Active Directory

Read only domain controller

Read only domain controller

RODC is a read-only domain controller that contains read-only Active Directory database copy and responds to security authentication requests.

Before installing RODCs, Microsoft recommends that organizations meet some prerequisites to ensure they work properly, including having a functional AD forest level set at Windows Server 2003 or higher and at least one writable domain controller deployed on Windows Server 2008 or higher.

Read not write. Main Office. Branch Office.

The main reason to introduce RODCs is to allow a Domain Controller to exist in a remote office that may have few users or less physical security as well network security requirements while not sacrificing performance for the remote location. 

The main features of an RODC are as below:

Read-only AD database

RODC host read only database where we cannot make any changes directly. , any database changes must be made to a writable DC, and then replicated back to the RODC. Applications or tools that need read only access of database can use the RODC.

Read-only DNS

RODC also host a read only dns database and RODC DNS doesn’t allow client updates, nor does it register name-service resource records.

Credential caching

An RODC doesn’t store user or computer credentials except for the RODC’s computer account. When the RODC receives an authentication request, it forwards it to an RWDC. The RODC then requests a copy of the credential so that it can service the request itself in the future.

If the password-replication policy allows credential caching, the credential details will be cached and the RODC can service logon requests (until the credentials change).

 Unidirectional replication

RODC support unidirectional replication that means replication happens only from writable domain controller to RODC. The RODC can’t spread misinformation to the rest of the domain, even if a change is made on the RODC.

Filtered attribute set configuration

A filtered attribute set isn’t replicated to any RODC in the forest. If an RODC is compromised and the set modified, a Server 2008 RWDC won’t replicate the values.  It’s also important to note that you can’t add system-critical attributes to the RODC filtered attribute set

Separation of administrator capabilities

An RODC can designate users as server administrators without granting any domain or other DC permissions.

The main benefits of an RODC are as below:

  • Reduced security risk to a writable copy of Active Directory.
  • Better logon times compared to authenticating across a WAN link.
  • Better access to the authentication resource on the network.
  • Better performance of directory-enabled applications.

Recommended content

Guys please don’t forget to like and share the post.Also join our WindowsTechno Community and where you can post your queries/doubts and our experts will address them .

You can also share the feedback on below windows techno email id.

If you have any questions feel free to contact us on admin@windowstechno.com also follow us on facebook@windowstechno to get updates about new blog posts.

How useful was this post?

Click on a star to rate it!

As you found this post useful...

Follow us on social media!

Was this article helpful?
YesNo

Vipan Kumar

He is an Active Directory Engineer. He has been working in IT industry for more than 10 years. He is dedicated and enthusiastic information technology expert who always ready to resolve any technical problem. If you guys need any further help on subject matters, feel free to contact us on admin@windowstechno.com Please subscribe our Facebook page as well website for latest article. https://www.facebook.com/windowstechno
Back to top button