RAD architecture


Table of Contents

The purpose of this site is to outline the proposed architecture for the Microsoft Enterprise Active Directory. The Office of Information Technology is committed to providing leadership and support for the effective use of technology, offering an extensive range of resources that support education, research and clinical environments. These enterprise-wide services provide technology solutions and secured standards to the Rutgers community.

Active Directory Configuration

The Rutgers Active Directory (RAD) is built across multiple domain controllers. The operating system of the domain controllers is currently Windows Server 2012 R2 and will be kept within one major rev of the latest released operating system. LDAP configuration settings are generally set to the Active Directory defaults.

DC Placement

The RAD domain controllers are geographically dispersed so that each main geographic location has at least one or more domain controller. The domain controllers reside in physically secure datacenters that also co-locate with Rutgers’ core network infrastructure to insure redundant high bandwidth links to RUNet.

The domain controllers for RAD reside on Rutgers private address space and cannot be accessed from outside Rutgers without the aid of VPN. The DNS information for the domain controllers is also only advertised on Rutgers private address space. This space includes Rutgers Newark, Piscataway, New Brunswick, and Camden campuses and the Rutgers Biomedical and Health Science campuses.

There is a NAT boundary that exists on the Rutgers network as a result of the merger between Rutgers and UMDNJ. The domain controllers reside on specific NAT exempted networks so that the IP addresses can be accessed freely across the NAT boundary between the legacy Rutgers space the RBHS space. We are also using multiple DNS views so DNS resolution is handled correctly depending upon which side of the NAT boundary the query is coming from. Other key enterprise RAD components also reside on these networks. Although all clients and resources can get to central RAD resources no matter which side of the NAT they reside, clients may not necessarily be able to communicate directly to each other across the NAT boundary. For example a PC on the legacy Rutgers space may not be able to reach another PC on the other side of the NAT boundary on the legacy UMDNJ space even though both machines are members of RAD.

Although the domain controllers are available on all Rutgers space, departments or units running their own firewalls may need to allow incoming access from the domain resources to insure proper communication. Detailed information can be obtained by inquiring to rad-support@oit.rutgers.edu.

DNS

DNS for RAD has been off-loaded from the domain controllers and is completely handled by the University Infoblox DNS grid. The Infoblox grid supports secure Dynamic DNS for both forward and reverse lookups and fully supports the DNS service records required for Active Directory. The Infoblox grid also supports multiple DNS views so that DNS queries are handled correctly on both sides of the NAT boundary within the university. There is a separate DNS view for the legacy Rutgers space and for the legacy UMDNJ space.

Active Directory Schema

The Rutgers Active Directory schema is open to changes, and includes both vendor and Rutgers custom schema elements. The RAD admin team will entertain any schema modification requests. All schema modifications must follow schema best practices. Vendors tend to follow these best practices. Custom schema modifications are also possible.


Branch diagram showing how various systems communicate with each other

Users

Most users in RAD will be provisioned and de-provisioned through synchronization to the People Registry using an in-house designed Active Directory connector. RAD in turn provisions the accounts to Azure active directory as the basis for Rutgers Office365 accounts. The attribute mappings for provisioned accounts are listed below.

