 2.6. Finding the Domains in a Forest
- 2.7. Finding the NetBIOS Name of a Domain
- 2.8. Renaming a Domain
- 2.9. Raising the Domain Mode to Windows 2000 Native Mode
- 2.10. Viewing and Raising the Functional Level of a Windows Server 2003 or 2008 Domain
- 2.11. Raising the Functional Level of a Windows Server 2003 or 2008 Forest
- 2.12. Using AdPrep to Prepare a Domain or Forest for Windows Server 2003 or 2008
- 2.13. Determining Whether AdPrep Has Completed
- 2.14. Checking If a Windows Domain Controller Can Be Upgraded to Windows Server 2003 or 2008
- 2.15. Creating an External Trust
- 2.16. Creating a Transitive Trust Between Two AD Forests
- 2.17. Creating a Shortcut Trust Between Two AD Domains
- 2.18. Creating a Trust to a Kerberos Realm
- 2.19. Viewing the Trusts for a Domain
- 2.20. Verifying a Trust
- 2.21. Resetting a Trust
- 2.22. Removing a Trust
- 2.23. Enabling SID Filtering for a Trust
- 2.24. Enabling Quarantine for a Trust
- 2.25. Managing Selective Authentication for a Trust
- 2.26. Finding Duplicate SIDs in a Domain
- 2.27. Adding Additional Fields to Active Directory Users and Computers
-
3. Domain Controllers, Global Catalogs, and FSMOs
- 3.0. Introduction
- 3.1. Promoting a Domain Controller
- 3.2. Promoting a Read-Only Domain Controller
- 3.3. Performing a Two-Stage RODC Installation
- 3.4. Modifying the Password Replication Policy
- 3.5. Promoting a Windows Server 2003 Domain Controller from Media
- 3.6. Promoting a Windows Server 2008 Domain Controller from Media
- 3.7. Demoting a Domain Controller
- 3.8. Automating the Promotion or Demotion of a Domain Controller
- 3.9. Troubleshooting Domain Controller Promotion or Demotion Problems
- 3.10. Verifying the Promotion of a Domain Controller
- 3.11. Removing an Unsuccessfully Demoted Domain Controller
- 3.12. Renaming a Domain Controller
- 3.13. Finding the Domain Controllers for a Domain
- 3.14. Finding the Closest Domain Controller
- 3.15. Finding a Domain Controller’s Site
- 3.16. Moving a Domain Controller to a Different Site
- 3.17. Finding the Services a Domain Controller Is Advertising
- 3.18. Restoring a Deleted Domain Controller
- 3.19. Resetting the TCP/IP Stack on a Domain Controller
- 3.20. Configuring a Domain Controller to Use an External Time Source
- 3.21. Finding the Number of Logon Attempts Made Against a Domain Controller
- 3.22. Enabling the /3GB Switch to Increase the LSASS Cache
- 3.23. Cleaning Up Distributed Link Tracking Objects
- 3.24. Enabling and Disabling the Global Catalog
- 3.25. Determining Whether Global Catalog Promotion Is Complete
- 3.26. Finding the Global Catalog Servers in a Forest
- 3.27. Finding the Domain Controllers or Global Catalog Servers in a Site
- 3.28. Finding Domain Controllers and Global Catalogs via DNS
- 3.29. Changing the Preference for a Domain Controller
- 3.30. Disabling the Global Catalog Requirement During a Domain Login
- 3.31. Disabling the Global Catalog Requirement for Windows Server 2003 or Windows Server 2008
- 3.32. Finding the FSMO Role Holders
- 3.33. Transferring a FSMO Role
- 3.34. Seizing a FSMO Role
- 3.35. Finding the PDC Emulator FSMO Role Owner via DNS
- 3.36. Finding the PDC Emulator FSMO Role Owner via WINS
-
4. Searching and Manipulating Objects
- 4.0. Introduction
- 4.1. Viewing the RootDSE
- 4.2. Viewing the Attributes of an Object
- 4.3. Counting Objects in Active Directory
- 4.4. Using LDAP Controls
- 4.5. Using a Fast or Concurrent Bind
- 4.6. Connecting to an Object GUID
- 4.7. Connecting to a Well-Known GUID
- 4.8. Searching for Objects in a Domain
- 4.9. Searching the Global Catalog
