Graham said:
Dear All, thanks for your replies back and apologies for not giving
more information.
am looking at the concept of a DC with a lazy replication schedule
as the point of recovery from an AD "disaster".
as such given that its directory may be some way out of date do not
want users / computers using it for authentication while retaining
its capabilty in terms of replication et al.
as such am needing to consider the implications of pausing the
netlogon service in respect of the above.
the issue of impact w..r.t the Kerberos comes from not fully
understanding the role of the netlogon in Kerberos authentication
and whether i need to go further by disabling say KDC - but then
how does that impact say replication.
Thanks
GT
Your request needs a little clarification in order to provide some
possible solutions, for what reason do you wish to stop the DC
authenticating users?
Dean
--
Dean Wells [MVP / Windows platform]
MSEtechnology
[[ Please respond to the Newsgroup only regarding posts ]]
R e m o v e t h e m a s k t o s e n d e m a i l
Since you're implementing a lazy replication schedule, I'm assuming
you're going to place the DC in question in a site configured to
impose that desired latency. If this is the case, the DC will not
be used by clients for authentication (this assumes the site, site
link and subnet objects are correctly configured in order to make
the DC appear on a subnet of its own). Two possible exceptions
exist; the very first time a client attempts to authenticate it will
possess no site knowledge and will use any DC returned by DNS (local
subnet priority will assist but is dependant upon your IP
configuration) and downlevel clients without the AD extensions do
not support site affinity period.
I would not recommend stopping the NETLOGON service since it
contributes more than merely playing a role in authentication; the
registration of its _critical_ DNS records is a significant example.
It is also worth mentioning that (assuming defaults are in place),
if a new, apparently bad password is submitted against the latent DC
that it will proxy the authentication attempt against the domain's
PDC FSMO which (again assuming defaults are in place) will be up to
date thereby authenticating the client.
In short, it really comes down to the motivating factors for doing
this. If it is solely due to your desire for extreme replication
latency I would suggest that you rely upon the features I described
above, if not, please provide further information.
HTH
Dean
--
Dean Wells [MVP / Windows platform]
MSEtechnology
[[ Please respond to the Newsgroup only regarding posts ]]
R e m o v e t h e m a s k t o s e n d e m a i l