RAD AttributeDescriptionUsed BySource
objectclassclasses necessary for people objectsRADStatic value, NetId Mgmt
SNSurnameRAD, MaCSRegistry, NetId Mgmt(adm accounts only)
CCountryRADRegistry, NetId Mgmt(adm accounts only)
STStateRADRegistry, NetId Mgmt(adm accounts only)
titleTitle of userRAD, MaCSHR (RIAS and Banner),NetId Mgmt(adm accounts only)
descriptionDescriptive InfoRADNetId Mgmt(adm accounts only)
displayNameFormatted name for directory listingRAD, MaCSRegistry,NetId Mgmt(adm accounts only), Also sourced from Preferred name process set by Cliff
lLocationRADRegistry, NetId Mgmt(adm accounts only)
departmentSchool or Department of user at RBHSRAD, MaCSRegistry, NetId Mgmt(adm accounts only)
companyOperational UnitRADRegistry, NetId Mgmt(adm accounts only)
sAMAccountnamesame value as NedIDRAD, IdM, MaCSRegistry, NetId Mgmt(adm accounts only)
userPrincipalNameInternet-Style Login name for a userRAD, MaCSRegistry,NetId Mgmt only copies from RAD to RAD-adm account,RATS
pwdLastSetPassword last changeRAD, MaCSNetID Mgmt
msExchHideFromAddressListsField to hide users from GALRAD, MaCSRegistry, NetId Mgmt(adm accounts only)
cnCommon NameRAD, MaCSRegistry, NetId Mgmt(adm accounts only)
givenNameName strings that are the part of a person’s (user or contact) name that is not their surnameRAD, MaCSRegistry, NetId Mgmt(adm accounts only)
initialsmiddle initialRADNetId Mgmt(adm accounts only)
employeeNumberRCPID, Uniq IdM identifier to recognize a person who come from multiple sources (i.e Banner, PSFT, SRDB,Guest)RAD, IdMRegistry, NetId Mgmt(adm accounts only)
businessCategoryUser’s active rolesRAD, MaCSRegistry, NetId Mgmt(adm accounts only)
proxyAddressesA proxy address is the address by which a Microsoft Exchange Server recipient object is recognized in a foreign mail system. Proxy addresses are required for all recipient objects, such as custom recipients and distribution lists.RAD, MaCSRATS
streetAddressUser’s AddressRAD, MaCSRegistry, NetId Mgmt(adm accounts only)
telephoneNumberUser’s Telephone #RAD, MaCSRegistry, NetId Mgmt(adm accounts only)
luser’s city/localeRAD, MaCSRegistry
ststate or provinceRAD, MaCSRegistry
postalCodepostal codeRAD, MaCSRegistry, NetId Mgmt(adm accounts only)
mailuser’s mail addressRAD, MaCSRATS
employeeIDExternal Id, Uniq IdM identifier to recognize a person who come from multiple sources (i.e Banner, PSFT, SRDB,Guest)RAD, Any Third Party including cloudRegistry, NetId Mgmt(adm accounts only)
managerobject link to managerRAD, MaCSRATS
extensionAttribute1PHI FlagRAD, MaCSRegistry for Now (TBD future),NetId Mgmt(adm accounts only)
extensionAttribute2Display NameRAD, MaCSRATS,NetId Mgmt(adm accounts only)
extensionAttribute3Connect LockingRAD, MaCSRATS
extensionAttribute4Msexchange hide from GALRAD, MaCSRATS
userAccountControla control flag in AD that indicate the active status of an accountRAD, MaCSRegistry/netID Managment
extensionAttribute5Duo EnrollmentRAD, MaCSNetID Mgmt
extensionattribute6Primary SMTP address for userRAD, OITMACS

Group

Initially groups will be provisioned and managed using Microsoft’s Active Directory Users and Computers (ADUC) management interface. This will be used through a transition period for some of the early adopters of RAD. The intention is to eventually put in place a RU Groups Service powered by grouper to handle all group creation and management. When ready, creation of groups will go through the RU Groups Service web interface and propagate to RAD.

Administrative Accounts

The following Delegated rights will be granted to an OU admin underneath the Delegated Sub OU’s.

Service Accounts (Non-People) 

Service accounts will reside in a protected Sub OU, underneath the Other People OU. These accounts will be configured with the following settings enabled.

Elevated accounts can be added to one or 2 groups elevated depending on what rights are needed.

Directory Structure


Tree branch diagram showing directory structure


The Rutgers Enterprise Active Directory is a single forest/single domain.

All NetID Based user accounts are under the top-level People OU. We have almost 300,000 accounts residing in this OU.

All other Non NetID accounts (Service, Admin, Resource, and Application) are under the top-level OtherPeople OU. The OtherPeople OU are separated into sub OUs by Org Type requesting the account.

Rutgers OIT does not make any promises about where a given user account will be located and reserves the right to move objects to meet changing service requirements.

Most computers and other directory objects specific to Rutgers clients are under the top-level Delegated OU. This is where departments, schools, and other Rutgers organizations that request a delegated OU are created. This is the only part of the RAD where campus Windows administrators are granted a non-default level of permissions. (creation/deletion of groups, sub-OUs, computer objects.