- 4.10. Searching for a Large Number of Objects
- 4.11. Searching with an Attribute-Scoped Query
- 4.12. Searching with a Bitwise Filter
- 4.13. Creating an Object
- 4.14. Modifying an Object
- 4.15. Modifying a Bit Flag Attribute
- 4.16. Dynamically Linking an Auxiliary Class
- 4.17. Creating a Dynamic Object
- 4.18. Refreshing a Dynamic Object
- 4.19. Modifying the Default TTL Settings for Dynamic Objects
- 4.20. Moving an Object to a Different OU or Container
- 4.21. Moving an Object to a Different Domain
- 4.22. Referencing an External Domain
- 4.23. Renaming an Object
- 4.24. Deleting an Object
- 4.25. Deleting a Container That Has Child Objects
- 4.26. Viewing the Created and Last Modified Timestamp of an Object
- 4.27. Modifying the Default LDAP Query Policy
- 4.28. Exporting Objects to an LDIF File
- 4.29. Importing Objects Using an LDIF File
- 4.30. Exporting Objects to a CSV File
- 4.31. Importing Objects Using a CSV File
-
5. Organizational Units
- 5.0. Introduction
- 5.1. Creating an OU
- 5.2. Enumerating the OUs in a Domain
- 5.3. Finding an OU
- 5.4. Enumerating the Objects in an OU
- 5.5. Deleting the Objects in an OU
- 5.6. Deleting an OU
- 5.7. Moving the Objects in an OU to a Different OU
- 5.8. Moving an OU
- 5.9. Renaming an OU
- 5.10. Modifying an OU
- 5.11. Determining Approximately How Many Child Objects an OU Has
- 5.12. Delegating Control of an OU
- 5.13. Assigning or Removing a Manager for an OU
- 5.14. Linking a GPO to an OU
- 5.15. Protecting an OU Against Accidental Deletion
-
6. Users
- 6.0. Introduction
- 6.1. Modifying the Default Display Name Used When Creating Users in ADUC
- 6.2. Creating a User
- 6.3. Creating a Large Number of Users
- 6.4. Creating an inetOrgPerson User
- 6.5. Converting a user Object to an inetOrgPerson Object (or Vice Versa)
- 6.6. Modifying an Attribute for Several Users at Once
- 6.7. Deleting a User
- 6.8. Setting a User’s Profile Attributes
- 6.9. Moving a User
- 6.10. Redirecting Users to an Alternative OU
- 6.11. Renaming a User
- 6.12. Copying a User
- 6.13. Finding Locked-Out Users
- 6.14. Unlocking a User
- 6.15. Troubleshooting Account Lockout Problems
- 6.16. Viewing the Domain-Wide Account Lockout and Password Policies
- 6.17. Applying a Fine-Grained Password Policy to a User Object
- 6.18. Viewing the Fine-Grained Password Policy That Is in Effect for a User Account
- 6.19. Enabling and Disabling a User
- 6.20. Finding Disabled Users
- 6.21. Viewing a User’s Group Membership
- 6.22. Removing All Group Memberships from a User
- 6.23. Changing a User’s Primary Group
- 6.24. Copying a User’s Group Membership to Another User
- 6.25. Setting a User’s Password
- 6.26. Preventing a User from Changing a Password
- 6.27. Requiring a User to Change a Password at Next Logon
- 6.28. Preventing a User’s Password from Expiring
- 6.29. Finding Users Whose Passwords Are About to Expire
- 6.30. Viewing the RODCs That Have Cached a User’s Password
- 6.31. Setting a User’s Account Options (userAccountControl)
- 6.32. Setting a User’s Account to Expire
- 6.33. Determining a User’s Last Logon Time
- 6.34. Finding Users Who Have Not Logged On Recently
- 6.35. Viewing and Modifying a User’s Permitted Logon Hours
- 6.36. Viewing a User’s Managed Objects
- 6.37. Creating a UPN Suffix for a Forest
- 6.38. Restoring a Deleted User
- 6.39. Protecting a User Against Accidental Deletion
-
7. Groups
- 7.0. Introduction
- 7.1. Creating a Group
- 7.2. Viewing the Permissions of a Group
- 7.3. Viewing the Direct Members of a Group
- 7.4. Viewing the Nested Members of a Group
- 7.5. Adding and Removing Members of a Group
- 7.6. Moving a Group Within a Domain
