Why We need Read-only domain controllers (RODC)
RODC is a read-only domain controller that contains read-only Active Directory database copy and responds to security authentication requests.
Before installing RODCs, Microsoft recommends that organizations meet some prerequisites to ensure they work properly, including having a functional AD forest level set at Windows Server 2003 or higher and at least one writable domain controller deployed on Windows Server 2008 or higher.
The main reason to introduce RODCs is to allow a Domain Controller to exist in a remote office that may have few users or less physical security as well network security requirements while not sacrificing performance for the remote location.
The main features of an RODC are as below:
Read-only AD database
RODC host read only database where we cannot make any changes directly. any database changes must be made to a writable DC, and then replicated back to the RODC. Applications or tools that need read only access of database can use the RODC.
Read-only DNS
RODC also host a read only dns database and RODC DNS doesn’t allow client updates, nor does it register name-service resource records.
Credential caching
An RODC doesn’t store user or computer credentials except for the RODC’s computer account. When the RODC receives an authentication request, it forwards it to an RWDC. The RODC then requests a copy of the credential so that it can service the request itself in the future.
If the password-replication policy allows credential caching, the credential details will be cached and the RODC can service logon requests (until the credentials change).
Unidirectional replication
RODC support unidirectional replication that means replication happens only from writable domain controller to RODC. The RODC can’t spread misinformation to the rest of the domain, even if a change is made on the RODC.
Filtered attribute set configuration
A filtered attribute set isn’t replicated to any RODC in the forest. If an RODC is compromised and the set modified, a Server 2008 RWDC won’t replicate the values. It’s also important to note that you can’t add system-critical attributes to the RODC filtered attribute set.
Separation of administrator capabilities
An RODC can designate users as server administrators without granting any domain or other DC permissions.
The main benefits of an RODC are as below:
- Reduced security risk to a writable copy of Active Directory.
- Better logon times compared to authenticating across a WAN link.
- Better access to the authentication resource on the network.
- Better performance of directory-enabled applications.
Read-Only Domain Controller (RODC) installation
Now let’s dive into the step-by-step guide. To create a dump of the AD Forest we will use ntdsutil. Did you know that originally Active Directory Domain Services was called New Technology Directory Services? Thus, the ntds in ntdsutil.
Before you proceed
Before you proceed with the Install from Media (IFM) method, you will need to know some basic things.
- The IFM method, obviously, cannot be used for the first Domain Controller of a forest but for adding an extra DC.
- The media file should be created by a DC from the same AD domain.
- If the new DC will be a Global Catalog (GC) server, then the media file should be created by a DC which is also a GC server.
- If the new DC will be a DNS server, the media file should be created by a DC with a DNS role installed.
- If you deploy an RODC, you can create the media from either a writable DC or an existing RODC.
- The IFM method creates a temporary database in the% TMP% folder, so make sure there is enough available space on the folder location.
Installing RODC using the Install from Media (IFM) method
As you may have already understood, the process is done in two basic steps, first in an existing Domain Controller from where we will create the media file and second in the new DC or RODC that will import the file we created when installing Active Directory.
In the existing Domain Controller
1. Log on to DC01, as windowstechno\administrator, then open the Command Prompt, type NTDSUTIL and press Enter.
2. At the ntdsutil prompt, type Active instance NTDS and then press Enter.
2. At the ntdsutil prompt, type ifm and then press Enter.
3. At the ifm prompt, type create sysvol full C:\ifm
and then press Enter.
4. Type, quit, quit.
Open the IFM folder to confirm that the file is there.
Next, make sure you share the IFM folder so that the other remote server can access to ADDS server and copy IFM server from the ADDS Server to remote side server…
In the newly build server that we are going to be promoted as RODC
First, install the Active Directory Domain Services role either through Server Manager or PowerShell. I will not mention the same procedure here because there is already a detailed guide to that procedure.
Also, for the same reason, I will only refer to the point where you declare the folder and not specifically to the process of promoting the server to a Domain Controller. I remind you that you will need to enable Add a domain controller to an existing domain as the new DC should be in the same domain from where you created the file.
Once ADDS installed please open the server manager and select the yellow notifications icon in the top navigation bar of the Server Manager window.
The Notifications Pane opens and displays a Post-deployment Configuration notification. Click the Promote this server to a domain controller link that appears in the notification.
Click on Add a domain controller to an existing domain and type the domain name as “Windowstechno.local”
Enter the domain admin credentials to promote this server.
Click on next button.
On the Domain Controller Options select DNS or GC and Read only domain controller during this installation, As we are installing the RODC in existing domain infrastructure. Enter a desired DSRM Password and click on next.
Note: If the domain controller located in a different site, the site name would have been pre-selected for that site if defined in ADDS. Here we are select the IND-MUM_Staging-Site.in upcoming post, we will explain about staging site.
On this RODC Options screen, we can delegate administrators account who can manage the RODC and also configure which accounts or groups are allowed to have their passwords replicated to the RODC.
In above snapshot, We have added the RODC-DS-A account for RODC administration and also added the group that contain the Mumbai office administrators in password replication option.
Click on next button.
In this window we can define from which DC we need replication done. Here we have selected the DC01 for replication.
In next window it gives option to change the folder paths. in here we keep default. click next to continue.
In next window it gives option to review the installation selection and click next to continue
In next window system will check if its meet all the prerequisites for the installation. click on Install to begin the installation
Click on next button
Once installation done system will automatically reboot.
After reboot, please login to RODC and open the active directory users and computers console to see the RODC object.
So, that’s all in this blog. I will meet you soon with some other stuff. Have a nice day!!!
Guys please don’t forget to like and share the post. Also join our WindowsTechno Community and where you can post your queries/doubts and our experts will address them.
You can also share the feedback on below windows techno email id.
If you have any questions feel free to contact us on admin@windowstechno.com also follow us on facebook@windowstechno to get updates about new blog posts.