Hope you are doing well and enjoying our all posts.Today we are going to explain about RODC-Read Only Domain Controller.
RODC is a read-only domain controller that contains read-only Active Directory database copy and responds to security authentication requests.
Before installing RODCs, Microsoft recommends that organizations meet some prerequisites to ensure they work properly, including having a functional AD forest level set at Windows Server 2003 or higher and at least one writable domain controller deployed on Windows Server 2008 or higher.
The main reason to introduce RODCs is to allow a Domain Controller to exist in a remote office that may have few users or less physical security as well network security requirements while not sacrificing performance for the remote location.
The main features of an RODC are as below:
Read-only AD database– RODC host read only database where we cannot make any changes directly. , any database changes must be made to a writable DC, and then replicated back to the RODC. Applications or tools that need read only access of database can use the RODC.
Read-only DNS—RODC also host a read only dns database and RODC DNS doesn’t allow client updates, nor does it register name-service resource records.
Credential caching–An RODC doesn’t store user or computer credentials except for the RODC’s computer account. When the RODC receives an authentication request, it forwards it to an RWDC. The RODC then requests a copy of the credential so that it can service the request itself in the future.
If the password-replication policy allows credential caching, the credential details will be cached and the RODC can service logon requests (until the credentials change).
Unidirectional replication– RODC support unidirectional replication that means replication happens only from writable domain controller to RODC. The RODC can’t spread misinformation to the rest of the domain, even if a change is made on the RODC.
Filtered attribute set configuration–A filtered attribute set isn’t replicated to any RODC in the forest. If an RODC is compromised and the set modified, a Server 2008 RWDC won’t replicate the values. It’s also important to note that you can’t add system-critical attributes to the RODC filtered attribute set
Separation of administrator capabilities–An RODC can designate users as server administrators without granting any domain or other DC permissions.
The main benefits of an RODC are as below:
- Reduced security risk to a writable copy of Active Directory.
- Better logon times compared to authenticating across a WAN link.
- Better access to the authentication resource on the network.
- Better performance of directory-enabled applications.
Guys please don’t forget to like and share the post. You can also share the feedback on below windows techno email id.