- 7.7. Moving a Group to Another Domain
- 7.8. Changing the Scope or Type of a Group
- 7.9. Modifying Group Attributes
- 7.10. Creating a Dynamic Group
- 7.11. Delegating Control for Managing Membership of a Group
- 7.12. Resolving a Primary Group ID
- 7.13. Enabling Universal Group Membership Caching
- 7.14. Restoring a Deleted Group
- 7.15. Protecting a Group Against Accidental Deletion
- 7.16. Applying a Fine-Grained Password Policy to a Group Object
-
8. Computer Objects
- 8.0. Introduction
- 8.1. The Anatomy of a computer Object
- 8.2. Creating a Computer
- 8.3. Creating a Computer for a Specific User or Group
- 8.4. Deleting a Computer
- 8.5. Joining a Computer to a Domain
- 8.6. Moving a Computer Within the Same Domain
- 8.7. Moving a Computer to a New Domain
- 8.8. Renaming a Computer
- 8.9. Adding or Removing a Computer Account from a Group
- 8.10. Testing the Secure Channel for a Computer
- 8.11. Resetting a Computer Account
- 8.12. Finding Inactive or Unused Computers
- 8.13. Changing the Maximum Number of Computers a User Can Join to the Domain
- 8.14. Modifying the Attributes of a computer Object
- 8.15. Finding Computers with a Particular OS
- 8.16. Binding to the Default Container for Computers
- 8.17. Changing the Default Container for Computers
- 8.18. Listing All the Computer Accounts in a Domain
- 8.19. Identifying a Computer Role
- 8.20. Protecting a Computer Against Accidental Deletion
- 8.21. Viewing the RODCs That Have Cached a Computer’s Password
-
9. Group Policy Objects
- 9.0. Introduction
- 9.1. Finding the GPOs in a Domain
- 9.2. Creating a GPO
- 9.3. Copying a GPO
- 9.4. Deleting a GPO
- 9.5. Viewing the Settings of a GPO
- 9.6. Modifying the Settings of a GPO
- 9.7. Importing Settings into a GPO
- 9.8. Creating a Migration Table
- 9.9. Creating Custom Group Policy Settings
- 9.10. Assigning Logon/Logoff and Startup/Shutdown Scripts in a GPO
- 9.11. Installing Applications with a GPO
- 9.12. Disabling the User or Computer Settings in a GPO
- 9.13. Listing the Links for a GPO
- 9.14. Creating a GPO Link to an OU
- 9.15. Blocking Inheritance of GPOs on an OU
- 9.16. Enforcing the Settings of a GPO Link
- 9.17. Applying a Security Filter to a GPO
- 9.18. Delegating Administration of GPOs
- 9.19. Importing a Security Template
- 9.20. Creating a WMI Filter
- 9.21. Applying a WMI Filter to a GPO
- 9.22. Configuring Loopback Processing for a GPO
- 9.23. Backing Up a GPO
- 9.24. Restoring a GPO
- 9.25. Simulating the RSoP
- 9.26. Viewing the RSoP
- 9.27. Refreshing GPO Settings on a Computer
- 9.28. Restoring a Default GPO
- 9.29. Creating a Fine-Grained Password Policy
- 9.30. Editing a Fine-Grained Password Policy
- 9.31. Viewing the Effective PSO for a User
-
10. Schema
- 10.0. Introduction
- 10.1. Registering the Active Directory Schema MMC Snap-in
- 10.2. Enabling Schema Updates
- 10.3. Generating an OID to Use for a New Class or Attribute
- 10.4. Extending the Schema
- 10.5. Preparing the Schema for an Active Directory Upgrade
- 10.6. Documenting Schema Extensions
- 10.7. Adding a New Attribute
- 10.8. Viewing an Attribute
- 10.9. Adding a New Class
- 10.10. Viewing a Class
- 10.11. Indexing an Attribute
- 10.12. Modifying the Attributes That Are Copied When Duplicating a User
- 10.13. Adding Custom Information to ADUC
- 10.14. Modifying the Attributes Included with ANR
- 10.15. Modifying the Set of Attributes Stored on a Global Catalog
- 10.16. Finding Nonreplicated and Constructed Attributes
- 10.17. Finding the Linked Attributes
- 10.18. Finding the Structural, Auxiliary, Abstract, and 88 Classes
