Preparing Active Directory

Information in this section assumes that you have installed the Microsoft Windows 2000 or 2003 Server family operating systems (including Active Directory) on at least one domain controller in your network.


Preparing to Extend the Active Directory Schema

If this is the first installation of SecureLogin on your server, you must extend the Microsoft Active Directory Schema before installing SecureLogin.

Management of the schema is restricted to a group of administrators called schema administrators. The Active Directory Schema snap-in allows schema administrators to manage the Active Directory schema by doing the following:

WARNING:  Extending the schema is a highly sensitive operation, with implications potentially throughout your network. Improper schema modifications can impair or disable Windows 2000 Server and possibly your entire network. Please seek the advice of a qualified systems administrator if you are uncertain about schema extension.

As a schema administrator, you won't perform schema management tasks frequently. Observe three safety precautions that control and limit schema modification:


Extending the Active Directory Management Schema

You can transfer the schema FSMO from one server to another. However, if you have installed a single Windows 2000 domain controller in your network, this procedure is unnecessary. By default, that single domain controller handles the schema FSMO role.


Transferring the Schema FSMO

  1. From the left pane of the Microsoft Management Console (MMC), right-click Active Directory Schema.

  2. Click Change Domain Controller.

  3. (Conditional) If the name in the Current DC field is not the target server, click Specify Name, type the name of the target domain controller, then click OK.

    The following figure illustrates the Current DC field:


    The Current DC field

  4. From the left pane, right-click Active Directory Schema, then click Operations Master > Change.

  5. Click OK to confirm that you want to change the Operations Master.

  6. When you receive the message that the Operations Master was successfully transferred, click OK.


Verifying the Domain Controller

  1. From the left pane of the MMC console, right-click Active Directory Schema, then click Change Domain Controller.

    The following figure illustrates Active Directory Schema in the directory structure:


    Active Directory Schema in the directory structure

  2. Verify that the Current DC field lists the domain controller that you are currently working on, then click OK.

  3. From the left panel, right-click Active Directory Schema, then select Operations Master.

  4. Check The Schema May Be Modified on This Domain Controller check box, then click OK.

    This check box sets a registry entry that permits schema updates. The server automatically detects the change to this registry. You don't have to restart the server to permit the schema to be updated.

    The following figure illustrates this check box:


    The Schema May Be Modified on This Domain Controller check box


Extending the Active Directory Schema

To store information such as a user's credentials, application scripts, preferences and corporate configuration, you must extend the Active Directory schema to accommodate seven object attributes.

  1. Run adsschema.exe, found in the \securelogin\tools directory on the Novell SecureLogin CD or image.

    When you run adsschema.exe on the server that is the FSMO master, adsschema.exe adds seven attributes to the schema:

    ProtAuthMethods. This attribute is only for a User object. It is an octet-string type.

    protocom-SSO-Auth-Data. This attribute is only for a User object. It is an octet-string type. It contains all user-specific authentication data, such as the passphrase.

    protocom-SSO-Entries. This attribute is for User, Container, and Organizational Unit objects. It is an octet-string type. This attribute contains the following:

    protocom-SSO-Entries-Checksum. This attribute optimizes the loading of data from Active Directory. Whenever data changes in the protocom-SSO-Entries attributes, the Checksum attribute is updated. When SecureLogin loads, it reads the checksum and compares it to the checksum in memory. If the checksums are different, SecureLogin reloads the Entries attribute from the directory.

    protocom-SSO-Profile. This attribute contains the user's distinguished name.

    protocom-SSO-Security-Prefs. This attribute stores data required for the Advanced Passphrase policies. This data includes Administrator-set Passphrase questions, Passphrase help information, and settings.

    protocom-SSO-Security-Prefs-Checksum. This attribute functions with the protocom-SSO-Security-Prefs attribute much like the protocom-SSO-Entries-Checksum functions with the protocom-SSO-Entries attribute.

  2. Reboot the computer.

If you need to verify that the schema has been extended, see Verifying the Active Directory Schema.


Assigning Rights

  1. If it is not already running, run adsschema.exe, found in the \securelogin\tools directory.

  2. Click Assign User Rights, then click OK.

    The Assign Rights to This Object dialog box appears.

  3. Specify the full name of the Container Object where you want the rights to be assigned, then click OK.

    The Active Directory Schema dialog box reappears. Click OK to enter another context, or click Cancel.

    If an error appears during an attempted login immediately after the install of SecureLogin on the Active Directory server, OK the message and wait for a few minutes before trying again. The reason for this error is because Active Directory takes time to synchronize. If the error continues, you might need to reboot the server.


Replicating Seven Attributes

To enable other servers to have the ProtAuthMethods, protocom-SSO-Auth-Data, protocom-SSO-Entries, protocom-SSO-Entries-Checksum, protocom-SSO-Profile, protocom-SSO-Security-Prefs, and protocom-SSO-Security-Prefs-Checksum attributes, you must replicate the attributes.

  1. In the MMC tool, navigate to the Attributes folder.

    The following figure illustrates the Attributes folder:


    The Attributes folder

  2. Right-click the ProtAuthMethods attribute, then click Properties.

    The following figure illustrates the ProtAuthMethods attribute:


    The ProtAuthMethods attribute

  3. Check the Replicate This Attribute to the Global Catalog check box, then click OK.

    The following figure illustrates this check box:


    The Replicate This Attribute to the Global Catalog check box

  4. Repeat this process for protocom-SSO-Auth-Data, protocom-SSO-Entries, protocom-SSO-Entries-Checksum, protocom-SSO-Profiles, protocom-SSO-Security-Prefs attributes, and protocom-SSO-Security-Prefs-Checksum.

  5. Shut down and restart the management console.

    Active Directory doesn't incorporate the new attributes until the management console is restarted.