- 10.19. Finding the Mandatory and Optional Attributes of a Class
- 10.20. Modifying the Default Security of a Class
- 10.21. Managing the Confidentiality Bit
- 10.22. Adding an Attribute to the Read-Only Filtered Attribute Set (RO-FAS)
- 10.23. Deactivating Classes and Attributes
- 10.24. Redefining Classes and Attributes
- 10.25. Reloading the Schema Cache
- 10.26. Managing the Schema Master FSMO
-
11. Site Topology
- 11.0. Introduction
- 11.1. Creating a Site
- 11.2. Listing Sites in a Forest
- 11.3. Renaming a Site
- 11.4. Deleting a Site
- 11.5. Delegating Control of a Site
- 11.6. Configuring Universal Group Caching for a Site
- 11.7. Creating a Subnet
- 11.8. Listing the Subnets
- 11.9. Finding Missing Subnets
- 11.10. Deleting a Subnet
- 11.11. Changing a Subnet’s Site Assignment
- 11.12. Creating a Site Link
- 11.13. Finding the Site Links for a Site
- 11.14. Modifying the Sites That Are Part of a Site Link
- 11.15. Modifying the Cost for a Site Link
- 11.16. Enabling Change Notification for a Site Link
- 11.17. Modifying Replication Schedules
- 11.18. Disabling Site Link Transitivity or Site Link Schedules
- 11.19. Creating a Site Link Bridge
- 11.20. Finding the Bridgehead Servers for a Site
- 11.21. Setting a Preferred Bridgehead Server for a Site
- 11.22. Listing the Servers
- 11.23. Moving a Domain Controller to a Different Site
- 11.24. Configuring a Domain Controller to Cover Multiple Sites
- 11.25. Viewing the Site Coverage for a Domain Controller
- 11.26. Disabling Automatic Site Coverage for a Domain Controller
- 11.27. Finding the Site for a Client
- 11.28. Forcing a Host into a Particular Site
- 11.29. Creating a Connection Object
- 11.30. Listing the connection Objects for a Server
- 11.31. Load-Balancing connection Objects
- 11.32. Finding the ISTG for a Site
- 11.33. Transferring the ISTG to Another Server
- 11.34. Triggering the KCC
- 11.35. Determining Whether the KCC Is Completing Successfully
- 11.36. Disabling the KCC for a Site
- 11.37. Changing the Interval at Which the KCC Runs
-
12. Replication
- 12.0. Introduction
- 12.1. Determining Whether Two Domain Controllers Are in Sync
- 12.2. Viewing the Replication Status of Several Domain Controllers
- 12.3. Viewing Unreplicated Changes Between Two Domain Controllers
- 12.4. Forcing Replication from One Domain Controller to Another
- 12.5. Enabling and Disabling Replication
- 12.6. Changing the Intra-Site Replication Interval
- 12.7. Changing the Intra-Site Notification Delay
- 12.8. Changing the Inter-Site Replication Interval
- 12.9. Disabling Inter-Site Compression of Replication Traffic
- 12.10. Checking for Potential Replication Problems
- 12.11. Enabling Enhanced Logging of Replication Events
- 12.12. Enabling Strict or Loose Replication Consistency
- 12.13. Finding Conflict Objects
- 12.14. Finding Orphaned Objects
- 12.15. Listing the Replication Partners for a DC
- 12.16. Viewing Object Metadata
-
13. DNS and DHCP
- 13.0. Introduction
- 13.1. Creating a Forward Lookup Zone
- 13.2. Creating a Reverse Lookup Zone
- 13.3. Viewing a Server’s Zones
- 13.4. Converting a Zone to an AD-Integrated Zone
- 13.5. Moving AD-Integrated Zones into an Application Partition
- 13.6. Configuring Zone Transfers
- 13.7. Configuring Forwarding
- 13.8. Delegating Control of an Active Directory Integrated Zone
- 13.9. Creating and Deleting Resource Records
- 13.10. Querying Resource Records
- 13.11. Modifying the DNS Server Configuration
- 13.12. Scavenging Old Resource Records
- 13.13. Clearing the DNS Cache
- 13.14. Verifying That a Domain Controller Can Register Its Resource Records
- 13.15. Enabling DNS Server Debug Logging
- 13.16. Registering a Domain Controller’s Resource Records
- 13.17. Deregistering a Domain Controller’s Resource Records
- 13.18. Preventing a Domain Controller from Dynamically Registering All Resource Records
- 13.19. Preventing a Domain Controller from Dynamically Registering Certain Resource Records
- 13.20. Allowing Computers to Use a Different Domain Suffix Than Their AD Domain
- 13.21. Authorizing a DHCP Server
- 13.22. Locating Unauthorized DHCP Servers
- 13.23. Restricting DHCP Administrators
-
14. Security and Authentication
- 14.0. Introduction
- 14.1. Enabling SSL/TLS
- 14.2. Encrypting LDAP Traffic with SSL, TLS, or Signing
- 14.3. Disabling LDAP Signing or Encryption
- 14.4. Enabling Anonymous LDAP Access
- 14.5. Restricting Anonymous Access to Active Directory
- 14.6. Using the Delegation of Control Wizard
- 14.7. Customizing the Delegation of Control Wizard
- 14.8. Revoking Delegated Permissions
- 14.9. Viewing the ACL for an Object
- 14.10. Customizing the ACL Editor
- 14.11. Viewing the Effective Permissions on an Object
- 14.12. Configuring Permission Inheritance
- 14.13. Changing the ACL of an Object
- 14.14. Changing the Default ACL for an Object Class in the Schema
- 14.15. Comparing the ACL of an Object to the Default Defined in the Schema
- 14.16. Resetting an Object’s ACL to the Default Defined in the Schema
- 14.17. Preventing the LM Hash of a Password from Being Stored
- 14.18. Enabling Strong Domain Authentication
- 14.19. Enabling List Object Access Mode
- 14.20. Modifying the ACL on Administrator Accounts
- 14.21. Viewing and Purging Your Kerberos Tickets
- 14.22. Forcing Kerberos to Use TCP
- 14.23. Modifying Kerberos Settings
- 14.24. Viewing Access Tokens
-
15. Logging, Monitoring, and Quotas
- 15.0. Introduction
- 15.1. Enabling Extended dcpromo Logging
- 15.2. Enabling Diagnostics Logging
- 15.3. Enabling NetLogon Logging
- 15.4. Enabling GPO Client Logging
- 15.5. Enabling Kerberos Logging
- 15.6. Viewing DNS Server Performance Statistics
- 15.7. Monitoring the File Replication Service
- 15.8. Monitoring the Windows Time Service
- 15.9. Enabling Inefficient and Expensive LDAP Query Logging
- 15.10. Using the STATS Control to View LDAP Query Statistics
- 15.11. Monitoring the Performance of AD
- 15.12. Using Perfmon Trace Logs to Monitor AD
- 15.13. Creating an Administrative Alert
- 15.14. Emailing an Administrator on a Performance Alert
- 15.15. Enabling Auditing of Directory Access
- 15.16. Enabling Auditing of Registry Keys
- 15.17. Creating a Quota
- 15.18. Finding the Quotas Assigned to a Security Principal
- 15.19. Changing How Tombstone Objects Count Against Quota Usage
- 15.20. Setting the Default Quota for All Security Principals in a Partition
- 15.21. Finding the Quota Usage for a Security Principal
-
16. Backup, Recovery, DIT Maintenance, and Deleted Objects
- 16.0. Introduction
- 16.1. Backing Up Active Directory in Windows 2000 and Windows Server 2003
- 16.2. Backing Up Active Directory in Windows Server 2008
- 16.3. Creating an Active Directory Snapshot
- 16.4. Mounting an Active Directory Snapshot
- 16.5. Accessing Active Directory Snapshot Data
- 16.6. Restarting a Domain Controller in Directory Services Restore Mode
- 16.7. Resetting the Directory Service Restore Mode Administrator Password
- 16.8. Performing a Nonauthoritative Restore
- 16.9. Performing an Authoritative Restore of an Object or Subtree
- 16.10. Performing a Complete Authoritative Restore
- 16.11. Checking the DIT File’s Integrity
- 16.12. Moving the DIT Files
- 16.13. Repairing or Recovering the DIT
- 16.14. Performing an Online Defrag Manually
- 16.15. Performing a Database Recovery
- 16.16. Creating a Reserve File
- 16.17. Determining How Much Whitespace Is in the DIT
- 16.18. Performing an Offline Defrag to Reclaim Space
- 16.19. Changing the Garbage Collection Interval
- 16.20. Logging the Number of Expired Tombstone Objects
- 16.21. Determining the Size of the Active Directory Database
- 16.22. Searching for Deleted Objects
- 16.23. Undeleting a Single Object
- 16.24. Undeleting a Container Object
- 16.25. Modifying the Tombstone Lifetime for a Domain
-
17. Application Partitions
- 17.0. Introduction
- 17.1. Creating and Deleting an Application Partition
- 17.2. Finding the Application Partitions in a Forest
- 17.3. Adding or Removing a Replica Server for an Application Partition
- 17.4. Finding the Replica Servers for an Application Partition
- 17.5. Finding the Application Partitions Hosted by a Server
- 17.6. Verifying Application Partitions Are Instantiated on a Server Correctly
- 17.7. Setting the Replication Notification Delay for an Application Partition
- 17.8. Setting the Reference Domain for an Application Partition
- 17.9. Delegating Control of Managing an Application Partition
-
18. Active Directory Application Mode and Active Directory Lightweight Directory Service
- 18.0. Introduction
- 18.1. Installing ADAM/AD LDS
- 18.2. Creating a New ADAM/AD LDS Instance
- 18.3. Creating a New Replica of an ADAM/AD LDS Configuration Set
- 18.4. Stopping and Starting an ADAM/AD LDS Instance
- 18.5. Changing the Ports Used by an ADAM/AD LDS Instance
- 18.6. Listing the ADAM Instances Installed on a Computer
- 18.7. Extending the ADAM/AD LDS Schema
- 18.8. Managing ADAM/AD LDS Application Partitions
- 18.9. Managing ADAM/AD LDS Organizational Units
- 18.10. Managing ADAM Users
- 18.11. Changing the Password for an ADAM or AD LDS User
- 18.12. Enabling and Disabling an ADAM User
- 18.13. Creating ADAM or AD LDS Groups
- 18.14. Managing ADAM or AD LDS Group Memberships
- 18.15. Viewing and Modifying ADAM Object Attributes
- 18.16. Importing Data into an ADAM or AD LDS Instance
- 18.17. Configuring Intra-site Replication
- 18.18. Forcing ADAM/AD LDS Replication
- 18.19. Managing AD LDS Replication Authentication
- 18.20. Managing ADAM/AD LDS Permissions
- 18.21. Enabling Auditing of AD LDS Access
-
19. Active Directory Federation Services
- 19.0. Introduction
- 19.1. Installing AD FS Prerequisites for Windows Server 2003 R2
- 19.2. Installing AD FS Prerequisites for Windows Server 2008
- 19.3. Installing the Federation Service in Windows Server 2003 R2
- 19.4. Installing the Federation Service on Windows Server 2008
- 19.5. Configuring an Active Directory Account Store
- 19.6. Configuring an ADAM or AD LDS Account Store
- 19.7. Creating Organizational Claims
- 19.8. Creating an Account Partner
- 19.9. Configuring a Resource Partner
- 19.10. Configuring an Application
- 19.11. Configuring a Forest Trust
- 19.12. Configuring an Alternate UPN Suffix
- 19.13. Configuring the AD FS Web Agent
- 19.14. Enabling Logging for the AD FS Web Agent
-
20. Microsoft Exchange Server 2007 and Exchange Server 2003
- 20.0. Introduction
- 20.1. Exchange Server and Active Directory
- 20.2. Exchange Server 2007 Architecture
- 20.3. Exchange Administration Tools
- 20.4. Preparing Active Directory for Exchange
- 20.5. Installing the First Exchange Server in an Organization
- 20.6. Creating Unattended Installation Files for Exchange Server
- 20.7. Installing Exchange Management Tools
- 20.8. Stopping and Starting Exchange Server
- 20.9. Mail-Enabling a User
- 20.10. Mail-Disabling a User
- 20.11. Mailbox-Enabling a User
- 20.12. Deleting a User’s Mailbox
- 20.13. Moving a Mailbox
- 20.14. Viewing Mailbox Sizes and Message Counts
- 20.15. Configuring Mailbox Limits
- 20.16. Creating an Address List
- 20.17. Creating a Storage Group
- 20.18. Creating a Mailbox Store
- 20.19. Installing Anti-Spam Agents on the Hub Transport Servers
- 20.20. Enabling Message Tracking
- 20.21. Summary
-
21. Microsoft Identity Lifecycle Manager
- 21.0. Introduction
- 21.1. Creating the HR Database MA
- 21.2. Creating an Active Directory MA
- 21.3. Setting Up a Metaverse Object Deletion Rule
- 21.4. Setting Up Simple Import Attribute Flow—HR Database MA
- 21.5. Setting Up a Simple Export Attribute Flow to AD
- 21.6. Defining an Advanced Import Attribute Flow—HR Database MA
- 21.7. Implementing an Advanced Attribute Flow Rules Extension—HR Database MA
- 21.8. Setting Up Advanced Export Attribute Flow in Active Directory
- 21.9. Configuring a Run Profile to Do an Initial Load of Data from the HR Database MA
- 21.10. Loading Initial HR Database Data into ILM Using a Run Profile
- 21.11. Configuring a Run Profile to Load the Container Structure from AD
- 21.12. Loading the Initial AD Container Structure into ILM Using a Run Profile
- 21.13. Setting Up the HR Database MA to Project Objects to the Metaverse
- 21.14. Writing a Rules Extension to Provision User Objects
- 21.15. Creating a Run Profile for Provisioning
- 21.16. Executing the Provisioning Rule
- 21.17. Creating a Run Profile to Export Objects from the ADMA to Active Directory
- 21.18. Exporting Objects to AD Using an Export Run Profile
- 21.19. Testing Provisioning and Deprovisioning of User Accounts in AD
- 21.20. Creating a Run Profile Script
- 21.21. Creating a Controlling Script
- 21.22. Enabling Directory Synchronization from AD to the HR Database
- 21.23. Configuring a Run Profile to Load the telephoneNumber from AD
- 21.24. Loading telephoneNumber Changes from AD into ILM Using a Delta Import and Delta Synchronization Run Profile
- 21.25. Exporting telephoneNumber Data to the HR Database
- 21.26. Using the HR Database MA Export Run Profile to Export the Telephone Number to the HR Database
- 21.27. Searching Data in the Connector Space
- 21.28. Searching Data in the Metaverse
- 21.29. Deleting Data in the Connector Space and Metaverse
- 21.30. Extending Object Types to Include a New Attribute
- 21.31. Previewing Changes to the ILM Configuration
- 21.32. Committing Changes to Individual Identities Using the Commit Preview Feature
- 21.33. Passing Data Between Rules Extensions Using Transaction Properties
- 21.34. Using a Single Rules Extension to Affect Multiple Attribute Flows
- 21.35. Flowing a Null Value to a Data Source
- 21.36. Contributing a UTCCodedTime Attribute in Active Directory
- 21.37. Importing and Decoding the accountExpires Attribute
- 21.38. Exporting and Encoding the accountExpires Attribute
- Index
- About the Authors
- Colophon
- Copyright
Product information
- Title: Active Directory Cookbook, 3rd Edition
- Author(s):
- Release date: December 2008
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596521103
You might also like
book
Active Directory Cookbook, 4th Edition
Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, …
book
Active Directory Cookbook
Those of you who run networks on Windows 2000 know the benefits of using Active Directory …
book
Active Directory, 5th Edition
Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to …
book
Mastering Active Directory - Second Edition
Become an expert at managing enterprise identity infrastructure by leveraging Active Directory Key Features Explore the …